Introduction
- The purpose of Service Asset and Configuration Management (SACM) is to provide
a logical model of the IT infrastructure.
- The objective is: to define service and infrastructure components and maintain
accurate configuration records.
- It is important that:.
- The integrity of the services assets and Configuration Items (CIs) are
protected.
- All assets and CIs are located in configuration management system.
- The operational and service management processes are supported
effectively.
- Scope
- All assets that are used during the Service Lifecycle fall within the scope of
asset management.
- The process offers a complete overview of all assets, and shows who is
responsible for the control and maintenance of these assets.
- Configuration management ensures that all components (CIs) that form part of the
service or product are identified, baselined(the configuration) and
maintained.
- Scope
- It ensures that releases into controlled environments and operational use are on
the basis of formal approvals.
- The process also provides a logical model of all service, assets, the physical
infrastructure and the mutual relations.
- Scope
- SACM also relates to non-IT assets and CIs, such as work products used to develop
the services and configuration items required to support the service that are not formally
classified as assets.
- The scope of the process also includes assets and CIs of other suppliers (“shared
assets”), to the extent that they are relevant to the service.
- Value for the business
- SACM increases the visibility and performance of the service, release or
environment. Among other things this results in:
- Better forecasting and planning of changes.
- Changes and releases to be assessed, planned and successfully
delivered.
- Incidents and problems to be resolved within the service level
targets.
- Better adherence to standards, legal and regulatory obligations (less non-
conformances).
- Ability to identify the costs for a service.
- Policies
- First step is to develop and maintain the SACM policies that set the objectives,
scope and principles and critical success factors for what is to be achieved by the
process.
- There are significant costs and resource implications to implementing SACM and
therefore strategic decisions need to be made about the priorities to be
addressed.
- Basic concepts
- ITIL defined a configuration item as follows:
- A configuration itemis an asset, service component or other item that is (or
will be) under the control of configuration management.
- Types of CIs:
- Service lifecycle CIS –CIs for the support of the Service Lifecycle
activities, such as the business case and release and change plans.
- Service CIs, such as service capability assets, service resource assets,
service model, service package, release package, service acceptance
criteria.
- Basic concepts
- Types of CIs:
- Organizational CIs, such as the documentation relating to the strategy of the
organization.
- Internal CIs, for instance those associated with individual
projects.
- External CIs, such as specifications of external customer requirements and
agreements.
- Interface CIs that are required to deliver the end to end service across a
Service Provider Interface (SPI).
- Basic concepts
- Configuration Management System
- In order to manage large and complex IT services and infrastructures SACM
needs to use a supporting system.
- A CMS generally consists of four layers:
- A presentation layer with different “views” for the different target
groups.
- A knowledge processing layer for, for instance, producing reports and
queries.
- An information integration layer that collates and structures the
data.
- A data layer with the data and information from different sources such as
configuration management database (CMDBs), discovery and inventory tools, project
information, etc.
- Basic concepts
- A configuration baseline is a configuration of a service, product or
infrastructure that has been formally reviewed and agree on that thereafter serves as the
basis for further activities, and that can be changed only through formal change
procedures.
- Baseline is used:
- To make a milestone in the development of a service (e.g. Service Design
baseline).
- To build a service component from a defined set of
inputs.
- Basic concepts
- Baseline is used:
- To change pr rebuild a specific version at a later stage.
- To assemble all relevant components in readiness for a change or
release.
- As a fall-back in the case of problems with new configurations (after
changes).
- Baseline configurations are included in the CMS.
- A snapshot(moment in time) is the most recent status of a CI or
environment.
- A snapshot is stored in the CMS and is kept as a read-only historical record
(i.e. it cannot be changed).
Activities, methods and techniques
- The basic SACM process activities consist of:
- Management and planning.
- Configuration identification.
- Configuration control.
- Status accounting and reporting.
- Verification and audit.
- 1.Management and planning
- The management team and configuration management decide what level of
configuration management is needed and how this level will be achieved.
- Documented in a configuration management plan.
- Contents of a configuration management plan include:
- Context and objective.
- Scope.
- Objectives.
- Applicable policies and standards.
- 1.Management and planning
- Contents of a configuration management plan include:
- Organization for configuration management including roles and
responsibilities.
- SACM systems and tools.
- Selection and application of processes and procedures to implement SACM
activities including configuration identification, version management, build management, etc. - Reference implementation plan.
- 1.Management and planning
- Contents of a configuration management plan include:
- Relationship management and interface controls e.g. with financial asset
management, with projects, with development and customers, etc. - Relationship management and control of service providers and sub-
contractors. - 2.Configuration management
- Focuses on determining and maintaining the naming and version numbering of assets
and CIs, the mutual relations and the relevant attributes. - Most important activities of configuration identification are:
- Defining and documenting criteria for the selection of CIs and the components
within them. - Selecting the CIs on the basis of the defined criteria.
- Giving all CIs unique numbers for identification
purposes. - Specifying the attributes of each CI.
- 2.Configuration management
- The lowest CI level is determined by
- The available information.
- The necessary level of control.
