Uploaded by Carlos Cast

Implementing IT Governance

advertisement
Chapter 5
Implementing IT governance
“Look at types of tools that are coming out to support IT
governance – they only deal with risk in the development
environment. What’s the risk of a project going wrong?
They are not yet able to apply themselves to the operational
world, the world that transactions live in. To detect, to
measure success in any way.”
SPEAKER AT MANAGED OBJECTS ROUNDTABLE ENTITLED: IT GOVERNANCE:
THE ROLE OF MEASUREMENT AND METRIC.
Implementing a formal IT Governance regime, assuming that you have only adhoc or informal governance processes at present, involves (despite what some
vendors may tell you) a lot more than just buying some software – although once
you do have the required culture in place, tools can facilitate the initiative. A
first requirement is to align IT governance with corporate governance in general.
Think of this as high-level requirements gathering – what are the business governance issues that currently worry the Board and the company auditors, and what
questions would they like to ask or ‘more importantly, are they afraid to ask?
Try to talk in terms of business issues, not technical solutions, of being able to
demonstrate that the physical implementation of a bank’s money laundering
policy, for example, is tested against the policies discussed by the Board of Directors, not about implementing Model Driven Architecture and Applications
Lifecycle Management tools.
This discussion is only an input to your governance initiative. You can’t assume
that the Board’s concerns are the right concerns – because informal risk analysis
is often driven by media hype and by our tendency to concentrate on the most
recent crisis we experienced. After the IRA bombings in London, people moved
data centres down into the basement where they were safe from bombs but far
more vulnerable to flooding, which is far more likely to affect a building in London
than a bomb. Nevertheless, you’ll get no credit for your IT governance initiative if you can’t sensibly address the one question the CEO wants to ask, when
he wants to ask it (even if the answer goes on to suggest that he/she may be
asking the wrong question).
THOROGOOD PROFESSIONAL INSIGHTS
57
5 IMPLEMENTING IT GOVERNANCE
Obtain management sponsorship
The first essential for IT governance is informed top management sponsorship.
If management sends mixed messages – if it insists on good governance in practice
but pays performance bonuses to people who deliver systems faster by cutting
corners – people at the sharp end of IT will soon realize that only lip service to
good governance is required. However, since in this situation they will also realize
that this makes them ideal scapegoat material if something does go wrong, morale,
productivity and systems quality will fall, as a direct result of your governance
efforts.
There are three ‘metrics’ for management sponsorship of IT governance:
1.
The availability of a corporate IT governance plan, overseen by a
Governance Committee, with representation from IT professionals in
the IT Group and reporting at Board level. The names are immaterial,
the group could easily be called the IT Strategy Committee, say; what
is important is that IT governance issues can be raised at Board level
and that technically informed input to the discussion is available.
2.
An IT governance framework is implemented, typically with an
Internal Control department or some such group. What is important
is that governance can be policed proactively, not ‘after the fact’ as
an Audit Group would. Governance must not be seen as a barrier to
implementation but as an assistive process, which ensures that IT
systems get it right first time and contain no hidden surprises that will
excite the regulators down the track.
3.
Provision of a formal budget for the IT governance initiative. Without
a budget, which Internal Control can book time against and that can
be used for any tools and training that may be required, you really
don’t have a government initiative, no matter how much people talk
about governance.
IT governance methodology overview
You should take a process-based approach to governance, which is why process
initiatives like CMMI and ITIL® can be an important underpinning to IT governance. CMMI is about organizational maturity, the ability of an organization to
implement a process in pursuit of an objective, measure its consequences and
improve the process to better deliver against changing business objectives; ITIL®
is a collection of ‘best practice’ processes for managing IT infrastructure. If third
THOROGOOD PROFESSIONAL INSIGHTS
58
5 IMPLEMENTING IT GOVERNANCE
parties (such as regulators) question your IT governance in detail, it can be useful
to point to your maturity/capability as an indicator that your process can be effectively improved to address the questions raised. It is significant that Borland,
a vendor of Application Lifecycle Management tools has recently acquired the
CMMI and process consultancy, TeraQuest. Borland is implementing CMMI Level
3 (the adoption of managed process at the organizational level) internally and
will no doubt include process improvement on the CMMI model as part of its
Application Lifecycle Management offerings.
