Maruleng Local Municipality ICT CHANGE MANAGEMENT POLICY

Similar documents
REVIEWED ICT CHANGE MANAGEMENT POLICY

Musina Local Municipality. Information and Communication Technology User Account Management Policy -Draft-

ICT USER ACCOUNT MANAGEMENT POLICY

University of Waikato Change Management Process

TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY

Security Incident Management Process. Prepared by Carl Blackett

How To Protect Decd Information From Harm

CHANGE MANAGEMENT PROCESS

Service Level Agreement

Information Security Incident Management Policy

UMHLABUYALINGANA MUNICIPALITY IT CHANGE MANAGEMENT POLICY

OPERATIONAL SERVICE LEVEL AGREEMENT BETWEEN THE CLIENT AND FOR THE PROVISION OF PRO-ACTIVE MONITORING & SUPPORT SERVICES

INFORMATION SECURITY INCIDENT REPORTING POLICY

Information and Communication Technology. Firewall Policy

ISO :2005 Requirements Summary

The purpose of this policy is to provide guidelines for Remote Access IPSec or Virtual Private

EPA Classification No.: CIO P-09.1 CIO Approval Date: 08/06/2012 CIO Transmittal No.: Review Date: 08/06/2015

ICT SUPPORT SERVICES

Aberdeen City Council IT Security (Network and perimeter)

ITIL Introducing service transition

Rotherham CCG Network Security Policy V2.0

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis

CITY UNIVERSITY OF HONG KONG Change Management Standard

HUIT Change Management with ServiceNow. September 2013

TechExcel. ITIL Process Guide. Sample Project for Incident Management, Change Management, and Problem Management. Certified

Analytics Reporting Service

Request for Proposal. Supporting Document 3 of 4. Contract and Relationship Management for the Education Service Payroll

Achieve. Performance objectives

IT Service Desk Workflow Management in versasrs HelpDesk

EDMS Project Outcome Realisation Plan

Service Desk Level 1 Service Description

INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c

Islington ICT Physical Security of Information Policy A council-wide information technology policy. Version 0.7 June 2014

IT CHANGE MANAGEMENT POLICY

ITIL Version 3.0 (V.3) Service Transition Guidelines By Braun Tacon

Information Security Incident Management Policy and Procedure

INFORMATION TECHNOLOGY SECURITY STANDARDS

Helpdesk Incident & Request Management Procedure For

Information Governance Framework

GMS NETWORK BASIC PRODUCT SPECIFICATION 1. INTRODUCTION 2. SERVICE DEFINITION. 2.1 Service Overview. GMS Network Basic

Request Fulfillment Management. ITG s CENTRE Service Record Screen

Order. Directive Number: IM Stephen E. Barber Chief Management Officer

GMS NETWORK ADVANCED WIRELESS SERVICE PRODUCT SPECIFICATION

Process Owner: Change Manager Version: 1.0

HP Service Manager. Software Version: 9.34 For the supported Windows and UNIX operating systems. Incident Management help topics for printing

Getting Started with the DCHR Service Desk. District Service Management Program

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results

IT Services. incident criteria

NYSED DATA DASHBOARD SOLUTIONS RFP ATTACHMENT 6.4 MAINTENANCE AND SUPPORT SERVICES

Statement of Service Enterprise Services - MANAGE Microsoft IIS

DBC 999 Incident Reporting Procedure

ISO27001 Controls and Objectives

Corporate ICT Change Management

1 Purpose Scope Roles and Responsibilities Physical & Environmental Security Access Control to the Network...

White Paper August BMC Best Practice Process Flows for ITIL Change Management

Change Management Process. June 1, 2011 Version 2.7

ITIL Roles Descriptions

The ITIL v.3 Foundation Examination

SERV SER ICE OPERA OPERA ION

The ITIL v.3. Foundation Examination

CM00 Change Management High Level

Access Control Policy

Auxilion Service Desk as a Service. Service Desk as a Service. Date January Commercial in Confidence Auxilion 2015 Page 1

Chris Day, Acting Director of IT Services C Day. Configuration Manager Change Manager Change Assessors Change Implementers

