Thursday, January 8, 2009

ITIL Security Management

In a 2004 survey designed by Noel Bruton (author of 'How to Manage the IT Helpdesk' and 'Managing the IT Services Process'), ITIL adopting organizations were asked to relate their actual experiences in having implemented ITIL. The ITIL recommendations were developed in the 1980s by the UK Government's CCTA in response to the growing dependence on IT and a recognition that without standard practices, government agencies and private sector contracts were independently creating their own IT management practices and duplicating effort within their Information and Communications Technology (ICT) projects resulting in common mistakes and increased costs. In December 2005, the OGC issued notice of an ITIL refresh, commonly known as ITIL v3, which became available in May 2007.

PRINCE2 is derived from the earlier PRINCE technique, which was initially developed in 1989 by the Central Computer and Telecommunications Agency (CCTA) as a UK Government standard for information systems (IT) project management; however, it soon became regularly applied outside the purely IT environment. Availability Management is the ability of an IT component to perform at an agreed level over a period of time. ITIL Security Management From the business continuity life cycle, one output is the recovery plan.

It is important to have a focal point for reporting incidents and making service requests. The CCTA IT Security and Privacy group provided the CCTA IT Security Library input to GITMM, but when CCTA was broken up the security service appropriated this work and suppressed it as part of their turf war over security responsibilities.

A Release consists of the new or changed software and/or hardware required to implement approved changes.

No comments: