1 of 20

{ Service Asset and Configuration Management Design Package }

29 September 2014

version 1

2 of 20

  • Ensure that assets under the control of the IT organization are identified, controlled and properly cared for throughout their lifecycle.
  • Identify, control, record, report, audit and verify services and other configuration items (CIs), including versions, baselines, constituent components, their attributes and relationships.
  • Account for, manage and protect the access to and integrity of CIs through the service lifecycle by working with change management to ensure that only authorized components are used and only authorized changes are made.
  • Ensure the integrity of CIs and configurations required to control the services by establishing and maintaining an accurate and complete configuration management system (CMS).
  • Maintain accurate configuration information on the historical, planned and current state of services and other CIs.
  • Support efficient and effective service management processes by providing accurate configuration information to enable people to make decisions at the right time

{ Process Objectives }

3 of 20

  1. Identify CIs at the level at which it is appropriate to determine that something is a CI and what to manage/record/capture within any individual CI type or category
  2. Control and properly care for assets throughout their lifecycle
  3. Store the data about each CI in an easy to use, efficient and effective manner
  4. Obtain information about the current run state of production services
  5. Account for, manage and protect the access to and integrity of CIs throughout the service lifecycle
  6. Maintain an accurate and complete configuration management system (CMS)
  7. Maintain accurate configuration information on historical, planned and current state of services and other CIs.
  8. Provide accurate configuration information to enable people to make decisions at the right time

{ Critical Success Factors }

4 of 20

{ Key Performance Indicators 1/3}

CSF

KPI

1

  • Number of CIs as a control measure
  • Percentage of CIs that are Assets
  • Percentage of services that have at least 1 CI
  • Percentage of CIs that do not tie to a service CI (derived from service catalog)
  • Frequency of changes that could not be tied to a CI or Asset
  • Frequency of changes to a CI or class of CIs
  • Number of CIs created without a change record
  • Percentage of CIs without a defined change authority

2

  • Number of CIs at various lifecycle stages (new, retired, etc)
  • Percentage of Assets in a child relationship to a retired CI/service
  • Number of corrections resulting from audits
  • Number of assets deployed without a change record

5 of 20

{ Key Performance Indicators 2/3}

CSF

KPI

3

  • Percentage of CIs failing audits of configuration details
  • Number of complaints about updating CI
  • Number of Incidents & Service requests about the CMS tool(s)
  • Survey of IT staff performing configuration management activities

4

  • Percentage of out-of-date baselines resulting from audits
  • Number of incidents/events tied to a CI
  • Variances between CMS data and other sources

5

  • Number of unauthorized changes to a configuration item
  • Frequency that implementors of a change to a CI is unauthorized (via audits)
  • Frequency of audits of security access to CMS data and to make changes

6 of 20

{ Key Performance Indicators 3/3}

CSF

KPI

6/7

  • Identify inaccurate or incomplete configuration records
  • Frequency of audits of configuration management information
  • Frequency of changes to CIs without a change record
  • Frequency of corrections to CIs to match reality

7/8

  • Frequency of views by stakeholder group (leadership, management, line staff, etc)
  • Volume of standard changes
  • Incidents caused by inaccurate CI information (missing, incorrect) during a change
  • Survey about utility along different dimensions

7 of 20

  • Setting the scope too wide, causing excessive cost and effort for insufficient benefit
  • Setting the scope too narrow, so that the process has little to no benefit
  • Maintaining accurate information recorded by the process by letting it stagnate, not auditing enough, or not doing anything with results of audits
  • Storing data in the cloud and losing access to it
  • Setting the wrong focus. The temptation to consider service asset and configuration management from a technically view and ignoring the service and business perspective.

{ Risks }

8 of 20

  • Achieving organizational change and buy-in for Service Asset and Configuration Management by convincing everyone that the process has value to expend some effort throughout daily, operational activities
  • Agreeing on a definition of a service asset versus a configuration item
  • Agreeing on what information should be managed for each CI type/category
  • Integration and/or replacement of current toolsets

{ Challenges }

9 of 20

{ Recommended Process Owner }

Bob Dein

Advantages

  • Overlap with Enterprise Architecture. EA repository refreshed and partially derived from the CMS
  • Near-term goal alignment to document current state architecture
  • Major stakeholder in seeing that configuration management is done well

Disadvantages

  • EA Only interested in changes and CIs that have architectural relevance
  • Concern about time commitment

10 of 20

{ Process Policies }

  • When possible, use automated or forced discovery to ensure the accurate collection of configuration management information that is free from human errors
  • Prefer as few configuration management data sources as possible
  • Limit duplication of configuration information across multiple repositories as much as possible. Configuration and asset information stored outside the Configuration Management System should be reviewed and approved in collaboration with the configuration management and change management process owners
  • All configuration items must have a unique identifier, type, single owner, and name that follows a naming convention for each type.
  • Take a regular configuration snapshot of the configuration management system(s) for Business Continuity purposes
  • Only authorized individuals may view or change configuration items
  • Take regular configuration snapshots and performance snapshots for important configuration items.

11 of 20

{ Process }

Process Owner

Process Manager

Configuration Item Owner

Change Implementer

Loggers/�Solvers

Change Authority

Manage the CMS by following the Change Management Process

A

R

I

R

I

I

Audit CMS

A

R

R

Synchronize with Fixed Asset Management

I

I

A

R

* Information contained in the CMS is managed via the change management process

12 of 20

{ Configuration Management System }

Integrated CMS (TeamDynamix)

CI Types

Source CMDB

NOC-IT

TSC

Filemaker

Oracle Enterprise Manager

Wiki

Process

IT Staff

Server

App

Contract

Storage�System

Database

Network Device

ETC

13 of 20

{ Configuration Item Type Topology }

Facility/�Cloud

Facility Hardware

End Point Device

IT Service

IT System

IT Process

Contracts

IT Staff

(See next slide)

14 of 20

{ Configuration Item Type Topology }

IT System

Server

Server Cluster

Storage

System

Database

Database Instance

Application/�Software

VLAN

Network Device

15 of 20

{ Configuration Item Shared Attributes }

  • Name
  • Unique Identifier
  • Description
  • CI Type
  • Format (cloud, physical, etc)
  • Which CMBD is authoritative/master source
  • Owner (change authority)
  • Relationship with other CIs
  • Relationship type (runs on, plugs into, etc)
  • Lifecycle status (production, dev, etc)
  • Status (live, up/down, retired)
  • Date added
  • Last audited
  • Who audited
  • Last modified
  • Who last modified
  • Primary support unit

16 of 20

{ Where to Start? }

  1. Team has identified source CMDBs for each CI type
  2. Rated along 5 dimensions
    1. Number of Source CMDBs
    2. Reliability of source CMDBs
    3. Frequency of changes
    4. Desire to manage
    5. Feasibility of managing in integrated CMDB
  3. Force Rank among team
    • TSC top priority
    • Others TBD

17 of 20

{ Acceptance Criteria }

Domain

Criteria

How we know

People

Have all users been adequately prepared?

  • 95% of IT Staff receive at least foundation level training
  • 90% of trained users are moderately confident in their ability to use the process and tool as intended
  • 100% of the managers are confident in their acceptance of process design and build

Tool/Process

Existing tools are ready for decommission

  • No new change tickets created in SSD
  • Transition plan in place for existing change tickets
  • CAB & LCMs only reviewing new changes in new process
  • Any CMDB meeting the criteria for being eliminated (eg, the Technical Service Catalog ) is transferred to new configuration management system

18 of 20

{ Acceptance Criteria }

Domain

Criteria

How we know

Process, Tool

Have all test plans been completed successfully?

  • all level 1 (most) user stories are bug free
  • validate 10 historical incidents and service requests function as expected
  • user focus group conducts historical testing of multiple combinations of historical changes at varying risk levels to determine the change management process is ready for deployment
  • Create, modify, and retire at least 2 Configuration Items of each type, including integration with underlying CMDB sources

19 of 20

{ Acceptance Criteria }

Domain

Criteria

How we know

Process, Tool, People

Error free usage in the production environment

  • successfully complete 2 emergency, 10 normal changes over a minimum of 2 weeks time
  • View and trace the relationships between configurations at least 3 levels deep
  • Audit of Configuration Management System after at least 1 week & resolution of any errors uncovered
  • Few incidents resulting from deployment of change/config process
  • User satisfaction survey of users

20 of 20

{ Acceptance Criteria }

Domain

Criteria

How we know

Process, Tool

Have standard change models been created with necessary warranty?

  • review current-state standard changes and discard or elevate to new standard change process
  • publish at least 10 standard change mechanisms on behalf of change authority using the procedure to create a standard change
  • successfully complete 100 standard changes over a minimum of 2 weeks time

Process, Tool

Automated CMS

  • Audit to ensure information being exchanged between integrated CMS is accurate for any integrated CMDBs
  • Configuration items in integrated CMS point to underlying configuration management database which contain detailed configuration information