Reviewer Part 2
Reviewer Part 2
COSO Framework
→ COSO is an acronym for the Committee of Sponsoring Organizations.
→ The committee created the framework in 1992, led by Executive Vice President
and General Counsel, James Treadway, Jr. along with several private sector
organizations, including the following:
• American Accounting Association
• Financial Executives International
• The Institute of Internal Auditors
• American Institute of Certified Public Accountants
• The Institute of Management Accountants (formerly the National
Association of Cost Accountants)
1|ISOM
The COSO CUBE
Benefits
→ It helps business processes to be performed in a uniform manner according to a
set of internal controls.
→ Is often in a better position to detect fraudulent activity, whether that activity is
perpetrated by cyber criminals, customers or trusted employees.
→ Some organizations find that when they implement carefully crafted internal
controls, it helps them to make existing business processes more efficient. This can
help reduce costs and make the organization more profitable.
Limitations
→ The framework is relatively broad in scope, which means that it can be applied to
a wide variety of organizations and processes.
→ The framework difficult to apply is its organizational structure. Organizations often
find that there are certain processes that could conceivably fall into multiple
categories, or that do not align well with any of the categories. As such,
organizations will often have to make some tough decisions when implementing
the framework.
COBIT Framework
→ COBIT stands for Control Objectives for Information and Related Technology.
→ It is a framework created by the ISACA (Information Systems Audit and Control
Association).
→ It was designed to be a supportive tool for managers—and allows bridging the
crucial gap between technical issues, business risks, and control requirements
→ COBIT is a thoroughly recognized guideline that can be applied to any
organization in any industry.
→ Overall, COBIT ensures quality, control, and reliability of information systems in an
organization, which is also the most important aspect of every modern business.
3|ISOM
ISACA
→ ISACA stands for Information Systems Audit and Control Association.
→ It develops controls and guidance for information governance, security, control,
and audit professionals.
→ This international association focuses on IT governance, providing benchmarks and
governance tools for organizations that employ information systems.
→ ISACA is behind the creation, sponsorship, and driving of the COBIT framework.
History
ISACA first released COBIT as a set of control objectives to aid the financial
1996
auditing community to work better around IT-related structures.
The third edition released and added further management guidelines around
2000
cyber security.
2005 COBIT 4.0 becomes the fourth edition in the COBIT series of releases.
The fifth COBIT version came in and brought along tools, objectives, and best
2012
practices universally applicable to all IT operations in enterprises.
ISACA then updated COBIT 5 to COBIT 2019. It is the latest version. This COBIT
2019 version is more comprehensive, flexible, and suitable for all enterprises,
irrespective of their immediate goals or size.
4|ISOM
About COBIT 2019
→ COBIT 2019, is aimed at facilitating a flexible and tailored Enterprise Governance
for IT (EGIT) design and implementation.
→ Compared to its predecessor COBIT 5, COBIT 2019 is characterized by the following
major changes.
→ The COBIT Core Model has 40 governance and management objectives are
divided into 5 domains to guide, structure, and catalyze the work:
A. Governance objectives domain:
✓ Evaluate, Direct and Monitor (EDM) - 5 objectives
B. Management objectives domains:
✓ Align, Plan and Organize (APO) - 14 objectives
✓ Build, Acquire and Implement (BAI) - 11 objectives
✓ Deliver, Service and Support (DSS) - 6 objectives
✓ Monitor, Evaluate and Assess (EA) - 4 objectives
5|ISOM
COBIT Framework basics
→ COBIT is more than a set of technical standards for IT managers. This framework
supports the requirements of businesses via combined IT applications, related
processes and sources. It provides the following two main parameters:
1. Control: IT management practices, policies, procedures, and structures,
providing an acceptable assurance level that business goals will be met.
2. IT control objective: States the acceptable results level that must be attained
on implementing control procedures for a particular IT operation.
6|ISOM
COBIT 2019 Principles:
→ The latest version, COBIT 2019, presents six principles for a governance system:
✓ Meet stakeholder needs
✓ Holistic approach
✓ Dynamic governance system
✓ Distinct governance from management
✓ Tailored to enterprise needs
✓ End-to-end governance system
COBIT Components
1. Framework
2. Process Descriptions
3. Control Objectives
4. Maturity Models
5. Management Guidelines
Benefits
1. Improves IT management processes 4. Offers flexibility and Scalability
7|ISOM
Goals
→ There are four primary goals of the COBIT framework:
1. To help organizations achieve their objectives for the governance and
management of enterprise IT.
2. To provide a comprehensive set of best practices for enterprise IT governance
and management.
3. To promote alignment between enterprise IT and the business goals of the
organization.
4. To provide a common language for enterprise IT governance and
management.
→ Also, the more specific strategic objectives of IT Controls are to ensure the safe
and secure operation of information systems and the protection from harm or
other potential damage of the organization’s I.T. assets and data maintained by
these systems. These objectives are achieved by a set of policies, procedures,
methods, techniques and technological measures, collectively called “IT
controls”.
8|ISOM
c) the protection and safeguarding of the IT infrastructure, equipment, facilities and
data of the organization. Both of these controls may overlap the typical corporate
administration, human resource, financial and production controls.
D. IT Strategy Controls: These controls are designed to ensure that IT is aligned with
the overall goals and objectives of the organization.
✓ Examples of IT strategy controls include IT governance frameworks, IT portfolio
management processes, and IT risk management policies.
F. IT Security Controls: These controls are designed to protect IT systems and data
from unauthorized access, disclosure, or modification.
