MindMap Gallery Information technology services ISOIEC20000-2018 version with clause analysis
This is a mind map about information technology services ISO/IEC20000-2018 version with clause analysis, including understanding of clauses, special terminology, series of standards, etc.
Edited at 2023-11-14 11:19:37This is a mind map about bacteria, and its main contents include: overview, morphology, types, structure, reproduction, distribution, application, and expansion. The summary is comprehensive and meticulous, suitable as review materials.
This is a mind map about plant asexual reproduction, and its main contents include: concept, spore reproduction, vegetative reproduction, tissue culture, and buds. The summary is comprehensive and meticulous, suitable as review materials.
This is a mind map about the reproductive development of animals, and its main contents include: insects, frogs, birds, sexual reproduction, and asexual reproduction. The summary is comprehensive and meticulous, suitable as review materials.
This is a mind map about bacteria, and its main contents include: overview, morphology, types, structure, reproduction, distribution, application, and expansion. The summary is comprehensive and meticulous, suitable as review materials.
This is a mind map about plant asexual reproduction, and its main contents include: concept, spore reproduction, vegetative reproduction, tissue culture, and buds. The summary is comprehensive and meticulous, suitable as review materials.
This is a mind map about the reproductive development of animals, and its main contents include: insects, frogs, birds, sexual reproduction, and asexual reproduction. The summary is comprehensive and meticulous, suitable as review materials.
Information technology services ISO/IEC20000
Series standards
ISO/IEC20000-1 service management system requirements
ISO/IEC20000-2 Service Management System Implementation Guide
ISO/IEC20000-3 ISO/IEC20000-1 Scope Definition and Suitability Guidelines (2019 Edition)
ISO/IEC20000-4 Process Reference Model
ISO/IEC20000-5 ISO/IEC20000-1 Implementation Plan Example
ISO/IEC20000-6 Requirements for organizations that audit and certify service management systems
ISO/IEC20000-7 Guidance on the integration and relationship between ISO/IEC:20000-1:2018 and 1SO9001:2015 and ISO/IEC:27001:2013
ISO/IEC20000-8 process assessment model
ISO/IEC20000-9 Guidelines for applying ISO/IEC20000-1 to cloud services
ISO/IEC20000-10
Special terms
assets asset
An element, thing, or entity that has potential or actual value to the organization
Note 1: Value can be tangible or intangible, financial or non-financial, and includes considerations of risks and liabilities. It can be positive or negative at different stages of the asset's life.
Note 2: Physical assets generally refer to equipment, inventory and property owned by an organization. Physical assets are the opposite of intangible assets, which are non-material assets such as leases, brands, digital assets, usage rights, licenses, intellectual property, reputation or agreements, etc.
Note: Assets can also be configuration items (configuration items: elements that need to be controlled to provide services.), but some configuration items may not be assets.
external supplier external supplier
Contract with an organization to participate in the planning, design, conversion, delivery or improvement of services, A party outside the organization that services a component or process.
Note: External suppliers include the specified main suppliers, but do not include their subcontracted suppliers.
Note: Organization external to the organization
internal supplier internal supplier
That part of a larger organization outside the scope of SMS that has documented agreements to facilitate the planning, design, conversion, delivery or improvement of services, service components or processes.
For example: procurement, infrastructure, finance, human resources, facilities, etc. (departments) Note: Both internal providers and SMS-scoped organizations are part of the same larger organization.
event incident
Unexpected interruptions in service and matters that result in a decrease in service quality but have not yet had an impact on customer or user service.
information security incident information security incident
Consists of a single or a series of unexpected or harmful information security events that are highly likely to endanger business operations or threaten information security.
Information security protects the confidentiality, integrity, and availability of information.
Known errors known error
The root cause of the problem has been found, or a method has been found to reduce or eliminate its impact on the service.
question problem
One or more actual or temporary causes of an event.
release release
A combination of one or more changes to a service or service components and new services deployed to the runtime environment as a result of one or more changes.
change request request for change
Proposals for changes to the Service, Service components, or SMS.
Note: Changes to services include the provision of new services, migration of services, and the removal of services that are no longer needed.
Service catalog service catalog
Information about the services an organization provides to its customers.
service component service component
A part of a service that is combined with other elements to provide a complete service. For example: infrastructure, applications, documentation, licenses, information, resources, support services
Note: Service components can include configuration items, assets, or other elements.
service level agreement service level agreement; SLA
A documented agreement between an organization and a customer that defines services and their agreed performance.
Note 1: Service level agreements may also be established between the organization and external providers, internal providers or customers as suppliers.
Note 2: Service level agreements may be included in a contract or other type of documented agreement.
service level objectives service level target
The specific measurable characteristics of the services an organization promises.
Service management service management
A set of capabilities and processes that direct and control an organization's activities and resources used to plan, design, transform, deliver and improve services to deliver value.
NOTE: This standard provides a set of requirements through clauses and subclauses. Each organization can choose how to combine these requirements into the process. Among them, sub-clauses can be used to define the process of organizing SMS.
Request for service service request
Requests for information, consultation, service access, or pre-authorization changes.
Convert transition
The activities involved in moving new or changed services into or out of the operating environment.
Terms understanding
Preface
"Organization" is the organization within the Service Management Body that manages and delivers services to customers. An "organization" within the scope of a service management system may be a part of an organization, such as a department of a large company. An organization or part of an organization that manages and delivers services to customers may also be called a service provider.
When an organization claims compliance with this standard, regardless of the nature of the organization, the content of Chapters 4 to 10 cannot be reduced. Chapters 4-5 require the organization itself to provide evidence of compliance with this standard. Cannot be provided by other parties. The contents of Chapters 6~10 can be supported by other parties, but they need to meet the conditions set forth in 8.2.3.
4 Organizational environment
4.1 Understand the organization and its environment
The organization should identify external and internal matters that are relevant to its intent and impact its ability to achieve the intended results of the SMS.
Internal factors, including the organization’s values, culture, knowledge and performance. For example, internal audit results and self-evaluation results, quality cost data analysis, technology trend information analysis, customer feedback, complaints, review results, actual and expected internal values and culture, organizational performance, etc.
External factors include international, national, regional and local political, economic, social, legal, technological, competitive, market and cultural environmental factors. For example, international trade conditions, laws and regulations, economic environment and development trends, etc.
illustrate: 1. Factors may include positive and negative elements or conditions that need to be considered; 2. It is changing all the time, and it is necessary to regularly monitor the organization's environment, especially the changes and trends that affect the organization's goals.
4.2 Understand the needs and expectations of relevant parties
The organization shall identify: parties relevant to the SMS and services; and the relevant requirements of these parties. Note: Requirements from interested parties may include services, performance and legal, regulatory requirements and contractual obligations related to SMS and the Services.
illustrate: 1. Can include parts outside the scope of the organization's service management system, such as customers, users, communities, external suppliers, regulators, public agencies, non-governmental agencies, investors or employees. 2. The forms of expression required by relevant parties are different and diverse, mainly in the form of contracts, agreements, letters, suggestions, meeting minutes, etc.
4.3 Determine the scope of the service management system
The organization should determine the boundaries and applicability of the SMS to determine its scope. When determining this scope, the organization should consider a) External and internal matters mentioned in 4.1 b) Requirements mentioned in 4.2 c) Services provided by the organization. The definition of the SMS scope should include the services within the scope and the name of the organization that manages and provides the services. The SMS scope should form documented information and be available. Note 1: ISO/IEC20000-3 provides guidance on defining scope. Note 2: The SMS scope definition declares which services fall within the scope. It can be all or part of the services provided by the organization.
Scope example: 1. Organizational scope: This system applies to all departments and personnel related to the IT service business of XX Company. For specific departments involved, please refer to the organizational structure. 2. Location: Located on the second floor of the Miya Building, Miya Road, Miyako District. 3. Service scope: Provide maintenance services for network systems, database systems, application systems, and servers.
4.4 Service management system
The organization shall establish the implementation, maintenance and continual improvement of SMS in accordance with the requirements of this standard, including the required processes and their interactions.
5 Leadership
5.1 Leadership and commitment
Top management should demonstrate leadership and commitment to SMS through the following activities: a) Ensure that the service management policy and service management objectives are established and consistent with the strategic direction of the organization; b) Ensure the establishment, implementation and maintenance of service management plans to support the service management policy and achieve service management objectives and service requirements; c) ensure that appropriate levels of authority are assigned to make decisions related to SMS and services; d) Ensure that the value to the organization and its customers is determined e) Ensure control over other parties involved in the service life cycle; f) ensure that SMS requirements are integrated into the organization’s business processes; g) ensure that the resources required for SMS and services are available; h) communicate the importance of effective service management, achieving service management objectives, delivering value and complying with SMS requirements; i) Ensure SMS achieves expected results j) Direct and support relevant personnel to contribute to the effectiveness of SMS and services k) Promote continuous improvement of SMS and services; l) Support other relevant management roles to demonstrate leadership appropriate to the shared area of responsibility References to "business" in this standard may be interpreted broadly to mean those activities that are central to the organization's purpose for existence.
Understanding: Emphasis on the role and role of top managers in the IT service management system to ensure that the expected results of the management system are achieved through 8 assurances, 1 communication, 1 guidance, 1 promotion, and 1 support.
5.2 Policy
5.2.1 Establish service management policy Top management should establish a service management policy that: a) Appropriate to the organization’s intentions; b) Provide a framework for setting service management objectives; c) include a commitment to meet applicable requirements; d) Includes a commitment to continuous improvement of service management systems and services.
5.2.2 Communicate service management policy The service management policy should: a) Documented information is made available; b) be communicated within the organization; c) When applicable, available to relevant parties.
Understand: Policies are the work intentions and directions officially issued by the organization's top managers. Internally, they are the direction and criteria for action, and externally, they are the purpose and commitment of behavior. The standard requires top management to establish and maintain a service management policy that is consistently appropriate and consistent with the strategic direction of the organization.
5.3 Organizational roles, responsibilities and authorities Top management should ensure that responsibilities and authorities related to the service management system and service-related positions are assigned and communicated within the organization. Top management should assign responsibilities and authorities to: a) Ensure that the service management system meets the requirements of this standard; b) Report service management system performance to top management.
Clearly require top managers to allocate the responsibilities and authorities of relevant positions, and ensure that these personnel and other relevant personnel can correctly understand them. The following may be considered when allocating responsibilities and authorities: ——Business processes and their effectiveness requirements; ——Existing organizational structure, policies, internal systems and job requirements; ——The current personnel capabilities and qualifications need to ensure that the assigned responsibilities are consistent with the required capabilities and qualifications; ——Available resources, including personnel, equipment and facilities, technology, funds, etc. The allocation of responsibilities and authorities should meet the requirements of the IT service management system, and the allocation of roles should consider the needs of process activities. To ensure that process outputs achieve expectations. Personnel and responsibilities should be assigned for reporting on the performance of the IT service management system and opportunities for improvement to top management and within the organization. The distribution of responsibilities and authorities should be conducive to the realization of customer focus. The integrity of the IT service management system in the event of changes should also be ensured. For example, the adjustment of a responsibility across multiple departments without personnel moving can easily cause discontinuity in certain work.
