Computer System Configuration Management and Change Control

Size: px
Start display at page:

Download "Computer System Configuration Management and Change Control"

Transcription

1 Computer System Configuration Management and Change Control Using Risk-Based Decision Making to Plan and Implement IT Change Justin J. Fisher Senior Manager, BT Quality and Compliance Pfizer

2 Agenda 1. Background 2. Audience Demographics 3. Scope 4. Introduction 5. Overview 6. Computer System Configuration Management 7. Computer System Change Control 8. The Valuable Interaction between Change Control and Configuration Management 9. Interactive Exercise 10.Summary

3 Background Education B.A. Education, Flagler College, St. Augustine, FL Experience Financial/Mortgage Industry IT Service Manager/ IT Change Manager Pharmaceutical Industry Internal and Independent Quality and Compliance Roles Computer Systems Validation and Infrastructure Qualification Quality systems Change Control, Incident Mgmt, CAPA/Investigations and Commitments Document and Records Management, etc. Lifecycle (Validation, Qualification, Project/Operational) Share Services

4 Getting To Know You Audience Poll Are you in IT? Delegated Quality or Compliance unit? Current Role in Change and Configuration Mgmt in your organization? Are you in Quality? Computerized Systems Quality?

5 Scope In Scope: Guidance for process expectations based on risk, scale, and complexity Out of Scope: Definitive application of processes at the technology level Risk of different architecture is varied, and we will not affix a risk categorization or specific process expectation to technologies (ie. Enterprise computer system used at multiple sites versus a desktop solution) Risk of business processes is varied Disclaimer: Theoretical definitions of Validation and Qualification Multiple resources available on understanding evolving industry expectations Terms will be used as they apply to historical use and experience

6 Introduction Configuration Management Change Control Computer System Configuration Management Appropriate configuration Mgmt processes should be established such that a computerized system and all its constituent components can be identified and defined at any point. 1 Computer System Change Control Change management procedures should be established. The point at which change management is introduced should be defined. Appropriate change processes should be applied to both project and operational phases. 1 1 ISPE. (2008). GAMP 5 A Risk-Based Approach to Compliant GxP Computerized Systems.

7 Overview Increased rigor and formality Project Configuration Management Change Control Clear hand-off from one phase to another Operations Configuration Management Change Control

8 Computer System Configuration Management a computerized system and all its constituent components can be identified and defined at any point. 1

9 Computer System Configuration Management Configuration Identification Configuration Control Configuration Status Accounting Configuration Evaluation

10 Identify Configuration Identification (What to keep under control) Configuration Item: Component of the system which does not change as a result of the normal operation of the system. 1 Deliverables that support the computer system User Requirements Functional Requirements Technical Architecture Configuration Specifications, etc. Computer System components Application modules and code Infrastructure Hardware Mid-tier solutions

11 Define Use a risk-based approach to determine the scale and complexity of a computer system configuration management process Finding the right granularity Scale, complexity, and risk Elements are controlled through Change Control Tell the story of the system through time Aids in Investigations

12 Key Elements of an Effective Configuration Management Solution Accessible Allows for more appropriate Impact Analysis and decision making Updateable Sufficient controls in place to prevent unauthorized modifications Accountability Change controls should adequately plan for configuration mgmt updates and follow through

13 Configuration Management Risk Avoidance Scale appropriately Unwieldy Best intentions may still not provide a dependable CMDB Utilize Periodic Review processes for continued maintenance Change from external systems may impact asset inventory Shared resources at risk of breaking CMDB if not appropriately addressed by all stakeholder Accountability to maintain system Strong quality system to hold teams accountable for compliance to the CM process

14 Computer System Change Control Change management procedures should be established. The point at which change management is introduced should be defined. Appropriate change processes should be applied to both project and operational phases. 1 URS 1.0 FS 1.1 FS 1.2 FS 1.3 CS DS 1.1.2

15 Computer System Change Control Describe the proposed change Document and Justify the change Evaluate Risks and Impact of the Change Accept or Reject the Request Develop and Verify the change Approve and Implement the Change Close the Change

16 Risk Based Change Control Increase rigor and formality as we move up the chart Applying the same rigor and formality to a server change as we would new functional code to support new business processes is not risk-based decision making Impact continuum Impact cannot be viewed solely as outage, but the further down the pyramid, the greater likelihood of a failure causing outage rather than functional failure Consistent processes must be scalable for risk The same SOPs and Change Control processes can be used for all categories, however the rigor and formality that is prescribed by the process should be scaled accordingly. Increase formality and rigor of change control Category 5: Custom applications Category 4: Configured products Category 3: Non- Configured products Category 1: Infrastructure Software

17 Flexibility Different types of technological components of a computer system require nuanced management For many application changes, the change moves through a pre-production workflow for appropriate development and verification prior to moving into the production environment. For many changes to infrastructure, there is no concept of moving a change through prerequisite environments, but if using one Change Control process, it must allow for both types of movements of change. Shared infrastructure/services Infrastructure that is not allocated for one computer system and has an inherent design that does not relate back to a business process Data Centers and Computer Rooms Shared Databases Physical and virtual Server Farms Storage arrays A Change control process that is overly focused on application change control will be impossible to implement for shared infrastructure concepts

18 Priority Automate as much of the regulatory and internal requirements into the process as possible to keep the business running Expectations to understand regulatory impact and requirements is scaled based on the category of technology supported A server technician doesn t need to know the GMP regulatory requirements for the business processes supported by a Customized application hosted on their server, but they need to know how GMP regulations apply to how they are expected to exhibit control over a component of a regulated computer system Communicate process design to the business to level-set expectations