✓ Examples of IT security controls include access controls, encryption, and
vulnerability assessments.
→ These IT controls helps with the proper monitoring and control of the organization
as a whole, from the members up to the managers and leaders.
→ It helps to make the organization and its members have an exceptional
performance, better than before and possibly a more cooperative with each
other, just like a human body that has different roles and parts but acts as one.
IT Committee
→ Establishing the IT committee should be done by the board. The primary purpose
of the IT Committee is to provide guidelines, review, and approve the IT critical
strategic issues (systems, plans, etc.) of the Company. An example of an IT
Committee charter is described next.
➢ Main Responsibilities: The duties and areas of responsibility of the IT
Committee are:
• Approve the IT personnel hiring and training plan. The Committee needs to
oversee the personnel hiring and training plan, to look for potential talents
and to see who will be a great addition to the organization.
10 | I S O M
objectives on what needs to be done first, and what should we do next after
the operation and development has been done.
• Plan the development of the skills of its members. Monitoring the members
has it perks, as so we can know what to improve with them, and what needs
to fix and change.
Policy
→ IT policies and procedures establish guidelines for the use of information
technology within an organization. In other words, it outlines what everyone is
expected to do while using company assets.
→ With the help of strong policies and procedures, you can incorporate actions that
are consistent, effective and efficient.
→ Policies helps us to understand what needs to be accomplished, what needs to
be prioritized, and the steps needed & the proper way to accomplish the task.
11 | I S O M
IT Personnel Management Controls
→ IT personnel management controls should be identified and formally established.
Developing the IT personnel management controls should be done by the IT
committee and ratified by the board.
→ In addition to whatever general personnel controls are exercised, at the level of
the Organization, the additional management controls for I.T. personnel include:
b. Employment contracts and job descriptions: All IT personnel should have valid
employment contracts, and job descriptions which should always reflect the
current job assignment.
12 | I S O M
f. Vacation: Vacation taking is also very important especially for I.T. personnel
working in financial and other critical systems as various abnormal and
potentially illegal actions may be discovered.
IT Strategic Plan
→ An IT strategy is a plan to meet the organization's information needs over three to
five years through the development of computer systems and related services
such as automation and technology.
→ The IT strategy includes a computer systems development plan but also the
business needs and goals that must be satisfied including the environmental issues
13 | I S O M
that must be addressed in support of a primary process of the business delivered
through IT.
→ This strategy should also enable and facilitate the knowledge management
framework.
→ The objectives of the IT Strategic Plan are:
1. Align information systems with the competitive strategy of the enterprise to
enhance the company's performance.
5. Accurately target the Corporate Success Factors to achieve, through the use
of IT, the given business objectives. This strategic plan should document the
information needs of the organization for the next 5-10 years. It should be
reviewed at least every year and it should be updated and re-issued every
three to five years. Also, it should be linked to the master business plan of the
organization.
→ A typical IT Systems Development Project can be divided into seven major stages:
1. IT Project Proposal: This phase involves the identification of a business need or
opportunity that can be addressed through an IT project. The IT project
14 | I S O M
proposal is created to outline the purpose of the project, the expected
outcomes, and the estimated costs and benefits.
2. IT Project Initiation: This phase involves the creation of a project team and the
establishment of project goals and objectives. The project team will conduct
a preliminary analysis of the requirements for the project and will identify the
resources needed to execute the project.
3. IT Project Planning: This phase involves the creation of a detailed project plan,
which includes a project schedule, budget, and resource allocation plan. The
project plan will also identify the risks associated with the project and how
they will be managed.
6. IT Project Termination: This phase involves the completion of the project and
the delivery of the IT system to the customer. The project team will conduct a
final evaluation of the system to ensure that it meets the requirements of the
customer.
7. IT Project Closure: This phase involves the closure of the project and the
documentation of the project results. The project team will create a final
report that outlines the successes and challenges of the project. They will also
identify any lessons learned that can be applied to future projects.
15 | I S O M
IT Security Controls
→ The purpose of I.T. security controls is to ensure that all I.T. assets, systems, facilities,
data and files are protected against unauthorized access, potential damage and
improper or illegal use, and that they are operable, safe and secure at all times.
→ Information security protects information from a wide range of threats in order to
ensure business continuity, minimize business damage and maximize return on
investments and business opportunities. Information security can be characterized
as the preservation of:
A. Confidentiality: ensuring that information is accessible only to those
authorized to have access.
4. End User Security Administration Controls: This category includes controls for
managing the security of end-user systems, such as laptops and mobile
devices. End-user security administration controls include procedures for
securing devices and restricting access to sensitive data.
16 | I S O M
5. Password Controls: This category includes controls for managing password
security, such as password complexity requirements, password expiration,
and password reuse restrictions.
→ Overall, IT security controls and policies are essential for protecting an organization's
assets and data from security risks. By implementing a comprehensive set of controls
and policies, organizations can reduce the likelihood and impact of security
incidents, while ensuring compliance with relevant regulations and standards.
17 | I S O M
Purpose
→ The purpose of the Company’s Information Security Policy is to provide the
essential guidelines and controls for secure, efficient and effective data collection
and processing operations, electronic transaction processing and information
reporting services, management information systems, and appropriate customer
information capabilities for Company Management and the Board of Directors to
effectively operate and manage the Company.
Management Responsibility
→ It is the responsibility of Company’s Management to manage the Company’s
computing and telecommunications systems.
