other examinable practices (5)

Cards (8)

  • Information security management
    Protects information needed by organizations to conduct business
  • relationship management
    relationships are identified > analyzed > monitored > improved
  • supplier management
    make sure we get what we paid for from suppliers.
    contracts are made in the form of UCs (underpinning contracts)
  • It asset management
    plans and manages the full lifecycle of IT assets
    1. maximize their value
    2. control costs
    3. support decisions about new assets
    IT Asset: any financially valuable component that can contribute to the delivery of IT products or services
  • monitoring and event management
    Observes and record changes in cervices and components states. Identifies those events and categorizes them and establishes responses.
    event: any change of state that has a significance for the management of a configuration of item or service
    types: informal, warning, exceptions
  • release management
    makes new and changes services and features available for use
    release: a version of a service or other that is made available for use
    releases have been disconnected from deployments with canary/dark releases
  • services configuration management
    ensures accurate information is available when needed about services configuration items and their relationships
    CI (config item): any component that needs to be managed to deliver IT service
    CMDB (config management database) a database or collection of databases holding CIs and their connections
    CMS (config management system): a frontend / user interface for CMDBs
  • deployment management
    moves new or changed hardware software documentation or any other components from one environment to the next. EG. DEV>QA>PROD