Enterprise Policies, Standards, and Guidelines

Enterprise Policies, Standards, and Guidelines

Introduction 

This site contains the currently published State of Georgia enterprise policies, standards and guidelines (PSGs). 

PSGs in this website are organized following the controls framework advanced by the ITGovernance Institute in a publication entitled Control Objectives for Information and related Technology (COBIT) version 4.1.  Cobit provides good practices across a process framework in a manageable and logical structure.  The State of Georgia enterprise policies, standards and guidelines are mapped to the Cobit framework accessible through the full index found at the right of the screen.  Where the State of Georgia has not published specific PSGs, the framework entry will be so noted.

Working definitions for the terms "policy", "standard" and "guideline" as used by the Georgia Technology Authority (GTA) are as follows:

  • Policy – A general or high level statement of a direction, purpose, principle, process, method, or procedure for managing technology and technology resources.
  • Standard – A prescribed or proscribed specification, approach, directive, procedure, solution, methodology, product or protocol which must be followed.
  • Guideline – A guideline is similar to either a standard or a policy, in that it outlines a specific principle, direction, directive, specification, or procedure but is not binding. Rather, a guideline is a recommended course of action. 

Plan and Organize

Plan and Organize

This domain covers strategy and tactics, and identifies the best ways for IT to contribute to the achievement of business objectives. The realization of the strategic vision needs to be planned, communicated and managed for different perspectives. A proper organization as well as technological infrastructure should be put in place. This domain typically addresses the following management questions:
• Are IT and the business strategy aligned?
• Is the enterprise achieving optimum use of its resources?
• Does everyone in the organization understand the IT objectives?
• Are IT risks understood and being managed?
• Is the quality of IT systems appropriate for business needs?

Define a Strategic IT Plan

Define a Strategic IT Plan

IT strategic planning is required to manage and direct all IT resources in line with the business strategy and priorities. The IT function and business stakeholders are responsible for ensuring that optimal value is realized from project and service portfolios. The strategic plan improves key stakeholders’ understanding of IT opportunities and limitations, assesses current performance, identifies capacity and human resource requirements, and clarifies the level of investment required. The business strategy and priorities are to be reflected in portfolios and executed by the IT tactical plan(s), which specifies concise objectives, action plans and tasks that are understood and accepted by both business and IT.

IT Value Management

IT Value Management

The processes of IT working with the business to ensure that the enterprise portfolio of IT-enabled investments have solid business cases that provide for transparent, repeatable and comparable evaluation, including financial worth, the risk of not delivering a capability and the risk of not realizing the expected benefits.  Providing effective, efficient and accountable delivery of the IT services with early warning of any deviations from plan, including cost, schedule or functionality.

Assessment of Current Capability and Performance

Define the Information Architecture

Define the Information Architecture

The information systems function creates and regularly updates a business information model and defines the appropriate systems to optimize the use of this information. This encompasses the development of a corporate data dictionary with the organization’s data syntax rules, data classification scheme and security levels. This process improves the quality of management decision making by making sure that reliable and secure information is provided, and it enables rationalizing information systems resources to appropriately match business strategies. This IT process is also needed to increase accountability for the integrity and security of data and to enhance the effectiveness and control of sharing information across applications and entities.

Enterprise Information Architecture Model

Enterprise Information Architecture Model

Establish and maintain an enterprise information model to enable applications development and decision-supporting activities, consistent with business and IT plans. The model should facilitate the optimal creation, use and sharing of information by the business in a way that maintains integrity and is flexible, functional, cost-effective, timely, secure and resilient to failure.

Enterprise Data Dictionary and Data Syntax Rules

Enterprise Data Dictionary and Data Syntax Rules

Maintain an enterprise data dictionary that incorporates the organization’s data syntax rules. This dictionary should enable the sharing of data elements among applications and systems, promote a common understanding of data among IT and business users, and prevent incompatible data elements from being created.

There are no PSGs published for this topic; however, the topic is under review for future PSGs.

Data Classification Scheme

Data Classification Scheme

Establish a classification scheme that applies throughout the enterprise, based on the criticality and of enterprise data. This scheme should include details about data ownership; definition of appropriate security levels and protection controls; and a brief description of data retention and destruction requirements, criticality and sensitivity. It should be used as the basis for applying controls such as access controls, archiving or encryption.

Determine Technological Direction

Determine Technological Direction

The information services function determines the technology direction to support the business. This requires the creation of a technological infrastructure plan and an architecture board that sets and manages clear and realistic expectations of what technology can offer in terms of products, services and delivery mechanisms. The plan is regularly updated and encompasses aspects such as systems architecture, technological direction, acquisition plans, standards, migration strategies and contingency. This enables timely responses to changes in the competitive environment, economies of scale for information systems staffing and investments, as well as improved interoperability of platforms and applications.

Technological Direction Planning

Technological Direction Planning

Analyze existing and emerging technologies, and plan which technological direction is appropriate to realize the IT strategy and the business systems architecture. Also identify in the plan which technologies have the potential to create business opportunities. The plan should address systems architecture, technological direction, migration strategies and contingency aspects of infrastructure components.

There are no PSGs published for this topic; however, the topic is under review for future PSGs.

Technology Infrastructure Plan

Technology Infrastructure Plan

Create and maintain a technology infrastructure plan that is in accordance with the IT strategic and tactical plans. The plan should be based on the technological direction and include contingency arrangements and direction for acquisition of technology resources. It should consider changes in the competitive environment, economies of scale for information systems staffing and investments, and improved interoperability of platforms and applications.

There are no PSGs published for this topic; however, the topic is under review for future PSGs.

Technology Standards

Technology Standards

To provide consistent, effective and secure technological solutions enterprise-wide, establish a technology forum to provide technology guidelines, advice on infrastructure products and guidance on the selection of technology, and measure compliance with these standards and guidelines. This forum should direct technology standards and practices based on their business relevance, risks and compliance with external requirements.

Define the IT Processes, Organization and Relationships

Define the IT Processes, Organization and Relationships

An IT organization is defined by considering requirements for staff, skills, functions, accountability, authority, roles and responsibilities, and supervision. This organization is embedded into an IT process framework that ensures transparency and control as well as the involvement of senior executives and business management. A strategy committee ensures board oversight of IT, and one or more steering committees in which business and IT participate determine the prioritization of IT resources in line with business needs. Processes, administrative policies and procedures are in place for all functions, with specific attention to control, quality assurance, risk management, information security, data and systems ownership, and segregation of duties. To ensure timely support of business requirements, IT is to be involved in relevant decision processes.