→ The President of the Company (or other Officer authorized by the Board) shall
establish an operating structure that effectively runs and optimizes the Company’s
system capabilities and information assets potential consistent with sound business,
banking and regulatory practices.
→ The authorized management staff shall be responsible for, and direct the feasibility
studies regarding the procurement of IT solutions and the development,
implementation, system and data conversion, system review, system operation
and training of personnel for all systems of the company. It is also management’s
responsibility to ensure that procedures are in effect for these systems to operate
in case of disasters or other calamities.
7) System testing
2) Requirements analysis
9) System operation
4) Review of alternative solutions
19 | I S O M
✓ Examples of administrative controls include: a published controls policy,
formal systems development standards and procedures, employment
contracts and confidentiality clauses, personnel screening, continuous
personnel supervision, separation of duties, and disaster recovery
planning for computing and telecommunications systems.
20 | I S O M
implemented on a continuous basis to ensure that all systems are developed
and maintained using the SDLC methodology identified in this document and
in the Company's IT standards.
✓ These audits should also ensure that only authorized personnel perform
approved system changes and improvements, that administrative
controls are in place (segregation of duties, screening and supervision of
personnel, etc.), and that audit mechanisms for the periodic review of the
source code of applications in escrow are in place.
IT systems continuity
→ The Company's management is responsible for establishing and operating proper
backup systems and procedures for all computing and telecommunications
systems.
→ These backup systems must be put in place to protect the company in the event
of a major breakdown or disaster.
→ The Company must develop and maintain a plan to address the possibility of such
events occurring, which will necessitate planning for alternate computing system
processing options (facilities, equipment, procedures, etc).
→ All of this is to ensure that the Company can maintain business continuity.
21 | I S O M
→ IT system continuity requirements may include, at a minimum, the following:
a) identification of critical application systems,
b) evaluation of alternate processing facilities, documented backup and
recovery plans
c) test procedures
d) contingency evaluation procedures,
e) off-site storage procedures, and computer data recovery
f) equipment
g) Computer Insurance Policy
Security requirements:
→ The minimum criteria, rules, and procedures established by Senior Company
Management and ratified by the Board of Directors that must be implemented to
help ensure the achievement of the Corporate Information Security Policy are
defined as information systems security standards.
→ Under management's direction, various staff (e.g., security manager, system
security administrator, end users, IT divisional managers, system development staff,
etc.) implement these. These should include a detailed description of each
procedure and/or control to be implemented.
22 | I S O M
the country in which the Company's office is located. All personnel must keep all
passwords, access procedures, and related controls confidential.
→ Cases involving Company personnel, whether directly or indirectly, may result in
immediate dismissal of these employees, as well as other disciplinary and/or legal
actions as required by national laws or Company regulations.
IT Operational Controls
→ The purpose of IT operational controls is to ensure that the IT facilities and
equipment can remain in good operational status, and therefore ensure the
safe and successful operation of the IT infrastructure and systems for serving the
business purposes of the organization.
→ The main types of IT Operational Controls are:
➢ four categories of IT controls related to infrastructure, contingency
planning, and end-user devices. Here is a brief overview of each
category:
23 | I S O M
4. Personal Computers Controls: This category includes controls used to
manage end-user devices, such as desktops, laptops, and mobile
devices. Personal computers controls may include procedures for
managing software updates, restricting access to sensitive data, and
monitoring device usage.
→ The most critical from a corporate perspective is the IT Disaster Recovery Plan,
which is presented next. The other controls are not discussed as they are
deemed to be outside the scope of this book.
→ The I.T. Disaster Recovery Plan Document describes what must be done in
order to recover from a pre-defined failure and resume operating an
Information System.
→ The contents of this plan should be:
iii. Security Issues: A detailed statement of the security issues regarding I.T.
disaster recovery and how these should be implemented to facilitate the
recovery process.
iv. Risks Covered: A detailed statement of the natural and other risks
covered, such as rain, fire, storm, earth-quake, etc.
xii. Recovery Testing Strategy: A detailed statement of the testing strategy for
all elements of the recovery process and the resources required.
xvi. Appendix: The appendix may contain external support contracts for the
recovery process, insurance contracts, insurance claims forms, and all other
pertinent documentation required for the recovery process to be
completed (.e.g, distribution list, user comments form, glossary of recovery
terms, vital records inventory list, systems and data based software
configuration lists, vehicles list for logistics support, the details (names,
phone numbers) of backup top management that must be present to
authorize critical operations in case the assigned recovery management
personnel are absent, etc.).
26 | I S O M
IT technical controls
→ The purpose of IT Technical Controls is to ensure that the operating system, data
base and data communications software can remain in good operational
status, and therefore ensure the safe and successful operation of the IT
infrastructure and systems for serving the business purposes of the organization.
1. Input Controls: These controls are designed to ensure that data entered into
the system is accurate, complete, and authorized.
✓ Examples of input controls include validation checks, which verify the
accuracy and completeness of data, and access controls, which ensure
that only authorized users can enter data into the system.
27 | I S O M
2. Processing Controls: These controls are designed to ensure that data is
processed accurately and completely.
✓ Examples of processing controls include error handling procedures, which
detect and correct processing errors, and reconciliation procedures,
which verify that processed data is accurate and complete.
3. Output Controls: These controls are designed to ensure that data output from
the system is accurate, complete, and secure.
✓ Examples of output controls include formatting and labeling controls,
which ensure that output is easily understandable and properly identified,
and distribution and access controls, which ensure that output is only
accessed by authorized users.
