Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

DS13.1 - Operations Procedures and Instructions

This topic is intended to enable collaboration and sharing of information to facilitate a better understanding and approach to implementing this COBIT control objective based on the risk, value and guidance provided by its corresponding control practices.

COBIT Control Objective DS13.1 - Operations Procedures and Instructions is contained within Process Popup Manage Operations.

Learn more about COBIT and related publications.

Click “Join This Community” to be able to actively participate in discussions and contribute content. You must be an ISACA member to join this topic. Join ISACA now.

This Topic Has:
11 Members
0 Online
4645 Visits

 Recent Discussions

Community Leader

Knowledge Center Manager

Knowledge Center Manager

Title: Become a Topic Leader!

Badge: Energizer

Operations Procedures and Instructions

Define, implement and maintain procedures for IT operations, ensuring that the operations staff members are familiar with all operations tasks relevant to them. Operational procedures should cover shift handover (formal handover of activity, status updates, operational problems, escalation procedures and reports on current responsibilities) to support agreed-upon service levels and ensure continuous operations.

View value and Risk Drivers  help

Hide value and Risk Drivers help

Value Drivers

  • Demonstration that IT operations are meeting SLAs
  • Promotion of continuity of operational support by documenting staff experience and retaining it in a knowledge base
  • Structured, standardised and clearly documented IT operations procedures and support staff instructions
  • Reduced time to transfer knowledge between skilled operation support staff and new recruits
  Risk Drivers
  • Errors and rework due to misunderstanding of procedures
  • Inefficiencies due to unclear and/or non-standard procedures
  • Inability to quickly deal with operational problems, new staff and operational changes

View Control Practices  help

Hide Control Practices  help

  1. Develop, implement and maintain standard IT operational procedures covering the definition of roles and responsibilities, including those of external service providers.
  2. Train support personnel in operational procedures and related tasks for which they are responsible.
  3. Define procedures and responsibilities for formal handover of duties (e.g., for shift change, planned or unplanned absence).
  4. Define procedures for exception handling in line with the incident management and change management procedures and to address security aspects.
  5. Ensure that segregation of duties is in line with the associated risk, security and audit requirements.

Discussions: 1 total

Must be a Topic member to contribute
Hie Has anyone formulated Operating procedures for ICT, Please share your views in terms of content to include in the procedure and whether it has to be one procedure or many different separate procedures?
Helly263 | 5/10/2016 3:48:25 AM | COMMENTS(0)

Documents & Publications: 127 total

Must be a Topic member to contribute
View All »
Posted by FarmService 1380 days ago
Posted by FarmService 2465 days ago
Posted by ISACA 20 hours ago
Posted by ISACA 20 hours ago
Posted by ISACA 469 days ago

Events & Online Learning: 17 total

Journal Articles: 266 total

Volume 3, 2107
by Jayakumar Sundaram, CISA, ISO 27001 LA
The SoA is a continuously updated and controlled document that provides an overview of information security implementation.
Volume 1, 2018
by Mike Van Stone, CISA, CISSP, CPA, and Ben Halpert
Ever-changing laws continue to increase the risk and cost of noncompliance when unintentional data losses occur.
Volume 1, 2018
GDPR (Regulation [EU] 2016/679) is a regulation by which the European Parliament, the Council of the European Union and the European Commission intend to strengthen and unify data protection for all individuals within the European Union.
Volume 1, 2018
by Steven J. Ross, CISA, CISSP, MBCP
Managing availability in a multi-modal environment requires a great deal of attention to details, which are being defined by the multi-modal pioneers of our day.
Volume 1, 2018
by Mohammed J. Khan, CISA, CRISC, CIPM
To facilitate and administer the implementation of controls around the subject of big data, one must truly understand the concepts of deidentification, reidentification and anonymization.
Volume 1, 2018
by Adeniyi Akanni, Ph. D., CISA, CRISC, ITIL
This article describes a six-stage cycle of implementing big data in commercial banks, points out the major challenges in implementation and provides a suggested solution.

Wikis: 2 total

Blog Posts: 149 total

Have you experienced ransomware attack so far and, if yes, what did you do to resolve? I set up Twitter poll here: It lasts for seven days. Thank you for taking part in the poll.
Posted By : Dragan Pleskonjic | 0 comments
Globally, many organizations are spending millions of dollars protecting their businesses and its enabling infrastructure, but are they really secure? We shall discuss answer to this question in a little while. We need to understand core basics before we ...
Posted By : SudireddyRamreddy | 2 comments
Buzzword - “Blockchain Technology”Introduction:The Internet has transformed the world. Of the several boons that Internet gave us, two of them deserve to be accentuated, namely “World Wide Web” and “Email”, which today are perhaps the most valued things o...
Posted By : rajeevj12 | 0 comments
Mi primer acercamiento real al Framework (o Marco de Referencia) de ISACA COBIT 5, fue a mediados del año pasado (2016) cuando decidí tomar un curso de examinación para la certificación de COBIT® 5 Foundation (Fundamentos de COBIT 5). La jerga técnica me ...
Posted By : MNUNEZA | 0 comments
There is need to for ISACA through our local; chapter to allow fees to be paid in installments or split invoices given the fact that in our country - one has to find currency first and then deposit into a VISA card account. Thus i can raise my exam and ma...
Posted By : Hamadzashe | 0 comments
Hello fellow members COBIT 5 is an excellent guide to developing ICT Governance Frameworks. Many organisations have well documented Frameworks but find it challenging when it comes to implementation. The objective of this post is to start a debate o...
Posted By : Thansen Singh | 1 comments