Asset management guidelines

Slides:



Advertisements
Similar presentations
IT Asset Management Status Update 02/15/ Agenda What is Asset Management and What It Is Not Scope of Asset Management Status of Key Efforts Associated.
Advertisements

Where is IT Asset Management in ITIL? Nicole Conboy, NCA IT Service & Asset Management Consultant.
ITIL: Service Transition
Dr. Julian Lo Consulting Director ITIL v3 Expert
Experience, Technology and Focus in Mid Market CRM Soffront Asset management: An Overview.
A Presentation for the Enterprise Architect © 2008 IBM Corporation IBM Technology Day - SOA SOA Governance Miroslav Petrek IT Software Architect
Security Controls – What Works
A framework for describing IT Project Management Processes and Tool Set Features Enterprise Project Management Framework.
© Copyright Lumension Security Lumension Security PatchLink Enterprise Reporting™ 6.4 Overview and What’s New.
NOT FOR PUBLIC DISTRIBUTION State of Minnesota Technology Summary February 24, 2011.
Security Engineering II. Problem Sources 1.Requirements definitions, omissions, and mistakes 2.System design flaws 3.Hardware implementation flaws, such.
Copyright © 2007 Advantica Inc. (USA Only) and Advantica Ltd. (Outside USA). All rights reserved by the respective owner. Benefits of an Integrated Compliance.
Pertemuan Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
I n t e g r i t y - S e r v i c e - E x c e l l e n c e Business & Enterprise Systems Introduction to Hewlett Packard (HP) Application Lifecycle Management.
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
Measuring the effectiveness of government IT systems Current ANAO initiatives to enhance IT Audit integration and support in delivering Audit outcomes.
High-Level Assessment Month Year
Software Asset Management
Defining Services for Your IT Service Catalog
Click to add text © 2010 IBM Corporation OpenPages Solution Overview Mark Dinning Principal Solutions Consultant.
LEVERAGING THE ENTERPRISE INFORMATION ENVIRONMENT Louise Edmonds Senior Manager Information Management ACT Health.
Realising the Value in Information Technology
Enterprise Architecture
Basel Accord IITRANSITIONSERVICES Business Integration Support FCM Management Limited Paris New York Toronto.
Release & Deployment ITIL Version 3
Computer Associates Solutions Managing eBusiness Catalin Matei, April 12, 2005
Microsoft ® Office Project Portfolio Server 2007.
Getting Smarter with Information An Information Agenda Approach
SEC835 Database and Web application security Information Security Architecture.
The Evergreen, Background, Methodology and IT Service Management Model
Continual Service Improvement Process
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
11 SECURITY TEMPLATES AND PLANNING Chapter 7. Chapter 7: SECURITY TEMPLATES AND PLANNING2 OVERVIEW  Understand the uses of security templates  Explain.
OSF/ISD Project Portfolio Management Framework January 17, 2011.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
University of Nevada, Reno Data-Driven Organization Governance 1 Governing a data-driven organization (4/24/2014)  Define governance within organizations.
Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset.
The Challenge of IT-Business Alignment
Roles and Responsibilities
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Sheridan Technology Asset Management Program (SherTAM)
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
CSI - Introduction General Understanding. What is ITSM and what is its Value? ITSM is a set of specialized organizational capabilities for providing value.
Service Transition & Planning Service Validation & Testing
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
What is a Business Analyst? A Business Analyst is someone who works as a liaison among stakeholders in order to elicit, analyze, communicate and validate.
Planning for security Microsoft View
U.S. Department of Agriculture eGovernment Program eGovernment Working Group Meeting February 11, 2004.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
PRJ566 Project Planning & Management Software Architecture.
Business Analysis. Business Analysis Concepts Enterprise Analysis ► Identify business opportunities ► Understand the business strategy ► Identify Business.
Federal Software Asset Management Initiative Concept of Operations Report to the Executive Steering Committee March 8, 2004 Implementing the President’s.
Fundamentals of Information Systems, Third Edition1 An Overview of Transaction Processing Systems Every organization has transaction processing systems.
Evaluate Phase Pertemuan Matakuliah: A0774/Information Technology Capital Budgeting Tahun: 2009.
State of Georgia Release Management Training
Continual Service Improvement Methods & Techniques.
Enterprise Architectures. Core Concepts Key Learning Points: This chapter will help you to answer the following questions: What are the ADM phase names.
Project Life Presented by Chuck Ray, PMP ITS Project Manager.
Info-Tech Research Group1 Automate the IT Asset Management Solution Automated tools mean you won’t have to manage your Assets off!
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
COBIT. The Control Objectives for Information and related Technology (COBIT) A set of best practices (framework) for information technology (IT) management.
Blazent / ServiceNow Messaging Guide. Transforming data into actionable intelligence Improve business outcomes by contextualizing data to make informed.
Changing IT Managing Networks in a New Reality Alex Bakman Founder and CEO Ecora Software.
ITIL: Service Transition
The Five Secrets of Project Scheduling A PMO Approach
Data Architecture World Class Operations - Impact Workshop.
TechStambha PMP Certification Training
Introduction to the Federal Defense Acquisition Regulation
The Open Group Architecture Framework (TOGAF)
Enterprise Content Management (ECM) Project
Presentation transcript:

Asset management guidelines

IT asset management (ITAM) overview Objective Provide a single, integrated view of agency assets in order to allow agencies to identify the asset location and assess the potential data risk if an asset is reported as compromised or lost. ITAM Defined Information Technology Infrastructure Library (ITIL) describes IT Asset Management (ITAM) as “all of the infrastructure and processes necessary for the effective management, control and protection of the hardware & software IT assets within an organization, throughout all stages of their lifecycle.” Scope Physical: Deals with the physical characteristics of hardware & software in support of planning, deployment, operation, support and service; installation/use data. Physical Inventory management Asset discovery Asset tracking Refresh Financial Procurement Budget Cost control Investment Strategy Contractual Asset compliance RFP preparation Contract maintenance Vendor management SLA management

Software Asset Management Value of ITAM Monitoring and Detection A faster response time for identifying and locating assets with sensitive data that have been compromised Incident Response Compliance Audit License compliance audits by vendors are increasing, making it important to minimize the financial penalties associated with the oversubscription of licenses Audit & Accountability Asset Control Software Asset Management Standardization Standardized methodology for collecting and reporting on software and hardware assets Asset Acquisition Risk Management Limit Risk Identify the number assets that contain sensitive data and validate that the appropriate security controls are in-place Security Posture Cost Savings Reduces duplicate asset purchases by agency departments, and avoids needless overpayment of license fees Security Understand what assets are in use and what rogue devices could potentially introduce security risks to the organization Goal: Deploy an evolving asset inventory that will enable agencies to continually improve their informed decision-making, and risk mitigation capabilities.

Where to Start Planning Data Collection Analysis Key Accomplishment Develop an approach for collecting and maintaining the agency's IT asset inventory and data Planning Data Collection Analysis Identify where IT assets are located Develop a process to collect IT assets Analyze the IT asset inventory Establish an IT asset management team Identify key stakeholders and asset repositories Define the ITAM scope Define asset management standards and data attributes Establish a centralized, single source asset repository for the collection of IT assets Establish access controls for the asset repository Define performance metrics, set targets and monitor progress Develop data collection methodology and process to expand the SCEIS asset inventory Refine the asset management standards to include additional data attributes Normalize data as it is entered into the asset repository Develop an asset management decision framework to assist in making clear investment choices in IT assets Ongoing IT Asset Management Define an IT asset management strategy and refresh period Automate the centralized, single source of truth for IT assets Perform internal compliance and enterprise architecture reviews Monitor hardware asset changes Provide IT asset management training for employees Please note that the following process is a suggested approach to asset management and may differ agency from agency

Phase 1: Define the key components of ITAM Planning Data Collection Analysis Step 1: Resources and scoping Step 2: Standardization Step 3: Metrics Identify roles and responsibilities Define asset categories and attributes Establish asset management metrics Establish project management structure Identify key contacts Conduct scoping meetings with key asset owners Gather an asset inventory list from the department that handles purchasing or deployment of IT assets (i.e. procurement department or help desk) Develop understanding of current IT environment and existing inventory reports Define an authoritative data source for IT assets in a structured and manageable manner Establish an asset repository for physical information for each IT asset Establish standard asset category guidelines (e.g., servers, mobile devices) Conduct workshops to determine the current ITAM situation for each asset category (e.g. software, infrastructure, desktop, telecom, and telephony) Standardize the naming convention for each asset category and asset class. Develop metrics to measure and demonstrate tangible benefits/results Percentage of assets that contain sensitive information Percentage of laptops under 3, 4, 5 years old Percentage of assets with asset owners from x department Percentage of assets discovered not in the State procurement system Percentage of duplicate assets Percentage of unknown assets Key Outputs Key points of contact Meeting schedule Asset management scope Centralized asset repository Standardized asset build guidelines Asset management metrics