Input Controls
→ The main objective of input controls is to prevent the entry of erroneous,
incomplete, or otherwise improper data into the computerized information system.
Also, to ensure that each transaction is authorized, processed correctly, and
processed only one time.
→ This is because imputing of data is the area where significant risks and exposures
for abuse, crime and errors exist. These controls must ensure: accuracy of data,
completeness of input and validation of input.
• Design both the documents and the screens so as to minimize the number of
errors which could be made by the data entry personnel, especially when
data are keyed from documents.
• Include check digits in the codes that identify transactions and other entities
which enable the computer application software to check whether a code
has been entered correctly.
• Display a message on the screen (for online systems) to remind data entry
personnel that all input transactions should be authorized (i.e the original
documents should be checked). For batch systems the check for
authorization should be visual.
28 | I S O M
2. Completeness of input: In order to ensure completeness of input, information
systems developers should provide instructions and software code in the system
developed so that:
• For batch systems, all transactions entered into the system, should
be compared against the count for the batch produced by the
computer program of the information system. Also, financial totals for the
batch, when financial data are involved, should be compared between what
has been inputted and what exists on the input documents.
• For both batch and online systems, the approach of “Dual read” may be
applied, especially for very critical financial or other-type transactions.
• This means that the data are inputted twice, once by person A, the second
by person B, and the input is accepted only when both actions (input by
person A and input by person B) are the same.
29 | I S O M
check can also be performed by comparing the individual detail and total
numerical items entered, and the financial total produced by the
computerized system. If a difference occurs then the data may have to be
corrected and inputted again.
• Code checks: The system can compare the code entered, beyond its digit
code (as explained beforehand), with valid codes exiting in the corporate or
other database. The result of all validations is an error file, a valid transactions
file and an error report for subsequent human inspection and correction.
Processing Controls
→ The main objective of processing controls is to ensure that transactions entered into
the computerized application system are valid and accurate, that external data
are not lost or altered, and that invalid transactions are reprocessed correctly.
• Cross footing tests: Cross footing tests mean the execution of logical tests for
information consistency. This presupposes that two independent computations
of a total figure can be made and compared.
• Functional checks: Functional checks ensure that invoices for zero or negative
amounts are not printed. Also funds are not transferred or paid beyond some
upper of pre-set limit per customer account.
• Rounding off checks: Correct rounding off of financial data can avoid a
possible “salami” attack where very tiny sums (e.g., 1 cent) are deposited into
an account of the defrauder for every financial transaction processed. This may
amount to several hundreds or millions of dollars (or euros) in a financial
institution in a given year stolen and defrauded.
• Parity checks: The addition of a parity bit (i.e., make all “1” bits even or odd) in
a set of data to be processed, assures that bits are not lost during computer
processing and prevents data corruption.
30 | I S O M
• Sequence checks: Sequence checks are used to check for missing items either
within the given transaction or in a pre-defined set of transactions.
Output Controls
→ The main objective of output controls is to authenticate all the other controls, i.e.,
to ensure that only authorized transactions are processed correctly and that
reports, screens and other output (e.g. magnetic media) are of the highest quality,
complete and available only to authorized personnel.
→ Output controls include:
• Schedule checks: to ensure that reports, media and documents are produced
and printed according to schedule.
• Report quality checks: Report quality checks ensure that all printed output is of
the highest quality.
• Output log: The output log is used to record manually all the outputs produced,
printed and distributed. This may serve as evidence for historical purposes,
especially when disputes have to be settled and for auditing purposes.
31 | I S O M
corporate committee (made up of the Chief Executive Officer, Chief Financial
Officer, Human Resources Director, etc.).
IT Balanced Scorecard
→ The whole idea of the Balanced Scorecard (as discussed in Chapter 11) is that it
gives you a clear picture of how well you're doing. When it comes to IT, however,
the rules for keeping score can get a little murky.
→ IT departments frequently use a set of metrics to gauge their progress, but they
track performance indicators -- like system availability and network uptime -- that
are unfamiliar to people in other areas of the business.
→ So while IT may believe it's performing well, the rest of the organization may be
less convinced of its success. The traditional mind-set of IT personnel has been
reactive, and their focus has been limited to putting out fires and answering
distress calls.
→ Also IT departments must align their strategic goals (via their own IT Balanced
Scorecard) with strategic goals defined by business managers (in the corporate
Balanced Scorecard) in order to have the best results delivered by IT.
→ All these goals, objectives and performance measures are best managed by the
BSC framework.
→ An example of such a Balanced Scorecard for the IT function is included in figure
FI10.01 (more examples are contained in the appendix):
32 | I S O M
Strategic Goals Measures
4. For the IT human resource management function: Turn over ratios, Training
per employee (amounts, hours), and Average tenure within the company.
33 | I S O M
IT Management Reporting Controls
→ In addition to the corporate procedures the IT Department must report to upper
levels of management the IT related performance issues. Especially these reports
should contain:
ITIL FRAMEWORK
→ In the early days of enterprise IT, the information technology department was
viewed as a cost center within the business. Communication and collaboration
between the IT department and the business was poor, and many organizations
lacked any formalized processes for requesting services or reporting IT incidents. As
a result, there was a common perception within many organizations that IT did not
add much value and did not effectively serve the needs and goals of the business.
34 | I S O M
These services must align with the strategic requirements of the business and they
must be delivered by the IT organization in accordance with agreed service levels.
