Wednesday, December 3, 2008

ITIL Users

ITIL Security Management is based on the code of practice for information security management also known as ISO/IEC 17799. Configuration management, when used strictly for software development, is called Software Configuration Management (SCM). ITIL has been criticized on several fronts.

The PRINCE2 methodology works with most project management techniques. This meant that adoption of CCTA guidance such as ITIL was delayed, as various other departments fought to take over new responsibilities. ITIL Users Minor software releases and hardware upgrades, normally containing small enhancements and fixes, some of which may have already been issued as emergency fixes.

It incorporates IT Service Management within its Control Objectives for Support and Delivery. The plan defines the actions necessary to prevent, detect, and mitigate the effects of potential disasters.

Service Level Management provides for continual identification, monitoring and review of the levels of IT services specified in the Service Level Agreements (SLAs).

No comments: