18.01.2013 Views

Enabling Processes

Enabling Processes

Enabling Processes

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Deliver, Service and Support<br />

174<br />

: ENABLING PROCESSES<br />

DSS01 Process Practices, Inputs/Outputs and Activities<br />

Management Practice Inputs Outputs<br />

DSS01.01 Perform operational procedures.<br />

From Description Description To<br />

Maintain and perform operational procedures and<br />

operational tasks reliably and consistently.<br />

BAI05.05 Operation and use plan Operational schedule Internal<br />

Activities<br />

Backup log Internal<br />

1. Develop and maintain operational procedures and related activities to support all delivered services.<br />

2. Maintain a schedule of operational activities, perform the activities, and manage the performance and throughput of the scheduled activities.<br />

�� ������ ���� ��� ���� �������� ��� ���������� ��� �������� ��� ��������� ����������� ���������� ��� �� � ������ ������� ������� ������ �� ����������<br />

with enterprise requirements. Support restart and reprocessing needs. Ensure that users are receiving the right outputs in a secure and timely manner.<br />

�� ������ ���� ���������� �������� ��������� ��� ��� ��� ��� �������� ����������� ������� ��� ������ �� ���� �� � ��� ���� ����� ���������� ����������� ���<br />

������������ �������� ������ ��� ���������� �������������<br />

5. Schedule, take and log backups in accordance with established policies and procedures.<br />

Management Practice Inputs Outputs<br />

DSS01.02 Manage outsourced IT services.<br />

From Description Description To<br />

Manage the operation of outsourced IT services to<br />

maintain the protection of enterprise information and<br />

reliability of service delivery.<br />

APO09.03 � ����<br />

� ����<br />

Independent assurance<br />

plans<br />

MEA02.06<br />

BAI05.05 Operation and use plan<br />

Activities<br />

�� ������ ���� ��� ������������ ������������ ��� �������� �� ����������� ��������� ��� ������� �� �� ���������� ���� ��������� ��� ���� ���� �����<br />

parties hosting or providing services.<br />

�� ������ ���� ��� ������������ ����������� �������� ��� �� ���������� ������������ ��� ���������� ��� ������� �������� ��� ������� �� �� ���������� ����<br />

contracts and SLAs with third parties hosting or providing services.<br />

3. Integrate critical internal IT management processes with those of outsourced service providers, covering, e.g., performance and capacity planning,<br />

change management, configuration management, service request and incident management, problem management, security management, business<br />

continuity, and the monitoring of process performance and reporting.<br />

4. Plan for independent audit and assurance of the operational environments of outsourced providers to confirm that agreed-on requirements are being<br />

adequately addressed.<br />

Management Practice Inputs Outputs<br />

DSS01.03 Monitor IT infrastructure.<br />

From Description Description To<br />

Monitor the IT infrastructure and related events. Store<br />

sufficient chronological information in operations logs<br />

to enable the reconstruction, review and examination<br />

BAI03.11 Service definitions Asset monitoring rules and<br />

event conditions<br />

DSS02.01<br />

DSS02.02<br />

of the time sequences of operations and the other<br />

Event logs Internal<br />

activities surrounding or supporting operations.<br />

Activities<br />

Incident tickets DSS02.02<br />

1. Log events, identifying the level of information to be recorded based on a consideration of risk and performance.<br />

2. Identify and maintain a list of infrastructure assets that need to be monitored based on service criticality and the relationship between configuration<br />

items and services that depend on them.<br />

3. Define and implement rules that identify and record threshold breaches and event conditions. Find a balance between generating spurious minor<br />

events and significant events so event logs are not overloaded with unnecessary information.<br />

4. Produce event logs and retain them for an appropriate period to assist in future investigations.<br />

5. Establish procedures for monitoring event logs and conduct regular reviews.<br />

6. Ensure that incident tickets are created in a timely manner when monitoring identifies deviations from defined thresholds.<br />

Personal Copy of: Mr. Dong Hong Wang

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!