→ Several standards have been released, including COBIT, ISO 20000, and others, but
the ITIL framework has become the most widely accepted and practiced standard
for managing the lifecycle and delivery of IT services. ITIL is a framework of best
practices for managing the It service lifecycle. ITIL's publications and guidance
have transformed enterprise IT with their emphasis on aligning IT services with the
strategic demands of the business.
→ The key difference between ITSM and ITIL is that ITSM is a paradigm and ITIL is a
framework of best practices.
❖ ITIL goes beyond simply defining the relationship between the IT organization and
the business. ITIL is a framework for effectively managing IT services throughout the
entire service lifecycle. The ITIL framework offers guidance and best practices for
managing the five stages of the IT service lifecycle: service strategy, service design,
service transition, service operation and continual service improvement.
35 | I S O M
❖ Organizations who practice ITSM may think of IT as a service-provider to the
business, but they may follow a separate framework like COBIT or ISO/IEC 20000 for
managing IT services. Still, ITIL is the most commonly applied framework of best
practices for organizations operating within the ITSM paradigm.
→ It was 1986 and the British government saw that its information technology was
getting increasingly costly - there was a need to develop a methodology for IT
service management that would enable cost savings and more efficient use of
resources.
→ By 1988, the CCTA had published a set of guidelines known as the Government
Infrastructure Management Method (GITMM), however the word "government" in
the name of the standard was seen to have a negative influence on private-sector
adoption.
→ In 1989, the GITMM was re-named the Information Technology Infrastructure Library
(ITIL).
→ The first version of ITIL was highly unrefined compared to later versions. Released in
40 separate volumes, it included guidance on service level management, help
desk management, change management, contingency planning, problem
management, configuration management and cost management.
→ There was also plenty of highly technical subject matter, including best practices
for cabling, configuring backup power supplies and designing office acoustics.
→ Despite the poor organization of ITIL v1, the standard and ITIL processes continued
to grow in popularity as additional publications were released throughout the
1990's.
36 | I S O M
known as ISO/IEC 20000 and other ITSM standards were beginning to emerge as
well.
→ Just in the year 2000, the CCTA merged into Great Britain's Office for Government
Commerce (OGC), BSI released the BS 15000:2000 specification for ITSM and
Microsoft, using ITIL as inspiration, created their own ITSM framework known as
Microsoft Operations Framework (MOF).
→ To remain relevant in the face of growing competition, the ITIL framework and
processes needed to be improved, re-invented, and reorganized into a more
structured framework that would become known as ITIL V2.
→ This revision of ITIL allowed OGC to describe new IT concepts like release and
deployment management and clearly define processes like ITIL incident
management and the financial management of IT assets. Publishing ITIL V2 would
also allow for the elimination of duplicate entries that characterized ITIL V1.
❖ The first volume of ITIL v2 was released in 2001. By 2002, seven volumes of ITIL V2
were made available:
1. Service Support
2. Service Delivery
3. ICT Infrastructure Management
4. Security Management
5. Application Management
6. Software Asset Management
7. Planning to Implement Service Management
→ 2005 saw the release of the ITIL V2 glossary that would clarify certain terms in the
framework that were poorly defined. In 2006, the OGC released a supplement to
ITIL V2 called ITIL small-scale implementation that provided additional guidance for
small businesses who hoped to benefit from the ITIL framework. ITIL V2 was a more
complete and organized version of ITIL V1 that served as a necessary intermediate
standard between V1 and the even more robust and comprehensive ITIL V3.
37 | I S O M
ITIL V3: Introducing the IT Service lifecycle
→ By 2007, the OGC had further refined their approach to ITSM and were prepared
to release an even more comprehensive and well-organized update to ITIL V2. ITIL
V3 was released in 2007 as a set of five publications, each corresponding to an
individual stage of the IT service lifecycle. The five books were titled:
1. ITIL Service Strategy
2. ITIL Service Design
3. ITIL Service Transition
4. ITIL Service Operation
5. ITIL Continual Service Improvement
→ Together, the five books of ITIL V3 (which would become known as ITIL 2007 after
the ITIL 2011 revision) described a comprehensive set of processes and functions
that support the various aspects of IT service delivery.
38 | I S O M
→ While previous versions of ITIL placed a strong emphasis on the management of IT
services throughout the service lifecycle, the ITIL 4 framework is built around a new
model called the Service Value System (SVS).
Purpose of ITIL
→ The goal is to improve efficiency and achieve predictable service delivery. The ITIL
framework enables IT administrators to be business service partners, rather than just
back-end support.
→ ITIL guidelines and best practices align IT department actions and expenses to
business needs and change them as the business grows or shifts direction.
→ ITIL helps you create accurate, repeatable processes to keep quality consistent.
Rely on the Industry Standard. ITIL is a globally recognized framework proven to
help businesses build a robust IT management system, ensure a high quality of
customer service, and constantly improve their IT-enabled services.
39 | I S O M
and/or employee’s issues, nor the IT service desk to be drowned under a
deluge of change-related incidents. This unwanted disruption, and
potentially cost, is a foundation stone in the need for a change
management process.
➢ In short, this core pillar of ITIL aims to reduce downtime caused by incidents
by getting the user back up and running in as little time as possible. An
example of incident management in action is an employee call to the IT
service desk in respect of an app on their mobile phone not working, with
the resolution being either an update to the app, the phone’s operating
system or both. This can either be done by the service desk analyst remotely
or the employee by following provided instructions.
❖ ITIL best practices indicate the proper way to handle problem management:
➢ “The practice of reducing the likelihood and impact of incidents by
identifying actual and potential causes of incidents, and managing
workarounds and known errors.”