Sarasota Security Team Service Level Agreement (SLA)

University of Pittsburgh Security Assessment Questionnaire (v1.5)

Exhibit E - Support & Service Definitions. v1.11 /

Information and Communication Technology. Helpdesk Support Procedure

Managed ICT Services. User Guide. Possibilities that are built in. Telstra Corporation Limited ABN

Information Security Incident Management Policy and Procedure. CONTROL SHEET FOR Information Security Incident Management Policy

Avon & Somerset Police Authority

hi Information Technologies Change Management Standard

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY

Statement of Service Enterprise Services - AID Microsoft IIS

JOB DESCRIPTION CONTRACTUAL POSITION

Information Security Incident Management Guidelines. e-governance

T141 Computer Systems Technician MTCU Code Program Learning Outcomes

ICT Policy. Executive Summary. Date of ratification Executive Team Committee 22nd October Document Author(s) Collette McQueen

FSIS DIRECTIVE

VEHICLE LOCATION SYSTEM POLICY. Version 0.2. Paul Robinson, Strategic Director, Richard Kniveton, Fleet and Depot Manager

How to integrate Verax NMS & APM with Verax Service Desk

Functional Area 3. Skill Level 301: Applications Systems Analysis and Programming Supervisor (Mercer 1998 Job 011)

Statement of Service Enterprise Services - MANAGE AppTone Server Management for SharePoint

Physical Security Policy

CCIT Change Management Procedures & Documentation

Network Security Policy

BCPay. Alternative payment process when Online Banking is experiencing Operational Disruptions. Product Disclosure Statement

The Newcastle upon Tyne Hospitals NHS Foundation Trust. IT Change Management Policy and Process

Estate Agents Authority

<COMPANY> P01 - Information Security Policy

Transcription:

Maruleng Local Municipality ICT CHANGE MANAGEMENT POLICY

Contents ICT CHANGE MANAGEMENT...1 POLICY...1 1. Preamble...3 2. Terms and definitions...3 3. Purpose...4 4. Objective of this Policy...4 5. References and Related Legislations and Regulations...4 6. Scope of the policy...5 7. Process Overview...5 8. Roles and Responsibilities...9 9. Change Lead Times... 10 10. Consequences of non-compliance... 11 11. Implementation... 11 12. Policy review... 11 ICT Change Management Policy 2

1. Preamble The complexity of current business environments, and the diverse technology used in ICT infrastructure environments demands a greater control to minimize risk and potential impact on the business. Procedures should be instituted to ensure all changes are recorded, followed up and escalated to management when necessary. It is important that these procedures are adhered to at all times. 2. Terms and definitions 2.1 Accountability means ensuring that the actions of an entity or individual may be traced uniquely to that entity or individual, who may then be held responsible for that action; 2.2 Authentication means establishing the validity of a claimed entity/verification of the identity of an individual or application; 2.3 Availability means being accessible and useable upon demand by an authorised entity; 2.4 CAB means Departmental Change Advisory Board. 2.5 Confidentiality means the principle that information is not made available or disclosed to unauthorised individuals, entities or processes; 2.8 Information and communication systems mean applications and systems to support the business, utilising information technology as an enabler or tool; 2.9 Information technology means any equipment or interconnected system or subsystem of equipment, that is used in the automatic acquisition, storage, manipulation, management, ICT Change Management Policy 3

movement, control, display, switching, interchange, transmission or reception of vocal, pictorial, textual and numerical data or information; 2.10 Monitoring means performance measurement to ensure the confidentiality, availability and integrity of operational systems and information; 2.11 VPN means Virtual Private Network; 2.12 SLA means Service Level Agreement; 3. Purpose The purpose of this policy is to provide the Maruleng Local Municipality with a procedure for the change control function that shall be established to manage record and track all changes for Maruleng Local Municipality ICT environment. 4. Objective of this Policy The objective of this policy is to ensure that standardized processes are followed and adhered to accordingly. This is to ensure that no changes take place as a quick change, with after the fact documentation, without any prior authorisation. 5. References and Related Legislations and Regulations The following publications govern the execution of the ICT Change Management Policy and were taken into consideration during the drafting of the guidelines and policy: (a) State Information Technology Act (Act no 88 of 1998); (b) Protection of Information Act (Act no 84 of 1982); (c) Minimum Information Security Standards (MISS), Second Edition March 1998; (d) Departmental Internet Usage Policy; (e) Departmental Email Policy; (f) Departmental Password Policy; (g) Departmental ICT Security Policy; (h) Departmental ICT Equipment Usage Policy. ICT Change Management Policy 4

6. Scope of the policy This policy is applicable to all employees of the Maruleng Local Municipality, including learners and interns as well as all other stakeholders who make use of the Maruleng Local Municipality network and systems. 7. Process Overview The Change Management Process seeks to manage and control the changes through processes and procedures and then ensuring that the appropriate authority levels exist for each change. The following process steps shall be used within Maruleng Local Municipality: 7.1 Change Initiation 7.1.1 A change is initiated when the requirements for a change has been identified. This request for change can be initiated for the following reasons: (a) Change to infrastructure components. (b) Resolving problems. (c) Project related activities. (d) Ad-hoc activities that influence service delivery. 7.2 Change Planning and Building 7.2.1 Under the responsibility of change planning and building, changes may be scheduled and planning may be provided if necessary for the optimum control of the change. 7.2.2 Change Management has a coordination role, supported by line management, to ensure that activities are both resources and also completed according to schedule. ICT Change Management Policy 5

7.3 Change Logging and Filtering 7.3.1 Under the responsibility of the ICT Help Desk, changes are logged on the Help Desk Remedy system. 7.3.2 Each Change may be categorized accordingly in the automatic function of the Help Desk Remedy system. 7.3.3 A Request for Change Form (Annexure A) needs to be completed for the following changes to the ICT environment: CLASS ITEM DEFINITION Significant Install New requirement introduced Minor Move Move of any component within the Infrastructure environment Significant Addition Additional requirements (including releases and or upgrades) within the Infrastructure environment Minor Configuration A change to the function or the assembly to the Infrastructure environment Significant Decommission Removal of any component from the Infrastructure environment Minor Operational state Change from the current operation state of a component within the Infrastructure environment 7.3.4 There are two change types that needs to be adhered to based on the above classes and items: CHANGE TYPE CAB Changes Pre-approved changes DEFINITION For changes that need to be channeled via the CAB after which approval or rejection will be provided For changes that can take place without being ICT Change Management Policy 6

CAB CHANGES May cause down-time on production systems May affect one or more SLAs May affect configuration information May affect processes for services Changed with high risk involved channeled via the CAB, e.g. password resets / creation of new user accounts PRE-APPROVED CHANGES May not cause down-time on any system May not affect any SLA May not affect any processes 7.4 Emergency Changes 7.4.1 The emergency change management process shall provide a change control mechanism in the event of an emergency. The goal is not to bypass the Change Management Processes but rather to speed up the process and execute it quickly and efficiently when the normal process cannot be followed due to an emergency. 7.4.2 The following criteria shall be accepted as Emergency Changes (a) Production loss (b) Financial loss (c) Prevention of death (d) Legislation changes 7.5 Change Approval 7.5.1 Prior to the approval of changes, an approval indicator shall be allocated to the change to enable the correct workflow associated with the required approval. The risks of the Change will determine the required approval: CATEGORY VALUES 1 2 3 1. Change Classification Major Significant Minor 2. Priority High Medium Low 3. Impact Multiple districts Single district No impact ICT Change Management Policy 7