6Planning
6.1 Measures to deal with risks and opportunities
6.1.1 When planning the service management system, the organization shall take into account the matters mentioned in 4.1 and the requirements mentioned in 4.2 and determine the risks and opportunities that need to be addressed to: a) Ensure that the service management system can achieve expected results; b) prevent or reduce adverse effects; c) Achieve continuous improvement of the service management system.
6.1.2 The organization shall identify and document: a) Risks related to: 1) organization; 2) Unsatisfied service requirements; 3) Participation of relevant parties in the service life cycle; b) the impact of SMS service risks and opportunities on customers; c) Risk acceptance criteria; d) Methods used for risk management.
6.1.3 The organization shall plan: a) actions to address and prioritize these risks and opportunities; b) How to: 1) Integrate these measures into the service management system process and implement them; 2) Evaluate the effectiveness of these measures. Note 1: Options for responding to risks and opportunities include: avoiding risks, taking or increasing risks to pursue opportunities, eliminating sources of risks, changing the likelihood or consequences of risks, mitigating risks through agreed measures, sharing risks with other parties or through formal Decide to accept the risk.
1. Risk is the impact of uncertainty, that is, various uncertain factors that exist objectively in a certain environment and within a certain period of time and affect the realization of organizational goals and expected results. The impact of uncertainty can be positive or negative. 2. In ISO/IEC20000-1:2018, there are the following clauses involving "risks and opportunities": 1) The introduction explains the concept of opportunity and risk thinking; 2) Terms: 3.1.20 Risk, 3.2.1 Asset, 3.2.29 Value; 3) Chapter 6 requires the organization to identify risks and opportunities related to service management and develop appropriate responses. ——6.1.1 Planning service management system: The organization shall examine the qualities described in 4.1 and the requirements mentioned in 4.2 to determine the risks and opportunities that need to be addressed; ——6.1.3 Organizational response: a) Measures and priorities to deal with risks and opportunities. ——6.3 Plan the service management system. The plan should take into account the service management policy, service management standards, risks and opportunities, service requirements and the requirements of this standard. 4) Chapter 8 requires organizations to consider risk when determining and delivering the required service mix - 8.2.2 Planning services: Taking into account known limitations and risks, the organization shall propose service changes that serve the service management policy, service management objectives and service requirements in a consistent manner. - 8.3.4.1 Managing external suppliers: The organization shall review external suppliers' service level standards or other contractual obligations for consistency with the customer's service levels and shall manage identified risks. - 8.5.1.3 Change activity management: The organization and interested parties shall make decisions regarding the authorization and priority of change requests. Decisions should consider risk, business benefits, feasibility and financial impact. - 8.7.1 Service availability management: At planned intervals, risks related to service availability shall be assessed and documented information retained. The requirements of the agreement should consider relevant business requirements, service requirements, SLAs and risks. 8.7.2 Service continuity management: At planned intervals, risks related to service continuity shall be assessed and documented information retained. The organization shall determine service continuity requirements. The requirements of the agreement should consider relevant business requirements, service requirements, SLAs and risks. ——8.7.3 Information security management 5) Chapter 9 performance evaluation requires management reviews to consider risks ——9.3 “K) Results of risk assessment and effectiveness of measures to address risks and opportunities in management review.”
6.2 Service management goals and implementation plans
6.2.1 Establish goals The organization should establish service management objectives at relevant functions and levels. Service management objectives should: a) Consistent with the service management policy; b) measurable; c) consider applicable requirements; d) be monitored e) get communication; f) Update when appropriate. The organization should maintain documented information about service management objectives.
6.2.2 Planning to achieve goals When planning how to achieve service management objectives, the organization should determine: a) What to do; b) What resources are needed; c) Who is responsible? d) When will it be completed; e) How to evaluate the results.
The organization should set service management objectives in the relevant functions, levels and processes required by the service management system. Setting service management objectives for the process is a new requirement clearly stated in this standard. The establishment of service management goals and the planning of achievement of service management goals can help organizations achieve consistency in actions. The organization can define what the organization should do by planning: what to do (Which), what resources are needed (What), who will be responsible (Who), when it will be completed (When), and how to evaluate the results (How), that is, the "4W1H" activity. Plan the activities needed to achieve service management goals. For the planning of service management standards and their implementation, follow the planning-review-implementation requirements-inspection and improvement.
6.3 Planning service management system Information Technology - Service Management - Service Management System Requirements 1S0/IEC 20000-1:2018 The organization shall create, implement and maintain a service management plan. Planning should take into account the service management policy, service management objectives, risks and opportunities, service requirements and the requirements of this standard. The service management plan should include the following or include a relevant index: a) Service list; b) known limitations affecting the service management system; c) Obligations such as relevant policies, standards, legal regulations and contractual requirements and how these obligations are fulfilled in SMS and services; d) Service management system and service authority and responsibility; e) The personnel, technology, information and financial resources required to operate the service management system and services; f) Methods of cooperation with other parties involved in the service life cycle; g) Technology used to support SMS; h) How to measure, audit, report and improve SMS and service effectiveness. Other planning activities should be consistent with the service management plan.
1. It is important to consider ways to collaborate with other parties involved in the life cycle. 2. ITIL defines the life cycle of information technology services as five stages, including service strategy, service design, service transformation, service operation and continuous improvement. When information technology services are at different stages, there will be corresponding processes and specifications.
7 support
7.1 Resources The organization shall identify and provide the human, technical, information and financial resources required to establish, implement, maintain and continuously improve the service management system and operate services to meet service requirements and achieve service management objectives.
1. Resources can include human resources, infrastructure, process operating environment, monitoring and measurement resources, technical and financial resources, organizational knowledge, etc. 2. When determining required resources, the organization should consider current capabilities and limitations, such as whether existing materials, human resources and capabilities, mechanical equipment, information and communication systems and facilities can meet operational requirements; if they cannot, The organization should make decisions about what resources are required and ensure the provision of resources, including externally provided resources, to meet resource requirements.
7.2 Capabilities The organization should: a) determine the necessary competencies of staff under the organization’s control that impact the performance and effectiveness of the organization’s SMS and services; b) Ensure that the above-mentioned personnel are competent to perform their jobs based on appropriate education, training or experience; c) When applicable, take steps to obtain the necessary capabilities and evaluate the effectiveness of the steps taken; d) Retain appropriate documented information as evidence of competency. Note: Applicable measures may include: for example, providing training, mentoring or assignment to existing employees; hiring or contracting competent personnel.
7.3 Consciousness People working under the control of the organization should understand: a) Service management policy; b) Service management objectives; c) Services related to their work; d) its contribution to the effectiveness of the service management system, including the benefits of improved performance; e) The impact of non-compliance with service management system requirements.
7.4 Communication The organization shall determine internal and external communication needs related to the service management system and services, including: a) What to communicate; b) when to communicate; c) Who to communicate with; d) How to communicate; e) Who is responsible for communication.
7.5 Documented information
7.5.1 General The organization's service management system should include: a) Documented information required by this standard; b) documented information determined by the organization to be necessary for the effectiveness of the service management system. c) The level of detail of documented information related to service management systems in different organizations may be different because: 1) The size of the organization and the types of its activities, processes, products and services; 2) the complexity of processes, services and their interactions; 3) Personnel capabilities.
7.5.2 Create and update When creating and updating documented information, the organization should ensure appropriate: a) Identification and description (e.g. title, date, author or citation number); b) format (e.g. language, software version, graphics) and medium (e.g. paper, electronic); c) Review and approval of suitability and adequacy.
7.5.3 Control of documented information
7.5.3.1 The service management system and documented information required by this standard shall be controlled to ensure: a) Available and suitable for use where and when required; b) Be adequately protected (e.g. from loss of confidentiality, inappropriate use, loss of integrity, etc.).
7.5.3.2 To control documented information, the organization shall address the following activities, where applicable: a) Distribution, access, retrieval and use; b) storage and protection, including maintaining readability; c) change control (e.g. version control); d) Retention and processing. External documented information determined by the organization to be necessary for planning and operating the service management system shall be appropriately identified and controlled. Note: Access implies decisions such as allowing only browsing of documented information, or allowing and authorizing browsing and updating of documented information.
7.5.4 Documented information of service management system Documented information of the service management system should include: a) Scope of service management system; b) Service management policies and objectives; c) Service management plan; d) Change management policy, information security policy and service continuity plan(s); e) the organization’s service management system process; f) Service requirements; g) Service catalog; h) Service Level Agreement (SLA); i) Contracts with external suppliers; j) Agreements with internal suppliers or customers who are suppliers; k) Procedures required by this standard; |) Records required to demonstrate compliance with this standard and relevant evidence of the organization's service management system. Note: Clauses 7.5.4 provide a list of key documented information for the service management system. This standard also has specific requirements for the documentation of other information, which must be documented or recorded. 1S0/IEC 20000-2 provides guidance.
7.6 Knowledge
The organization shall determine and maintain the necessary knowledge to support the operation of the SMS and services. Knowledge should be relevant and available and accessible to the appropriate personnel. Note: Knowledge is specific to the organization and its SMS, services and related parties. Use and share knowledge to support the achievement of desired results and SMS and service operation.
Understanding: New in the 2018 edition, organizational knowledge is knowledge unique to an organization, usually obtained from its experience, and is information used and shared to achieve organizational goals. Including the knowledge generated by its own internal development and external knowledge useful for the survival and development of the organization. Organizational awareness can be based on: 1. Internal sources, such as intellectual property, knowledge gained from experience, experience and lessons learned from failed and successful projects, acquisition and sharing of unwritten knowledge and experience, and improvement results of processes, products and services, etc.; 2. External sources, such as standards, academic exchanges, professional conferences, knowledge collected from guests or external providers, etc. The organization should encourage the acquisition of necessary knowledge based on changing needs and trends. The update of knowledge changes rapidly, and organizations should promptly acquire knowledge and update the knowledge structure as the internal and external environments change to ensure sustainable development.
8 run
8.1 Operational planning and control
The organization shall plan, implement and control the necessary processes to meet the requirements and implement the measures identified in Chapter 6 according to the following requirements: a) Process performance indicators established according to requirements; b) Implement process controls to maintain consistency with established performance indicators; c) Maintain the necessary level of documented information to ensure that the process proceeds as planned. The organization shall control planned changes to the SMS and review unintended consequences of the changes and, if necessary, take steps to mitigate any negative impacts (see 8.5.1). The organization shall ensure that outsourced processes are controlled (see 8.2.3).
understand: 1. The intention of this clause is to plan, implement and control processes that meet the requirements of relevant parties inside and outside the organization. These processes are the common factors of the actions identified in Chapter 6. These common factors can standardize and combine these processes. actions, and improve action job performance. There are three key points that should be made clear here: “stakeholder requirements”, “process” and “action”. 2. Process: ——General process of system certification: document and record control, internal audit, management review, and continuous improvement; ——The macro process of system planning: organizational environment identification, leadership planning, system planning, and monitoring, measurement, analysis and evaluation of system operation; ——The specific process of system operation: service portfolio (service delivery, asset management, etc.), relationships and agreements (business relationship management, service level management, etc.), supply and demand (demand management, capacity management, etc.), service design and conversion (change management) , release and deployment management, etc.), resolution and fulfillment (service request management, incident management, etc.), service assurance (service availability, service continuity, etc.); ——Basic management processes of the organization: such as human resources management, procurement management, financial management, supply chain management, production operation control, etc., not limited to supporting SMS.