There are seven principles defined in ITIL4, which are listed below:
1. Focus on value
➢ The value of the services is always determined in the perspective of customers.
Every service or product should create value to customers and its stakeholders.
More than the creation of value, it has to be realized and acknowledged by
the stakeholders, upon value realization.
41 | I S O M
being served. Therefore, in this scenario the service provider must determine
the service consumer and the key stakeholders i.e. customers, users, or sponsors
etc. By doing this, the service provider will obtain clarity on who will receive
value from that which is being delivered, modified or improved.
➢ Firstly, the existing system has to be assessed, measured and observed to get a
proper / correct understanding of the existing state. The possibility of re-using
them as applicable & feasible should then be determined. This will provide the
required insights of the existing system and guide in making the appropriate
decisions. It is important to understand that, all decisions made to bring about
changes in the existing system, must be made with clarity, based on the existing
reality
➢ It is also important to assess the current state by eliminating biased data and
incorrect assumptions which would lead towards wrong conclusions and
decisions. The individual who does the assessment and recommendations
needs to have specific knowledge about the existing reality, and the state of
the proposed new services and objective of the initiative. There should not be
any bias while doing the assessment.
42 | I S O M
decisions. The metrics established have to be meaningful and should help
interpreting the required outcome.
➢ The iterations which are sequential, are to be sequenced based on the need.
It may be for establishing the new services or improving / modifying the existing
ones. The individual iterations should consider both the requirements and the
resources available and have to be manageable. This will ensure that the results
produced should be tangible and are returned in a timely.
43 | I S O M
➢ Working together in collaboration is emphasized over working in a silo culture.
Which means, bringing excellence through involvement of many, rather than
depending on just individual excellence.
➢ The silo culture can be a result of the existing organizational structure/belief that
does not promote a collaborative culture, refuses encouragement and
empowerment, and does not change established processes & practices,
communication methods used etc.
44 | I S O M
6. Keep it simple and practical
➢ The principle, keep it simple and practical, emphasizes on establishing the
minimum required steps in an approach or process to achieve the objectives.
It is important to produce the solutions which are workable, practical, and
understandable while delivering the solutions, which further, should be able to
deliver value to the customer in terms of outcomes the customer wanted to
achieve.
➢ The continual effort put by the service organization to optimize should result in
improving the performance of services and delivering service value. The
guidance for optimization is obtained through the guidance of ITIL®4 & can
also refer to the guidance provided in best practices followed in industry like
Lean, Kanban and DevOps etc. ITIL®4 complements these frameworks.
45 | I S O M
points would not add any further value. The consideration of compliance needs
such as time, resources, finance etc. should be kept in mind while optimizing.
→ Together, the five books of ITIL V3 (which would become known as ITIL 2007 after
the ITIL 2011 revision) described a comprehensive set of processes and functions
that support the various aspects of IT service delivery. ITIL V3 covers all essential
steps of IT service management, from strategically prioritizing the delivery of IT
services that satisfy business needs to managing the continual service
improvement process.
→ We review and examine the contents of ITIL V3's five core publications, describing
the goals of each stage of the service lifecycle and the processes that support
these ITIL objectives.
→ The service strategy stage facilitates organizations to strategize and set business
goals to meet customer demands and needs.
→ The purpose of Service Strategy is to provide a strategy for the service lifecycle.
The strategy should be in sync with business objectives.
→ The 5 stages of the service lifecycle work together to enable more seamless
delivery and communication between business services and IT. This approach can
be used enterprise-wide. As mentioned above, each major category has
subcategories.
46 | I S O M
Within the category of Service Strategy, there are four subcategories
1. Service Strategy
➢ Service strategy is the first book in ITIL V3 and corresponds to the first stage in
the IT service lifecycle. The purpose of service strategy is to align the actions of
the IT organization with the needs of the business. To do this, the IT organization
must decide on a strategy for effectively serving its customers. As part of Service
Strategy, the IT organization works with the business to determine what services
the IT organization should offer and what capabilities must be developed.
• Service - from its root word serve, it means the action of helping or doing work for
someone. It is also an assistance or advice given to customers during and after
the sale of goods.
❖ There are four processes described in the Service Strategy volume of ITIL V3:
A. Service Portfolio Management - The Service Portfolio is the entire set of services
under management by a service provider. It consists of three major parts:
Service Pipeline, Service Catalog, and Retired Services. Service Portfolio
Management organizes the process by which services are identified,
described, evaluated, selected and chartered.
✓ It is also the scope of services the service provider manages. Managing this
portfolio requires each service to be identified and evaluated to establish
its role in the IT process. Service portfolio management includes the Service
Pipeline, Service Catalog, and Retired Services.
47 | I S O M
B. Financial Management for IT Services - a process that helps the IT organization
manage its budgeting, charging and accounting requirements. The Financial
Management process provides a means of understanding and managing
costs and opportunities associated with services.
✓ It includes three basic activities:
• Accounting: Tracking how money is spent by a service provider.
• Budgeting: Planning how the money will be spent by a service provider.
• Charging: Securing payment from customers for services provided.
2. Service Design
➢ The service design phase of the ITIL framework focuses on seven processes and
the Four Ps of Service Design. Its primary goal is to prevent costly service
disruptions that arise in response to inefficient workflow. Each of the Ps
represents an area of focus crucial to consider when designing the IT service
infrastructure.
48 | I S O M
• Inefficient workflow repetitive/unnecessary tasks–a major source of
inefficiency within teams and is a big waste of one of the most important
resources-time.