You should take a systems approach to governance. Your internal process is in
a state of dynamic equilibrium. Changing external threats and regulations provide
external stimuli, resulting in feedback through the Internal Control function to
management and the technicians in the IT Group, which results in changes to
the internal process that satisfy the new regulations or mitigate the new threats.
Separation of function keeps the whole process ‘honest’:
•
The Internal Control Group reports to the Board via the Governance
Committee – it is immune to local politics in the IT Group and in business
departments, and is focused on corporate strategy. Since it sets
requirements but isn’t responsible for systems delivery, it isn’t tempted
to interfere in technical matters that are properly the province of the
experts in the IT group.
•
The IT Group is presented with governance as, essentially, a systems
requirement. It isn’t tempted to compromise governance in the
interests of speedy or cheap delivery, because governance is part of
what it is delivering. At the same time, it is free to determine the most
effective technical solution to the business governance requirements
raised by the Internal Control function, without having possibly
inappropriate technical controls bolted on to completed systems, that
can easily introduce technical defects.
•
The Auditors report independently and confirm that the processes are
working by comparing practice against the agreed framework
everyone should be working to. If it is all working properly, the Auditors
should not find problems after the fact when they are expensive to
address because any problems should have been addressed proactively
during systems development/maintenance. However, if the process
is starting to fail, the Auditors should be able to proactively alert
management to the issue.
As with any other IT project, IT governance needs clear objectives and a budget
allocation; and a plan showing how these objectives will be achieved and how
THOROGOOD PROFESSIONAL INSIGHTS
59
5 IMPLEMENTING IT GOVERNANCE
the budget will be allocated. Implementation should be in stages, frequently delivering defined governance benefits, rather than a ‘big bang’ implementation
delivering perfect governance in one go years in the future – if the company
remains focused on the project that long. The stages in implementing an IT governance initiative from scratch would be, broadly (and in no particular order) as
follows:
1. Obtain buy-in on the ground
The impetus to good governance may be clear at Board level but the troops can
be surprisingly cynical about such initiatives. Too many of us have heard managers
talk about the best of practices – and seen them reward cowboys for rapid delivery
of systems which are full of problems for less charismatic workers to clear up,
for little reward or thanks.
Training is probably key to an organization demonstrating to its staff that it is
serious about governance – training in new tools, training in performance
management, so as to ensure that the possible overheads of governance don’t
impact on operational performance. In addition to training, experienced
(perhaps external) mentors who have a wide experience of IT generally and recognize, and know how to address, the more subtle governance issues, can be helpful
A governance forum, in which workers at the sharp end can discuss governance
issues and suggest solutions in public (far more useful than mutterings around
the water cooler about some technically infeasible governance edict), is a good
idea. However, you must make sure that you document the action points from
such a forum and show the community that the issues it identifies are at least
given proper consideration (this is process management through feedback). It
is also important that such a forum represents both the business and IT points
of view, with fully informed and empowered attendees. If it becomes a costfocused drag on innovation (e.g.: ‘our job is to find out where the IT department
wants to spend money and stop it’) such a forum can be counterproductive.
2. Map IT to the business
Generally, there is a ‘many to many’ relationship between business functions and
the IT infrastructure. A particular server, a computer storing both business data
and automated data processing systems, may support many business functions,
for example; conversely, a single business function may invoke many servers.
The best way to do this is with diagrams, but the relationships involved are too
complex for this to be done manually. In addition, there is a strong risk that such
THOROGOOD PROFESSIONAL INSIGHTS
60
5 IMPLEMENTING IT GOVERNANCE
maps will become out-of-step with reality. Business process analysis/management tools can provide a useful bridge between the world of IT and the world
of business, although there isn’t a lot of evidence that they’re being used for
this yet.
The best way to maintain such mappings is therefore with automated tools that
can generate the framework (at least) for automated systems from models relating
business processes to IT systems. Look for suites of systems development tools
(not necessarily from the same vendor) that support the entire development
lifecycle from business process modeling and requirements management, through
to coding and testing.