IT Process Framework

IT Process Framework

Define an IT process framework to execute the IT strategic plan. This framework should include an IT process structure and relationships (e.g., to manage process gaps and overlaps), ownership, maturity, performance measurement, improvement, compliance, quality targets and plans to achieve them. It should provide integration among the processes that are specific to IT, enterprise portfolio management, business processes and business change processes, and be integrated into a quality management system (QMS) and the internal control framework.

IT Steering Committee

IT Steering Committee

Establish an IT steering committee (or equivalent) composed of executive, business and IT management to:

  • Determine prioritization of IT-enabled investments in line with the enterprise’s business strategy and priorities
  • Track status of projects and resolve resource conflict
  • Monitor service levels and service improvements

There are no PSGs published for this topic; however, the topic is under review for future PSGs.

Organizational Placement of the IT Function

Organizational Placement of the IT Function

Place the IT function in the overall organizational structure so as to emphasize the importance of IT within the enterprise, specifically its criticality to business strategy and the level of operational dependence on IT. The reporting line of the CIO should be commensurate with the importance of IT within the enterprise.

There are no PSGs published for this topic; however, the topic is under review for future PSGs.

IT Organizational Structure

IT Organizational Structure

Establish an internal and external IT organizational structure that reflects business needs. In addition, put a process in place for periodically reviewing the IT organizational structure to adjust staffing requirements and sourcing strategies to meet expected business objectives and changing circumstances.

There are no PSGs published for this topic; however, the topic is under review for future PSGs.

Establishment of Roles and Responsibilities

Responsibility for IT Quality Assurance

Responsibility for IT Quality Assurance

Assign responsibility for the performance of the quality assurance (QA) function and provide the QA group with appropriate QA systems, controls and communications expertise. Ensure that the organizational placement and the responsibilities and size of the QA group satisfy the requirements of the organization.

There are no PSGs published for this topic; however, the topic is under review for future PSGs.

Responsibility for Risk, Security and Compliance

Responsibility for Risk, Security and Compliance

Embed ownership and responsibility for IT-related risks within the business at an appropriate senior level. Define and assign roles critical for managing IT risks, including the specific responsibility for information security, physical security and compliance. Establish risk and security management responsibility at the enterprise level to deal with organization-wide issues. Additional security management responsibilities may need to be assigned at a system-specific level to deal with related security issues. Obtain direction from senior management on the appetite for IT risk and approval of any residual IT risks.

There are no PSGs published for this topic; however, the topic is under review for future PSGs.

Contracted Staff Policies and Procedures

Relationships

Relationships

Establish and maintain an optimal co-ordination, communication and liaison structure between the IT function and various other interests inside and outside the IT function, such as the board, executives, business units, individual users, suppliers, security officers, risk managers, the corporate compliance group, outsourcers and offsite management.

There are no PSGs published for this topic; however, the topic is under review for future PSGs.

Manage the IT Investment

Manage the IT Investment

A framework is established and maintained to manage IT-enabled investment programs and that encompasses cost, benefits, prioritization within budget, a formal budgeting process and management against the budget. Stakeholders are consulted to identify and control the total costs and benefits within the context of the IT strategic and tactical plans, and initiate corrective action where needed. The process fosters partnership between IT and business stakeholders; enables the effective and efficient use of IT resources; and provides transparency and accountability into the total cost of ownership (TCO), the realization of business benefits and the ROI of IT-enabled investments.

IT Budgeting

IT Budgeting

Establish and implement practices to prepare a budget reflecting the priorities established by the enterprise’s portfolio of IT-enabled investments, and including the ongoing costs of operating and maintaining the current infrastructure. The practices should support development of an overall IT budget as well as development of budgets for individual IT services. The practices should allow for ongoing review, refinement and approval of the overall budget and the budgets for individual IT services.

There are no PSGs published for this topic; however, the topic is under review for future PSGs.

Cost Management

Cost Management

Implement a cost management process comparing actual costs to budgets. Costs should be monitored and reported. Where there are deviations, these should be identified in a timely manner and the impact of those deviations should be assessed. Together with the business sponsor of those costed services, appropriate remedial action should be taken and, if necessary, the service business case should be updated.

There are no PSGs published for this topic; however, the topic is under review for future PSGs.

Benefit Management

Benefit Management

Implement a process to monitor the benefits from providing and maintaining appropriate IT capabilities. IT’s contribution to the business, either as a component of IT-enabled investments or as part of regular operational support, should be identified and documented in a business case, agreed to, monitored and reported. Reports should be reviewed and, where there are opportunities to improve IT’s contribution, appropriate actions should be defined and taken. Where changes in IT’s contribution impact the service or where changes to other related projects impact the service, the service business case should be updated.

There are no PSGs published for this topic; however, the topic is under review for future PSGs.

Communicate Management Aims and Direction

Communicate Management Aims and Direction

Management develops an enterprise IT control framework and defines and communicates policies. An ongoing communication program is implemented to articulate the mission, service objectives, policies and procedures, etc., approved and supported by management. The communication supports achievement of IT objectives and ensures awareness and understanding of business and IT risks, objectives and direction. The process ensures compliance with relevant laws and regulations.

IT Policy and Control Environment

IT Policy and Control Environment

Define the elements of a control environment for IT, aligned with the enterprise’s management philosophy and operating style. These elements should include expectations/requirements regarding delivery of value from IT investments, appetite for risk, integrity, ethical values, staff competence, accountability and responsibility. The control environment should be based on a culture that supports value delivery whilemanaging significant risks, encourages cross-divisional co-operation and teamwork, promotes compliance and continuous process improvement, and handles process deviations (including failure) well.

There are no PSGs published for this topic; however, the topic is under review for future PSGs.

Manage IT Human Resources

Manage IT Human Resources

A competent workforce is acquired and maintained for the creation and delivery of IT services to the business. This is achieved by following defined and agreed-upon practices supporting recruiting, training, evaluating performance, promoting and terminating. This process is critical, as people are important assets, and governance and the internal control environment are heavily dependent on the motivation and competence of personnel.

