Skip to main content

Journey to Implementation Change Management Process (Part 2)

Continue,

In the previous article, I already define the advantages and references that can be used for Change Management process, in this article it will focusing on what the important parameters used to ensure enablement and supporting Change Management to be applied in your enterprise.


Service Catalogue

As the baby step to build Change Management process is build a service catalog of your enterprise. What is Service Catalogue? Refer to ITIL, service catalogue is a database or structured document with information about all live IT services, including those available for deployment. The service catalogue is part of the service portfolio and contains information about two types of IT service: customer-facing services that are visible to the business; and supporting services required by the service provider to deliver customer-facing services. As reflection question is do you know what kind of IT services which available in your enterprise? Ask the same questions to your co-workers, do they answer same as yours? If there any differences, than you should start to gather all the scattered information and verify every answers too ensure all internal personnel have an identical view.
What kind the information should include in service catalogue? Here they are:

  1. Service Name, referred to services which known to users / IT personnel.
  2. Service Description, used to additional information related to service name.
  3. Supporting Services, used to describe which services supported this services.
  4. Service Owner, define owner (person in the enterprise) of the services. 
  5. Criticality, define level of service criticality to the enterprise business.
  6. Service Level Agreement (SLA), related to expectation of availability of services.
This service catalogue should be accessible by internal and frequently updated reflect to existing environment. It is important to maintain the accuracy and availability the service catalogue. To build a service catalogue is not a day job. The enterprise should assign dedicated person / team to actualize this part. The advantages of this are this catalogue will use as reference for business users and IT teams to determine what kind of services that valuable to business continuity. Simply for beginning, the service catalogue could written in simple spreadsheets.

Change Management Database (CMDB)

The next part is Change Management Database (CMDB). Refer to ITIL, CMDB is database used to store configuration records throughout their lifecycle. The configuration management system maintains one or more configuration management databases, and each database stores attributes of
configuration items, and relationships with other configuration items. Simply, CMDB have a role to maintain all changes which implemented in the IT Services reflect to service catalogue.
This is also not a day job. It need a dedicated person / team to maintain the accuracy of CMDB. Through this we can view and review all changes which implemented in the enterprise. If there's a incident caused services disruption, then CMDB become an essential part for the enterprise, especially for IT personnel to view what kind of changes yet implemented. It will create an awareness for personnel to conduct comprehensive development, analysis and approval before they perform the changes in the services.
The essential part in CMDB is Configuration Item (CI). Definition of CI is service asset that
needs to be managed in order to deliver an IT service. Examples of configuration items are a server or a software licence. The CMDB will mapping the service catalogue to CI. So, it will bring an advantages for the personnel to completely view structure of the services.
To ensure the CIs accurately better to using automate solution which provide by various vendors. It will collect all data inside the CIs. It need an agent to be injected in CIs to completely gather all the information. Some of elements that will need to be gather such as:

  1. Hostname
  2. IP Address
  3. Type of devices: servers, network device, security devices, etc
  4. Software / Operating System version
  5. Etc 
After all elements collected, to draw services completely that CIs mapped into service catalogue. This is an example of it:

Example of Simple CMDB

That's it for today, it will continue in next article.
Thank you for reading.

- EJ

Popular posts from this blog

Konfigurasi Wazuh sebagai perangkat monitoring keamanan TI

Didalam dunia keamanan teknologi informasi, menggunakan  tools  yg powerful dan gratis merupakan satu hal yg sangat penting dalam membantu meningkatkan visibilitas keamanan. Salah satu tools  tersebut adalah Wazuh . Bagi pakar keamanan yg sudah cukup lama berkecimpung didalam dunia keamanan teknologi informasi, tools Wazuh tidaklah asing. Malah mungkin sudah menjadi salah satu tools  wajib yg harus dimiliki dalam aktifitas pengamanan aset teknologi informasi.

Securing Your Password To Protect Your Data

Background Someday when I joint in an open discussion with a group of friends, I asked them the question about how often they are change their bank account PIN. I asked them in certain period start from 1 months, a quarter then in 1 year, less than 3 person raise their hands. Then I asked them again about did they already change their bank account PIN since they open their account for the first time. Parallel with previous question, less than 3 person raise their hands. Surprisingly that's the fact!