DS09: Configuration Management

Description Controls KGI KPI CSF Maturity Levels

1. Description

Identify and record all IT assets, their physical location, interdependencies and reliability history, and a regular verification programme which confirms their existence.

[To top of Page]

2. Control Objectives



[To top of Page]

3. Key Goal Indicators



[To top of Page]

4. Key Performance Indicators



[To top of Page]

5. Critical Success Factors



6. Service Maturity Variations

0 Non-existentManagement does not have an appreciation of the benefits of having a process in place that is capable of reporting on and managing the IT infrastructure, for either hardware or software configurations.
1 (Initial/Ad Hoc)The need for configuration management is recognised. Basic configuration management tasks, such as maintaining inventories of hardware and software, are performed on an individual basis. No standard practices are applied.
2 (Repeatable but Intuitive)Management is aware of the benefits of controlling the IT configuration but there is implicit reliance on technical personnel knowledge and expertise. Configuration management tools are being employed to a certain degree, but differ among platforms. Moreover, no standard working practices have been defined. Configuration data content is limited and not used by interrelated processes, such as change management and problem management.
3 (Defined Process)The need for accurate and complete configuration information is understood and enforced. The procedures and working practices have been documented, standardised and communicated, but training and application of the standards is up to the individual. In addition, similar configuration management tools are being implemented across platforms. Deviations from procedures are unlikely to be detected and physical verifications are performed inconsistently. Some automation occurs to assist in tracking equipment and software changes. Configuration data is being used by interrelated processes.
4 (Managed and Measurable)The need to manage the configuration is recognised at all levels of the organisation and best practices continue to evolve. Procedures and standards are communicated and incorporated into training and deviations are monitored, tracked and reported. Automated tools are utilised, such as ‘push’ technology, to enforce standards and improve stability. Configuration management systems do cover most of the IT infrastructure and allow for proper release management and distribution control. Exception analysis, as well as physical verifications, are consistently applied and their root causes are investigated.
5 OptimizedAll infrastructure components are managed within the configuration management system, which contains all necessary information about components and their interrelationships. The configuration data is aligned with vendor catalogues. Interrelated processes are fully integrated and use as well as update configuration data. Baseline audit reports provide essential hardware and software data for repair, service, warranty, upgrade and technical assessments of each individual unit. Authorised software installation rules are enforced. Management forecasts repairs and upgrades from analysis reports providing scheduled upgrades and technology refreshment capabilities. Asset tracking and monitoring of individual workstations protects assets and prevents theft, misuse and abuse.

[To top of Page]


Visit my web site