Personnel Recruitment and Retention

Personnel Recruitment and Retention

Maintain IT personnel recruitment processes in line with the overall organization’s personnel policies and procedures (e.g., hiring, positive work environment, orienting). Implement processes to ensure that the organization has an appropriately deployed IT workforce with the skills necessary to achieve organizational goals.

There are no PSGs published for this topic; however, the topic is under review for future PSGs.

Personnel Competencies

Employee Job Performance Evaluation

Manage Quality

Manage Quality

A QMS is developed and maintained that includes proven development and acquisition processes and standards. This is enabled by planning, implementing and maintaining the QMS by providing clear quality requirements, procedures and policies. Quality requirements are stated and communicated in quantifiable and achievable indicators. Continuous improvement is achieved by ongoing monitoring, analysis and acting upon deviations, and communicating results to stakeholders. Quality management is essential to ensure that IT is delivering value to the business, continuous improvement and transparency for stakeholders.

Quality Management System

Quality Management System

Establish and maintain a QMS that provides a standard, formal and continuous approach regarding quality management that is aligned with business requirements. The QMS should identify quality requirements and criteria; key IT processes and their sequence and interaction; and the policies, criteria and methods for defining, detecting, correcting and preventing non-conformity. The QMS should define the organizational structure for quality management, covering the roles, tasks and responsibilities. All key areas should develop their quality plans in line with criteria and policies and record quality data. Monitor and measure the effectiveness and acceptance of the QMS, and improve it when needed.

There are no PSGs published for this topic; however, the topic is under review for future PSGs.

Development and Acquisition Standards

Development and Acquisition Standards

Adopt and maintain standards for all development and acquisition that follow the life cycle of the ultimate deliverable, and include sign-off at key milestones based on agreed-upon sign-off criteria. Consider software coding standards; naming conventions; file formats; schema and data dictionary design standards; user interface standards; interoperability; system performance efficiency; scalability; standards for development and testing; validation against requirements; test plans; and unit, regression and integration testing.

Quality Measurement, Monitoring and Review

Assess and Manage IT Risks

Assess and Manage IT Risks

A risk management framework is created and maintained. The framework documents a common and agreed-upon level of IT risks, mitigation strategies and residual risks. Any potential impact on the goals of the organization caused by an unplanned event is identified, analyzed and assessed. Risk mitigation strategies are adopted to minimize residual risk to an accepted level. The result of the assessment is understandable to the stakeholders and expressed in financial terms, to enable stakeholders to align risk to an acceptable level of tolerance.

Establishment of Risk Context

Event Identification

Event Identification

Identify events (an important realistic threat that exploits a significant applicable vulnerability) with a potential negative impact on the goals or operations of the enterprise, including business, regulatory, legal, technology, trading partner, human resources and operational aspects. Determine the nature of the impact and maintain this information. Record and maintain relevant risks in a risk registry.

Maintenance and Monitoring of a Risk Action Plan

Maintenance and Monitoring of a Risk Action Plan

Prioritize and plan the control activities at all levels to implement the risk responses identified as necessary, including identification of costs, benefits and responsibility for execution. Obtain approval for recommended actions and acceptance of any residual risks, and ensure that committed actions are owned by the affected process owner(s). Monitor execution of the plans, and report on any deviations to senior management.

Manage Projects

Manage Projects

A program and project management framework for the management of all IT projects is established. The framework ensures the correct prioritization and co-ordination of all projects. The framework includes a master plan, assignment of resources, definition of deliverables, approval by users, a phased approach to delivery, QA, a formal test plan, and testing and post-implementation review after installation to ensure project risk management and value delivery to the business. This approach reduces the risk of unexpected costs and project cancellations, improves communications to and involvement of business and end users, ensures the value and quality of project deliverables, and maximizes their contribution to IT-enabled investment programs.

Project Management Approach

Project Management Approach

Establish a project management approach commensurate with the size, complexity and regulatory requirements of each project. The project governance structure can include the roles, responsibilities and accountabilities of the program sponsor, project sponsors, steering committee, project office and project manager, and the mechanisms through which they can meet those responsibilities (such as reporting and stage reviews). Make sure all IT projects have sponsors with sufficient authority to own the execution of the project within the overall strategic program.

Project Scope Statement

Project Scope Statement

Define and document the nature and scope of the project to confirm and develop amongst stakeholders a common understanding of project scope and how it relates to other projects within the overall IT-enabled investment program. The definition should be formally approved by the program and project sponsors before project initiation.

There are no PSGs published for this topic; however, the topic is under review for future PSGs

Project Phase Initiation

Project Phase Initiation

Approve the initiation of each major project phase and communicate it to all stakeholders. Base the approval of the initial phase on program governance decisions. Approval of subsequent phases should be based on review and acceptance of the deliverables of the previous phase, and approval of an updated business case at the next major review of the program. In the event of overlapping project phases, an approval point should be established by program and project sponsors to authorize project progression.

There are no PSGs published for this topic; however, the topic is under review for future PSGs

Integrated Project Plan

Integrated Project Plan

Establish a formal, approved integrated project plan (covering business and information systems resources) to guide project execution and control throughout the life of the project. The activities and interdependencies of multiple projects within a program should be understood and documented. The project plan should be maintained throughout the life of the project. The project plan, and changes to it, should be approved in line with the program and project governance framework.

There are no PSGs published for this topic; however, the topic is under review for future PSGs

Project Resources

Project Resources

Define the responsibilities, relationships, authorities and performance criteria of project team members, and specify the basis for acquiring and assigning competent staff members and/or contractors to the project. The procurement of products and services required for each project should be planned and managed to achieve project objectives using the organization’s procurement practices.

There are no PSGs published for this topic; however, the topic is under review for future PSGs

Project Risk Management

Project Risk Management

Eliminate or minimize specific risks associated with individual projects through a systematic process of planning, identifying, analyzing, responding to, monitoring and controlling the areas or events that have the potential to cause unwanted change. Risks faced by the project management process and the project deliverable should be established and centrally recorded.

There are no PSGs published for this topic; however, the topic is under review for future PSGs

Project Quality Plan

Project Performance Measurement, Reporting and Monitoring

Project Performance Measurement, Reporting and Monitoring

Measure project performance against key project performance scope, schedule, quality, cost and risk criteria. Identify any deviations from the plan. Assess the impact of deviations on the project and overall program, and report results to key stakeholders. Recommend, implement and monitor remedial action, when required, in line with the program and project governance framework.