19 Impact Analysis Category 5: Custom applications Category 4: Configured products Category 3: Non-Configured products Category 1: Infrastructure Software Less likelihood of functional impact Change control process should provides sufficient guidance for evaluating the impact of a proposed change Reasonable estimate of the positive and/or negative impact to: Computer system configuration items Business processes Functions Availability Other scheduled activities (scheduled backups, disaster recovery activities, other planned changes) Reasonable and Scalable

20 Proceduralizing Change Control Much of what happens in IT is repeatable in nature, therefore duplicate changes may be implemented repeatedly Not a part of the normal use of the computer system or component Not used for novel or one-off changes Build the elements of the repeatable change into procedures Reduces documentation during change control execution Built in planning in accordance with known impact Greater likelihood of repeatable changes Category 5: Custom applications Category 4: Configured products Category 3: Non- Configured products Category 1: Infrastructure Software

21 Avoiding Common Issues with Change Control Urgency causes poor quality and may override thoughtful and appropriate risk-based planning Centralizing change management roles reduces accountability and expertise when managing a change Once change is made, record keeping can lapse Negative impact to Inspection ready state Not appropriately tied into Computer System Lifecycle When to follow Change Control procedures, and when to follow lifecycle procedures, or both

22 The Valuable Interaction between Change Control and Configuration Management Configuration Management Change Control

23 Benefits of Strong Process Design Accurate, dependable, and defendable decision making Improved integration into other Quality Systems processes Audit and Inspection efficiencies Reporting capabilities Metrics and greater visibility for process improvements Improved communication with business partners

24 Approval and Notification Clearly defined Configuration Items Notification to stakeholders Approval from relevant and required groups

25 Activity Impact Analysis and Mitigation

26 ISSUE Common Issues encountered in Computer System Configuration Management and Change Control Processes and Solution IMPACT Discuss possible negative impacts RESOLUTION Discuss possible resolutions

27 Scenario 1 ISSUE The configuration documented within the CMDB is out of date IMPACT Decisions may be made based on inaccurate information May lead to rework and project delays RESOLUTION Increase accountability and verification Periodic auditing of system/solution

28 Scenario 2 ISSUE Configuration is not detailed enough IMPACT Inability to perform thorough impact analysis of a proposed change or a reported event Critical changes to configuration may not be appropriately controlled RESOLUTION Clearly define the configuration expectations within your Configuration Management plan or SOPs

29 Scenario 3 ISSUE Configuration is too detailed IMPACT Unable to determine true impact of a proposed change or a reported event Difficult to maintain RESOLUTION Consider the risk of a configuration item to the overall system and the intended use of the system when determining the granularity that is appropriate for the CI Do not include configurations that change as a part of the normal use of the system

30 Scenario 4 ISSUE Configuration Management solution is too cumbersome and difficult to update IMPACT Easy to overlook/avoid CM expectations because it slows down the ability for IT to get the job done. RESOLUTION Develop CM solutions to ensure that the system is user friendly, intuitive, and makes sense to an IT professional. Consider the use of Industry Standard tools and processes.

31 Scenario 5 ISSUE The Change Control system is a glorified Word document IMPACT Very little automation in alignment with process requirements Greater variability in how the records are documented SME is required to be able to achieve sufficient documentation RESOLUTION Implement a common solution that meets process requirements (TrackWise, HP OpenView ServiceCenter) Configure a solution in alignment with the process

32 Scenario 6 ISSUE The Change Control process is not appropriately linked to configuration management processes Inability to meet requirements IMPACT Lack of understanding of how to use the processes Two separate processes are triggered independently and inconsistently Create technical and procedural linkages between the two systems RESOLUTION Automate changes to CIs within the CC system Increase periodic configuration evaluation

33 Scenario 7 ISSUE Change Controls are scheduled without regard to other scheduled activities IMPACT Greater potential for failure Significant potential for impact to other scheduled events RESOLUTION Embed Change Control coordination into process Ensure Impact Analysis includes review of scheduled activities

34 Scenario 8 ISSUE The Change Control process design is very focused on Application Change Control Open to significant interpretation by the other teams IMPACT May drive multiple processes; creating wrapper documents and sub-procedures to meet the requirements of the SOP by different technologies RESOLUTION Integrate perspective of all IT teams and technologies into process development

35 Summary Computerized System Configuration Management and Change Control are interrelated processes fundamental to the defendable control of a system through its lifecycle Strong process design, inclusive of the needs of different technologies, requiring appropriate analyses and mitigation strategies, leads to reduction of potential negative impact

Computer System Configuration Management and Change Control

Computer System Configuration Management and Change Control Computer System Configuration Management and Change Control What Your IT Department Is Really Doing Justin J. Fisher, Pfizer IT Quality and Compliance Manager Agenda 1. Background 2. Audience Demographics

More information

Release & Deployment Management

Release & Deployment Management 1. Does the tool facilitate the management of the full lifecycle of Release and Deployment Management? For example, planning, building, testing, quality assurance, scheduling and deployment? Comments:

More information

What is a life cycle model?

