ITSM Wiki - Documents of IT Service Management

 Home        Imprint        Business Terms/Data Protection        FAQ        ITSM Wiki Home

Seiten zur Zeit nur in deutscher Sprache verfügbar          Change to english version 

ITSMprocesses.COM - Your portal for ITSM processes and tools Dipl.-Ing. Walter Abel Management Consulting

.... ITSM Wiki .... 

 You are here: Wiki - Documents

 Proceed to:          Content          ► ITIL® 4          Processes          Roles          Documents          Key Performance Indicators


Documents of IT Service Management



The processes of IT Service Management are guided by a controlled information flow. It contains a number of standardized process documents described here. A great amount of these documents pass more than one ITSM discipline, which makes a classification by the disciplines confusing. Hence they are presented here in alphabetical order.


A    B    C    D    E    F    I    K    M    O    P    R    S    T    U    W



- A -


Actual Costs


Actual Costs are period related expenses of the (part of the) organization or a project.



Availability Management Report


The Availability Management Report informs the other ITSM functions about the availability of IT Services and IT Infrastructure.



Availability Plan


The Availability Plan contains information about active and planned activities for adaption of the availability of the IT Services and IT Infrastructure to the requirements of all fields of IT Service Management and the IT Service Consumers under economic aspects.


- B -


Budget Requirement


The Budget Requirement describes the budget period related prognosis of expected costs and revenues of the requiring business unit respective project.



Business Continuity Strategy


The Business Continuity Strategy describes the arrangements for the retention respective fastest possible re-establishment of business critical processes of the company in case of disaster. It is part of the company strategy and provides important input for the IT service continuity strategy.


- C -


Capacity Forecast


The Capacity Forecast contains the anticipated capacity demand per IT Service based on Service Level Agreements and demand trends.



Capacity Management Report


The Capacity Management Report contains all relevant information about usage and performance of the IT Services and IT Infrastructure.



Capacity Plan


The Capacity Plan contains the prognosis of the future Capacity Demand per IT Service and evaluated possible activities to provide these required Capacities.



Change Evaluation Report


The Change Evaluation Report documents the results of the different steps of Change Evaluation:

  • prior to planning

  • prior to realization

  • prior to rollout

  • after rollout.


Change Information


The Change Information contains all information worth knowing about planned and ongoing Changes, especially Planned Service Outages provided for the other ITSM Disciplines and the IT Service Consumers.



Change Management Guideline


The Change Management Guideline (Change Policy) contains the rules for intake, evaluation, prioritization and approval of Changes (Change Release Hierarchy) either by the Change Manager or the Change Advisory Board (CAB), the handling of Emergency Changes by the Emergency Change Advisory Board (EACB) and the validation and documentation of Changes during Post Implementation Reviews (PIR). Additionally the rules for extensive Changes that have to pass the processes of Change Evaluation are documented here.



Change Management Report


The Change Management Report informs all IT Service Management Disciplines about the status of actual and planned changes and the results of the post implementation reviews and the derived improvement and optimization proposals.



Change Model


Change Models define the content and the procedure for Standard Changes. These are pre-approved Changes with low risk.



Change Release Hierarchy


The Change Release Hierarchy defines who is entitled to release (approve) a submitted Change depending on its criticality (risks). The Change Release Hierarchy is part of the Change Management Guideline.



Change Record


The Change Record is based upon the Request for Change and documents the complete life cycle of a Change.



Change Schedule


The Change Schedule (Forward Schedule of Changes) contains the planning of all approved Changes including their accompanying information and dependencies.



Configuration Item


Configuration Items are the operating resources of the IT services in general. They are maintained within the Configuration Management Database (CMDB), which itself is a core component of the Configuration Management System.



Configuration Management Audit Protokoll


The report of the audit of the Configuration Management System (Configuration Management Audit Protocol) informs about the results of the Configuration Management Audits including

  • detected differences between the Configuration Item Records and installed Configuration Items

  • evaluation of the usefulness of the structure of the Configuration Management System

  • actuality and completeness of the Definitive Media Library.


Configuration Management Guideline


The Configuration Management Guideline defines who is entitled to change the structure and the content of the Configuration Management System.