Project Closure

Project Closure

Require that, at the end of each project, the project stakeholders ascertain whether the project delivered the planned results and benefits. Identify and communicate any outstanding activities required to achieve the planned results of the project and the benefits of the program, and identify and document lessons learned for use on future projects and programs.

There are no PSGs published for this topic; however, the topic is under review for future PSGs

Acquire and Implement

Acquire and Implement

To realize the IT strategy, IT solutions need to be identified, developed or acquired, as well as implemented and integrated into the business process. In addition, changes in and maintenance of existing systems are covered by this domain to make sure the solutions continue to meet business objectives. This domain typically addresses the following management questions:
• Are new projects likely to deliver solutions that meet business needs?
• Are new projects likely to be delivered on time and within budget?
• Will the new systems work properly when implemented?
• Will changes be made without upsetting current business operations?

Identify Automated Solutions

Identify Automated Solutions

The need for a new application or function requires analysis before acquisition or creation to ensure that business requirements are satisfied in an effective and efficient approach. This process covers the definition of the needs, consideration of alternative sources, review of technological and economic feasibility, execution of a risk analysis and cost-benefit analysis, and conclusion of a final decision to ‘make’ or ‘buy’. All these steps enable organizations to minimize the cost to acquire and implement solutions while ensuring that they enable the business to achieve its objectives.

Definition and Maintenance of Business Functional and Technical Requirements

Feasibility Study and Formulation of Alternative Courses of Action

Feasibility Study and Formulation of Alternative Courses of Action

Develop a feasibility study that examines the possibility of implementing the requirements. Business management, supported by the IT function, should assess the feasibility and alternative courses of action and make a recommendation to the business sponsor.

There are no PSGs published for this topic; however, the topic is under review for future PSGs

Requirements and Feasibility Decision and Approval

Requirements and Feasibility Decision and Approval

Verify that the process requires the business sponsor to approve and sign off on business functional and technical requirements and feasibility study reports at predetermined key stages. The business sponsor should make the final decision with respect to the choice of solution and acquisition approach.

There are no PSGs published for this topic; however, the topic is under review for future PSGs

Acquire and Maintain Application Software

High-level Design

High-level Design

Translate business requirements into a high-level design specification for software acquisition, taking into account the organization’s technological direction and information architecture. Have the design specifications approved by management to ensure that the high-level design responds to the requirements. Reassess when significant technical or logical discrepancies occur during development or maintenance.

There are no PSGs published for this topic; however, the topic is under review for future PSGs

Detailed Design

Detailed Design

Prepare detailed design and technical software application requirements. Define the criteria for acceptance of the requirements. Have the requirements approved to ensure that they correspond to the high-level design. Perform reassessment when significant technical or logical discrepancies occur during development or maintenance.

There are no PSGs published for this topic; however, the topic is under review for future PSGs

Major Upgrades to Existing Systems

Development of Application Software

Development of Application Software

Ensure that automated functionality is developed in accordance with design specifications, development and documentation standards, QA requirements, and approval standards. Ensure that all legal and contractual aspects are identified and addressed for application software developed by third parties.

There are no PSGs published for this topic; however, the topic is under review for future PSGs

Acquire and Maintain Technology Infrastructure

Acquire and Maintain Technology Infrastructure

Organizations have processes for the acquisition, implementation and upgrade of the technology infrastructure. This requires a planned approach to acquisition, maintenance and protection of infrastructure in line with agreed-upon technology strategies and the provision of development and test environments. This ensures that there is ongoing technological support for business applications.

Technological Infrastructure Acquisition Plan

Technological Infrastructure Acquisition Plan

Produce a plan for the acquisition, implementation and maintenance of the technological infrastructure that meets established business functional and technical requirements and is in accord with the organization’s technology direction.

There are no PSGs published for this topic; however, the topic is under review for future PSGs

Infrastructure Resource Protection and Availability

Infrastructure Resource Protection and Availability

Implement internal control, security and auditability measures during configuration, integration and maintenance of hardware and infrastructural software to protect resources and ensure availability and integrity. Responsibilities for using sensitive infrastructure components should be clearly defined and understood by those who develop and integrate infrastructure components. Their use should be monitored and evaluated.

There are no PSGs published for this topic; however, the topic is under review for future PSGs

Infrastructure Maintenance

Infrastructure Maintenance

Develop a strategy and plan for infrastructure maintenance, and ensure that changes are controlled in line with the organization’s change management procedure. Include periodic reviews against business needs, patch management, upgrade strategies, risks, vulnerabilities assessment and security requirements.

There are no PSGs published for this topic; however, the topic is under review for future PSGs

Enable Operation and Use

Procure IT Resources

Supplier Contract Management

Supplier Contract Management

Set up a procedure for establishing, modifying and terminating contracts for all suppliers. The procedure should cover, at a minimum, legal, financial, organizational, documentary, performance, security, intellectual property, and termination responsibilities and liabilities (including penalty clauses). All contracts and contract changes should be reviewed by legal advisers.

There are no PSGs published for this topic; however, the topic is under review for future PSGs

Manage Changes

Manage Changes

All changes, including emergency maintenance and patches, relating to infrastructure and applications within the production environment are formally managed in a controlled manner. Changes (including those to procedures, processes, system and service parameters) are logged, assessed and authorized prior to implementation and reviewed against planned outcomes following implementation. This assures mitigation of the risks of negatively impacting the stability or integrity of the production environment.

Install and Accredit Solutions and Changes

Final Acceptance Test

Final Acceptance Test

Ensure that business process owners and IT stakeholders evaluate the outcome of the testing process as determined by the test plan. Remediate significant errors identified in the testing process, having completed the suite of tests identified in the test plan and any necessary regression tests. Following evaluation, approve promotion to production.

There are no PSGs published for this topic; however, the topic is under review for future PSGs

Deliver and Support

Deliver and Support

This domain is concerned with the actual delivery of required services, which includes service delivery, management of security and continuity, service support for users, and management of data and operational facilities. It typically addresses the following management questions:
• Are IT services being delivered in line with business priorities?
• Are IT costs optimized?
• Is the workforce able to use the IT systems productively and safely?
• Are adequate confidentiality, integrity and availability in place for information security?