8.2 Service portfolio
8.2.1 Service delivery
The organization should operate a service management system to ensure coordination of activities and resources. The organization shall implement the required activities to deliver the service. Note: Service portfolio is used to manage the entire life cycle of all services, including proposed services, services under development, officially provided services defined in the service catalog, and services that have been offline. Service portfolio management ensures that service providers have the correct service portfolio. Service portfolio activities in this standard include service planning, control of parties involved in the service life cycle, service catalog management, asset management and configuration management.
Goal: Maximize service returns and minimize risks. Measurement: Establish measurement methods regarding service risks and benefits (in conjunction with 9.1 Monitoring, measurement, analysis and evaluation of SMS and services); Selection: service selection and priority method, that is, facing the market and customers, which services to choose and how to set the priority of services, corresponding to service planning 8.2.2; Asset allocation: clarify which assets are used to support services, what is the relationship between assets, etc. Asset investment is the component of service costs and should be optimized to maximize returns and minimize risks, corresponding to asset management 8.2.5 and allocation management 8.2.6 ; Evolution: The complete process of a service through proposal, development, operation and offline. Services in operation are usually represented by service catalogs, especially the "service catalog" determined by signing a contract with a specific customer, corresponding to service planning 8.2.2, service Directory Management 8.2.4: Management and control: Manage and control relevant parties in the life cycle to control costs and reduce risks, corresponding to 8.2.3; Underpinning: Financial management is a key input to service portfolio management, and by understanding the cost structure adopted in service delivery, companies may be able to determine cost baselines. Accurate cost calculation requires understanding of financial information, service demand information, organization's service capability information, etc., corresponding to 8.4.1.
8.2.2 Service planning/planning services
Requirements for existing services, new services, and service changes should be confirmed and documented. The organization shall identify the criticality of services based on the needs of the organization, customers, users and interested parties. The organization should identify and manage dependencies and replication relationships between services. Taking into account known limitations and risks, the organization should propose service changes so that the service is consistent with the service management policy, service management objectives and service requirements.
1. Regularly determine and record services and their requirements (including laws, regulations, contracts and other requirements of relevant parties) in different progress states as a basis for organizational planning services (as part of service portfolio management). The services planned by the organization can be market-oriented services that are not targeted at specific customers, or they can be services targeted at specific customers. 2. Existing services are presented through the service catalog. New services need to go through suggestions, development and other processes to become operable and deliverable services. Service changes are controlled through the change management of the existing or established SMS. 3. The determination of service importance is related to the following factors: the organization’s benefits and costs; customer payment, business importance and benefits supported by the service, and time urgency; user experience (such as availability, etc.); compliance with the supervision of other relevant parties. compliance, supplier benefits and costs, etc. Service importance can be tailored to specific customers or built around the organization itself. Regardless of the importance, an evaluation model needs to be established for analysis and evaluation. 4. The following factors should be considered when setting priorities: business needs that generate change requests and new services or change service proposals; service management goals; investment, benefits, and risks in implementing change requests and service proposals; available resources; known constraints.
8.2.3 Relevant parties controlling the service life cycle
8.2.3.1 The organization shall be responsible for the requirements of this standard and the services delivered regardless of any party involved in performing activities during the support services life cycle. The organization shall validate and apply this standard to evaluate and select other interested parties in the service life cycle. Other interested parties may be external suppliers, internal suppliers and suppliers acting as customers. Other interested parties should not provide and operate all services, service components or processes within the scope of the service management system. The organization shall confirm and document the following: a) Services provided and operated by other relevant parties; b) Service components provided and operated by other relevant parties; c) Processes or partial processes within the scope of the service management system operated by other relevant parties. The organization shall integrate services, service components and processes within the scope of the service management system provided and operated by the organization itself or other relevant parties to meet service requirements. The organization shall coordinate with other relevant parties including planning, design, conversion, delivery and improvement activities in the service life cycle.
1. Evaluation criteria: The impact of other parties on the service should be considered. The decisive factors of the impact include the responsibilities of other parties in the service life cycle, frequency of participation, costs/expenses paid by the organization, and their role in service benefits and risks. An assessment model should be built based on these factors. 2. Selection criteria: The priority of selecting other parties should be determined based on the size of their impact. What the organization should determine and record is to establish a list of its three deliverables (i.e. services, service components, service processes) for each other party on the basis of identifying other parties and their responsibilities, and compare them with the organization Responsibilities are integrated to meet customer needs and achieve service management objectives. The goal is to improve service efficiency and reduce costs and risks. The integrated methods and results should be achieved through configuration management.
8.2.3.2 The organization shall define and apply the following controls to other interested parties: a) measure and evaluate process performance; b) Measure and evaluate the effectiveness of services and service components in meeting service requirements. Note: 1S0/1EC20000-3 provides guidance on controlling other relevant parties during the service life cycle.
1. The measurement and evaluation of the effectiveness of services and service components should focus on the following points: The effectiveness indicators of services meeting needs include the degree of satisfaction of customer business value. The role of services on these indicators should be determined based on customer business operation performance indicators. , and then convert it into effectiveness indicators in terms of service availability, information security, service continuity, etc. Service availability is closely related to capacity, service performance, etc.; service component effectiveness indicators (such as availability, information security, etc.) are service effectiveness The basis for measurement is to establish the corresponding relationship between service effectiveness indicators and service component effectiveness indicators. The corresponding relationship can be established by using the component path through which the service is completed. 2. The relationship between customer business, services, and service components can be realized through the configuration management system, and measurement and evaluation models can be established accordingly.
8.2.4 Service catalog management
The organization should create and maintain one or more service catalogs. The service catalog should include information describing the organization, customers, users and other interested parties of the services, their expected results and dependencies between services. The organization should provide customers, users and other interested parties with appropriate access to (parts of) the service catalog.
1. The services in the service catalog include business services and technical services. Business services consist of the computing capabilities directly required by the customer's business system, while technical services consist of the technical activities provided by the organization to the customer's business system. 2. Common technical services take the type of information assets as the first dimension, such as servers, network equipment, computer room air conditioners, etc.; then add the dimension of technical activities to form technical services, such as server installation and deployment services, server inspection services, etc.; Technology The activities are as follows: Installation and deployment include initial installation and deployment, upgrade and patching, transformation, configuration and testing, asset identification and monitoring, daily inspection and inspection, troubleshooting, migration, backup and recovery, audit and evaluation, abandonment (uninstallation, Disconnect, clear, store, destroy), etc.; 3. In the event of service transfer, service offline, new services, etc., the organization should update and maintain the service catalog in a timely manner.
8.2.5 Asset Management
The organization shall ensure that the assets used to deliver the services are managed to meet the service requirements and obligations under clause 6.3c). Note: 1S055001 and 1S0/IEC19770-1 identify requirements to support implementation, operational assets and IT asset management. Note: In addition, when assets are used as configuration items, refer to configuration management.
1. Assets refer to the assets used to provide services, which may include assets of the organization, customers, suppliers and other parties, as long as these assets are indispensable for the delivery of services. 2. Classification of information assets: physical assets, such as computer hardware, communication facilities, physical support facilities; information/data, such as documents and databases; software, such as application software, system software, development tools and programs, etc.; producing products or The ability to provide services; people; intangible assets, such as willingness, reputation, etc. 3. Assets should be managed throughout the life cycle. An organization can only conduct complete life cycle management of its own assets. For other parties’ assets, the organization can make requests and suggestions, and the responsibilities and management work belong to other parties. 4. The organization should form an asset ledger and maintain the ledger regularly. Asset ledger attributes usually include asset major category, medium category, small category, name, code, status, responsible person, location, supplier, etc. The organization should add attributes according to the actual situation. For example, in Information Security 8.7.3, assets should Add safe assignment attribute.
8.2.6 Configuration Management
The types of configuration items should be defined and services should be classified into configuration items. Configuration information should be logged to a level of detail appropriate to the criticality and type of service, and access to the configuration information should be controlled. The configuration information of each configuration item should include: a) Unique identification; b) Configuration item type; c) Configuration item description; d) Relationship with other configuration items: e) status. Configuration items should be controlled, and changes to configuration items should be traceable and auditable to maintain the integrity of configuration information. Configuration items should be updated after changes to the configuration item are released. The organization should verify the accuracy of configuration information at scheduled intervals. If deviations are discovered, the organization shall take necessary action. When applicable, configuration information should be available to other service management activities.
1. Based on the service process, CI types such as customers/users, service organizations, service catalogs and SLAs and related documents, services, IT systems and assets can be defined. 2.CI attributes generally include: 2.1 Identification type: configuration item name; configuration item identification/label (such as automatically identifiable barcode); configuration item number; version number/model/license number/copy number; 2.2 Definition class: configuration item classification; configuration item definition; configuration item description; 2.3 Relationship class: The relationship between configuration items: parent-child relationship, composition relationship, integration relationship, association relationship, etc.; the corresponding relationship between configuration items and IT components; installation environment; supplier; 2.4 Management category: status; location; responsible department/responsible person (configuration item owner, maintenance manager or custodian, etc.); configuration administrator/approval authority (the organization that approves the configuration item); approval date (the configuration item is organized date of approval); access rights; cost; date of provision; maintenance service period; 2.5 Utility category: availability index; capacity index; security index; continuity index; 2.6 Component class: Without further refinement of the composition, the composition of IT components (including specific attributes) can be used as configuration item attributes, such as CPU utilization; 3. CI status includes: configuration items that have been approved but have not yet been launched (referring to deployment in the production environment) (not yet imported into the configuration library). Their status includes: under development/procurement, tested, and accepted; The status of online configuration items (in the configuration library) includes: in use, deactivated, under maintenance (pending changes, etc.); The status of offline and removed configuration items includes: deleted/removed; lease expired (cloud service); damaged. 4. CI should be controlled. The intention of this clause is that the organization should track and audit changes in CI to ensure that CI is controlled and that CI information is consistent with the physical CI deployed in the system. 5. Examples of CI audit implementation requirements are as follows: Regularly review configuration items to ensure that the information in the configuration management database is complete, accurate and updated in a timely manner. The audit should be performed: after the implementation of major changes; after disaster recovery; other inspections or management requirements should be performed at least once a year. Regularly check the log information and audit operation records in the configuration management system, and report any suspicious situations immediately to ensure the operational security of the configuration database; regularly organize sampling inspections of the information in the configuration management database, and the sampling should cover all configuration item categories. The sampling ratio follows: for configuration items with a total of less than 10 items, the sampling ratio is 50%; for configuration items with a total number between 10 and 50 items, the sampling ratio is 20%; for configuration items with a total number of more than 50 items, the sampling ratio is 10 %wait.
