Microsoft Word - Tesis-Inggris

advertisement
CHAPTER II
THEORITICAL FRAMEWORK
2.1
Service Level Management
BMC Software states that Service is defined as one or more IT systems
which enable a business process, something that changes value to the
business that may be comprised of other services. A good starting point is to
ask the customers which IT Services they use and how those services map
onto their business processes.
The Service Level Management (SLM) process is used by organization
to determine the level of IT service needed to support the business. It also
enables monitoring to identify whether the required service levels are being
achieved. Service Level Agreement (SLA), which are managed through
Service Level Managament process, provide specific targets against which
the performance of the IT organization can be measured.
According to Information Technology Infrastructure Library (ITIL)
training documents, the definition of Service Level Agreement (SLA) is the
written agreement both between IT provider and the IT customer, defining
the key service targets and responsibilities of both parties. Wikipedia defines
Service Level Agreement (SLA) as a formal agreement between 2 parties. It
is a contract that exists between customers and their service providers. It
12
13
records
the
common
understanding
about
services,
priorities,
responsibilities, guarantee, etc with the main purpose to agree on the level of
service. In the conclusion, Service Level Agreement is defined as an
agreement between IT service providers and their customers in providing the
certain level of services.
Service Level Management is aimed to maintain and improve IT
service quality through the constant cycle of agreeing, monitoring, and
reporting upon IT service achievements and instigation of action to eradicate
poor service – in the line of business and const justification. The SLM
process is responsible for ensuring that :
1.
SLA, Operating Level Agreement (OLA) which
is an internal
agreement covering delivery of services that supports IT
organizations in their delivery of services, and Underpinning
Contracts (UC) which is a contract with external supplier
covering delivery of services that supports IT organization in
their delivery of services, are met.
2.
Any adverse impact on service quality is kept to a minimum
14
Figure 2.1. SLM Structures (Source: BMC ITIL Foundation)
The improvements in service quality and reductions in service
disruption that can be achieved through Service Level Management can
ultimately lead to significant financial savings. Furthernore, less time and
effort is spent by IT staff in resolving fewer failures and IT customers are
able to perform their business without adverse impact. To satisfy the needs
of business and to provide SLA, service providers must first understand and
then meet the availability and performance expectations of business owners
and end users who are engaged in the business process. During the SLM
process, SLAs are defined between the Customer and the IT Provider. Those
agreements define the key service targets and responsibilities of both parties.
2.2
COBIT Framework
COBIT stands for Control Objectives for Information and Related
Technology is a framework and supporting toolsets for managers to bridge
15
the gap with respect to control requirements, technical issues, and business
risk, and communicate that level of control to stakeholders.
According to Wikipedia, COBIT is a set of best practices (framework)
for information technology management created by the Information System
Audit and Control Objectives (ISACA), and the IT Governance Institute
(ITGI) in 1992. COBIT composed of 34 IT processes that can be grouped
into 4 domains: Planning and Organizations (PO), Acquiring and
Implementation (AI), Delivery and Support (DS), and Monitoring and
Evaluation (ME). COBIT is designed for use by 3 distinct audiences:
1.
Management – to help them balance risk and control investment in
an often-unpredictable IT environment.
2.
Users – to obtain assurance on the security and controls of IT
services provided by internal or third parties.
3.
Auditors – to substantiate their opinions and provide advice to
management and internal controls.
COBIT provides its audiences with a set of generally accepted
measures, indicators, processes and best practices to assist them in
maximizing the benefits derived through the use of information technology
and developing appropriate IT governance and control in a company.
COBIT was released in 1996, whose mission is to research, develop,
publish, and promote an authoritative, up-to-date, international set of
generally accepted information technology control objectives for day-to-day
16
use by business managers and auditors. Providing a good practice across a
domain and process framework and presents activities in manageable and
logical structures, COBIT is strongly focused on control, less on execution.
It will help in IT-enabled investment, ensure service delivery, and provide a
measure against which to judge when things do go wrong.
Figure 2.2. COBIT Framework (Source: IT Governance Institute, 2007)
17
COBIT consists of 34 high-level control objectives, one for each
process. These control objectives are categorized into 4 groups:
1. Planning and Organization
Planning and Organization will cover the use of information and
technologies and how it can be best used in a company to achieve
company’s goals and objectives. It also highlights the organizational
and infrastructural form of IT in order to achieve the most optimal
results and to generate the most benefit from the use of IT. This
process is indicated into 11 high-level control objectives as follow:
Activity
PO1
Define a strategic
IT Plan
PO2
Define the
Information
Architectures
PO3
Determine
Technology
Direction
PO4
Define IT
Processes,
Organization, and
Relationship
PO5
Manage the IT
Investment
PO6
Communicate
Process Description
Required to manage and direct all IT
resources in line with business
strategies and priorities.
The Information system function
creates and regularly updates a
business information models and
defines the appropriate system to
optimize the use of this information.