Define and Manage Service Levels

Define and Manage Service Levels

Effective communication between IT management and business customers regarding services required is enabled by a documented definition of and agreement on IT services and service levels. This process also includes monitoring and timely reporting to stakeholders on the accomplishment of service levels. This process enables alignment between IT services and the related business requirements.

Service Level Management Framework

Service Level Management Framework

Define a framework that provides a formalized service level management process between the customer and service provider. The framework should maintain continuous alignment with business requirements and priorities and facilitate common understanding between the customer and provider(s). The framework should include processes for creating service requirements, service definitions, SLAs, OLAs and funding sources. These attributes should be organized in a service catalogue. The framework should define the organizational structure for service level management, covering the roles, tasks and responsibilities of internal and external service providers and customers.

There are no PSGs published for this topic; however, the topic is under review for future PSGs

Service Level Agreements

Service Level Agreements

Define and agree to SLAs for all critical IT services based on customer requirements and IT capabilities. This should cover customer commitments; service support requirements; quantitative and qualitative metrics for measuring the service signed off on by the stakeholders; funding and commercial arrangements, if applicable; and roles and responsibilities, including oversight of the SLA. Consider items such as availability, reliability, performance, capacity for growth, levels of support, continuity planning, security and demand constraints.

Monitoring and Reporting of Service Level Achievements

Monitoring and Reporting of Service Level Achievements

Continuously monitor specified service level performance criteria. Reports on achievement of service levels should be provided in a format that is meaningful to the stakeholders. The monitoring statistics should be analyzed and acted upon to identify negative and positive trends for individual services as well as for services overall.

There are no PSGs published for this topic; however, the topic is under review for future PSGs

Review of Service Level Agreements and Contracts

Manage Third-Party Services

Manage Third-Party Services

The need to assure that services provided by third parties (suppliers, vendors and partners) meet business requirements requires an effective third-party management process. This process is accomplished by clearly defining the roles, responsibilities and expectations in third-party agreements as well as reviewing and monitoring such agreements for effectiveness and compliance. Effective management of third-party services minimizes the business risk associated with non-performing suppliers.

Identification of All Supplier Relationships

Identification of All Supplier Relationships

Identify all supplier services, and categorize them according to supplier type, significance and criticality. Maintain formal documentation of technical and organizational relationships covering the roles and responsibilities, goals, expected deliverables, and credentials of representatives of these suppliers.

There are no PSGs published for this topic; however, the topic is under review for future PSGs

Supplier Risk Management

Supplier Risk Management

Identify and mitigate risks relating to suppliers’ ability to continue effective service delivery in a secure and efficient manner on a continual basis. Ensure that contracts conform to universal business standards in accordance with legal and regulatory requirements. Risk management should further consider non-disclosure agreements (NDAs), escrow contracts, continued supplier viability, conformance with security requirements, alternative suppliers, penalties and rewards, etc.

There are no PSGs published for this topic; however, the topic is under review for future PSGs

Supplier Performance Monitoring

Manage Performance and Capacity

Performance and Capacity Planning

Performance and Capacity Planning

Establish a planning process for the review of performance and capacity of IT resources to ensure that cost-justifiable capacity and performance are available to process the agreed-upon workloads as determined by the SLAs. Capacity and performance plans should leverage appropriate modeling techniques to produce a model of the current and forecasted performance, capacity and throughput of the IT resources.

There are no PSGs published for this topic; however, the topic is under review for future PSGs

Future Performance and Capacity

Future Performance and Capacity

Conduct performance and capacity forecasting of IT resources at regular intervals to minimize the risk of service disruptions due to insufficient capacity or performance degradation, and identify excess capacity for possible redeployment. Identify workload trends and determine forecasts to be input to performance and capacity plans.

There are no PSGs published for this topic; however, the topic is under review for future PSGs

IT Resources Availability

IT Resources Availability

Provide the required capacity and performance, taking into account aspects such as normal workloads, contingencies, storage requirements and IT resource life cycles. Provisions such as prioritizing tasks, fault-tolerance mechanisms and resource allocation practices should be made. Management should ensure that contingency plans properly address availability, capacity and performance of individual IT resources.

There are no PSGs published for this topic; however, the topic is under review for future PSGs

Monitoring and Reporting

Monitoring and Reporting

Continuously monitor the performance and capacity of IT resources. Data gathered should serve two purposes:

  • To maintain and tune current performance within IT and address such issues as resilience, contingency, current and projected workloads, storage plans, and resource acquisition
  • To report delivered service availability to the business, as required by the SLAs

Accompany all exception reports with recommendations for corrective action.

There are no PSGs published for this topic; however, the topic is under review for future PSGs

Ensure Continuous Service

IT Continuity Framework

IT Continuity Framework

Develop a framework for IT continuity to support enterprise-wide business continuity management using a consistent process. The objective of the framework should be to assist in determining the required resilience of the infrastructure and to drive the development of disaster recovery and IT contingency plans. The framework should address the organizational structure for continuity management, covering the roles, tasks and responsibilities of internal and external service providers, their management and their customers, and the planning processes that create the rules and structures to document, test and execute the disaster recovery and IT contingency plans. The plan should also address items such as the identification of critical resources, noting key dependencies, the monitoring and reporting of the availability of critical resources, alternative processing, and the principles of backup and recovery.

IT Continuity Plans

IT Continuity Plans

Develop IT continuity plans based on the framework and designed to reduce the impact of a major disruption on key business functions and processes. The plans should be based on risk understanding of potential business impacts and address requirements for resilience, alternative processing and recovery capability of all critical IT services. They should also cover usage guidelines, roles and responsibilities, procedures, communication processes, and the testing approach.

Critical IT Resources

Critical IT Resources

Focus attention on items specified as most critical in the IT continuity plan to build in resilience and establish priorities in recovery situations. Avoid the distraction of recovering less-critical items and ensure response and recovery in line with prioritized business needs, while ensuring that costs are kept at an acceptable level and complying with regulatory and contractual requirements. Consider resilience, response and recovery requirements for different tiers, e.g., one to four hours, four to 24 hours, more than 24 hours and critical business operational periods.