3. Implement policy-based security and identity management
There is a lot more to IT governance than security, but security is part of it. Good
security requires risk and threat analysis, to determine and prioritize the risks
facing the organization; and then formulation of a Security Policy, which
documents policies designed to mitigate, transfer (through insurance, say) or
accept (in conjunction with contingency plans) the various identified risks. Then
you can begin to design procedures that will implement the policies. Ideally, the
policies will be fairly generic, so that when changing technology or business
renders a procedure obsolete, the intent of the policy is clear and can direct the
formulation of a new procedure.
Good security is role based, as this aids maintenance. People in an organization have basic, restricted access as employees; then as they are given roles in
the organization, each role brings with it appropriate access permissions. If people
move roles within the organization, they lose permissions associated with one
role and gain those associated with another.
Identity management is related to security. It is all about identifying people
unambiguously and managing the attribution of identity to people seeking access
to your organization. It includes providing the facilities to enable the unambiguous
attribution of actions to identities, essential for audit trails and security. A large
part of IT governance comes from people taking responsibility for their actions.
Without identity management, your governance is built on sand.
In common with the general tenor of this report, a standards-based approach
to security is recommended, although you may not need to formally certify against
the standards. ISO/IEC 17799:2000 [StandDir, web] is becoming accepted worldwide as the code of practice for information security management, although
you can’t really certify against this, as it isn’t a specification you can assess against.
THOROGOOD PROFESSIONAL INSIGHTS
61
5 IMPLEMENTING IT GOVERNANCE
You also need BS7799-2:2002, the corresponding specification (which you can
certify against); and both are available as a package, with some extra material,
as the ISO 17799 Toolkit. ISO 17799 et al provides an excellent framework for
implementing security and ensures that you take a holistic approach, starting
with risk management (although it isn’t strong on the details of this) and covering
often-neglected areas such as business continuity. However, some form of
mentoring from an external security consultant is recommended too – it is difficult to make an unbiased assessment of risk and the threats facing you, from
inside an organization.
Tools to support IT risk assessment, implement ISO 17799 etc are available. Some
of these can be very useful but beware of concentrating only on those areas your
tools cover and neglecting business risk assessment as a whole: there is little
point in mitigating the IT risk affecting a system if the business risk is uncontrolled; and almost any IT security measures can be rendered ineffective if unhappy
or unjustly-treated staff can be compromised, or if physical access to the premises
and IT infrastructure isn’t effectively controlled. In the case of risk assessment
tools, in particular, investigate the provenance and localization of the threat
database that underlies their risk assessment facilities. A database relating to
US threats, say, may not be wholly appropriate in the UK, and a database that
is some years old may miss emerging threats (ideally, you should be able to add
threats from your own history to the database).
4. Implement BSM across all platforms
Business Service Management (BSM – see Chapter 4) means that you manage
your IT infrastructure in terms of the business services it implements. Managed
Objects claims to have invented the term [ManObj, web] but it is also associated with HP and BMC Software these days; and BMC’s Atrium CMDB, which
addresses the IT Infrastructure Library (ITIL®) requirement for a single, enterprise database to ensure data consistency and support integration across differing
service management processes may be a significant enabler for BSM.
Business Service Management is commonly taken to include Service Level Management, Incident and Problem Management, Infrastructure and Application
Management (including Licence Management), Service Impact and Event
Management, Asset Management and Discovery, Change and Configuration
Management, Capacity Management and Provisioning, and Identity Management. Some of these have been split out for special emphasis in the present chapter.
By its very nature, BSM must be cross-platform. Business users will not be happy
if business-friendly service level reporting and management stops abruptly when
THOROGOOD PROFESSIONAL INSIGHTS
62
5 IMPLEMENTING IT GOVERNANCE
their data strays onto the mainframe, for example. This is a serious governance
issue as discontinuities in the vocabulary and culture of service level management and security facilitate breakdowns in IT governance at that point.
