Search results
Results from the WOW.Com Content Network
An Excel-based tool that uses situation descriptions to aid an easy assessment of the maturity of implemented service management processes and general practices. Certification and qualification scheme
ITIL security management describes the structured fitting of security into an organization. ITIL security management is based on the ISO 27001 standard. "ISO/IEC 27001:2005 covers all types of organizations (e.g. commercial enterprises, government agencies, not-for profit organizations). [ 1 ]
The suite of documents associated with a particular version of the CMMI includes a requirements specification called the Appraisal Requirements for CMMI (ARC), [2] which specifies three levels of formality for appraisals: Class A, B, and C. Formal (Class A) SCAMPIs are conducted by SEI-authorized Lead Appraisers who use the SCAMPI A Method Definition Document (MDD) [3] to conduct the appraisals.
An assessment project starts with a clear goal statement to define the scope of the project. The project involves a series of roles who take part in the assessment. The project is organized in 6 phases. It is supported by several tools (templates and spreadsheets) provided in the TIPA Toolbox. [3]
ISO/IEC 15504 is the reference model for the maturity models (consisting of capability levels which in turn consist of the process attributes and further consist of generic practices) against which the assessors can place the evidence that they collect during their assessment, so that the assessors can give an overall determination of the organization's capabilities for delivering products ...
The implementation maturity model (IMM) is an instrument to help an organization in assessing and determining the degree of maturity of its implementation processes. This model consists of two important components, namely the: five maturity levels, adopted from capability maturity model (CMM) of the Software Engineering Institute (SEI).
ITIL (previously and also known as Information Technology Infrastructure Library) is a framework with a set of practices (previously processes) for IT activities such as IT service management (ITSM) and IT asset management (ITAM) that focus on aligning IT services with the needs of the business.
SABSA (Sherwood Applied Business Security Architecture) is a model and methodology for developing a risk-driven enterprise information security architecture and service management, to support critical business processes.