What is a life cycle model? What is a life cycle model? Framework under which a software product is going to be developed. Defines the phases that the product under development will go through. Identifies activities involved in each

More information

General Platform Criterion Assessment Question

General Platform Criterion Assessment Question Purpose: [E]nsure that the assets required to deliver services are properly controlled, and that accurate and reliable information about those assets is available when and where it is needed. (ST 4.3.1)

More information

This interpretation of the revised Annex

This interpretation of the revised Annex Reprinted from PHARMACEUTICAL ENGINEERING The Official Magazine of ISPE July/August 2011, Vol. 31 No. 4 www.ispe.org Copyright ISPE 2011 The ISPE GAMP Community of Practice (COP) provides its interpretation

More information

Service Support. 2005 Kasse Initiatives, LLC. ITIL Configuration Management - 1. version 2.0

Service Support. 2005 Kasse Initiatives, LLC. ITIL Configuration Management - 1. version 2.0 Service Support Configuration Management ITIL Configuration Management - 1 Goals of Configuration Management The goals of Configuration Management are to: Account for all the IT assets and configurations

More information

Validating Enterprise Systems: A Practical Guide

Validating Enterprise Systems: A Practical Guide Table of Contents Validating Enterprise Systems: A Practical Guide Foreword 1 Introduction The Need for Guidance on Compliant Enterprise Systems What is an Enterprise System The Need to Validate Enterprise

More information

Release and Deployment Management Software

Release and Deployment Management Software ( Bron: ITG, Integration Technologies Group; zie ook blz 13) (Service Transition) Release and Deployment Management Software 1. Does the tool facilitate the management of the full lifecycle of Release

More information

SACM and CMDB Strategy and Roadmap. David Lowe ActionableITSM.com March 20, 2012

SACM and CMDB Strategy and Roadmap. David Lowe ActionableITSM.com March 20, 2012 SACM and CMDB Strategy and Roadmap David Lowe ActionableITSM.com March 20, 2012 Disclaimer The strategy and roadmap information presented here is generic by nature and based on a highly hypothetical use

More information

GENERAL PLATFORM CRITERIA. General Platform Criterion Assessment Question

GENERAL PLATFORM CRITERIA. General Platform Criterion Assessment Question GENERAL PLATFORM CRITERIA SACM-V3-G-001 Comment: Does the tool use ITIL V3 process terms and align to ITIL V3 workflows and process integrations? SACM-V3-G-002 (OGC ISS 5.1.10) Access Controls Does the

More information

CONTENTS. List of Tables List of Figures

CONTENTS. List of Tables List of Figures Prelims 13/3/06 9:11 pm Page iii CONTENTS List of Tables List of Figures ix xi 1 Introduction 1 1.1 The Need for Guidance on ERP System Validation 1 1.2 The Need to Validate ERP Systems 3 1.3 The ERP Implementation

More information

Network Configuration Management

Network Configuration Management Network Configuration Management Contents Abstract Best Practices for Configuration Management What is Configuration Management? FCAPS Configuration Management Operational Issues IT Infrastructure Library

More information

IT Service Continuity Management PinkVERIFY

IT Service Continuity Management PinkVERIFY -11-G-001 General Criteria Does the tool use ITIL 2011 Edition process terms and align to ITIL 2011 Edition workflows and process integrations? -11-G-002 Does the tool have security controls in place to

More information

Risk-Based Validation of Computer Systems Used In FDA-Regulated Activities

Risk-Based Validation of Computer Systems Used In FDA-Regulated Activities September 2, 2003 Risk-Based Validation of Computer Systems Used In FDA-Regulated Activities Purpose This document provides a summary of the requirements relating to use of computer-based systems in activities

More information

ITIL Version 3.0 (V.3) Service Transition Guidelines By Braun Tacon

ITIL Version 3.0 (V.3) Service Transition Guidelines By Braun Tacon ITIL Version 3.0 (V.3) Service Transition Guidelines By Braun Tacon Executive Summary: This document is seven pages. Page one is informational/background only. What follows over the next six pages are

More information

Service Asset & Configuration Management PinkVERIFY

Service Asset & Configuration Management PinkVERIFY -11-G-001 General Criteria Does the tool use ITIL 2011 Edition process terms and align to ITIL 2011 Edition workflows and process integrations? -11-G-002 Does the tool have security controls in place to

More information

Configuration Management System:

Configuration Management System: True Knowledge of IT infrastructure Part of the SunView Software White Paper Series: Service Catalog Service Desk Change Management Configuration Management 1 Contents Executive Summary... 1 Challenges

More information

GAMP5 - a lifecycle management framework for customized bioprocess solutions

GAMP5 - a lifecycle management framework for customized bioprocess solutions GE Healthcare Life Sciences GAMP5 - a lifecycle management framework for customized bioprocess solutions imagination at work GE Healthcare s engineering department, Customized Bioprocess Solutions (CBS),

More information

CM00 Change Management High Level

CM00 Change Management High Level CM00 Change Management High Level CM01 Create Change CM09 Assess and Execute Emergency / CM03 Approve Change CM05 Implement Change CM02 Assess And Schedule Change CM07 Review Change CM04 Communicate Scheduled

More information

Testing Automated Manufacturing Processes

Testing Automated Manufacturing Processes Testing Automated Manufacturing Processes (PLC based architecture) 1 ❶ Introduction. ❷ Regulations. ❸ CSV Automated Manufacturing Systems. ❹ PLCs Validation Methodology / Approach. ❺ Testing. ❻ Controls

More information

GAMP 4 to GAMP 5 Summary

GAMP 4 to GAMP 5 Summary GAMP 4 to GAMP 5 Summary Introduction This document provides summary information on the GAMP 5 Guide and provides a mapping to the previous version, GAMP 4. It specifically provides: 1. Summary of Need