4. Implementation Exceed 4 hours Complex Simple 5. Black out Exceed 4 hours Complex Simple 7.5.2 The sum of the value of the five risk categories may determine the approval process: Low risk Medium risk High risk Greater than 10 = Minor Approval required From 6 to 10 = Significant Approval required Less than 6 = Major Approval required 7.5.3 The risk factor indicates the nature of the approval: Minor Approval Significant Approval Major Approval Emergency Approval The Chairperson of the CAB has delegated authority to approve and schedule changes to the Senior Manager: Information Technology and shall report back to CAB The change submitted shall be discussed at the CAB and relevant documentation are sent to CAB members before the meeting for assessment IT SECTION shall raise the Request for Change with the CAB. Approved changed must be passed back to the CAB for scheduling and implementation Request for Change forms and relevant documentation are sent to CAB members for approval. A minimum of two members need to approve the change 7.6 Change Implementation 7.6.1 IT SECTION shall be responsible for implementation of all changes as scheduled. 7.6.2 Feedback regarding the success or failure of the change shall be provided to the CAB within 5 days after the planned completion time. 7.7 Change Review and Reporting 7.7.1 IT SECTION management shall perform an evaluation of the changes implemented. The purpose of this review shall be: 7.7.1.1 Establish if the change had the desire effect and met the objectives ICT Change Management Policy 8

7.7.1.2 Tasks and follow-up actions assigned to correct any problems or inefficiencies arising in the change management process itself as a result of ineffective changes 7.7.1.3 Where resources were used to implemented the change as planned, and any problems or discrepancies fed back to CAB helping to improve the future estimating process 7.7.1.4 Review satisfactory and abandoned changed, and formally closes them in the ICT help desk system. 7.8 Communication 7.8.1 Communication will be managed according to the predefined communication structure for each project. Communication shall include: (a) Change approvals (b)change notifications (c)change control escalations (d)change management processes and procedure changes (e)change management standard changes (f) Change management policy changes. 8. Roles and Responsibilities Different owners of processes and responsibilities can be identified. 8.1 Manager: Change Management The manager for change management shall be responsible for: 8.1.1 Defining of the Change Management process, procedure, division of work and the roles and responsibilities within the process 8.1.2 Contributing to the evaluation or establishment of the change management system, ensuring conformance to documentation standards 8.1.3 Maintaining the change management system in accordance with agreed procedures 8.1.4 Reviews on procedures and other processes checking for compliance against the quality system, and external standards where appropriate 8.1.5 Communicating all updates and/or changes of the Change Management Process ICT Change Management Policy 9

8.1.6 Promoting awareness of the importance of a structured change management process, working with other business units 8.2 Change Advisory Board 8.2.1 The Department shall formulate a Change Advisory Board to function within the following mandate: 8.2.1.1 To formalize an official forum to review all changes in a structured way. 8.2.1.2 To focus the attention of the Committee to the management of changes. 8.2.2 The Change Advisory Board shall: 8.2.2.1 Review all high impact changes to be implemented 8.2.2.2 Review any change that was implemented unsuccessfully or had to be cancelled 8.2.2.3 Screen all the changes to ensure the correct category, type and item have been selected. 8.2.2.4 Monitor routine and low impact changes. 8.3 IT SECTION 8.3.1 Implement Change requests as per above mentioned Change Management Process 8.3.2 Provide regular feedback on progress regarding the change request and schedule. 9. Change Lead Times 9.1 Change lead time is the amount of time required to evaluate and adequately plan for change implementation. Lead time is measured from the time the change is submitted until the change is actually implemented. Lead time shall vary by the type of change. 9.2 All changes to be submitted shall be done within the following lead time matrix: SERVICE New Application Releases Incident Fixes Emergencies LEAD TIME APPLICATION SYSTEMS 1 month 12 24 hours 12 hours OPERATIONS ICT Change Management Policy 10

Installation of hardware 1 2 months Consumable tapes / cartridges 2 weeks Changes to Schedules 48 hours Hardware maintenance 1 month Changes to operation of servers 1 week NETWORK Installation of new data lines 4 months In- and outdoor transfer of data lines 1 month Installation of new equipment on 2 weeks existing network Incident fixes 3 weeks TECHNICAL SUPPORT New application release 3 weeks Environmental changes 2 months Incident fixes 24 48 hours Software evaluation 2 weeks The lead time for non-standard changes that require research shall be negotiated with SBU s concerned, and will depend on the nature and complexity of the change or captured in Operational Service Level Agreements 10. Consequences of non-compliance Non-compliance of this policy may lead to disciplinary actions, legal liability as well as dismissal. 11. Implementation This policy comes into effect from the date of approval. 12. Policy review This policy shall be reviewed annually. ICT Change Management Policy 11