Business of I.T. Applications (Extra) Flashcards
ability to establish procedures to incorporate and prioritize management of unplanned interruptions (incidents) and investigate causes of failure.
Interaction and co-adoption of ITIL and Agile Practices
value streams, processes, suppliers
resources
benefits, cost, risk
stakeholder values
(1) It creates controls that each practice must consider when planning how work is to be done. (2) In high-velocity environments, information security is integrated as much as possible into the daily work of development and operations. (3) It must be driven from the senior-most level of the organization, according to clearly understood governance requirements and organizational policies.
Information Security Management
based on change type determines the roles for assessment and authorization.
change model
maximize the number of successful service and product changes by ensuring that risks are properly assessed, authorizing changes to proceed, and managing the change schedule.
Change Control
Taking advantage of such services can free an organization from investing in its own costly infrastructure and software assets that would have to be accounted for as capital expenditure.
partners and suppliers dimension
(1) ensure metrics are outcomes based and focused on value (2) define your metrics (3) simplify and or optimize before automating.
optimize and automate
(1) the ecosystem is constantly changing, so feedback is essential (2) “Fast” does not mean complete (3) comprehend the whole but do something.
progress iteratively with feedback principle
communicate in a way the audience can hear (2) decisions can only be made on visible data (3) collaboration does not mean consensus. (4) to determine whom to collaborate with.
collaborate and promote visibility principle