- The necessary resources required to maintain that CI
level - Only useful to include a certain CI if it supports the other service management
processe - Document naming conventions and apply them in the identification of CIs,
documents and changes, but also, for instance, in basic configurations, releases and
compilations. - 2.Configuration management
- Each CI must be uniquely identifiable by means of a version number, as there may
be several versions of the same CI. - When planning naming conventions allow for future growth.
- The names must also be short but meaningful, and correspond with the existing
conventions as much as possible. - Provide all physical CIs, such as hardware, with labels, so that they are easy to
identify. - 2.Configuration management
- The labels must be easy to read and accessible, so that a user can pass the
information on the label on to the service desk. - Labels with a barcode are very efficient for physical audits of the
CIs. - With the aid of attributesinformation is stored that is relevant for the CI in
question - 2.Configuration management
- When structuring the CMDB the following attributes, among others, can be
used: - CI number/label or barcode number –unique identifier.
- CI type.
- Name/description.
- Version.
- Location.
- Supply date.
- License details e.g. expiry date.
- Owner.
- Status.
- Supplier/source.
- 2.Configuration management
- When structuring the CMDB the following attributes, among others, can be
used: - Related documents.
- Related software.
- Historical data e.g. audit trail.
- Relationship type.
- Applicable SLA.
- Purchase date.
- Acceptance date.
- Current status.
- Planned status.
- 2.Configuration management
- Relationshipsdescribe how CIs work together to provide a service.
- The CMDB maintains these relations to demonstrate the interdependencies between
CIs, for instance: - A CI is part of another CI –a software module is part of an application
(parent-child relation). - A CI is connected to –a PC that is connected to the LAN.
- A CI usesanother CI –a business service uses a server.
- A CI is installed on another CI –MS Word is installed on a
PC. - 2.Configuration management
- CIs are classed by means of a classification, for instance: service, hardware,
software, documentation, personnel. - A release unitis the portion of the service or infrastructure, that is normally
released together, in accordance with an organizations release policy. - Releases are documented in the CMS for the support of the release and deployment
process. - 2.Configuration management
- Releases can be classified into the following release categories:
- Major releases –important deployment of new hardware and software
with. - Minor releases –usually contain a number of smaller
improvement. - Emergency releases –usually implemented as a temporary solution for a problem
or known error. - 3.Configuration control
- Ensures that the CIs are adequately managed. No CIs can be added, modified,
replaced or removed without following agreed procedure. - Establish guidelines and procedures for, among others:
- License management.
- Change management.
- Version management.
- Access control.
- Build control.
- Promotion.
- Deployment.
- Installation.
- Baseline configurations integrity management.
- 4.Status accounting and reporting
- The lifecycle of a component is classified into different stages and the stages
that different types of CI go through must be properly documented. For instance, a release
goes through the following stages: registered, accepted, installed, withdrawn. - Status reports give an insight into the current and historical data of each CI
and the status changes that have occurred. - Different type of service asset and configuration reports are needed for
configuration management. - 4.Status accounting and reporting
- Such reports may consist of:
- A list of CIs and their baseline.
- Details on the current status and change history.
- A list of unauthorized CIs detected.
- Reports on the unauthorized use of hardware and software.
- 5.Verification and audit
- SACM conducts audits to ensure that:
- There are no discrepancies between the documented baselines and the actual
business environment to which they refer. - CIs physically exist in the organization or DML and spares stores, the
functional and operational characteristics of CIs can be verified and checks can be made that
records in the CM match the physical infrastructure. - Release and configuration documentation is present before the release is
rolled out. - 5.Verification and audit
- Audits are conducted at the following times:
- Shortly after changes to the CMS.
- Before and after changes to IT services or
infrastructure. - At random and planned intervals.
- Before a release to ensure the environment is as
expected. - In response to the detection of unauthorized CIs.
- Following recovery from disasters.
- Audit tools can perform checks at regular intervals, for instance
weekly. - The most notable of these are:
- IT service continuity management : to make the organization aware of the
assets the business depends on, and for the control of key spares and
software. - Incident management : for the diagnosis of problems and
incidents. - Availability management : for the detection of “points or
failure”. - SACM also has many interactions with release and deployment management.
- The following measures are used to evaluate the performance of the SACM
process: - Increased quality and accuracy of information about assets and
CIs. - Fewer errors as a result of outdated information.
- Shorter audits because the information is more accessible.
- Shorter diagnosis and resolution times for problems and incidents.
- Fewer discrepancies between the actual situation and that in the CMS.
- The challenges in the SACM process are:
- Convincing staff that they cannot circumvent the SACM process.
- Finding and justifying financial resources for SACM.
- Collecting too much data simply because it is available.
- Lack of management acceptance and support.
- Critical success factorsof the SACM process are:
- Determining the right level of detail and depth.
- Implementing a top-down approach for the configuration structure.
- Achieving the right level of accuracy.
- Using technology to automate the CMS and to enforce SACM
guidelines. - The following risks are acknowledged:
- Too much technical focus as opposed to operational and service
focus. - The CMS becomes outdated because, for instance, unauthorized personnel move hardware assets.
Interfaces
Metrics
Implementation
No comments:
Post a Comment