More information

TechExcel. ITIL Process Guide. Sample Project for Incident Management, Change Management, and Problem Management. Certified

TechExcel. ITIL Process Guide. Sample Project for Incident Management, Change Management, and Problem Management. Certified TechExcel ITIL Process Guide Sample Project for Incident Management, Management, and Problem Management. Certified Incident Management Red Arrows indicate that the transition is done automatically using

More information

Using the ISPE s GAMP Methodology to Validate Environmental Monitoring System Software

Using the ISPE s GAMP Methodology to Validate Environmental Monitoring System Software Using the ISPE s GAMP Methodology to Validate Environmental Monitoring System Software TEST DOCUMENTS DETAILED DOCUMENTS FUNCTIONAL SPECS USER REQUIREMENTS Introduction Continuous Monitoring Systems (CMS)

More information

Internal Audit Report ITS CHANGE MANAGEMENT PROCESS. Report No. SC-11-11

Internal Audit Report ITS CHANGE MANAGEMENT PROCESS. Report No. SC-11-11 Internal Audit Report ITS CHANGE MANAGEMENT PROCESS Report No. SC-11-11 March 2011 SANTA CRUZ: INTERNAL AUDIT March 31, 2011 MARY DOYLE Vice Chancellor Information Technology Re: Internal Audit Report

More information

How To Improve Your Business

How To Improve Your Business IT Risk Management Life Cycle and enabling it with GRC Technology 21 March 2013 Overview IT Risk management lifecycle What does technology enablement mean? Industry perspective Business drivers Trends

More information

Implementing Change Management in a Regulated Environment

Implementing Change Management in a Regulated Environment Implementing Change Management in a Regulated Environment Valerie Arraj Managing Director Session 227 Compliance Process Partners Service Management-focused consulting, automation and training organization

More information

Computerized System Audits In A GCP Pharmaceutical Laboratory Environment

Computerized System Audits In A GCP Pharmaceutical Laboratory Environment IVTGXP_july06.qxd 6/28/06 1:09 PM Page 36 Computerized System Audits In A GCP Pharmaceutical Laboratory Environment By Maintaining data integrity for both clinical laboratory processes and patient data

More information

SOLUTION WHITE PAPER. Align Change and Incident Management with Business Priorities

SOLUTION WHITE PAPER. Align Change and Incident Management with Business Priorities SOLUTION WHITE PAPER Align Change and Incident Management with Business Priorities Table of Contents Executive summary 1 the Need for Business aware Service support processes 2 The Challenge of Traditional

More information

State of Oregon. State of Oregon 1

State of Oregon. State of Oregon 1 State of Oregon State of Oregon 1 Table of Contents 1. Introduction...1 2. Information Asset Management...2 3. Communication Operations...7 3.3 Workstation Management... 7 3.9 Log management... 11 4. Information

More information

IT Governance. What is it and how to audit it. 21 April 2009

IT Governance. What is it and how to audit it. 21 April 2009 What is it and how to audit it 21 April 2009 Agenda Can you define What are the key objectives of How should be structured Roles and responsibilities Key challenges and barriers Auditing Scope Test procedures

More information

Overview of EAM Services. A Fully Integrated Global EAM Service Provider

Overview of EAM Services. A Fully Integrated Global EAM Service Provider A Fully Integrated Global EAM Service Provider Table of Contents Strategy & Process Services Overview... p. 3 Asset Reliability Services Overview... p. 4 Systems & Technology Services Overview... p. 7

More information

Achieving ITSM Excellence Through Availability Management

Achieving ITSM Excellence Through Availability Management Achieving ITSM Excellence Through Availability Management Technology Concepts and Business Considerations Abstract This white paper outlines the motivation behind Availability Management, and describes

More information

Closed Loop Incident Process

Closed Loop Incident Process Closed Loop Incident Process From fault detection to closure Andreas Gutzwiller Presales Consultant, Hewlett-Packard (Schweiz) HP Software and Solutions 2010 Hewlett-Packard Development Company, L.P. The

More information

HP Service Manager. Process Designer Content Pack 9.30.1. Processes and Best Practices Guide

HP Service Manager. Process Designer Content Pack 9.30.1. Processes and Best Practices Guide HP Service Manager Process Designer Content Pack 9.30.1 Processes and Best Practices Guide Document Release Date: June, 2012 Software Release Date: June, 2012 1 Legal Notices Warranty The only warranties

More information

INTRODUCTION. This book offers a systematic, ten-step approach, from the decision to validate to

INTRODUCTION. This book offers a systematic, ten-step approach, from the decision to validate to INTRODUCTION This book offers a systematic, ten-step approach, from the decision to validate to the assessment of the validation outcome, for validating configurable off-the-shelf (COTS) computer software

More information

Cloud Computing in a GxP Environment: The Promise, the Reality and the Path to Clarity

Cloud Computing in a GxP Environment: The Promise, the Reality and the Path to Clarity Reprinted from PHARMACEUTICAL ENGINEERING THE OFFICIAL TECHNICAL MAGAZINE OF ISPE JANUARY/FEBRUARY 2014, VOL 34, NO 1 Copyright ISPE 2014 www.pharmaceuticalengineering.org information systems in a GxP

More information

ITIL A guide to service asset and configuration management

ITIL A guide to service asset and configuration management ITIL A guide to service asset and configuration management The goal of service asset and configuration management The goals of configuration management are to: Support many of the ITIL processes by providing

