become-itil-foundation-certified-abhinav-kaiser(www.ebook-dl.com)
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Chapter 5 ■ Service Design<br />
have a relationship manager. Mostly, you may never talk to a soul in the service provider<br />
organization, unless you have issues. In some cases, issues are sorted out by bots today.<br />
5.7.2.3 Objectives of Service Catalog Management<br />
From the service catalog management, these are the expected objectives:<br />
1. Manage the service catalog end to end, including technical<br />
and customer service catalogs<br />
2. Keep the catalog accurate at any given point in time, including<br />
the operational services and, if necessary, the soon-to-beoperationalized<br />
services as well<br />
3. Ensure the right parties with access are able to view the<br />
catalog, for example, a business customer must be able to<br />
view the wholesale catalog while an individual must be able to<br />
view the retail catalog<br />
4. Support other processes by providing the information it requires<br />
5. Support in defining services and service definitions<br />
6. Maintain dependencies with the service portfolio and other<br />
service catalogs in the organization<br />
7. Maintain dependencies with the service <strong>com</strong>ponents<br />
(configuration items; this will be discussed in Chapter 6)<br />
5.7.3 Information Security Management<br />
Passwords are like underwear: you don’t let people see it, you should<br />
change it very often, and you shouldn’t share it with strangers.<br />
—Chris Pirillo<br />
The only truly secure system is one that is powered off, cast in a block of<br />
concrete and sealed in a lead-lined room with armed guards.<br />
—Gene Spafford<br />
Information security management is a process that deals with the security of data,<br />
especially the customer data. Remember from Chapter 1 when I discussed value derived<br />
from services using logical gates, one of the aspects that provided warranty of a service<br />
was information security. If warranty fails, then the utility part of a service ceases to make<br />
sense, hence failing the entire service objective. In effect, this is one of the most important<br />
processes within the ITIL service lifecycle.<br />
This is a governance process that ensures that risks rising from information security<br />
perspective are identified and dealt with appropriately. It manages all aspects of IT<br />
security, be it application data, sensitive business information, or the data center security.<br />
86