8.3 Relationships and Agreements
8.3.1 General provisions
Organizations may use suppliers to: a) Provide or operate services; b) Provide or operate service components; c) Run a process or part of a process in the organization's SMS.
1. The organization signs service contracts with external providers (which define service requirements), and signs documented agreements with internal providers and customers (as suppliers) to meet service requirements. 2. For the same customer, no matter how many suppliers there are, all supplier contracts or documented agreements should ultimately be consistent with the customer's SLA. Decompose the target indicators in the SLA of a specific customer to obtain the target indicators in the supplier's contract or agreement. 3. Note: There is a complete life cycle process for supplier management, that is, initial supplier evaluation, supplier access, procurement (selection), use, monitoring, re-evaluation, exit, etc. The process before procurement is not within the scope of this standard.
8.3.2 Business relationship management
Customer users and other interested parties of the Service should be identified and recorded. The organization should designate a person(s) responsible for managing customer relationships and maintaining customer satisfaction. The organization should establish channels of communication with customers and other interested parties. Communication should promote understanding of the changing business environment in which the service operates and enable the organization to respond to new or changed service requirements. The organization shall review service performance trends and service results at planned intervals. The organization should measure satisfaction with services based on a representative sample of customers at planned intervals. Results should be analyzed and reviewed to identify opportunities for improvement and reported. Closures and service complaints should be logged, managed, and reported. If a service complaint cannot be resolved through normal channels, a means of escalation should be provided.
1. The core of customer relationship management is value, which means long-term and continuous dynamic management of customer value identification, retention and development in the life cycle process of customer identification, preservation and development to achieve a win-win situation. Value judgment includes: the value provided by the organization to customers; the contribution of customers to the value of the organization. Customer relationship management includes three stages: collecting customer information and establishing a customer database; classifying customers and carrying out key account management; meeting customer needs, correctly treating customer complaints, and cultivating loyal customers. 2. Business environment refers to the customer's business environment, including external environmental factors such as policy, economy, technology, social culture, customers, competitors, etc., as well as organizational vision, strategic goals, internal organizational structure, personnel responsibilities, products/services, production line operations, and supply Internal environmental factors such as chain management, customer relationship management, application systems and IT infrastructure. 3. The basis for establishing service performance indicators is service management objective 6.2, service delivery 8.2.1, and target indicator 8.3.3 in the service level agreement; 4. Service complaints are part of the satisfaction evaluation. There should be dedicated personnel to manage the entire process of service complaints, which includes complaints filing, reception and recording, processing, confirmation, closure, reporting and other activities. Complaint channels should be part of the organization's communication channels, and multiple complaint channels should be established. If the complaint cannot be resolved through normal channels, the organization should provide other channels to resolve the complaint in an escalating manner, such as the management hotline, etc.
8.3.3 Service level management
The organization and customer should agree on the services to be provided. For each service delivered, the organization should establish one or more SLAs based on documented service requirements. The SLA should include service level objectives, workload limits and exceptions. The organization shall monitor, review and report at planned intervals: a) Performance corresponding to service level objectives; b) Comparison of workload limits in SLA with actual workload status and periodic changes. If service level objectives are not met, the organization should identify opportunities for improvement. Note: Agreements between an organization and its customers to provide services can take many forms, such as a written agreement, a transcript of a verbal agreement in a meeting, an email instruction agreement, or a terms of service agreement.
1. The monitoring requirements for services and SLA are as follows: the service items that need to be monitored should be clearly defined based on the SLA and service catalog; the implementation process and key activities of each service item (customer business activities supported by the service) should be clarified. Record information of implementation operations should be obtained for the implementation process, including: service records, such as incident tickets; work logs; service reports, such as weekly reports, monthly reports, etc.; customer satisfaction. For key activities, information system status information should be obtained, including: load conditions, including average values, peak and trough values, and periodic changes; physical status; availability, performance and security status; system configuration parameters. 2. Target values of evaluation indicators: service/system availability indicators; service/system performance indicators; service/system security indicators; service/system capacity indicators; service/system continuity indicators, such as RTO, RPO; service execution indicators, such as The completion rate, accuracy rate and timeliness rate of each task, etc. The organization should estimate the actual value of the evaluation indicator based on the collected monitoring information, compare it with the target indicator, and conduct SLA review. Key points about the review include: the evaluation method should be clear, including measurement and statistical methods; the service level should be evaluated item by item based on the service monitoring results. The degree of indicator satisfaction; giving a conclusion on whether the SLA is met and the degree of satisfaction; and determining the SLA maintenance or change requirements based on the SLA evaluation conclusion. 3. The review results should be summarized to form a service level report. The main contents of the report include: service SA satisfaction degree; customer satisfaction status. For those that do not meet the SLA, identify the reasons for the deficiency and propose improvement measures, including: service catalog and service level optimization; service organization optimization including: positions and personnel; service capability optimization including: skills and training; service process optimization; service resource optimization; service Scheduling optimization; other improvements.
8.3.4 Supplier management
8.3.4.1 Management of external suppliers The organization shall designate a person(s) responsible for managing external provider relationships, contracts, and performance. The organization shall have a documented contract for each external provider. The contract should include or contain references to: a) the scope of services, service components, processes or process parts provided or operated by external providers; b) Requirements that external suppliers should meet; c) Service level objectives or other contractual obligations; d) Authority and responsibilities of the organization and external providers. The organization should assess the alignment of external providers' service level objectives or other contractual obligations with customer SLAs and manage identified risks. The organization shall define and manage interfaces with external providers. The organization shall monitor the performance of external providers at planned intervals. If service level objectives or other contractual obligations are not met, the organization should ensure that opportunities for improvement are identified. The organization shall review contracts against current service requirements at planned intervals. Before contract changes are approved, the impact of the changes on SMS and services should be assessed. Disputes between the organization and external providers should be documented and managed until closure.
1. Supplier performance should establish performance indicators based on the results provided, and conduct daily tracking, monitoring and evaluation as the basis for regular re-evaluation, continuous selection or exit. It should be based on the SLA (i.e., the entire service performance indicator) signed with the customer, consider the supplier's responsibilities and deliverables, and combine the dependencies between services, service components, CI, etc. established in Configuration Management 8.2.6 to clarify the supplier's responsibilities and deliverables. The role of parties and deliverables in the entire service is determined, and performance indicators are ultimately determined. 2. The risk identification of external suppliers should be based on performance deviation (deviation from customer SLA), specifically including: the risk of direct performance deviation; lack of, insufficient or inadequate personnel, tools, assets, information, etc. that support the results delivered by external suppliers. Risks that may be caused by changes, which will ultimately be reflected in the risk of direct performance deviation; risks controlled by external suppliers, such as external suppliers' operating conditions, bankruptcy, compliance, etc. 3. The interface with external suppliers includes communication interfaces between personnel, interfaces between the management systems of both parties (such as customer relationship management systems, project management tools, etc.), and operation and maintenance management tools (such as management tools used by both parties). interface, etc. 4. Regularly review the external supplier's satisfaction with the contract to resolve disputes between the two parties, contract changes, etc. Contract reviews should be organized and carried out regularly by specialized departments or personnel, and it should be clear whether both parties should maintain the contract or change it. For external suppliers that deviate significantly from contract requirements, exit measures should be taken. To evaluate the impact of contract changes on SMS and services, you should refer to the impact benchmark in 8.5.1.1. If the impact is large, appropriate countermeasures should be taken. For example, for external suppliers that want to withdraw, backup plans should be made in advance to redesign and convert services. (8.5). For disputes between the parties, the provisions of the contract should be implemented and the issues should be resolved and closed directly.
8.3.4.2 Management of internal suppliers and customers as suppliers The organization shall prepare, negotiate and maintain documented agreements with each internal supplier or customer as a supplier that define service level objectives, other commitments, activities and interfaces between the parties. The organization shall monitor the performance of internal suppliers or customers acting as suppliers at planned intervals. If service level objectives or other agreed commitments are not met, the organization should ensure that opportunities for improvement are identified.
The organization should enter into agreements with internal suppliers or customers that include service level objectives, other commitments, activities and interfaces. The management process of internal suppliers or customers as suppliers can refer to the external supplier management process in 8.3.4.1. The establishment of service level objectives and performance indicators can refer to the external supplier's service level objectives, performance indicators and other related content (8.3.4.1). The content organization of the agreement may refer to the relevant content of the external supplier contract (8.3.4.1). The definition and management of interfaces can refer to the content related to external provider interfaces (8.3.4.1). The organization should regularly monitor and evaluate the performance of internal suppliers or customers to determine whether service level objectives or other agreed commitments are met, and require external suppliers to improve.
8.4 Supply and demand
8.4.1 Budgeting and accounting of services
An organization should budget and account for services or service groups in accordance with its financial management policies and processes. Costs should be budgeted to enable effective financial control and service decisions. The organization shall monitor and report actual costs against budget at planned intervals, review financial forecasts and manage costs. Note: While many organizations charge for their services, not all. The budgeting and accounting of services in this standard excludes charges to ensure applicability to all organizations.
The organization should clarify the service cost objects and cost classifications. The cost objects include the organization's tools and assets (software and hardware), personnel, IT infrastructure, locations, etc. that support the service. The cost classification includes direct costs, indirect costs and allocable indirect costs, such as : Whether the cost object is included in the cost estimate is secondary to whether the object belongs to the organization. The part shared and jointly constructed by both parties is an allocable cost. The organization should regularly monitor, evaluate, and report actual costs and review budget effectiveness.
8.4.2 Demand management
At planned intervals, the organization shall: a) Determine current demand for services and predict future demand; b) Monitor and report demand and service usage Note: Demand management is responsible for understanding the current and future needs of customers. Capacity management works in conjunction with demand management to plan and provide sufficient capabilities to meet demand.
1. Manage service requirements to ensure that the organization obtains service requirements in a timely manner and converts them into SLA-signable services as much as possible to increase service revenue. 2. Service needs originate from customer business changes, and demand acquisition is the starting point of the service life cycle process. The key to demand management is to establish a demand analysis model. For a specific customer, the model mainly includes the following contents: Input: including customer business, customer IT systems and services, as follows: —Customer business: Distinguish between the customer's core business and supporting business, focus on the current status and development trends of the core business, especially the changing trend of business capacity. Special attention should be paid to the time sensitivity of business capacity, that is, the peak period of business capacity and special dates. Business capacity (such as Double Eleven and other dates for Internet business); 1. Customer IT systems: upgrades, scrapping, resource capacity (such as effective utilization rate), new technology adoption, new system launch, application migration to cloud computing, etc.; One-to-one services: Status of running services (services in the customer service catalog) (including service effective usage or consumption, service satisfaction with SLA, customer evaluation of service pricing), service change requests, customer evaluation of service providers and changes, etc. Output: including customer business, customer IT systems and services, as follows: 1. Customer business: new business capacity (including business capacity during peak periods and special days) and demand for computing power or business services; Customer IT system: new additions and changes in functions, performance, capacity, etc., as well as corresponding technical service needs; One-to-one services: Customer service providers that have withdrawn, customer core business operational performance, customer SLA satisfaction, customer evaluation of service cost performance, as well as new service requirements and changed service requirements; New service requirements or changed service requirements may be identified and documented through 8.2.2. 3. Demand management is closely related to capacity management. Changes in the resource capacity of the customer system can generate demand for business services (computing power) and technical services (such as inspections, fault handling, etc.). The prediction from business capacity to resource capacity here also applies. for capacity management. Demand management should be related to financial management, and demand should be quantified with financial data to facilitate organizational management to predict and manage the impact of demand on finance. The organization should deploy or adopt the customer's existing testing tools. Obtain the input data of the demand analysis model, conduct demand analysis regularly, and form a demand analysis report, focusing on the customer's existing service consumption and new service needs. 4. When appropriate, the organization can use the demand conversion rate (converted to formal SI, A) as a performance indicator of SMS.