Maintenance of the IT Continuity Plan

Testing of the IT Continuity Plan

Testing of the IT Continuity Plan

Test the IT continuity plan on a regular basis to ensure that IT systems can be effectively recovered, shortcomings are addressed and the plan remains relevant. This requires careful preparation, documentation, reporting of test results and, according to the results, implementation of an action plan. Consider the extent of testing recovery of single applications to integrated testing scenarios to end-to-end testing and integrated vendor testing.

There are no PSGs published for this topic; however, the topic is under review for future PSGs

Distribution of the IT Continuity Plan

Distribution of the IT Continuity Plan

Determine that a defined and managed distribution strategy exists to ensure that plans are properly and securely distributed and available to appropriately authorized interested parties when and where needed. Attention should be paid to making the plans accessible under all disaster scenarios.

There are no PSGs published for this topic; however, the topic is under review for future PSGs

IT Services Recovery and Resumption

IT Services Recovery and Resumption

Plan the actions to be taken for the period when IT is recovering and resuming services. This may include activation of backup sites, initiation of alternative processing, customer and stakeholder communication, and resumption procedures. Ensure that the business understands IT recovery times and the necessary technology investments to support business recovery and resumption needs.

There are no PSGs published for this topic; however, the topic is under review for future PSGs

Offsite Backup Storage

Offsite Backup Storage

Store offsite all critical backup media, documentation and other IT resources necessary for IT recovery and business continuity plans. Determine the content of backup storage in collaboration between business process owners and IT personnel. Management of the offsite storage facility should respond to the data classification policy and the enterprise’s media storage practices. IT management should ensure that offsite arrangements are periodically assessed, at least annually, for content, environmental protection and security. Ensure compatibility of hardware and software to restore archived data, and periodically test and refresh archived data.

Ensure Systems Security

Ensure Systems Security

The need to maintain the integrity of information and protect IT assets requires a security management process. This process includes establishing and maintaining IT security roles and responsibilties, policies, standards, and procedures. Security management also includes performing security monitoring and periodic testing and implementing corrective actions for identified security weaknesses or incidents. Effective security management protects all IT assets to minimize the business impact of security vulnerabilities and incidents

IT Security Plan

IT Security Plan

Translate business, risk and compliance requirements into an overall IT security plan, taking into consideration the IT infrastructure and the security culture. Ensure that the plan is implemented in security policies and procedures together with appropriate investments in services, personnel, software and hardware. Communicate security policies and procedures to stakeholders and users.

Identity Management

Identity Management

Ensure that all users (internal, external and temporary) and their activity on IT systems (business application, IT environment, system operations, development and maintenance) are uniquely identifiable. Enable user identities via authentication mechanisms. Confirm that user access rights to systems and data are in line with defined and documented business needs and that job requirements are attached to user identities. Ensure that user access rights are requested by user management, approved by system owners and implemented by the security-responsible person. Maintain user identities and access rights in a central repository. Deploy cost-effective technical and procedural measures, and keep them current to establish user identification, implement authentication and enforce access rights.

User Account Management

User Account Management

Address requesting, establishing, issuing, suspending, modifying and closing user accounts and related user privileges with a set of user account management procedures. Include an approval procedure outlining the data or system owner granting the access privileges. These procedures should apply for all users, including administrators (privileged users) and internal and external users, for normal and emergency cases. Rights and obligations relative to access to enterprise systems and information should be contractually arranged for all types of users. Perform regular management review of all accounts and related privileges.

Security Testing, Surveillance and Monitoring

Security Testing, Surveillance and Monitoring

Test and monitor the IT security implementation in a proactive way. IT security should be reaccredited in a timely manner to ensure that the approved enterprise’s information security baseline is maintained. A logging and monitoring function will enable the early prevention and/or detection and subsequent timely reporting of unusual and/or abnormal activities that may need to be addressed.

There are no PSGs published for this topic; however, the topic is under review for future PSGs

Cryptographic Key Management

Cryptographic Key Management

Determine that policies and procedures are in place to organize the generation, change, revocation, destruction, distribution, certification, storage, entry, use and archiving of cryptographic keys to ensure the protection of keys against modification and unauthorized disclosure.

There are no PSGs published for this topic; however, the topic is under review for future PSGs

Identify and Allocate Costs

Identify and Allocate Costs

The need for a fair and equitable system of allocating IT costs to the business requires accurate measurement of IT costs and agreement with business users on fair allocation. This process includes building and operating a system to capture, allocate and report IT costs to the users of services. A fair system of allocation enables the business to make more informed decisions regarding the use of IT services.

Cost Modeling and Charging

Educate and Train Users

Educate and Train Users

Effective education of all users of IT systems, including those within IT, requires identifying the training needs of each user group. In addition to identifying needs, this process includes defining and executing a strategy for effective training and measuring the results. An effective training program increases effective use of technology by reducing user errors, increasing productivity and increasing compliance with key controls, such as user security measures.

Identification of Education and Training Needs

Identification of Education and Training Needs

Establish and regularly update a curriculum for each target group of employees considering:
• Current and future business needs and strategy
• Value of information as an asset
• Organizational values (ethical values, control and security culture, etc.)
• Implementation of new IT infrastructure and software (i.e., packages, applications)
• Current and future skills, competence profiles, and certification and/or credentialing needs as well as required reaccreditation
• Delivery methods (e.g., classroom, web-based), target group size, accessibility and timing

Delivery of Training and Education

Delivery of Training and Education

Based on the identified education and training needs, identify target groups and their members, efficient delivery mechanisms, teachers, trainers, and mentors. Appoint trainers and organize timely training sessions.  Record registration (including prerequisites), attendance and training session performance evaluations.

There are no PSGs published for this topic; however, the topic is under review for future PSGs

Evaluation of Training Received

Manage Service Desk and Incidents

Manage Service Desk and Incidents

Timely and effective response to IT user queries and problems requires a well-designed and well-executed service desk and incident management process. This process includes setting up a service desk function with registration, incident escalation, trend and root cause analysis, and resolution. The business benefits include increased productivity through quick resolution of user queries. In addition, the business can address root causes (such as poor user training) through effective reporting.