The information service function
determines the technology direction to
support the business.
An IT organization is defined by
considering requirements for staff,
skill,
function,
authority,
accountability,
roles
and
responsibilities, and supervision.
Established and maintained to manage
IT-enable investment program and that
encompasses cost, benefit, and
prioritization within budget, a formal
budgeting process and management
against the budget.
Management develops an enterprise IT
18
Management
Aims and
Direction
PO7
Manage IT
Human Resources
PO8
Managing Quality
PO9
Asses and Manage
IT Risk
PO10 Manage Project
control framework and defines and
communicates policies
Acquired and Maintained for the
creation and delivery of IT services to
the business.
This is enabled by planning,
implementing, and maintaining the
QMS by providing clear quality
requirements, policies, and procedures.
Documents a common and agreedupon level of IT risk, mitigation
strategies, and residual risk
Ensures the correct prioritization and
co-ordination of all projects
2. Acquisition and Implementation
Acquisition and Implementation covers identifying of IT
requirements, acquiring the technology, and implementing it within the
current company’s business process. This domain also addresses the
development of the maintenance plan that a company should adopt in
order to prolong the life of an IT system and it components. This
process is indicated in the 11 high-level control objectives as follow:
Activity
AI1
Identify Automated
Solutions
AI2
Acquire and Maintain
Application Software
Process Description
The need for a new application
or function requires analysis
before acquisition or creation
to ensure that the business
requirements are satisfied in
effective
and
efficient
approach
Application are made available
in
line
with
business
requirements
19
AI3
Acquire and Maintain
Technology Infrastructures
AI4
Enable Operation and Use
AI5
Procure IT Resources
AI6
Manage Changes
AI7
Install and Accredit
Solutions and Changes
Organization have processed
for
the
acquisition,
implementation, and upgrade
of
the
technology
infrastructures
Knowledge about the new
system is made available
IT
resources,
including
hardware, software, people,
and services need to be
procured
All
changes,
including
emergencies maintenance and
patches,
relating
to
infrastructure and application
within
the
production
environment are formally
managed in controlled manner
New systems need to be made
operational once development
is complete
3. Delivery and Support
Delivery and Support focuses on the delivery aspect of
information technology. It covers areas such as the execution of the
application within the IT systems and its results as well as the support
processes that enable the effective and efficient execution of these IT
systems. Training and Security Issues are also covered within. This
process is indicated in the 11 high-level control objectives as follow:
Activity
DS1
Define and Manage
Service Level
Process Description
Effective
communication
between IT management and
business customers regarding
service required is enabled by a
20
DS2
Manage Third Party
Services
DS3
Manage Performance
and Capacity
DS4
Ensure Continuous
Services
DS5
Ensure System Security
DS6
Identify and Allocate
Cost
DS7
Educate and Train User
DS8
Manage Service Desk
and Incident
DS9
Manage the
Configuration
documented definition of and in
agreement on IT service and
service levels
The need to assure that the
services provided by third party
meet
business
requirements
requires an effective third party
management process
The need to manage performance
and capacity of IT resources
requires a process to periodically
review current performance and
capacity of IT resources
The
need
for
providing
continuous IT services requires
developing, maintaining and
testing IT continuity plans,
utilizing offsite backup storage
and providing periodic continuity
plan training
The need to maintain the
integrity of information and
protect IT assets requires a
security management process
The need for a fair and equitable
system of allocating IT cost to
the business requires of accurate
measurements and agreement
with business user on fair
allocation
Effective education of all users of
IT systems, including those
within IT, requires identifying
training needs for each of user
groups
Timely and effective response to
IT user queries and problems
requires a well-designed and well
executed service desk and
incident management process
Effective problem management
requires the identification and
classification of problems, root
causes analysis, and resolution of
21
DS10
Manage Problem
DS11
Manage Data
DS12
Manage the Physical
Environment
DS13
Manage Operation
problems
Effective problem management
requires the identification and
classification of problems, root
causes analysis, and resolution of
problems
Effective
data
management
requires
identifying
data
requirements
Protection
for
computer
equipment and personal requires
well-designed and well-managed
physical facilities
Complete and accurate of data
requires effective management of
data processing procedures and
diligent maintenance of hardware
4. Monitoring and Evaluation
This Monitoring and Evaluation domain deals with a company’s
strategy in assessing the needs of the company and whether or not the
current IT system still meets the objectives for which it was designed
and the controls necessary to comply with regulatory requirements.