8.4.3 Capacity management (or capacity management)
Capacity requirements for personnel, technical, information and financial resources should be determined, documented and maintained taking into account service and performance requirements. Plan for organizational response capabilities, including: a) Current and forecast capabilities based on service needs; b) The expected impact on the agreed service level objectives, service availability, and service continuity requirements; c) The time span and threshold of capability changes. The organization shall provide sufficient capacity to meet agreed capacity and performance requirements. The organization should monitor the use of capabilities, analyze capability and performance data and identify opportunities for improvement. Note: Capacity is also called capacity, English: capacity
1. Clarify the sources of capacity requirements and determine, record and maintain resource capacity requirements. The sources of capacity requirements are service and performance requirements, while resources include four types of resources: human, technical, information and financial. 2. When considering customer business operations, organizations should pay attention to three levels of capacity, namely business capacity, service capacity and resource capacity. The cost of the organization is ultimately reflected in the consumption of four resources: human resources, technology, information and financial resources. 3. Capacity planning includes capacity forecasts, expected impacts of predicted capacity, and time scales and thresholds for capacity changes. 4. Time scale refers to the average measurement of the time it takes to complete a certain physical process. Generally speaking, the slower the evolution of a physical process, the longer its time scale. The larger the spatial range involved in a physical process, the longer its time scale. The time of change of service capacity can be regarded as the speed of change of service capacity. If the change of service capacity is stable and the time scale is long, the change of resource capacity is small and the prediction model is simple. On the contrary, the prediction model is complex: and the prediction accuracy is relatively low. Low. In short, the small time scale means that the service capacity changes drastically. Determining factors for the timing of changes in service capacity include: 1) The degree of oscillation of the customer's business capacity line, such as peak and trough alternating frequency and curvature; 2) The peak value, trough value, normal value of customer business capacity and their corresponding time periods (for example, 9 to 11 am is the peak period); 3) Load balancing of service components. 5. After the service deployment is completed according to the capacity plan, monitoring and analysis measures should be taken to verify whether the capacity meets the service capacity and performance requirements. If there are deviations, improvement measures should be proposed. Capacity monitoring content includes: computing resources, transmission resources and storage resources, such as: 1. Computing resources: performance indicators such as effective utilization of memory, CPU, etc. and timely response rate; 2. Transmission resources: effective bandwidth utilization and performance indicators such as QoS and delay; 3. Storage resources: performance indicators such as effective utilization of storage space and timely response rate. To analyze monitoring data and generate alarms (such as performance failures caused by insufficient capacity, etc.), this requires setting a capacity threshold as the basis for alarms.
8.5 Service design, construction and transformation
8.5.1 Change Management
8.5.1.1 Change management strategy A change management strategy should be established and documented to determine: a) Service components and other matters under change management control; b) Change categories, including emergency changes, and how to manage them; c) Criteria for identifying changes that may have a significant potential impact on customers or services.
1. The organization should clarify its change management policy and formulate a formal document. The change management policy includes: assets (or CI) and other factors (such as SLA) that fall within the scope of change management; change types and disposal processes; and the assessment basis for the impact of the change. Service components subject to change management control should include all assets and other factors that support the service, as described below: ——Assets that support customer business operations: mainly refer to information systems, computer room physical facilities, etc. ——The organization's assets that support customer business operations: If the organization only provides technical services, the assets refer to service monitoring and management tools. If the organization also provides assets that support customer business operations (see the previous item), these assets should be subject to change management control; ——Supplier assets: Depending on the services, service components and functions provided by the supplier, it may provide service monitoring and management tools, or it may provide service components to the organization, and then the organization deploys them to support customer business operations. In information systems, these assets should be subject to change management controls. ——Change type: Changes are usually classified based on the two dimensions of information asset type and technical activities, such as installation and deployment, upgrades, patches, transformations, migrations, scrapping, etc. 2. Change level is a more stringent classification of change, usually based on the degree of impact of the change: The basic factors for assessing the level of change are catch-up (time is the basis) and degree of impact. The analysis of the degree of impact should comprehensively consider the following factors: ——System or service events: such as reduced efficiency, interruptions and leaks; ——Systems or services involving the country and society should give priority to leaks, focusing on personal safety and intangible impacts; ——Systems or services with strong real-time nature should give priority to interruption events, mainly focusing on the impact on finance, customers, production capacity, reputation, brand, etc.; ——For systems or services that are only used internally, priority should be given to efficiency reduction events, mainly the impact on production capacity; ——Systems or services used by customers should give priority to interruption events, focusing on the impact on customers, production capacity, etc. 3. Set the change level according to the change assessment rules, which should at least include: Standard changes: changes with mature operations, high repeatability, and minimal impact; General changes: changes that have a certain impact on the system and require the participation of IT and business managers in the review; Important changes: changes that require review by top leadership; Emergency change: The change time requirement is urgent, and the focus is on the success rate of the change and the timeliness of completion. 4. To track the change execution process, the change status should be clear, such as: new, reviewed, planned, under review, reviewed, scheduled, implemented, waiting, modified, completed, closed, etc.
8.5.1.2 Change management initiation Change requests, including proposals to add, delete, or transfer services, should be recorded and categorized. The organization shall adopt the service design and transformation in 8.5.2 for the following situations: a) New services that may have a significant impact on customers or other services according to the change management strategy; b) According to the change management strategy, service changes that may have a significant impact on customers or other services; c) Categories of changes that should be managed by Service Design and Transformation according to the change management strategy; d) Service offline; e) Transfer existing services from the organization to customers or other parties; f) Transfer existing services from customers or other parties to the organization. New services or changed services within the scope of 8.5.2 should be evaluated, approved, scheduled and reviewed through the change management activities in 8.5.1.3. Change requests not managed through 8.5.2 shall be managed through the change management activities in 8.5.1.3.
1. Adding requests for services may generate new services, and deleting or transferring services will have a greater impact on the customer service catalog and SLA, requiring changes to the customer service catalog and SLA. In these cases, services may need to be redesigned and converted. 2. The source of adding, deleting or transferring services is Service Demand Management 8.4.2, and forms a service change request that meets certain conditions and falls within the scope of organizational responsibilities or contracts. SLA needs to be signed and the service design and conversion process must be executed. Finally, Deployed and implemented in customer business systems. 3. Changes in assets or CI and other factors include: a. Service changes caused by changes in customer business operations require service design and conversion; b. Changes in customer IT infrastructure cause service changes, requiring service design and conversion; c. Changes in the customer's business environment (see 4.1, 8.3.2) lead to changes in the customer's business operations and changes in the customer's IT infrastructure, which require service design and conversion.
8.5.1.3 Change management activities The organization and interested parties should make decisions regarding the approval and prioritization of change requests. Decisions should consider risk, commercial interest, feasibility and financial impact. Decisions should also consider the potential impact of changes on: a) Existing services; b)Customers, users and other relevant parties; c) The policies and plans required by this standard; d)Capacity, service availability, service continuity and information security; e) Other change requests, releases and deployment plans. Approved changes should be prepared, verified, and where possible tested. Recommended deployment dates and other deployment details for approved changes should be communicated to relevant parties. Rollback or remediation of failed changes should be planned and, where feasible, tested. Failed changes should be investigated and agreed actions taken. The organization shall review the effectiveness of the changes and take actions agreed with all parties involved. Change request records should be analyzed at planned intervals to identify trends. Results and conclusions drawn from the analysis should be documented and reviewed, and opportunities for improvement identified.
1. Change requests should be approved and prioritized. The decisive factors for approval and priority include risk, business benefit, feasibility and financial impact. 2. The change request should be formed into a standardized document (such as an RFC form), which includes: basic information of the change initiator, change object and scope, change proposal time, change content, change reason, change risk, change type, change level, Change status, change plan, change failure handling plan (rollback, recovery, emergency, etc. plans), cost budget, etc. and other necessary factors. 3. The change approval organization may include: change administrator: conduct preliminary screening of change requests, change manager: approve general changes, change management committee: approve emergency or major changes, the above organizations usually require service providers, customers, suppliers and other necessary Personnel composition. The inputs required to approve changes (especially major changes) include: change request form, preliminary review and acceptance opinions, change implementation plan, change failure handling plan (rollback plan, emergency remedial measures, etc.), personnel organizational structure, responsibilities introduction, Description of technical feasibility, description of problems or benefits to be solved, cost budget description, description of risks, business impact and disposal measures. 4. Change test requirements are as follows: The following should be tested: built changes, implementation plans, fallback plans, backup plans, and contingency plans. A change test plan should be prepared based on test content, personnel, time schedule, etc. The main content includes: test type, such as unit test, integration test or regression test, etc.; test objectives and test content; test case design; test environment construction; test method and Tools; test record templates; test issue tracking templates; test report templates; tester organization and responsibilities; test schedule. A special testing environment (such as a quasi-production environment) should be built, and change testing in the production environment is prohibited; The following work should be carried out during the test execution process: test recording; test problem discovery and tracking; problem handling; test conclusion. 5. For changes that are approved after verification, an implementation plan should be formulated and the plan should be notified to customers, suppliers and other relevant parties. The main contents of the implementation plan include the following: implementation content and scope; built changes and rollback or remediation plans, emergency plans, etc.; production environment preparation inspection; implementation tasks and allocation; personnel organization and responsibilities; deployment schedule; and other necessary factors. 6. Records and reports related to changes should be regularly collected and sorted out, statistics on the implementation of changes should be made, and development trends should be identified. The main contents include: ——Quantity: total change requests, filtered change requests, approved change requests, successful/failed changes, emergency changes, and the number of changes of various types/levels (including the number of standard changes); ——Time: the average processing time from request to closure and the average time of each link (such as the average approval time); ——Distribution: Quantity distribution on assets/CI, quantity distribution on cost range.
8.5.2 Service design and conversion
8.5.2.1 Planning new or changed services The plan should be based on the service requirements for the new or changed service identified in 8.2.2 and should include or contain references to: a) Authority and responsibility for design, construction and conversion activities; b) Activities carried out by the organization or other parties according to the schedule; c) human, technical, information and financial resources; d) Dependence on other services; e) Testing required for new or changed services; f) Service acceptance criteria; g) A measurable description of the expected results of delivering new or changed services; h) Impact on SMS, other services, planned changes, customers, users and other relevant parties. For services to be taken offline, the plan should also include the deadline for the offline service and the archiving, processing or transmission of data, service components, documents and other activities. For services to be transferred, planning should also include the date of service transfer and the delivery and handover of data, documentation, knowledge, service components. CIs affected by new or changed services should be managed through configuration management.