Service Desk

Service Desk

Establish a service desk function, which is the user interface with IT, to register, communicate, dispatch and analyze all calls, reported incidents, service requests and information demands. There should be monitoring and escalation procedures based on agreed-upon service levels relative to the appropriate SLA that allow classification and prioritization of any reported issue as an incident, service request or information request. Measure end users’ satisfaction with the quality of the service desk and IT services.

There are no PSGs published for this topic; however, the topic is under review for future PSGs

Registration of Customer Queries

Registration of Customer Queries

Establish a function and system to allow logging and tracking of calls, incidents, service requests and information needs. It should work closely with such processes as incident management, problem management, change management, capacity management and availability management. Incidents should be classified according to a business and service priority and routed to the appropriate problem management team, where necessary. Customers should be kept informed of the status of their queries.

There are no PSGs published for this topic; however, the topic is under review for future PSGs

Incident Escalation

Incident Escalation

Establish service desk procedures, so incidents that cannot be resolved immediately are appropriately escalated according to limits defined in the SLA and, if appropriate, workarounds are provided. Ensure that incident ownership and life cycle monitoring remain with the service desk for user-based incidents, regardless which IT group is working on resolution activities.

There are no PSGs published for this topic; however, the topic is under review for future PSGs

Incident Closure

Incident Closure

Establish procedures for the timely monitoring of clearance of customer queries. When the incident has been resolved, ensure that the service desk records the resolution steps, and confirm that the action taken has been agreed to by the customer. Also record and report unresolved incidents (known errors and workarounds) to provide information for proper problem management.

There are no PSGs published for this topic; however, the topic is under review for future PSGs

Manage the Configuration

Manage the Configuration

Ensuring the integrity of hardware and software configurations requires the establishment and maintenance of an accurate and complete configuration repository. This process includes collecting initial configuration information, establishing baselines, verifying and auditing configuration information, and updating the configuration repository as needed. Effective configuration management facilitates greater system availability, minimizes production issues and resolves issues more quickly.

Configuration Repository and Baseline

Configuration Repository and Baseline

Establish a supporting tool and a central repository to contain all relevant information on configuration items. Monitor and record all assets and changes to assets. Maintain a baseline of configuration items for every system and service as a checkpoint to which to return after changes.

There are no PSGs published for this topic; however, the topic is under review for future PSGs

Identification and Maintenance of Configuration Items

Configuration Integrity Review

Configuration Integrity Review

Periodically review the configuration data to verify and confirm the integrity of the current and historical configuration. Periodically review installed software against the policy for software usage to identify personal or unlicensed software or any software instances in excess of current license agreements. Report, act on and correct errors and deviations.

There are no PSGs published for this topic; however, the topic is under review for future PSGs

Manage Problems

Manage Problems

Effective problem management requires the identification and classification of problems, root cause analysis and resolution of problems. The problem management process also includes the formulation of recommendations for improvement, maintenance of problem records and review of the status of corrective actions. An effective problem management process maximizes system availability, improves service levels, reduces costs, and improves customer convenience and satisfaction.

Identification and Classification of Problems

Identification and Classification of Problems

Implement processes to report and classify problems that have been identified as part of incident management. The steps involved in problem classification are similar to the steps in classifying incidents; they are to determine category, impact, urgency and priority. Categorize problems as appropriate into related groups or domains (e.g., hardware, software, support software). These groups may match the organizational responsibilities of the user and customer base, and should be the basis for allocating problems to support staff.

There are no PSGs published for this topic; however, the topic is under review for future PSGs

Problem Tracking and Resolution

Problem Tracking and Resolution

Ensure that the problem management system provides for adequate audit trail facilities that allow tracking, analyzing and determining the root cause of all reported problems considering:

• All associated configuration items

• Outstanding problems and incidents

• Known and suspected errors

• Tracking of problem trends

Identify and initiate sustainable solutions addressing the root cause, raising change requests via the established change management process. Throughout the resolution process, problem management should obtain regular reports from change management on progress in resolving problems and errors. Problem management should monitor the continuing impact of problems and known errors on user services. In the event that this impact becomes severe, problem management should escalate the problem, perhaps referring it to an appropriate board to increase the priority of the (RFC or to implement an urgent change as appropriate. Monitor the progress of problem resolution against SLAs.

There are no PSGs published for this topic; however, the topic is under review for future PSGs

Manage Data

Manage the Physical Environment

Manage the Physical Environment

Protection for computer equipment and personnel requires well-designed and well-managed physical facilities. The process of managing the physical environment includes defining the physical site requirements, selecting appropriate facilities, and designing effective processes for monitoring environmental factors and managing physical access. Effective management of the physical environment reduces business interruptions from damage to computer equipment and personnel.

Site Selection and Layout

Site Selection and Layout

Define and select the physical sites for IT equipment to support the technology strategy linked to the business strategy. The selection and design of the layout of a site should take into account the risk associated with natural and man-made disasters, while considering relevant laws and regulations, such as occupational health and safety regulations.

There are no PSGs published for this topic; however, the topic is under review for future PSGs

Physical Access

Physical Access

Define and implement procedures to grant, limit and revoke access to premises, buildings and areas according to business needs, including emergencies. Access to premises, buildings and areas should be justified, authorized, logged and monitored. This should apply to all persons entering the premises, including staff, temporary staff, clients, vendors, visitors or any other third party.

Manage Operations

Manage Operations

Complete and accurate processing of data requires effective management of data processing procedures and diligent maintenance of hardware. This process includes defining operating policies and procedures for effective management of scheduled processing, protecting sensitive output, monitoring infrastructure performance and ensuring preventive maintenance of hardware.  Effective operations management helps maintain data integrity and reduces business delays and IT operating costs.

Operations Procedures and Instructions

Operations Procedures and Instructions

Define, implement and maintain procedures for IT operations, ensuring that the operations staff members are familiar with all operations tasks relevant to them. Operational procedures should cover shift handover (formal handover of activity, status updates, operational problems, escalation procedures and reports on current responsibilities) to support agreed-upon service levels and ensure continuous operations.

IT Infrastructure Monitoring

IT Infrastructure Monitoring

Define and implement procedures to monitor the IT infrastructure and related events. Ensure that sufficient chronological information is being stored in operations logs to enable the reconstruction, review and examination of the time sequences of operations and the other activities surrounding or supporting operations.