More information

TrackWise - Quality Management System

TrackWise - Quality Management System TrackWise - Quality Management System Focus area: Electronic Management of CAPA Systems in the Regulated Industry May 11, 2007 Yaniv Vardi VP, Operations Sparta Systems Europe, Ltd. Agenda Sparta Systems

More information

ITSM Maturity Model. 1- Ad Hoc 2 - Repeatable 3 - Defined 4 - Managed 5 - Optimizing No standardized incident management process exists

ITSM Maturity Model. 1- Ad Hoc 2 - Repeatable 3 - Defined 4 - Managed 5 - Optimizing No standardized incident management process exists Incident ITSM Maturity Model 1- Ad Hoc 2 - Repeatable 3 - Defined 4 - Managed 5 - Optimizing No standardized incident process exists Incident policies governing incident Incident urgency, impact and priority

More information

Considerations When Validating Your Analyst Software Per GAMP 5

Considerations When Validating Your Analyst Software Per GAMP 5 WHITE PAPER Analyst Software Validation Service Considerations When Validating Your Analyst Software Per GAMP 5 Blair C. James, Stacy D. Nelson Introduction The purpose of this white paper is to assist

More information

ITIL / ITSM: Where Do I Start?

ITIL / ITSM: Where Do I Start? ITIL / ITSM: Where Do I Start? A whitepaper presented by: Third Sky, Inc. 75 Union Street, Suite 100 Brighton, MA 02135 http://www.thirdsky.com In partnership with: FrontRange Solutions, Inc. Page 1 of

More information

White Paper. Change Management: A CA IT Service Management Process Map

White Paper. Change Management: A CA IT Service Management Process Map White Paper Change Management: A CA IT Service Management Process Map Peter Doherty Senior Consultant, Technical Service, CA, Inc. Peter Waterhouse Director, Business Service Optimization, CA Inc. June

More information

Avaya Patch Program Frequently Asked Questions (For All Audiences)

Avaya Patch Program Frequently Asked Questions (For All Audiences) Avaya Patch Program Frequently Asked Questions (For All Audiences) This document was designed to address questions that you may have regarding Avaya s Patch Policy and how this initiative will help to

More information

Applying ITIL v3 Best Practices

Applying ITIL v3 Best Practices white paper Applying ITIL v3 Best Practices to improve IT processes Rocket bluezone.rocketsoftware.com Applying ITIL v. 3 Best Practices to Improve IT Processes A White Paper by Rocket Software Version

More information

Altiris Client Management Suite

Altiris Client Management Suite Altiris Client Management Suite Agenda 1 What DO YOU Need Help With 2 What does Altiris have to Assist 3 What s New with CMS 7 4 Beyond Client Management Altiris Client Management Suite Leads the Way Symantec

More information

Change Management Living with Change

Change Management Living with Change Change Management Living with Change Introduction Neil Thomas Industry experience in IT & IT support ITIL Vendor Product Management ITIL Consulting Specialised in Service Catalog & CMDB Introduction Fully

More information

Real world experiences for CMDB Success

Real world experiences for CMDB Success Real world experiences for CMDB Success Gaurav Dutt Uniyal Infosys Technologies Limited The CMDB and CMS - the Powerhouse of Service Management 8 th July 2008 Agenda The present state CMDB implementation

More information

The FDA recently announced a significant

The FDA recently announced a significant This article illustrates the risk analysis guidance discussed in GAMP 4. 5 By applying GAMP s risk analysis method to three generic classes of software systems, this article acts as both an introduction

More information

An ITIL Perspective for Storage Resource Management

An ITIL Perspective for Storage Resource Management An ITIL Perspective for Storage Resource Management BJ Klingenberg, IBM Greg Van Hise, IBM Abstract Providing an ITIL perspective to storage resource management supports the consistent integration of storage

More information

Service Transition. ITIL is a registered trade mark of AXELOS Limited.. The Swirl logo is a trade mark of AXELOS Limited.. 1

Service Transition. ITIL is a registered trade mark of AXELOS Limited.. The Swirl logo is a trade mark of AXELOS Limited.. 1 Service Transition ITIL is a registered trade mark of AXELOS Limited.. The Swirl logo is a trade mark of AXELOS Limited.. 1 Lesson Objectives Service Transition - Introduction - Purpose and Objectives

More information

STS Federal Government Consulting Practice IV&V Offering

STS Federal Government Consulting Practice IV&V Offering STS Federal Government Consulting Practice IV&V Offering WBE Certified GSA Contract GS-35F-0108T For information Please contact: gsa70@stsv.com 2007 by STS, Inc. Outline Background on STS What is IV&V?

More information

Microsoft s Compliance Framework for Online Services

Microsoft s Compliance Framework for Online Services Microsoft s Compliance Framework for Online Services Online Services Security and Compliance Executive summary Contents Executive summary 1 The changing landscape for online services compliance 4 How Microsoft

More information

MANDATORY CRITERIA. 1. Does the tool facilitate the creation, modification, fulfillment and closure of Service Request records?

MANDATORY CRITERIA. 1. Does the tool facilitate the creation, modification, fulfillment and closure of Service Request records? MANDATORY CRITERIA 1. Does the tool facilitate the creation, modification, fulfillment and closure of Service Request records? 2. Does the tool provide a pre-defined list of services which can be requested

More information

The CMDB at the Center of the Universe

The CMDB at the Center of the Universe The CMDB at the Center of the Universe Reg Harbeck CA Wednesday, February 27 Session 5331 Purpose Clarify origin of CMDB concept and what it is Understand difference and equivalence between CMDB and Asset

More information

Service Automation to implement and operate your Cloud initiatives

Service Automation to implement and operate your Cloud initiatives Service Automation to implement and operate your Cloud initiatives Pierre AESCHLIMANN Principal Solution Consultant (EMEA Global Accounts) BMC Software ! Request, change, and support business services!