5. Implement infrastructure management
Having a fully managed infrastructure based on an up-to-date and maintained
asset register is an essential part of IT governance. Even something as simple
as IT asset management is a vital part of IT governance. If you don’t know exactly
what hardware you have and exactly what software is running on it, how can
you claim any sort of IT governance? Software piracy is one area where organizations seem to be assumed guilty unless they can prove innocence, and the
consequences of a visit by the piracy police (disruption, confiscation, fines) can
be immense. Yet how effective can a plea that ‘we’re sure all our software is
licensed although we don’t know what software we have and where it is running’
be?
ITIL® is a good basis for infrastructure management, although it is probably
sufficient rather than necessary. As well as asset management, capacity
management and service level management, the Service Desk function and defect
tracking are typically part of an IT governance framework.
6. Implement configuration management
Configuration management involves the identification of the components of an
automated system that contribute to the service it delivers and the management
of changes to this configuration (including audit trails and facilities for backing
out of unsuccessful changes). Software change control (keeping track of
changes to software code as requirements change or defects are addressed) is
only part of configuration management.
Defect and problem tracking and service desk support are closely related to configuration management.
7. Implement business continuity management
The availability of IT systems is now critical to the operation of many businesses.
This makes Business Continuity Management (BCM) a vital part of IT governance (it’s also required by the ISO 17799 security standard). In fact, it should
be built in from the start by designing critical systems to be resilient. BCM is
non-trivial to do well and external consultancy may be attractive. It must be firmly
based on an objective assessment of risks (itself difficult unless you are an experi-
THOROGOOD PROFESSIONAL INSIGHTS
63
5 IMPLEMENTING IT GOVERNANCE
enced risk assessor), including risks the organization hasn’t encountered yet,
and deal with the spectrum of contingency from minor service interruptions to
a full-blown disaster that eliminates a data centre in its entirety.
It is important to ensure that IT governance is maintained sensibly (at a managed
level) during a contingency, as otherwise a contingency could be engineered
as an opportunity to steal data, compromise business transactions or financial
reports, or sabotage systems. A ‘whole systems’ approach to business continuity should be adopted. The non-availability of phones or a serious health and
safety issue can take out a business service just as effectively as a fire-damaged
computer.
8. Implement information lifecycle management
Electronic information can be as important and legally significant as paper
documents such as contracts formal and (potentially forged) instruments. The
courts will probably treat any email as an electronically signed document,
according to Stephen Mason, Barrister, speaking at SUNLive05 [SUNLive05, web]
in London. The regulations and laws affecting business information (see
Chapter 2) say that information must be available to answer auditors’ questions
in a timely manner, and its provenance must be capable of proof; but, as well
as this, some personal information must be destroyed securely when you no
longer need it. This means that you need a policy-based information lifecycle
management system (similar in purpose to document management systems in
the ‘real world’). This must be able to classify information, store it cost-effectively and securely (possibly with backup copies kept offsite), document its
creation, amendment and destruction, and securely audit the critical events in
the lifecycle.
9. Implement a systems development/acquisition process
If you build software, you must have a lifecycle development process (see Chapter
4) from business requirements analysis through to coding, testing and implementing systems (in fact, testing should start with validation of the requirements).
This is best implemented by training and mentoring, using tools to facilitate
desired practice. Simply mandating a development process does not work well.
If you don’t build software, you need a similar process for implanting packages.
You still need to analyze business requirements, in order to choose a package
which best fits your business process and in order to assess the impact of the
business process embodied in the package on your existing business process.
THOROGOOD PROFESSIONAL INSIGHTS
64
5 IMPLEMENTING IT GOVERNANCE
And, you still need to test package applications, in case they don’t do what they
say they will, or you implement them incorrectly. If you customize a package,
this is really a small systems development project and similar QA measures are
necessary.
10. Optimize processing
If you don’t have a great deal of IT governance, introducing full-blown governance and compliance measures can impact processing overheads – and,
therefore, the business (after implementing HIPAA in the States, data volumes
often increase by an order of magnitude or more). It is therefore vital to include
what Mercury Interactive calls ‘business technology optimization’ [Mercury, web]
in your governance program. Put crudely, satisfying the requirements of HIPAA
or Sarbanes-Oxley (or local equivalents) can increase, say, database accesses
by several orders of magnitude – and, doubtless, many database infrastructures
won’t be designed to cope with this. Unless you reassess and, possibly,
optimize performance, the immediate result of introducing IT governance may
be to impact business performance and, thus, the reputation of IT (and also badly
impact your career).