There are no PSGs published for this topic; however, the topic is under review for future PSGs

Monitor and Evaluate

Monitor and Evaluate

All IT processes need to be regularly assessed over time for their quality and compliance with control requirements. This domain addresses performance management, monitoring of internal control, regulatory compliance and governance. It typically addresses the following management questions:
• Is IT’s performance measured to detect problems before it is too late?
• Does management ensure that internal controls are effective and efficient?
• Can IT performance be linked back to business goals?
• Are adequate confidentiality, integrity and availability controls in place for information security?

Monitor and Evaluate IT Performance

Definition and Collection of Monitoring Data

Board and Executive Reporting

Board and Executive Reporting

Develop senior management reports on IT’s contribution to the business, specifically in terms of the performance of the enterprise’s portfolio, IT-enabled investment programs, and the solution and service deliverable performance of individual programs. Include in status reports the extent to which planned objectives have been achieved, budgeted resources used, set performance targets met and identified risks mitigated. Anticipate senior management’s review by suggesting remedial actions for major deviations. Provide the report to senior management, and solicit feedback from management’s review.

There are no PSGs published for this topic; however, the topic is under review for future PSGs

Remedial Actions

Remedial Actions

Identify and initiate remedial actions based on performance monitoring, assessment and reporting. This includes follow-up of all monitoring, reporting and assessments through:

• Review, negotiation and establishment of management responses

• Assignment of responsibility for remediation

• Tracking of the results of actions committed.

There are no PSGs published for this topic; however, the topic is under review for future PSGs

Monitor and Evaluate Internal Control

Monitor and Evaluate Internal Control

Establishing an effective internal control program for IT requires a well-defined monitoring process. This process includes the monitoring and reporting of control exceptions, results of self-assessments and third-party reviews. A key benefit of internal control monitoring is to provide assurance regarding effective and efficient operations and compliance with applicable laws and regulations.

Ensure Compliance with External Requirements

Ensure Compliance with External Requirements

Effective oversight of compliance requires the establishment of a review process to ensure compliance with laws, regulations and contractual requirements. This process includes identifying compliance requirements, optimizing and evaluating the response, obtaining assurance that the requirements have been complied with and, finally, integrating IT’s compliance reporting with the rest of the business.

Identification of External Legal, Regulatory and Contractual Compliance Requirements

Identification of External Legal, Regulatory and Contractual Compliance Requirements

Identify, on a continuous basis, local and international laws, regulations, and other external requirements that must be complied with for incorporation into the organization’s IT policies, standards, procedures and methodologies.

There are no PSGs published for this topic; however, the topic is under review for future PSGs

Optimization of Response to External Requirements

Positive Assurance of Compliance

Positive Assurance of Compliance

Obtain and report assurance of compliance and adherence to all internal policies derived from internal directives or external legal, regulatory or contractual requirements, confirming that any corrective actions to address any compliance gaps have been taken by the responsible process owner in a timely manner.

There are no PSGs published for this topic; however, the topic is under review for future PSGs

Provide IT Governance

Establishment of an IT Governance Framework

Establishment of an IT Governance Framework

Define, establish and align the IT governance framework with the overall enterprise governance and control environment. Base the framework on a suitable IT process and control model and provide for unambiguous accountability and practices to avoid a breakdown in internal control and oversight. Confirm that the IT governance framework ensures compliance with laws and regulations and is aligned with, and confirms delivery of, the enterprise’s strategies and objectives. Report IT governance status

and issues.

There are no PSGs published for this topic; however, the topic is under review for future PSGs

Strategic Alignment

Strategic Alignment

Enable board and executive understanding of strategic IT issues, such as the role of IT, technology insights and capabilities. Ensure that there is a shared understanding between the business and IT regarding the potential contribution of IT to the business strategy. Work with the board and the established governance bodies, such as an IT strategy committee, to provide strategic direction to management relative to IT, ensuring that the strategy and objectives are cascaded into business units and IT functions, and that confidence and trust are developed between the business and IT. Enable the alignment of IT to the business in strategy and operations, encouraging co-responsibility between the business and IT for making strategic decisions and obtaining benefits from IT-enabled investments.

There are no PSGs published for this topic; however, the topic is under review for future PSGs

Value Delivery

Value Delivery

Manage IT-enabled investment programs and other IT assets and services to ensure that they deliver the greatest possible value in supporting the enterprise’s strategy and objectives. Ensure that the expected business outcomes of IT-enabled investments and the full scope of effort required to achieve those outcomes are understood; that comprehensive and consistent business cases are created and approved by stakeholders; that assets and investments are managed throughout their economic life cycle; and that there is active management of the realization of benefits, such as contribution to new services, efficiency gains and improved responsiveness to customer demands. Enforce a disciplined approach to portfolio, program and project management, insisting that the business takes ownership of all IT-enabled investments and IT ensures optimization of the costs of delivering IT capabilities and services.

There are no PSGs published for this topic; however, the topic is under review for future PSGs

Resource Management

Resource Management

Oversee the investment, use and allocation of IT resources through regular assessments of IT initiatives and operations to ensure appropriate resourcing and alignment with current and future strategic objectives and business imperatives.

There are no PSGs published for this topic; however, the topic is under review for future PSGs

Risk Management

Risk Management

Work with the board to define the enterprise’s appetite for IT risk, and obtain reasonable assurance that IT risk management practices are appropriate to ensure that the actual IT risk does not exceed the board’s risk appetite. Embed risk management responsibilities into the organization, ensuring that the business and IT regularly assess and report IT-related risks and their impact and that the enterprise’s IT risk position is transparent to all stakeholders.

There are no PSGs published for this topic; however, the topic is under review for future PSGs

Performance Measurement

Performance Measurement

Confirm that agreed-upon IT objectives have been met or exceeded, or that progress toward IT goals meets expectations. Where agreed-upon objectives have been missed or progress is not as expected, review management’s remedial action. Report to the board relevant portfolios, program and IT performance, supported by reports to enable senior management to review the enterprise’s progress toward identified goals.

There are no PSGs published for this topic; however, the topic is under review for future PSGs

Independent Assurance

Independent Assurance

Obtain independent assurance (internal or external) about the conformance of IT with relevant laws and regulations; the organization’s policies, standards and procedures; generally accepted practices; and the effective and efficient performance of IT.

There are no PSGs published for this topic; however, the topic is under review for future PSGs