More information

Implementation of ANSI/AAMI/IEC 62304 Medical Device Software Lifecycle Processes.

Implementation of ANSI/AAMI/IEC 62304 Medical Device Software Lifecycle Processes. Implementation of ANSI/AAMI/IEC 62304 Medical Device Software Lifecycle Processes.. www.pharmout.net Page 1 of 15 Version-02 1. Scope 1.1. Purpose This paper reviews the implementation of the ANSI/AAMI/IEC

More information

Welcome Computer System Validation Training Delivered to FDA. ISPE Boston Area Chapter February 20, 2014

Welcome Computer System Validation Training Delivered to FDA. ISPE Boston Area Chapter February 20, 2014 Welcome Computer System Validation Training Delivered to FDA ISPE Boston Area Chapter February 20, 2014 1 Background Training Conducted on April 24, 2012 Food & Drug Administration Division of Manufacturing

More information

Peregrine. AssetCenter. Product Documentation. Asset Tracking solution. Part No. DAC-441-EN38

Peregrine. AssetCenter. Product Documentation. Asset Tracking solution. Part No. DAC-441-EN38 Peregrine AssetCenter Product Documentation Asset Tracking solution Part No. DAC-441-EN38 AssetCenter Copyright 2005 Peregrine Systems, Inc. All Rights Reserved. Information contained in this document

More information

How To Create A Help Desk For A System Center System Manager

How To Create A Help Desk For A System Center System Manager System Center Service Manager Vision and Planned Capabilities Microsoft Corporation Published: April 2008 Executive Summary The Service Desk function is the primary point of contact between end users and

More information

Cover Page. Title Configuration Management Database. Category Enterprise IT Management Initiatives

Cover Page. Title Configuration Management Database. Category Enterprise IT Management Initiatives Cover Page Title Configuration Management Database Category Enterprise IT Management Initiatives Contact Dale Richardson, Director Data Center Services Department of Information resources Dale.Richardson@dir.texas.gov

More information

Adoption by GCP Inspectors Working Group for consultation 14 June 2011. End of consultation (deadline for comments) 15 February 2012

Adoption by GCP Inspectors Working Group for consultation 14 June 2011. End of consultation (deadline for comments) 15 February 2012 10 December 2013 EMA/INS/GCP/600788/2011 Compliance and Inspection Reflection paper on the use of interactive response technologies (interactive voice/web response systems) in clinical trials, with particular

More information

Configuration Management. Process Guide

Configuration Management. Process Guide Configuration Management Process Guide Table of Contents 1. PREFACE... 3 2. MISSION... 5 3. OBJECTIVES... 6 3.1 INTRODUCTION... 6 3.2 DEFINITIONS... 6 3.3 OBJECTIVES... 6 4. GUIDING PRINCIPLES... 9 4.1

More information

5 CMDB GOOD PRACTICES

5 CMDB GOOD PRACTICES 5 CMDB GOOD PRACTICES - Preparing for Service Asset and Configuration Management Wade Palmer, Director of IT Services ii TABLE OF CONTENTS INTRODUCTION... 1 1. KEY CMDB ELEMENTS... 1 2. IT CHANGE MANAGEMENT

More information

Enabling ITIL Best Practices Through Oracle Enterprise Manager, Session #081163 Ana Mccollum Enterprise Management, Product Management

Enabling ITIL Best Practices Through Oracle Enterprise Manager, Session #081163 Ana Mccollum Enterprise Management, Product Management Enabling ITIL Best Practices Through Oracle Enterprise Manager, Session #081163 Ana Mccollum Enterprise Management, Product Management Andy Oppenheim Enterprise Management, Product Management Mervyn Lally

More information

Sharon Strause 9/10/2010. 15 years with the

Sharon Strause 9/10/2010. 15 years with the Manage Software Development, Testing, and Validation Presented by Sharon Strause, Senior Consultant EduQuest, Inc. IVT s Computer and Software Validation EU Conference The Hilton Dublin Dublin, Ireland

More information

Request for Proposal for Application Development and Maintenance Services for XML Store platforms

Request for Proposal for Application Development and Maintenance Services for XML Store platforms Request for Proposal for Application Development and Maintenance s for ML Store platforms Annex 4: Application Development & Maintenance Requirements Description TABLE OF CONTENTS Page 1 1.0 s Overview...

