15.08.2018 Views

become-itil-foundation-certified-abhinav-kaiser(www.ebook-dl.com)

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 5 ■ Service Design<br />

have a relationship manager. Mostly, you may never talk to a soul in the service provider<br />

organization, unless you have issues. In some cases, issues are sorted out by bots today.<br />

5.7.2.3 Objectives of Service Catalog Management<br />

From the service catalog management, these are the expected objectives:<br />

1. Manage the service catalog end to end, including technical<br />

and customer service catalogs<br />

2. Keep the catalog accurate at any given point in time, including<br />

the operational services and, if necessary, the soon-to-beoperationalized<br />

services as well<br />

3. Ensure the right parties with access are able to view the<br />

catalog, for example, a business customer must be able to<br />

view the wholesale catalog while an individual must be able to<br />

view the retail catalog<br />

4. Support other processes by providing the information it requires<br />

5. Support in defining services and service definitions<br />

6. Maintain dependencies with the service portfolio and other<br />

service catalogs in the organization<br />

7. Maintain dependencies with the service <strong>com</strong>ponents<br />

(configuration items; this will be discussed in Chapter 6)<br />

5.7.3 Information Security Management<br />

Passwords are like underwear: you don’t let people see it, you should<br />

change it very often, and you shouldn’t share it with strangers.<br />

—Chris Pirillo<br />

The only truly secure system is one that is powered off, cast in a block of<br />

concrete and sealed in a lead-lined room with armed guards.<br />

—Gene Spafford<br />

Information security management is a process that deals with the security of data,<br />

especially the customer data. Remember from Chapter 1 when I discussed value derived<br />

from services using logical gates, one of the aspects that provided warranty of a service<br />

was information security. If warranty fails, then the utility part of a service ceases to make<br />

sense, hence failing the entire service objective. In effect, this is one of the most important<br />

processes within the ITIL service lifecycle.<br />

This is a governance process that ensures that risks rising from information security<br />

perspective are identified and dealt with appropriately. It manages all aspects of IT<br />

security, be it application data, sensitive business information, or the data center security.<br />

86

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!