Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

DS13.1 - Operations Procedures and Instructions

This topic is intended to enable collaboration and sharing of information to facilitate a better understanding and approach to implementing this COBIT control objective based on the risk, value and guidance provided by its corresponding control practices.

COBIT Control Objective DS13.1 - Operations Procedures and Instructions is contained within Process Popup Manage Operations.

Learn more about COBIT and related publications.

Click “Join This Community” to be able to actively participate in discussions and contribute content. You must be an ISACA member to join this topic. Join ISACA now.

 
This Topic Has:
11 Members
0 Online
4526 Visits

 Recent Discussions

Community Leader

Knowledge Center Manager

Knowledge Center Manager

Title: Become a Topic Leader!

Badge: Energizer


Operations Procedures and Instructions

Define, implement and maintain procedures for IT operations, ensuring that the operations staff members are familiar with all operations tasks relevant to them. Operational procedures should cover shift handover (formal handover of activity, status updates, operational problems, escalation procedures and reports on current responsibilities) to support agreed-upon service levels and ensure continuous operations.

View value and Risk Drivers  help

Hide value and Risk Drivers help


Value Drivers

  • Demonstration that IT operations are meeting SLAs
  • Promotion of continuity of operational support by documenting staff experience and retaining it in a knowledge base
  • Structured, standardised and clearly documented IT operations procedures and support staff instructions
  • Reduced time to transfer knowledge between skilled operation support staff and new recruits
  Risk Drivers
  • Errors and rework due to misunderstanding of procedures
  • Inefficiencies due to unclear and/or non-standard procedures
  • Inability to quickly deal with operational problems, new staff and operational changes

View Control Practices  help

Hide Control Practices  help

  1. Develop, implement and maintain standard IT operational procedures covering the definition of roles and responsibilities, including those of external service providers.
  2. Train support personnel in operational procedures and related tasks for which they are responsible.
  3. Define procedures and responsibilities for formal handover of duties (e.g., for shift change, planned or unplanned absence).
  4. Define procedures for exception handling in line with the incident management and change management procedures and to address security aspects.
  5. Ensure that segregation of duties is in line with the associated risk, security and audit requirements.

Discussions: 1 total

Must be a Topic member to contribute
Hie Has anyone formulated Operating procedures for ICT, Please share your views in terms of content to include in the procedure and whether it has to be one procedure or many different separate procedures?
Helly263 | 5/10/2016 3:48:25 AM | COMMENTS(0)

Documents & Publications: 127 total

Must be a Topic member to contribute
View All »
Downloads
Posted by FarmService 1230 days ago
Downloads
Posted by FarmService 2316 days ago
Books
Posted by ISACA 43 days ago
Books
Posted by ISACA 320 days ago

Events & Online Learning: 25 total

16 Mar 2015
ISACA International Event
Orlando, FL, USA
15 Jun 2015
ISACA International Event
Ciudad de México, Mexico
21 Sep 2015
ISACA International Event
Miami, FL, USA
21 Sep 2015
ISACA International Event
06010 Mexico City, Panama
La Conferencia Latinoamericana CACS/ISRM

Journal Articles: 247 total

Volume 4, 2107
by Larry G. Wlosinski, CISA, CRISC, CISM, CAP, CBCP, CCSP, CDP, CIPM, CISSP, ITIL v3, PMP
The root causes of privacy incidents include the outsourcing of data, malicious insiders, system glitches, cyberattacks, and the failure to shred or dispose of privacy data properly.
Volume 3, 2107
by Jayakumar Sundaram, CISA, ISO 27001 LA
The SoA is a continuously updated and controlled document that provides an overview of information security implementation.
Volume 4, 2017
by Mathew Nicho, Ph.D., CEH, CIS, ITIL Foundation, RWSP, SAP, Shafaq Khan, Ph.D., CIS, PMBOK, PMP, SAP, and Ram Mohan, CRISC, CISM, CGEIT, ISO 27001, ITIL Foundation
A key issue often cited by information systems (IS) executives in the last three decades is aligning IT with business, which assists in realizing value from IT investments.
Volume 4, 2017
by Joshua J. Filzen, Ph.D., CPA and Mark G. Simkin, Ph.D.
Attachments are popular in several accounting contexts. Many of the same file types that can be attached to emails can also be attached to the records in databases.
Volume 4, 2017
by Steven De Haes, Ph.D., Anant Joshi, Ph.D., Tim Huygh and Salvi Jansen
IT governance, also referred to as governance of enterprise IT (GEIT) or corporate governance of IT, is a subset of corporate governance that is concerned with enterprise IT assets.
Volume 4, 2017
by Mathew Nicho, Ph.D., CEH, CIS, ITIL Foundation, RWSP, SAP, Shafaq Khan, Ph.D., CIS, PMBOK, PMP, SAP and Ram Mohan, CRISC, CISM, CGEIT, ISO 27001
The Emirates National Oil Company embarked on an initiative to realize value out of IT assets through Information Technology Infrastructure Library (ITIL) process implementation.

Wikis: 2 total

Blog Posts: 133 total

Few days ago the person behind the Hacking Team hack revealed how he did it in pastebin - (the original in Spanish) https://pastebin.com/raw/GPSHF04A I was very keen to understand how good you need to be to hack back one of the most (in)famous hacki...
Posted By : TiagoRosado | 0 comments
9 Aug 2017
How, where, and when can IT innovate even in anapparent non-innovation culture?Innovationcan be a broad concept whose definition for a specific company, department orpractitioner is based very much upon context. Organization mission, culture,size, revenue...
Posted By : Richard521 | 0 comments
Recently while reading through various cyber security threat feeds, I ran across a very interesting article describing ways to protect your identity and personal data.  In the article the author discussed "Understanding your data-protection and privacy ri...
Posted By : James948 | 0 comments
22 Jul 2017
Hasta hace pocos años contar con una aplicación de inteligencia de negocios era caro, complejo y necesitabas el apoyo constante del personal de informática para obtener la información precisa. Hoy ya existen herramientas como Power BI Desktop que permiten...
Posted By : Alejandro906 | 0 comments
La demanda de servicios bancarios a través de Internet, producto del surgimiento de nuevas necesidades en los consumidores atraídos por el auge tecnológico, mantiene a las entidades financieras inmersas en una encrucijada en la cual deben equilibrar el ni...
Posted By : Gerardo Zuñiga | 1 comments
Places where the relevant principles of COBIT map to COSO 2013 principles* are marked as Yes. .ExternalClassAA9D49C4D9F042DC96DF42A7B720A8E8 table {;} .ExternalClassAA9D49C4D9F042DC96DF42A7B720A8E8 .font51287 {color:black;font-size:9.0pt;font-weig...
Posted By : Sugandh | 0 comments