✓ Example of inefficient workflow:
- Wasted inventory due to overproduction
- Duplication of efforts and errors
The “Four Ps of Service Design” – represent areas that should be taken into
consideration when designing a service. They are:
1. People: Human resources and customer service representatives are integral to
ITSM. It’s vital to ensure that the members of an organization are adequately
supported and aligned with business objectives.
2. Processes: Measurability is a key component of process management.
Implementing key performance indicators (KPIs) helps keep the IT team aligned
with the rest of the organization’s long- and short-term goals.
➢ Key Performance Indicators:
a) Sales
b) Profit Margin
c) Revenue Growth
d) Revenue Per Client
e) Customer Satisfaction
There are 7 processes described in the Service Design volume of ITIL V3:
1. Service Catalogue Management - The Service Catalog is a subset that contains
services available to customers and users.
49 | I S O M
➢ It is often the only portion of the Service portfolio visible to customers. It
commonly acts as the entry portal for all information services in the live
environment.
➢ A service catalog is the subset of IT services directly available to customers.
Typically, these are the offerings within the larger service portfolio visible to
users.
51 | I S O M
➢ Supplier management ensures that the organization receives the agreed-
upon service levels from its partners. It’s similar to service level management,
but unlike service management, it deals with internal negotiations.
The ITIL service lifecycle stage of Service Transition includes the following main
processes:
A. Change Management
➢ Process Objective: To control the lifecycle of all Changes. The primary
objective of Change Management is to enable beneficial Changes to be
made, with minimum disruption to IT services.
B. Change Evaluation
➢ Process Objective: To assess major Changes, like the introduction of a new
service or a substantial change to an existing service, before those Changes
are allowed to proceed to the next phase in their lifecycle.
52 | I S O M
C. Project Management Transition Planning and Support
➢ Process Objective: To plan and coordinate the resources to deploy a major
Release within the predicted cost, time and quality estimates.
D. Application Development
➢ Process Objective: To make available applications and systems which provide
the required functionality for IT services. This process includes the development
and maintenance of custom applications as well as the customization of
products from software vendors.
H. Knowledge Management
➢ Process Objective: To gather, analyze, store and share knowledge and
information within an organization. The primary purpose of Knowledge
Management is to improve efficiency by reducing the need to rediscover
knowledge.
53 | I S O M
→ Processes: ITIL Service Operation. Service Operation carries out operational tasks.
The ITIL service lifecycle stage of Service Operation ) includes the following main
processes:
A. Event Management
➢ Process Objective: To make sure CIs and services are constantly monitored,
and to filter and categorize Events in order to decide on appropriate actions.
B. Incident Management
➢ Process Objective: To manage the lifecycle of all Incidents. The primary
objective of Incident Management is to return the IT service to users as quickly
as possible.
C. Request Fulfilment
➢ Process Objective: To fulfill Service Requests, which in most cases are minor
(standard) Changes (e.g. requests to change a password) or requests for
information.
D. Access Management
➢ Process Objective: To grant authorized users the right to use a service, while
preventing access to non-authorized users. The Access Management
processes essentially execute policies defined in Information Security
54 | I S O M
Management. Access Management is sometimes also referred to as Rights
Management or Identity Management.
E. Problem Management
➢ Process Objective: To manage the lifecycle of all Problems. The primary
objectives of Problem Management are to prevent Incidents from happening,
and to minimize the impact of incidents that cannot be prevented. Proactive
Problem Management analyzes Incident Records, and uses data collected by
other IT Service Management processes to identify trends or significant
Problems.
IT Operations Management
→ The objective is to monitor and control the IT services and their underlying
infrastructure, executing day-to-day routine tasks related to the operation of
infrastructure components and applications. This includes job scheduling, backing
up and restoring, print and output management, and routine maintenance.
Job scheduling
→ This involves configuring and managing the system's job scheduler to ensure that
tasks and processes are executed efficiently and according to schedule. Console
management can help to ensure that the system's job scheduler is properly
configured, that jobs are scheduled correctly, and that any issues or errors are
identified and resolved quickly.
55 | I S O M
properly configured, that backups are performed regularly, and that data can be
restored quickly and efficiently in the event of a system failure or data loss.
Job Scheduling
Back-up and Restore
Print and Output
Service Desk
→ This is the point of contact between users and the service provider. A service desk
usually handles communication with the users and also manages incidents and
service requests.
Application Management
→ Application Management is responsible for managing applications throughout
their lifecycle.
PRINCIPLES OF AM
Build or Buy
→ The Build or Buy principle helps organizations determine whether to develop an
application in-house or purchase an existing one from a vendor. This decision is
critical because it can have a significant impact on the cost, timeline, and quality
of the application.
→ For example, building an application in-house may provide more control over its
development, but it can also be more expensive and time-consuming.
→ On the other hand, purchasing an existing application can be faster and more
cost-effective, but it may not meet all of the organization's unique requirements.
56 | I S O M
Operation Model
→ The Operation Model principle helps organizations determine how to best operate
and maintain applications over their lifecycle.
→ This includes defining processes for monitoring, troubleshooting, and resolving
issues, as well as determining how to best manage upgrades and changes.
→ This principle is critical because it ensures that applications are reliable,
performant, and secure, and that they meet the needs of users and stakeholders.
AM Lifecycle
A. Requirements: This stage involves identifying the needs of the application's users
and stakeholders. It is important to gather comprehensive and accurate
requirements to ensure that the application meets the desired objectives.