11. Implement problem management
Business Continuity is often thought of as disaster recovery, something standalone that you bring in after a disaster, such as the loss of a data centre in a fire.
This is obviously an aspect of IT governance, if the business depends on applications running in that data centre, but this is too limited a view (see Business
Continuity Management, BCM, above). Business continuity is also a function
of IT problem management.
The business needs to be isolated from IT problems: at one end, a significant
part of the IT infrastructure is lost and we talk of disaster recovery and BCM;
at the other end, a bug is encountered that affects the business or a small part
of the IT infrastructure (a single phone line perhaps) drops out and we talk about
problem or incident management and defect tracking. In the interests of good
IT governance, you should probably see this as a continuum: the impact of IT
issues on the business should be limited, well controlled and managed.
This is usually associated with a service desk function, which should aim for
pre-emptive identification and mitigation of emerging issues, ideally before they
have any impact on a business service. There are many sophisticated service
desk packages: BMC Remedy [Remedy, web], for example, or FrontRange’s HEAT
[HEAT, web].
THOROGOOD PROFESSIONAL INSIGHTS
65
5 IMPLEMENTING IT GOVERNANCE
12. Demonstrate ROI
At least one of the objectives behind any IT governance initiative is likely to be
to better run IT for the organization’s benefit. So, it is very good practice to instrument IT Governance systems and report business information so that IT
governance, and the ROI (Return on Investment) from the governance project,
can be demonstrated on a continuing basis.
Choose your metrics carefully – people tend to deliver what you measure, so if
you choose the wrong measures you may get the wrong results. Early attempts
to measure the quality of support staff, for instance, in terms of the number of
calls completed in a period resulted in a plethora of quick fixes and recurring
problems – because continual short-term fixes to the same problem made the
metrics look better. It might have been better to measure problems fixed without
recurrences and customer satisfaction rather than calls processed. After all,
provided it is accessible and servicing the calls it gets, the fewer calls a service
desk has to process, the more successful it is!
Look beyond a purely financial ROI. Good IT governance reduces risk, so it
increases business confidence and allows you to play in areas your competitors find too risky. It involves efficient provisioning, so new staff get up-to-speed
faster, and promotes a supportive IT environment, with fewer surprises, so staff
morale generally should improve. A ‘balanced scorecard’ [BalScore, web]
approach to measuring the impact of IT governance is probably appropriate.
It is always important to remember that IT governance is only a means to an
end. ‘Better IT governance’ is not really a useful objective; it is better to have
increasing the ‘bang per buck’ spent on IT as an objective (measured in business
terms), or widening your customer base in areas where good governance forms
part of the acceptance criteria, or even reducing the cost of regulatory compliance and controlling the risk of legal action. Nevertheless, be realistic. If your
improved IT governance allows you to win a lucrative contract in the health
industry, you can’t accrue the entire profit to your IT governance effort – it may
be an enabler, and this is a real non-financial ROI, but the final profit is mostly
down to the software or services you supply against the contract. Similarly, if
your improved governance makes you more efficient, you can’t claim the manhours saved as a benefit until you actually reduce headcount or redeploy people
onto productive work.
THOROGOOD PROFESSIONAL INSIGHTS
66
5 IMPLEMENTING IT GOVERNANCE
13. Reviews
Reviews of IT systems after changes have bedded in, in order to enable a ‘gap
analysis’ of the differences between aspiration and reality, followed by the scheduling of maintenance efforts aimed at reducing any gaps, is an important
characteristic of good IT governance. Sometimes, as with CMMI initiatives (see
Chapter 2), these reviews are part of a formal process but, regardless of how
you approach IT governance, there must be some sort of review and feedback
process. Change seems to be part of the nature of IT, so a static governance
system, however effective, is unlikely to stay effective for long.
In the next chapter we summarise the findings of the Report.
THOROGOOD PROFESSIONAL INSIGHTS
67
Download