Phase 1: Data standardization template Asset Inventory Template Use an MS-Excel template for the manual collection of asset data if no automated capability exists. Create an MS-Excel workbook and define individual worksheets for each asset category (e.g., Network, Desktop, Servers). If necessary, combine multiple data collection spreadsheets into one master spreadsheet that will represent the asset inventory. Category: LAN WAN Desktops Servers Printers Mobile Devices Network Appliances Sensors Wireless Other Class: USB Devices Cell Phones Laptops PDAs Tablets Data Attributes: Manufacturer Model Serial Number Network Name Operating System IP Address Applications HIPAA Data Owner Contact Info Location Asset Tag Checked out Checked in Attribute Value: Yes/ No Step 2: Define classes Step 3: Define Data Attributes Step 4: Define Attribute Value Define all the asset classification-types needed to accurately and comprehensively describe the assets found within the category within the agency’s environment. Step 1: Define Categories Carefully define the data attribute’s value. Use pull-down menus whenever possible to minimize inconstant responses. Select the data attributes required to accurately and uniquely describe the individual asset classification.

Phase 2: Develop a process to collect IT assets Planning Data Collection Analysis Step 4: Data gathering Step 5: Refine and normalize Perform data collection Complete data rationalization to eliminate inconsistencies All processes from asset data collection through final report generation/ distribution should be detailed and repeatable. Limit the initial asset management phase to testing processes (one asset category and asset type): Use asset data that is “well documented "so that the entire data collection, rationalization and reporting process can be verified for accuracy and inconsistencies eliminated Increase the asset data category collection incrementally through each iteration Improve sustainability, availability, and quality of asset information Normalize the collected asset data if multiple asset data sources are used Perform a data quality analysis to verify that: Asset data collected is accurate and complete Reports accurately reflect the asset data counts and metadata Key Outputs Asset collection plan Normalization and data rationalization procedures Quality analysis asset management procedures

Phase 3: Analyze the IT asset inventory data Planning Data Collection Analysis Step 6: Decision framework Ongoing IT Asset Management Integration Sustainment Develop a framework to improve the management of assets Identify opportunities to integrate automated asset inventory solutions Define the data refresh cycle and ongoing asset management activities Track and trend metrics for stakeholder review Where are assets located? How does the asset provide value? How to derive (and demonstrate) maximum value from IT investments? How to manage risks and security across the asset base? What are the total number of laptops in my environment that contain sensitive data and have encryption? Integration an automated IT asset management tool with other IT solutions (e.g., patch management, SIEM, helpdesk) Provide ongoing capabilities to track and maintain an integrated IT asset inventory Define the data refresh cycle: Industry typically refreshes asset data every 3 months Continually refresh the IT asset inventory data by updating the existing asset data and capturing new asset information Key Outputs Asset management decision framework Metric dashboard for the business Automated asset management tool implementation plan Periodic baseline reports

Why do ITAM Initiatives Fail? Lessons learned Why do ITAM Initiatives Fail? Key Learning Points Lack of executive mandate to comply with ITAM processes Attempting to satisfy multiple constituents: fiscal versus operational interests Lack of authority or will to enforce asset management process and policy compliance Poor or nonexistent change management lead to a loss of ITAM database integrity Expecting a tool to solve a process problem Reports and data requirements poorly defined, often without data architect expertise Manual data entry, collection and integration processes are frequently incomplete, inaccurate and poor quality causing additional data reconciliation effort Lack of a mechanism for maintaining manually-entered data (e.g., metadata, warranty, contract) Little or no tracking and reporting of business benefits Lack of defined standards for server builds, configurations, and other infrastructure ITAM must be a solution to a business problem ITAM is more process and organization than technology Implement in a staged approach Metrics are needed to measure and demonstrate benefits/results Tangible results are highly dependent on management of integrated asset, contract, vendor and financial portfolios – data standards are a challenge Change management is critical to maintaining database integrity Automate ITAM data collection, normalization and rationalization processes as much as possible