B. Design: Once the requirements have been identified, the next stage involves
designing the application's architecture, functionality, and user interface. This
stage ensures that the application is designed to meet the needs of the users and
stakeholders and is aligned with the organization's goals.
D. Deploy: Once the application has been developed and tested, it is ready for
deployment. This stage involves deploying the application to the production
environment, configuring the necessary infrastructure, and preparing the
application for launch.
E. Operate: Once the application is live, it enters the operational stage. This involves
monitoring the application's performance, addressing any issues or bugs, and
providing support to users.
57 | I S O M
Metrics
→ refer to the quantitative measurements of key performance indicators (KPIs) that
are used to evaluate the performance of the application.
A. Agreed Metrics: Agreed metrics refer to the key performance indicators (KPIs)
that are agreed upon between the application management team and
stakeholders to measure the success of the application management process.
These metrics should align with the overall goals and objectives of the
organization and should be measurable, specific, relevant, and time-bound.
B. Process Metrics: Process metrics are used to measure the efficiency and
effectiveness of the application management process. These metrics provide
insights into how well the process is functioning and can help identify areas for
improvement. Examples of process metrics include the time to complete tasks,
the number of errors or defects, and the frequency of process improvements.
D. Project Metrics: Project metrics are used to measure the success of a specific
project within the application management process. These metrics are used to
track progress, identify issues, and ensure that the project is delivered on time and
within budget. Examples of project metrics include scope and requirements
adherence, project schedule and timeline, budget variance and cost
management, resource utilization and allocation, and risk and issue
management.
E. Training & Development Metrics: Training and development metrics are used to
measure the effectiveness of training and development programs for employees
within the application management process. These metrics provide insights into
how well the programs are working and can help identify areas for improvement.
Examples of training and development metrics include employee satisfaction
58 | I S O M
and retention, skills development and competency assessments, training hours
and completion rates, knowledge transfer and sharing, and succession planning
and career development.
Documentation
→ refers to the collection of information about the application that is used to support
its operation and maintenance.
B. Use & Change Cases: Use and Change cases are documentation that outlines
how the application should be used and what changes can be made to it. This
helps ensure that the application is being used as intended, and that any
changes made to it are done so in a way that maintains its integrity.
D. Manuals: Manuals are documentation that provides users with instructions on how
to use the application. This documentation helps ensure that users can effectively
use the application and understand its features and functionality.
Technical Management
→ Technical Management provides technical expertise and support for the
management of the IT infrastructure.
59 | I S O M
and efficiency of IT processes and services in line with the concept of continual
improvement adopted in ISO 2000.
❖ There is only one process in this area, and it has seven steps:
1. Identifying improvement strategies
✓ Compile a list of what you should measure. This will often be driven by
business requirements.
3. Gathering data
✓ Gathering data requires having some form of monitoring in place.
Monitoring could be executed using technology such as application,
system and component monitoring tools or even be a manual process for
certain tasks.
4. Processing data
✓ process the data into the required format -report-generating technologies
are typically used at this stage as various amounts of data are condensed
into information for use in the analysis activity.
5. Analyzing data
✓ Data analysis transforms the information into knowledge of the events that
are affecting the organization.
60 | I S O M
ITIL benefits and use cases
→ Any organization can use ITIL, from small businesses in the US to large-scale
enterprises abroad. It provides a flexible roadmap for organizations to follow when
undertaking a digital transformation. A few more reasons a company may align
their IT processes with the ITIL framework include:
61 | I S O M
The course will help you to understand:
→ how modern IT and digital service organizations operate
→ how value streams increase speed and efficiency
→ how cultural or behavioural principles guide work that benefits the wider
organization
→ how to use commonly-used service management terms and concepts
Certification Renewal
→ Starting 2023, all PeopleCert Global Best Practice certifications will need to be
renewed after 3 years.
→ ITIL SL recognizes the value of ITIL, not just for IT operations, but for all digitally-
enabled services. Becoming an ITIL 4 Strategic Leader demonstrates that you have
a clear understanding of how IT influences and directs business strategy.
→ To obtain the designation ITIL 4 Managing Professional or ITIL 4 Strategic Leader, you
must complete all modules in each stream, with ITIL Strategist Direct, Plan and
Improve being a universal module for both streams.
62 | I S O M
→ After achieving the ITIL 4 Managing Professional designation, candidates would
only need to complete the ITIL 4 Leader: Digital and IT Strategy module to achieve
the ITIL 4 Strategic Leader designation.
→ ITIL 4 MP has been created for IT practitioners working within technology and digital
teams across businesses.
→ To obtain the designation ITIL 4 Managing Professional or ITIL 4 Strategic Leader, you
must complete all modules in each stream, with ITIL Strategist being a universal
module for both streams.
→ You can transition easily to become an ITIL 4 Managing Professional. Take the ITIL 4
Managing Professional Transition Module.
63 | I S O M
Steps To ITIL 4 Master Certification
→ To attain the ITIL 4 Master Certification, you must take the following courses and
exams:
1. ITIL 4 Foundation with Certification Exam then,
2. ITIL 4 Specialist: Create, Deliver and Support (CDS) with Certification Exam and
3. ITIL 4 Specialist: Drive Stakeholder Value (DSV) with Certification Exam and
4. ITIL 4 Specialist: High Velocity IT (HVIT) with Certification Exam and
5. ITIL 4 Strategist: Direct, Plan and Improve (DPI) with Certification Exam and
then,
6. ITIL 4 - Digital and IT Strategy w/ Certification Exam
64 | I S O M