More information

ITIL Introducing service transition

ITIL Introducing service transition ITIL Introducing service transition The goals of service transition Aligning the new or changed service with the organisational requirements and organisational operations Plan and manage the capacity and

More information

IBM Tivoli Asset Management for IT

IBM Tivoli Asset Management for IT Cost-effectively manage the entire life cycle of your IT assets IBM Highlights Help control the costs of IT assets with a single product installation that tracks and manages hardware, software and related

More information

3:15 Networking and Refreshment Break. 3:45 Cloud Computing Manage Risk in a

3:15 Networking and Refreshment Break. 3:45 Cloud Computing Manage Risk in a 12:15 Conference Registration 1:15 Conference Chairperson s Welcome and Opening Remarks Deborah S. Turner, Associate Director, Computer and Automation Validation, Alkermes plc 1:30 Celebrating 30 Years

More information

IT Service Management with System Center Service Manager

IT Service Management with System Center Service Manager Course 10965B: IT Service Management with System Center Service Manager Page 1 of 9 IT Service Management with System Center Service Manager Course 10965B: 3 days; Instructor-Led Introduction This Three-day

More information

SOFTWARE CONFIGURATION MANAGEMENT GUIDEBOOK

SOFTWARE CONFIGURATION MANAGEMENT GUIDEBOOK Office of Safety and Mission Assurance NASA-GB-9503 SOFTWARE CONFIGURATION MANAGEMENT GUIDEBOOK AUGUST 1995 National Aeronautics and Space Administration Washington, D.C. 20546 PREFACE The growth in cost

More information

Combine ITIL and COBIT to Meet Business Challenges

Combine ITIL and COBIT to Meet Business Challenges Combine ITIL and COBIT to Meet Business Challenges By Peter Hill, Director, IT Governance Network, and Ken Turbitt, Best Practices Director, BMC Software BEST PRACTICES WHITE PAPER Table of Contents ABSTRACT...

More information

INTRODUCTION. Specifically we looked at:

INTRODUCTION. Specifically we looked at: 3 INTRODUCTION The Evolve IP-CCNG 2014 North American Call Center Survey Results Paper examined the trends, concerns and spending in today s call centers. Specifically we looked at: Cloud-based versus

More information

Masterminding Data Governance

Masterminding Data Governance Why Data Governance Matters The Five Critical Steps for Data Governance Data Governance and BackOffice Associates Masterminding Data Governance 1 of 11 A 5-step strategic roadmap to sustainable data quality

More information

SIEM Implementation Approach Discussion. April 2012

SIEM Implementation Approach Discussion. April 2012 SIEM Implementation Approach Discussion April 2012 Agenda What are we trying to solve? Summary Observations from the Security Assessments related to Logging & Monitoring Problem Statement Solution Conceptual

More information

Training Management with TrackWise

Training Management with TrackWise Training Management with TrackWise Adam Rona Manager, Professional Services Sparta Systems Tamir Podhurst Implementation Team Leader Sparta Systems Agenda Why TrainingManagement in an EQMS? Training Manager

More information

LOW RISK APPROACH TO ACHIEVE PART 11 COMPLIANCE WITH SOLABS QM AND MS SHAREPOINT

LOW RISK APPROACH TO ACHIEVE PART 11 COMPLIANCE WITH SOLABS QM AND MS SHAREPOINT LOW RISK APPROACH TO ACHIEVE PART 11 COMPLIANCE WITH SOLABS QM AND MS SHAREPOINT Implementation of MS SharePoint provides companywide functionalities for general document management and workflow. The use

More information

IT Service Management with System Center Service Manager

IT Service Management with System Center Service Manager Course 10965B: IT Service Management with System Center Service Manager Course Details Course Outline Module 1: Service Management Overview Effective IT Service Management includes process driven methodologies

More information

Course 6426: Configuring and Troubleshooting Identity & Access Solutions With Windows Server 2008 Active Directory Page 1 of 6

Course 6426: Configuring and Troubleshooting Identity & Access Solutions With Windows Server 2008 Active Directory Page 1 of 6 2008 Active Directory Page 1 of 6 Configuring and Troubleshooting Identity and Access Solutions with Windows Server 2008 Active Directory Course 6426: 2 days; Instructor-Led Introduction This instructor-led

More information

SaaS Adoption Lifecycle in Life-Sciences Companies

SaaS Adoption Lifecycle in Life-Sciences Companies www.arisglobal.com A White Paper Presented By ArisGlobal SaaS Adoption Lifecycle in Life-Sciences Companies by Achal Verma, Associate Director - Program Delivery, Cloud Services Abstract With increasing

More information

ADDENDUM 5 TO APPENDIX 4 TO SCHEDULE 3.3

ADDENDUM 5 TO APPENDIX 4 TO SCHEDULE 3.3 ADDENDUM 5 TO APPENDIX 4 TO SCHEDULE 3.3 TO THE Statement of Technical Approach for Help Desk Services Northrop Grumman s help desk solution will put in place the people, processes and tools to deliver

More information

1 Why should monitoring and measuring be used when trying to improve services?

1 Why should monitoring and measuring be used when trying to improve services? 1 Why should monitoring and measuring be used when trying to improve services? a) To validate, direct, justify and intervene b) To validate, measure, monitor and change c) To validate, plan, act and improve

More information

November 12, 2015. I.T. Change Management Why Bother?

November 12, 2015. I.T. Change Management Why Bother? November 12, 2015 I.T. Change Management Why Bother? Why do it? The true intent of your I.T. Change Management process is to: a) Pass an Audit or b) Mitigate Risk to the Business Mitigate Risk to the Business

More information

Change & configuration management

Change & configuration management 2008-01-18 12:42:00 G007_CHANGE_AND_CONFIGURATION_MANAGEMENT Change & configuration management Guidelines Page 1 of 11 1. Preliminary 1.1 Authority This document is issued by the (the Commission) pursuant

More information

AUSTIN INDEPENDENT SCHOOL DISTRICT INTERNAL AUDIT DEPARTMENT TRANSPORTATION AUDIT PROGRAM

AUSTIN INDEPENDENT SCHOOL DISTRICT INTERNAL AUDIT DEPARTMENT TRANSPORTATION AUDIT PROGRAM GENERAL: The Technology department is responsible for the managing of electronic devices and software for the District, as well as the Help Desk for resolution of employee-created help tickets. The subgroups