1. The planning work should form a planning report. In addition to the background, principles, goals, implementation plan and path, the report content should also include: a) It is required to establish the organization and responsibilities in the entire service implementation process. The positions or personnel in the organization include personnel engaged in service planning, service designers, service construction personnel, service conversion personnel, etc., as well as corresponding management. These personnel should be distinguished They are personnel belonging to the organization, customers or suppliers. Customer or supplier personnel should be controlled in accordance with the requirements of 8.2.3 and 8.3.4; b) It is required to clarify the tasks and work processes of the organization and other relevant parties and formulate work plans. It not only requires an overall work plan to grasp the overall progress of service realization, but also requires the development of separate work plans for the organization, customers or suppliers, and final coordination Complete service implementation consistently; c) Clarify the resources required for service implementation, which is also the cost component of the organization. 8.4.1 should be followed to quantify resource costs and control cost consumption. These costs include the cost of purchasing supplier results (services, service components, service processes) and the cost of customer participation in service implementation; d) It is determined that other services with dependencies may change, which will generate associated tasks and costs. The associated tasks should be included in the person's work plan, and the associated costs should be included in the service cost; e) The work plan should include the arrangement of the required tests, and the cost of testing should be included in the service cost; f) Whether the service is necessary to meet customer requirements after implementation. The acceptance criteria include: ——Meet the SLA requirements signed by both parties (organization and customer); ——Meet the cost financial management requirements of both parties 8.4.1; ——Comply with laws, regulations and other necessary compliance requirements; g) Emphasize that the service goals or expected results are measurable to ensure the operability of the acceptance criteria; h) Risk management and control in service practice. According to the requirements of 8.5.1.1 and 8.5.1.3, the impact on SMS, other services, plan changes, customers, users and other relevant parties can be assessed. If the impact is unacceptable, risk disposal measures should be taken. . 2. For those affected by new or changed services, Ci affected by the new or changed services shall be managed according to Configuration Management 8.2.6. Its implementation requires establishing a connection between change management and configuration management, specifically including: ——Identify and label the or affected CIs in change management, and verify that the CIs in the remaining configuration libraries are consistent; ——Track the changes or affected CI, and after completing the change implementation, pass the final CI information to the configuration manager; ——According to the CI information passed, change the corresponding CI information in the configuration library, and complete the CI update after verification and comparison.
8.5.2.2 Design New or changed services should be designed and documented to meet the service requirements identified in 8.2.2. The design should include the following relevant elements: a) The rights and responsibilities of all parties involved in providing new or changed services; b) Requests for changes in human, technical, information and financial resources; c) Corresponding education, training and experience requirements; d) New or changed SLAs, contracts and other documented agreements for support services; e) Changes to SMS, including new or changed policies, plans, processes, procedures, measures and knowledge; f) Impact on other services; g) Update of service catalog.
1. The organization should carry out service design work on the basis of service planning to ensure that the service planning results are feasible and implementable. Service planning focuses on setting out framework requirements for construction tasks. It is a blueprint-style plan for management, while service design is a design plan for development engineers. It should be based on the importance and scale of the services to be implemented to clarify whether preliminary Design or detail design, and construction drawing design involving physical deployment (such as involving the construction of computer room facilities). 2. Clause d) requires a review of the design plan to meet new or changed SLA, contract and other documented agreement requirements, which is a more specific acceptance criterion; Clause e) emphasizes the risks of SMS changes, involving the establishment of new or changes to policies, plans, processes, procedures, measures and knowledge in SMS, and appropriate response measures should be given; Once the service has been designed, the customer service catalog should be updated before building and transitioning.
8.5.2.3 Building and Converting New or changed services should be established and tested to verify compliance with service requirements, compliance with the documented design, and compliance with agreed service acceptance criteria. If service acceptance criteria are not met, the organization and interested parties should decide on necessary actions and deployment. Release and deployment management should be used to deploy approved new or changed services into the operational environment. After completion of conversion activities, the organization should report the results of the conversion to interested parties against expected outcomes.
1. The organization should build new or changed services and complete testing work to confirm whether relevant standards (including service requirements (such as SA), design solutions, and service acceptance criteria) are met. 2. The results of service construction are presented in the following types: a) Software packages that support customer business operations; b) Integrated equipment and facilities that support customer business operations; c) Software and hardware integration combination including the first two items; ——Cloud services, such as IaaS, PaaS, SaaS, etc.; ——Data services that support customer business operations, such as data storage, data analysis, etc.; ——Technical activities/technical services such as installation, deployment, upgrade, reinforcement/patching, security incident or fault handling, configuration operations, inspections and inspections, assessment and evaluation, and auditing of customer business systems; ——Others, such as video and audio services, etc. 3. The built service should also include business environment factors that are consistent with the service result type, as follows: ——Physical environment: including computer room air conditioning, electricity, cabinets, integrated wiring and other equipment and facilities, spatial layout, physical connections, etc.; ——Network environment: network architecture and core equipment, network physical topology and logical topology (such as network protocols and ports); ——Computing environment: configuration and connection of physical or virtual servers, storage, etc.; ——Security environment: configuration and connection of network boundaries, security equipment, etc.; ——Management environment: the connection between personnel and organizational requirements, technical activities, service processes, etc. That is to say, merely providing a software package is not the "service" required by customers. The operating environment factors of the software package must also be considered and integrated into the service design. 4. Testing is a test before deployment. The test environment should be a non-production environment. A test environment should be built as similar to the production environment as possible. For example, many financial institutions have built a "quasi-production environment" that is similar to the production environment. When building a test environment, the business environment factors mentioned above should be considered. Technology selection, deployment, and configuration should consider service requirements (such as SLA), design plans, service acceptance standards, etc. 5. After releasing and deploying results, the organization should establish the corresponding relationship between the expected results (goals and blueprints in planning, results in design plans, result types in service construction, etc.) and actual service deployment and operation, and provide Determine the matching degree and submit it to customers, suppliers, regulators, etc.
8.5.3 Release and deployment management
The organization should define release types, including emergency releases, frequency, and how they will be managed. The organization should plan for the deployment of new or changed services and service components into the operational environment. Planning should be coordinated with change management and include references to relevant change requests, known bugs, or issues closed via releases. Planning should include deployment dates, deliverables, and deployment methods for each release. Releases should be validated against documented acceptance criteria and approved prior to deployment. If acceptance criteria are not met, the organization and interested parties should decide on necessary actions and deployment. Before deploying a release to a runtime environment, a baseline of the affected CIs should be established. The integrity of services and service components should be maintained when a release is deployed into a runtime environment. The success or failure of releases should be monitored and analyzed. Measurements should include release-related events after the deployment release. Results and conclusions drawn from the analysis should be documented and reviewed to identify opportunities for improvement. Information regarding release success or failure and future release dates should be provided to other service management activities when appropriate.
1. According to different levels, it can be divided into the following three categories: 1) Major release: A large rollout of new hardware and software, usually accompanied by major feature enhancements. This release typically eliminates multiple known bugs and includes temporary workarounds and temporary fixes. In practice, many organizations treat major releases as emergency releases. 2) Small software releases and hardware upgrades: This type of release usually refers to some small improvements and fixes to known bugs. Some may have been implemented earlier as emergency fixes but are now included in the release. This release also ensures that the "Previous Trusted State", the starting point for all testing, is updated. 3) Emergency fix: Usually used to temporarily fix a problem or known error. 2. According to the scale of release, it can be divided into: 1) Emergency Release: A small number of corrections to known errors and quickly implemented solutions; 2) Small release: a certain number of improvements and corrections of known bugs 3) Large-scale release: Generally, it is the first release of new software and hardware or a major improvement to the functionality of the existing architecture. 3. According to the completeness of the release package, the release can be divided into: 1) Full release: refers to releasing a complete set of programs, including those parts that have not been changed; 2) Delta release: Use Delta release when the release contains only a small number of changes; 3) Package release: the release of a set of software that is dependent and related to each other. 4. The criteria for judging whether a release fails or succeeds include: 1) Publish to meet customer service goals or service requirements, such as functionality, performance, security, etc.; 2) The release is consistent with the IT architecture of the customer’s business system; 3) The status of the release and other components (supporting the customer's business operations) is normal, and the function/performance/security parameters are within the expected value range; 4) The release matches the required connection or associated service component (relationship, see 8.2.5 Configuration Management); 5) The effective running time of releases and other components complies with contract requirements. 5. Monitoring content includes: 1) Security indicators of services and business systems (such as data integrity check, encryption, etc.), availability (such as service availability 99.9%), and continuity (such as service RPO, RTO); 2) The status, function/performance/security parameters, CPU/memory/storage/bandwidth, etc. of releases and other components (that support customer business operations); 3) System failures, security incidents, interruptions, etc.; 4) Other required parameters. 6. After the deployment is completed, an effectiveness review should be conducted and improvement measures should be taken, including: 1) Summarize the documents in the release and deployment implementation process (including failure handling) and the monitoring data of the information system, analyze the release accordingly, and finally obtain the result of successful or failed release, compile a release and deployment report, and submit it to relevant square; 2) Review failed or successful releases, analyze, judge, and confirm the reasons for success or failure, clarify improvement responsibilities for failed releases, and put forward improvement requirements until the needs are met.
8.6 Settlement and Performance
8.6.1 Event Management Events should: a) be recorded and classified; b) Prioritize based on impact and urgency; c) Upgrade based on needs; d) solve; e) Close. Incident records should be updated promptly based on the actions taken. The organization should determine criteria for identifying significant events. Major incidents should be classified and managed according to documented procedures. Significant events should be communicated to top management. The organization should designate a management responsible person for each significant incident. After the incident is resolved, significant incidents should be reported and reviewed to identify opportunities for improvement.
