Business Guide
itil   »  the 25 itil processes

The 25 ITIL Processes

        posted by , December 25, 2011

ITIL 2011 (v3) identifies 5 stages in the lifecycle of an IT service:

i.ITIL Service Strategy
ii. ITIL Service Design
iii. ITIL Service Transition
iv. ITIL Service Operation
v. ITIL Continual Service Improvement

Within each stage are service management processes (a total of 25):

Service Strategy

1. Strategy Management for IT Services
2. Service Portfolio Management
3. Financial Management of IT Services
4. Demand Management
5. Business relationship management

Service Strategy

6. Design coordination
7. Service Catalog
8. Service Level Management
9. Availability Management
10. Capacity Management
11. IT Service Continuity Management (ITSCM)
12. Information Security Management System
13. Supplier Management

Service Transition

14. Transition Planning and Support
15. Change Management
16. Service Asset and Configuration Management
17. Release and Deployment Management
18. Service Validation and Testing
19. Change Evaluation
20. Knowledge Management

Service Operation

21. Event Management
22. Incident Management
23. Request Fulfillment
24. Problem Management
25. Access Management

Other Processes

The following are listed as functions by ITIL (nonetheless, they are commonly referred to as processes):
26. Service desk
27. Application management

3 Shares Google Twitter Facebook

Related Articles

Enterprise Architecture
How to architect an organization.

What is the value of your EA project in 9 words or less?

Want to automate, monitor, measure and continually optimize your business? You might need BPM.

The 90 second version of TOGAF — a popular enterprise architecture framework.

A guide to information security including cheat sheets, best practices and checklists.

Recently on Simplicable

Security Risks

posted by Anna Mar
Security threats and security risk management.

Security Vulnerabilities

posted by John Spacey
Exploitable flaws and weaknesses.

Multifactor Authentication Explained

posted by Anna Mar
How to confirm the identity of users and entities.

Security Principles

posted by Anna Mar
The maxims of security.


about     contact     sitemap     privacy     terms of service     copyright