More information

6436: Designing a Windows Server 2008 Active Directory Infrastructure and Services (5 Days)

6436: Designing a Windows Server 2008 Active Directory Infrastructure and Services (5 Days) www.peaklearningllc.com 6436: Designing a Windows Server 2008 Active Directory Infrastructure and Services (5 Days) Introduction At the end of this five-day course, students will learn how to design an

More information

Exam : EX0-100. Title : ITIL Foundation Certificate in IT Service Management. Ver : 08.01.06

Exam : EX0-100. Title : ITIL Foundation Certificate in IT Service Management. Ver : 08.01.06 Exam : EX0-100 Title : ITIL Foundation Certificate in IT Service Management Ver : 08.01.06 QUESTION 1 The successful diagnosis of a problem results in a Known Error. On the basis of this Known Error a

More information

Configuration control ensures that any changes to CIs are authorized and implemented in a controlled manner.

Configuration control ensures that any changes to CIs are authorized and implemented in a controlled manner. ITIL Intermediate Capability Stream: RELEASE CONTROL AND VALIDATION (RCV) CERTIFICATE SCENARIO BOOKLET Scenario One A global company develops its own applications to support the business. The service transition

More information

HP Change Configuration and Release Management (CCRM) Solution

HP Change Configuration and Release Management (CCRM) Solution HP Change Configuration and Release Management (CCRM) Solution HP Service Manager, HP Release Control, and HP Universal CMDB For the Windows Operating System Software Version: 9.30 Concept Guide Document

More information

CMDB Essential to Service Management Strategy. All rights reserved 2007

CMDB Essential to Service Management Strategy. All rights reserved 2007 CMDB: Essential to the Service Management strategy Business Proposition: This white paper describes how the CMDB is an essential component of the IT Service Management Strategy, and why the FrontRange

More information

ITIL by Test-king. Exam code: ITIL-F. Exam name: ITIL Foundation. Version 15.0

ITIL by Test-king. Exam code: ITIL-F. Exam name: ITIL Foundation. Version 15.0 ITIL by Test-king Number: ITIL-F Passing Score: 800 Time Limit: 120 min File Version: 15.0 Sections 1. Service Management as a practice 2. The Service Lifecycle 3. Generic concepts and definitions 4. Key

More information

Qualification Guideline

Qualification Guideline Qualification Guideline June 2013 Disclaimer: This document is meant as a reference to Life Science companies in regards to the Microsoft O365 platform. Montrium does not warrant that the use of the recommendations

More information

Risk based monitoring using integrated clinical development platform

Risk based monitoring using integrated clinical development platform Risk based monitoring using integrated clinical development platform Authors Sita Rama Swamy Peddiboyina Dr. Shailesh Vijay Joshi 1 Abstract Post FDA s final guidance on Risk Based Monitoring, Industry

More information

INCIDENT MANAGEMENT & REQUEST FULFILLMENT PROCESSES. Process Owner: Service Desk Manager. Version: v2.0. November 2014 Page 0

INCIDENT MANAGEMENT & REQUEST FULFILLMENT PROCESSES. Process Owner: Service Desk Manager. Version: v2.0. November 2014 Page 0 INCIDENT MANAGEMENT & REQUEST FULFILLMENT PROCESSES Process Owner: Service Desk Manager Version: v2.0 November 2014 Page 0 Document Revision History Revision Description Date Approved by Number V1.0 Initial

More information

HP Service Manager. Software Version: 9.34 For the supported Windows and UNIX operating systems. Processes and Best Practices Guide

HP Service Manager. Software Version: 9.34 For the supported Windows and UNIX operating systems. Processes and Best Practices Guide HP Service Manager Software Version: 9.34 For the supported Windows and UNIX operating systems Processes and Best Practices Guide Document Release Date: July 2014 Software Release Date: July 2014 Legal

More information

Work Performance Statement

Work Performance Statement Work Performance Statement Enterprise Date Services Service Management Tool Introduction Acronyms, and Abbreviations AQS FAA Office of Quality, Integration and Executive Services ARB Airmen Records Building

More information

SAP IT Infrastructure Management

SAP IT Infrastructure Management SAP IT Infrastructure Management Legal Disclaimer This presentation is not subject to your license agreement or any other agreement with SAP. SAP has no obligation to pursue any course of business outlined

More information

Operational Risk. The new FSA requirements. Contents. February 2004

Operational Risk. The new FSA requirements. Contents. February 2004 Operational Risk The new FSA requirements February 2004 Contents Purpose Definition of OR by FSA Factors to take into account Business functions within a company with individual OR plans for their function

More information

Moving beyond Virtualization as you make your Cloud journey. David Angradi

Moving beyond Virtualization as you make your Cloud journey. David Angradi Moving beyond Virtualization as you make your Cloud journey David Angradi Today, there is a six (6) week SLA for VM provisioning it s easy to provision a VM, the other elements change storage, network

More information

Integration Technologies Group (ITG) ITIL V3 Service Asset and Configuration Management Assessment Robert R. Vespe Page 1 of 19

Integration Technologies Group (ITG) ITIL V3 Service Asset and Configuration Management Assessment Robert R. Vespe Page 1 of 19 Service Asset and Configuration 1. Does the tool facilitate the registration and management of an organization s logical, physical and virtual Configuration Items (CIs)? For example, services, systems,

More information