1. Manage the event processing process, including event extraction, recording, analysis and delegation, processing, escalation, resolution and closure, etc. 2. Causes or mechanisms of internal events: 1) Failure: Functional failure of software, hardware, equipment and facilities, etc.; 2) Misoperation: Intentional or unintentional operations by personnel affect the operation of the system; 3) Supplier: refers to the interruption of the supplier's product and service provision, etc.; 4) Information security incidents: including harmful programs, network attacks, information destruction, information content harm, etc.; 5) Physical events: refers to structural damage and aging of equipment and facilities; 6) Configuration errors, such as server IP configuration errors, etc. External events mainly include events that have a greater impact on the operation of the information system, including: 1) Public events: infectious diseases, terrorist attacks; 2) Natural disasters: earthquakes, floods, fires, etc. 3. The event level judgment requirements are as follows: 1) The basic factors for assessing the level of an event are urgency (time is the basis) and degree of impact. The analysis of the degree of impact should comprehensively consider the following factors: System or service events: reduced efficiency, interruptions, leaks, etc.; The tangible impact of the incident: the impact on the country, society, and organizations in terms of finance, market, customers, production capacity, personal safety, etc.; The intangible impact of the incident: social order and the organization’s reputation and brand, etc. 2) Events that require emergency response and general events that are implemented step by step according to daily procedures should be distinguished according to the degree of impact. For the former, special emergency plans need to be formulated and handled according to the response level; 3) General incidents are considered emergencies due to tight processing time, but emergency incidents may not require emergency response; 4) According to the degree of impact, the event level is divided into 4 levels: Extraordinarily major events (Level I); major events (Level II); major events (Level III); ordinary events (Level IV). 4. The event status should be set according to the actual processing process, such as submitted, pending allocation, allocated, pending, processing, pending, resolved, event closed, etc.; 5. Incident upgrades include technology/functional upgrades and structural/management upgrades, as detailed below, 1) Management upgrades should be implemented when facing the following event processing scenarios: Exceeding the scope of management responsibilities, such as insufficient authorization; Exceed the time limit within the existing resources and capabilities; The combined parts of systems belonging to multiple organizations; resources and costs required exceed the expected range; Beyond SLA scope; Incident handling failed due to insufficient management levels. 2) Technical upgrades should be implemented when facing the following event processing scenarios: Do not have the skills to solve the incident. For example, if the tasks are improperly assigned, the assigned personnel do not have the skills to solve the incident; Incidents cannot be resolved within the expected time, such as insufficient skills, resulting in low efficiency; Incident handling failed due to insufficient skills. 3) The handling process of each incident should be fully recorded and the records should be updated in a timely manner. The main contents of event records include: Basic information of the event request/initiator, such as name, position and contact information; assets corresponding to the event and assets that may be affected; event phenomenon or request content; event type; event level; event discovery and reporting time; event expected completion time ;Event status; event cause; event processing plan; event processing upgrade; event processing results. 6. Put forward more stringent requirements for the handling of major incidents, including assessment standards, classification and management, reporting, management responsible persons, etc. Extraordinarily major events: refer to events that can cause particularly serious impact or damage, including causing particularly serious system losses to particularly important information systems and producing particularly significant social impacts. Major events: Major events refer to events that can cause serious impact or damage, including causing serious system losses to particularly important information systems, or causing particularly serious system losses to important information systems; resulting in significant social impacts. Major events: refer to information security incidents that can cause more serious impact or damage, including the following situations: causing particularly important information systems to suffer greater system losses, or causing important information systems to suffer serious system losses, general information systems Suffer particularly serious system losses and have a greater social impact. General incidents: refer to information security incidents that do not meet the above conditions. The occurrence and handling of major incidents should be reported to the top management. The content of the report includes the level of the incident, the extent of the impact, the results of the treatment, the cause analysis, the results of the treatment, the system recovery status, the investigation and accountability status, the summary of experience and improvements, etc.
8.6.2 Service request management Service requests should: a) be recorded and classified; b) Priority classification; c)Performance; d) Close. Service request records should be updated promptly with actions taken. Instructions for fulfilling service requests should be provided to those involved in the fulfillment of the service request.
——Manage the service request processing process, including request extraction, recording, analysis and delegation, processing, resolution and closure, etc. Service requests refer to the implementation of small changes to the T system. These changes are low-risk, frequent, and low-cost, such as requests to change end user passwords, install office software, etc. ——Organizations should treat service requests as a type of event based on actual conditions and integrate them into the event management process. They can refer to the event management process to establish an independent service request resolution process. ——Organizations can provide operational guidance to personnel involved in service request fulfillment through self-service desks, training, online document sharing, push (such as email sending), etc.
8.6.3 Problem Management Organizations should analyze incident data and trends to identify problems. The organization should conduct a root cause analysis and identify potential actions that could prevent the incident from occurring or reoccurring. The question should: a) be recorded and classified; b) Priority classification; c) Upgrade based on needs; d) Solve it as much as possible; e) Close. Problem records should be updated promptly based on the actions taken. Changes required to resolve the problem should be managed according to a change management policy. If the root cause is identified but the problem has not been permanently resolved, the organization should identify measures to reduce or eliminate the impact of the problem on the service. Known errors should be logged. When appropriate, other service management activities should be provided with the latest information on known errors and problem resolutions. The effectiveness of problem resolution should be monitored, reviewed and reported at planned intervals.
1. Failure to find the root cause is called a problem; finding the root cause is called a known error; 2. If there is a fundamental solution to the event that quickly restores system operation, this solution can be directly adopted, that is, event processing becomes known error processing. 3. Manage the problem handling process, including identifying and raising problems, diagnosis and solutions, processing, closing, as well as problem classification, priority, escalation, etc. 4. Clarify the source of the problem to help identify and determine the problem, usually including: 1) Repeated events; 2) In-depth resolution of major incidents; 3) The event cannot be associated with existing problems and known errors; 4) Issues discovered and raised based on trend analysis of data; 5) Potential risks discovered through monitoring and inspection of user IT infrastructure require discussion and root cause analysis. 5. Monitor, review and report on the effectiveness of problem management. Track and monitor the problem handling process and collect the following data: 1) The total number of issues raised and the number of known errors; 2) The number of problems solved, including temporary solutions and permanent solutions; 3) Number of unresolved issues, including problems and known errors; 4) Problem classification and the number of solved or unsolved problems; 5) Analyze the timely rate of problem solving and the impact and scope of unresolved problems. Review the problem handling, analyze the reasons for unresolved problems, put forward suggestions for improvement, and summarize the above content to form a problem report.
8.7 Service Guarantee
8.7.1 Service availability management Risks to service availability should be assessed and documented at planned intervals. The organization should determine service availability requirements and goals. Agreed requirements should consider relevant business requirements, service requirements, SLAs and risks. Service availability requirements and goals should be documented and maintained. Service availability should be monitored, results recorded and compared to targets. Unplanned unavailability should be investigated and necessary actions taken. Note: The risks identified in 6.1 can provide risk input for service availability, service continuity and information security.
1. Availability management: Availability management report, availability plan, availability design standards, usability testing schedule; regularly conduct service availability risk assessment and form a risk assessment report as the basis for risk disposal measures. Availability is usually expressed in terms of uptime within a certain period of time, or it can also be expressed as a relative value, that is, "availability = uptime/agreed time period", for example, availability within a year is 99.9%. ——Carrying out service availability risk assessment requires monitoring, analyzing, and evaluating services and service components. ——Service availability risk assessment needs to start from the service components (i.e. assets or CI) that support the service. The specific method is: select the services that need to be assessed, directly select the assessment objects for business services, and map them to the corresponding assets or CI. Then clarify the business services supported by the assets or CI, that is, technical service risks, which need to be reflected by business service risks; ——Monitoring and identifying the hidden dangers and threats of each asset or CI in the access path can identify and assess the service availability risk of each asset or CI. According to the serial and parallel relationships between assets or CIs, the entire service availability can be assessed. risk; 2. Network security equipment, routing and switching equipment indicators: ① Connectivity; ② Quality and delay; ③ Access control; Communication link-facility indicators: ① Connectivity; ② Quality and delay; Computing and storage equipment indicators: ① Connectivity; ② Quality and delay; ③ Business computing; 4 Storage response; Special storage design indicators: ① connectivity push; ② quality and delay; ③ storage response; Redundancy/deployment architecture (virtualization, hot standby, cluster, cloud computing, etc.) indicators: ① Connectivity; ② Quality and delay; ③ Switching response. ——The implementation of new or changed services (8.5.2) requires the establishment of availability design standards, including availability target indicators of services or service components, redundancy methods, detection and recovery measures, etc. ——According to the usability design standards, test indicators should be established, test plans should be formulated, and testing work should be carried out, including availability or unavailability indicators, interruption time, failure frequency and number, etc. 3. Availability monitoring, analysis and comparison requirements should be based on the components (assets or CI) covered by the service and the relationship (8.2.6). Monitoring objects should be selected, monitoring and analysis tools should be deployed, availability indicators should be monitored, hidden dangers should be discovered in a timely manner, and improvements should be made in a timely manner. ; All monitoring records, hidden dangers and improvement measures should be regularly summarized and organized to form a usability analysis report, including: ——Component availability indicator values (actual values) and deviations from target indicators; ——Key business function availability indicator values and deviations from target indicators; ——Service availability indicators and deviations from target indicators; ——Planned or unplanned unavailability; ——The degree of satisfaction with SLA; --Suggestions for Improvement. Take targeted measures (usually requiring emergency response) for unplanned unavailability. Examples of unplanned unavailability are as follows: — Disruptions due to unanticipated emergency performance issues; ——Disruptions caused by public events (such as widespread power outages) or natural disasters; ——Business interruptions caused by the rapid development of usability technology and the inability to cope with it; ——Disruption caused by unexpected business growth.
8.7.2 Service continuity management Risks to service continuity should be assessed and documented at planned intervals. The organization shall determine service continuity requirements. Agreed requirements should consider relevant business requirements, service requirements, SLAs and risks. The organization shall create, implement and maintain one or more service continuity plans. The service continuity plan should include or include a reference to: a) Standards and responsibilities for initiating service continuity; b) Procedures to be implemented in the event of severe loss of service; c) Service availability targets when invoking service continuity plans; d) Requirements for service restoration; e) Procedures for restoring normal working conditions. When access to normal service areas is lost, access to the service continuity plan and contact list should be ensured. The service continuity plan should be tested against the service continuity requirements at planned intervals. Service continuity plans should be retested after significant changes in the service environment. Test results should be recorded. Reviews should be conducted after each test and after the service continuity plan is called. If deficiencies are found, the organization shall take necessary actions. The organization should report the cause, impact and recovery when initiating the service continuity plan.
1. Carry out service continuity risk assessment regularly and form a risk assessment report as the basis for risk treatment measures. 2. The service continuity goal is to determine the priority of service recovery, which is determined by the recovery target indicators RTO and RPO. Of course, service recovery priorities and recovery goals depend on customer business recovery priorities and recovery goals. That is, the recovery time objective (RTO) refers to the time requirement from when a service or business function stops to be restored after a disaster occurs; the recovery point objective (RPO) refers to the time point requirement to which the system and data must be restored after a disaster occurs. RTO consists of MSB: the maximum tolerable business loss value, which can be financial loss, business volume loss, deviation from industry regulatory requirements, reputation loss, etc.; MAO: the maximum tolerable business interruption time; 3. An example of a service continuity plan content framework is as follows: ——Purpose and scope; ——Service continuity objectives; - Criteria and procedures for initiation; ——Response program; ——Organizational structure and responsibilities; ——Communication methods and personnel list; — Dependencies and interactions within and outside the organization, such as with the National Emergency Response Center; ——Resource construction, including resource type and quantity, acquisition and use methods, etc.; ——Relevant record documents. 4. When the normal service area cannot be reached due to various reasons, appropriate access channels should be established to facilitate incident handling personnel to obtain the service continuity plan and communicator list. (There are many reasons why personnel involved in incident handling cannot reach the normal service area, including obstacles at the incident site, such as fire, etc.; time or traffic constraints, such as an incident occurring at night and being unable to reach the scene in time; location reasons, such as business trips abroad, etc.) 5. Carry out regular service continuity plan testing. Testing requirements include the following: 1) The corresponding service continuity plan testing sequence for the business or service; 2) The corresponding service continuity plan testing frequency of the business or service (i.e. how often to test); 3) The event scenario should include specific events and event levels. 6. A test plan should be developed and tested according to the plan. The main contents of the test plan include: 1) Test goals and evaluation indicators to meet the goals; 2) Test methods and event scenarios, such as desktop deductions and field tests; 3) Scope of test objects; 4) Test process; 5) Test organization; 6) Resources required for testing; 7 ) Time schedule; 8) Risks and countermeasures of the drill; 9) Test records. 7. The review of testing and invoked service continuity plans includes: 1) Whether the service continuity plan is appropriate; 2) Whether the skills of the responding personnel are sufficient for on-site disposal; 3) Whether the acquisition and use of resources during the disposal process is feasible and meets the needs of emergency response work; 4) Whether the time spent on emergency operations meets the RTO requirements; 5) When setting emergency scenarios, it is not sufficient to consider non-ideal situations; 6) Whether the quality of emergency plan documents meets work requirements.