Monitoring also covers the issue of an independent assessment of the
effectiveness of IT system in its ability to meet business objectives and
the company’s control processes by internal and external auditors. This
process is indicated in the 11 high-level control objectives as follow:
Activity
ME1
Monitor and Evaluate
IT Performance
ME2
Monitor and Evaluate
Process Description
Effective
IT
performance
management requires a monitoring
process
Establishing an effective internal
22
Internal Control
2.3
ME3
Ensure Compliance
with External
Requirements
ME4
Provide IT
Governance
control program for IT requires a
well-defined monitoring process
Effective oversight of compliance
requires establishment of a review
process to ensure compliances with
laws regulations, and contractual
requirements
Establishing
an
effective
governance framework includes
defining organizational structures,
processes, leadership, roles and
responsibilities to ensure that
enterprise IT investment are
aligned
and
delivered
in
accordance
with
enterprise
strategies and objectives
COBIT Maturity Model
The Maturity Model provided by COBIT Management Guidelines for
the 34 IT Process is becoming an increasingly popular tool to manage the
timeless issue of balancing risk and control in a cost-effective manner.
In the article “The COBIT Maturity Model in Vendor Evaluation Case”,
COBIT Maturity Model is an IT Governance Tool used to measure how well
developed the management processes are with respect to internal control.
The maturity model allows the organization to grade itself from Nonexistent
(0) to Optimized (5).
A fundamental feature of the maturity model is that it allows an
organization to measure as-is maturity levels, and defines to-be maturity
levels as well as gaps to fill. As a result an organization can discover
practical improvements to the system internal control of IT. However,
23
maturity levels are not a goal, but rather they are a means to evaluate the
adequacy of internal controls with respect to company objectives.
IT Management is constantly on the lookout for benchmarking and selfassessment tools in response to the need to know what to do in an efficient
manner. Starting from COBIT’s processes and high-level control objectives,
the process owner should be able to incrementally benchmark against that
control objective. This provides for three needs:
1.
Relative measure of the organization is
2.
Manner to efficiently decide where to go
3.
Tool for measuring progress against the goal.
The COBIT Framework defines 34 IT processes within an IT
environment. For each process there is one high-level control statement and
between 3-30 detailed control objectives. The approach to maturity models
for control over IT processes consists of developing a method of scoring so
that an organization can grade itself from Non-existent to Optimized (from 0
to 5). Whatever the model, the scales should not be too granular, as that
would render the system difficult to use and suggest a precision that is not
justifiable.
24
Figure 2.3. The Scale for Maturity Model
(Source: IT Governance Institute, 2007)
Based on the COBIT Management Guidelines, for each 34 processes,
there is an incremental scale, based on the rating of 0 to 5. The scale is
associated with generic qualitative maturity model description ranging from
Non-Existent to Optimized as follows:
Maturity
Level
0
1
2
Status of the Internal Control Environment
There is no recognition of the need for internal
control. Control is not the part of the organization's
Nonculture or mission. There is a high risk of control
Existent
deficiencies and incidents
There is some recognition of the need for internal
control. The approach to risk and control
Initial/Ad- requirements is ad-hoc and disorganized without
communication or monitoring. Deficiencies are not
hoc
identified. Employees are not aware of their
responsibilities
Controls are in place but not documented. Their
operation is dependent on knowledge and motivation
of individuals. Effectiveness is not adequately
Repeatable evaluated. Many control weaknesses exist and are not
but
adequately addressed; the impact can be severe.
Intuitive Management’s actions to resolve control issues are
not prioritized or consistent. Employees may not be
aware of their responsibilities
25
Controls are in place and adequately documented.
Operating effectiveness is evaluated on periodic basis
and there is an average number of issues. However,
evaluation process is not documented. While
3
Defined
management is able to deal predictably with most
control issues, some control weaknesses are predicted
and impacts could still be severe. Employees are
aware of their responsibilities for control.
There is an effective internal control and risk
management environment. A formal, documented
evaluation of control occurs frequently. Many
Managed controls are automated and regularly reviewed.
Management is likely to detect most control issues
4
and
Measurable but not all issues routinely identified. There is
consistent follow-up to address identified control
weaknesses. A limited, tactical use of technology is
applied to automate controls.
An enterprise-wide risk and control program provide
continuous and effective control and risk issues
resolution. Internal control and risk management are
integrated with enterprise practices; supported with
automated
real-time
monitoring
with
full
5 Optimized
accountability
for
control
monitoring,
risk
management and compliance enforcement. Control
evaluation is continuous, based on self-assessment
and gap and root causes analyses. Employees are
proactively involved in control improvements.
The advantage of maturity model approach is that it is relatively easy for
management to place itself on the scale and appreciate what is involved if
improved performance is needed. The scales include 0 because it is possible
that no process exists at all. The “0-5” scale is based on a simple maturity
scale showing how a process evolves from a non-existent capability to an
optimized capability. This approach has been derived from the Maturity
Model that the Software Engineering Institute defined for the maturity of the
26
software development capability. Against these levels, developed for each
COBIT 34 IT Processes, management can map:
- The current status of organization – where the organization is today
- The current status of (best-in-class) of industry – the comparison
- The current status of international standards – additional comparison
- The organization’s strategy for improvement – where the organization
wants to be
Download