8.7.3 Information security management
8.7.3.1 Information security policy Information security policies relevant to the organization should be approved by management with appropriate authority. The information security policy shall be documented and take into account the service requirements and obligations in 6.3c). Information security policies should be available when needed. The organization should communicate the importance of adhering to the information security policy and its applicability to SMS and services to: a) organization; b)Customers and users; c) External suppliers, internal suppliers and other relevant parties.
The organization should make the information security policy available to relevant personnel through appropriate means, clarify the importance of following the security policy, and the applicability of the security policy to SMS and services. The organization should identify possible risks based on the organizational and customer service components and data involved in the responsibilities of relevant personnel in the service life cycle, select applicable information security policies based on the risks, and then provide relevant personnel with information through document access, training, etc. Communicate information security policy. Suitable people include: people within the organization; customers and users; external providers, internal providers and other interested parties.
8.7.3.2 Information security control measures Information security risks to SMS and services should be assessed and recorded at planned intervals. Information security controls should be identified, implemented and operated to support the information security policy and address identified information security risks. Decisions regarding information security controls should be documented. The organization shall approve and implement information security controls to address information security risks associated with external organizations. The organization shall monitor and review the effectiveness of information security controls and take necessary actions.
1. Establishing the environment mainly includes clarifying the scope, objectives and assessment criteria of risk assessment. The assessment criteria include: risk level rules; risk acceptability, risk preference; assignment rules for assets, vulnerabilities, threats, etc.; risk calculation models, etc. Risk identification includes asset identification, threat identification, and vulnerability identification. Risk analysis includes establishing the relationship between assets, threats, and vulnerabilities, and calculating the possibility and impact of risks (see the change impact analysis method in 8.5.1.1). Risk assessment refers to ranking risks according to risk level rules. Risk disposal refers to determining acceptable and unacceptable risks based on risk acceptance levels and risk preferences, selecting safety measures for unacceptable risks, taking into account costs, benefits, urgency, etc., and setting disposal priorities. 2. The risk disposal plan is the work arrangement after selecting safety measures, including the risks to be handled, control strategies, response measures, responsible persons, disposal time, residual risks, etc.; 3. After deploying security control measures, the corresponding relationship between the service and information assets (including data) should be established in advance according to the service configuration relationship (8.2.6), and an access path similar to the service availability (8.7.1) should be formed. Carry out the following monitoring, evaluation and review work on all assets on the access path. 1. The network security architecture and design are consistent, such as network security area division, security equipment deployment, boundary security measure deployment, etc.; 2. Security function configuration must be consistent with security policy requirements; 3. Vulnerabilities on assets that should be addressed are repaired; 4. Known threats are contained; 5. For newly identified or unpatched vulnerabilities, use penetration testing methods to verify that the difficulty of being exploited by threats exceeds the tolerable level; 6. The entire service or customer business system meets national or industry regulatory requirements, such as network security level protection requirements, etc.
8.7.3.3 Information security incidents Information security incidents should: a) be recorded and classified; b) Disposal priorities based on information security risk considerations; c) Upgrade as needed; d) solve; e) Close. The organization should analyze information security incidents by type, volume and impact of SMS, services and interested parties. Information security incidents should be reported and reviewed to identify opportunities for improvement. Note: The ISO/IEC27000 series stipulates relevant requirements and provides guidance to support the implementation and operation of information security management systems. ISO/IEC27013 provides guidance for the integration of ISO/IEC27001 and ISO/IEC20000-1 (this standard).
1. Manage the information security incident handling process, including incident extraction, recording, analysis and delegation, processing, upgrade, resolution and closure, etc. These contents can be implemented with reference to the relevant contents of Incident Management 8.6.1. 2. Determine information security strategies based on information security risks, select, implement, and operate information security controls based on risks and strategies, and form an information security risk disposal plan. 3. Regularly form information security incident reports and submit them to relevant parties. The main contents of information security incident reports include: 1) Event discovery time, assets, and impact; 2) Analysis of the causes of the incident, that is, vulnerability and threat conditions; 3) The handling process and results of the event; 4) Changes caused by events; 5) Summary of causes and improvements, such as improvement measures to reduce the frequency of incidents, mitigate damage and avoid recurrence; 6) When necessary, hold accountable and punish;
9Performance evaluation
9.1 Monitoring, measurement, analysis and evaluation The organization should determine: a) The content of SMS and services needs to be monitored and measured; b) Applicable monitoring, measurement, analysis and evaluation methods to ensure valid results; c) Carry out monitoring and measurement; d) The results of monitoring and measurement should be analyzed and evaluated. The organization shall retain appropriate documented information as evidence of results. The organization should evaluate SMS performance and effectiveness against service management objectives. The organization shall evaluate the effectiveness of services against service requirements.
Service providers should adopt appropriate methods to monitor and measure the service management system (SMS) and services. These methods should include internal audits and management reviews. The objectives of internal audits and management reviews should be documented. Internal audits and management reviews should confirm that the service management system (SMS) and services have the ability to meet service management targets and meet service needs. Non-compliance with the requirements of ISO/IEC 20000-1, service management system requirements or service requirements identified by the service provider shall be identified. The results of internal audits and management reviews should be recorded, including nonconformities, related matters and identified actions. Results and actions should be communicated to relevant parties. Monitoring and measurement content at least includes: service performance of each process; completion of service goals; risks; personnel capabilities; resources; internal and external audits; management reviews and stakeholder satisfaction.
9.2 Internal Audit/Review
9.2.1 The organization shall conduct internal audits at planned intervals to provide information on the SMS: a) conforms to: 1) The organization’s own requirements for SMS; 2) The requirements of this standard; b) Effective implementation and maintenance.
9.2.2 The organization shall: a) Plan, establish, implement and maintain an audit program, including frequency, methods, responsibilities, program requirements and reporting, which shall take into account: 1) The importance of the relevant process; 2) Changes affecting the organization; 3) The results of the last audit; b) Determine the audit standards and scope of each audit; c) Select auditors and conduct audits to ensure the objectivity and fairness of the audit process; d) Ensure that audit results are reported to relevant management; e) Retain documented information as evidence of implementation of the audit plan and audit results. Note: 1SO19011 provides guidance on auditing management systems.
Documented procedures should be developed to define the responsibilities and authorities for planning, conducting, reporting results and maintaining records of audits. The audit program should be planned; the status and importance of the processes and areas to be audited and the results of previous audits should be considered; the criteria, scope, frequency and methods of audits should be documented. The selection of auditors and the conduct of audits should ensure the objectivity and impartiality of the audit process. Auditors should not audit their own work. Non-conformities should be communicated, prioritized and responsibility for action assigned. The manager responsible for the area being audited shall ensure that necessary corrective and corrective actions are taken promptly to eliminate the nonconformity discovered and its cause. Tracking activities should include verification of actions taken and reporting of verification results.
9.3 Management review
Top management should review the organization's SM and services at planned intervals to ensure their continued suitability, adequacy and effectiveness. Management review should include: a) The implementation status of measures determined in previous management reviews; b) Changes in external and internal matters related to SMS; c) Information about the performance and effectiveness of SMS, including the following elements and their trends: 1) Nonconformity and corrective measures; 2) Monitoring and measurement results; 3) Audit results; d) Opportunities for continuous improvement; e) Feedback from customers and other relevant parties; f) Comply with and apply the service management policy and other policies required by this standard; g) Achievement of service management objectives; h) Performance of services; i)The performance of other parties involved in providing services; j) Current and projected human, technical, information and financial resource levels and human and technical resource capabilities; k) The effectiveness of risk assessment results and actions taken to address risks and opportunities; l)Changes that may affect SMS and services. The outputs of the management review should include decisions related to continual improvement opportunities and any requirements for SMS and service changes.
9.4 Service reports
The organization should determine reporting requirements and their purpose. Information on SMS activities and service delivery should be used to produce reports on the performance and effectiveness of SMS and services. Service reports should include trends. The organization should make decisions and take actions based on the results in service reports. All parties involved should be notified of agreed actions. NOTE: Required reporting is specified in the relevant clauses of this standard. Additional reports can also be generated.
1. The service provider and relevant parties should negotiate and record a description of each service report, including details of identification, purpose, readership, frequency and data source. Service reports should be generated using information from service delivery and service management system (SMS) activities including the service management process. Service reports include at least: ——Performance corresponding to service level objectives; ——Relevant major event information, including at least major events, deployment of new services or changed services, and triggered service continuity plans; ——Workload characteristics, including workload and periodic changes; ——Disqualifications detected based on the requirements of this part of ISO/IEC20000-1, service management system (SMS) requirements or service requirements and the reasons for identification; ——Trend information; ——Customer satisfaction measurement, service complaints and analysis of satisfaction measurement and complaints. The service provider should make decisions and take actions based on the findings of the service report. Coordinated measures should be communicated to relevant parties. 2. Service reports are tools for service providers to collect and monitor service quality data. They generally refer to monthly or quarterly reports on SLA achievement at the level agreed upon in the service agreement with customers. 3. Example of service report content: 1) Reporting purpose: ——An objective reflection of the current service status, compared with the service level agreement, to help managers, IT service providers and business departments understand the service provision situation; ——Produce timely, reliable, concise and sufficiently correct reports as information basis for decision-making and effective communication means, and service statements must be able to help report recipients understand the report content; ——Provide evidence for service managers to make decisions and ensure that the service provision process is under control; ——Provide decision-making, planning and execution references for service management improvement and change activities, which is conducive to continuous improvement of services and resource utilization. 2) Target readers: company leadership, customers, other relevant parties, etc. 3. Report overview: report topic, service provider introduction, service report cycle, service report submission time 4. Overall summary of services in this cycle: service quality, announcement of major faults, announcement of major changes 5. Service performance, record the comparison between service performance and service level agreement, including trends, etc. 6. Review of major events/problems. 7. Review of major changes. 8. IT service trend analysis. 9. Customer satisfaction analysis. 10. Reported data sources.