Criticality Status from Business Perspective


The Criticality Status from Business Perspective describes the relevance of proper function of

  • IT services

  • IT infrastructure services

  • IT infrastructure

from the view of importance for the company business. The means for that purpose is the Service Landscape.



Criticality Status from IT Perspective


The Criticality Status from IT Perspective describes the relevance of proper function of

  • IT services

  • IT infrastructure services

  • IT infrastructure

from the view of recognized threats and weaknesses of the IT Infrastructure.



CSI Register


The Continual Service Improvement Register (CSI Register) is the basis for all potentials and initiatives for the improvement of the service quality over the service life cycle. In the cyclic CSI Register all activities to improve the service quality are documented.



Customer Portfolio


The Customer Portfolio contains information about all customers of the IT Service Provider over the customer's lifecycle from the Business Relationship Management's perspective (comparable to CRM).


- D -


Definitive Media Library


The Definitive Media Library is the infrastructure (locations and storage equipment there) where the latest versions of released Software Configuration Items are stored in a protected environment. This also includes software licenses and documentations. Asset and Configuration management is responsible for the Definitive Media Library while the content is maintained by Change and Release Management. It is documented in the Configuration Management System.



Delivery Documents


The Delivery Documents contain product documentations, installation instructions, aso. besides the delivery note as specified within the purchase order.



Demand Prognosis


The Demand Prognosis provides a forecast of the future demand for IT Services based upon the IT Service Strategy, requests from the IT Service Consumers and historic consumption trends.



Design Recommendation for High Availability


The Design Recommendations for High Availability define inputs for procedures and design characteristics for the Service Design required for high availability of the IT Services and IT Infrastructure.



Desired Service Outcome


The Desired Service Outcome desribes the expected results of an IT Services with the words of the customer. Based upon this information detailed documents describing the requirements exactly in technical terms of the Service Provider are created.



Disaster Guideline


The Disaster Guideline contains procedures for the handling of disaster situations:

  • call-up plans

  • emergency procedures

  • preventive procedures

  • aso.


Disaster Practice Report


The Disaster Practice Report documents the planning for, the execution and the results of Disaster Pratices and containes proposals for detected improvement potentials of the Contingency Planning.


- E -




An Emergency is a complex breakdown of IT Systems and / or IT Services, e.g.:

  • complete breakdown of one or more IT Systems

  • blackout of a subsidary caused by damage or ruin of IT Infrastructure

  • disaster situations.


Emergency Procedure


Emergency Procedures define all activities for the fastest possible restore of operation of IT Systems after emergency situations (disasters, complete breakdown of IT Services or locations, aso.). This restore has normally two steps:

  • recovery of a life - sustaining minimal operation

  • recovery of full operation.


Event Correlation


The Event Correlation describes the relations between events and necessary operational interventions respective necessary error messages. The rules for the Event Correlation define the appropriate reaction to an Event.



Event Incident Notice


Message about a recognized malfunction of an IT System or an IT System Component from Event Management.



Event Record


The Event Record describes relevant status changes from the operation of IT Services and IT Infrastructure Components. They may be status changes but also alarm situations.


Event Statistics


The Event Statistics shows patterns and trends of Events and allows an analysis of the efficiency of the Event Recognition.



Event Ticket


Automated notification of the Service Desk System about a recognized malfunction of an IT System or an IT System Component from Event Management.


- F -




The Forecast describes an extrapolation of economic results based upon actual costs and revenues of previous periods within the budgeting period to the end of this budgeting period.


- I -


Improvement Management Report


The Improvement Report provides information about planning and results of Continual Service Improvement for the other IT Service Management functions. It contains planned, actually executed and since the last report finished service- and process improvement activities and their expected respective achieved results. Furthermore proposals for future additional service improvement activities are provided.



Incident Escalation Rules


The Escalation Rules for Incidents define the hierarchy levels for escalation of an Incident and the triggers therefore.



Incident Management Report


The Incident Management Report informs all involved ITSM Disciplines about occured Incidents and their elimination.



Incident Message


Message by an IT Service Consumer or an IT employee about a recognized malfunction of an IT system or an IT system component.



Incident Model


Incident Models describe the predefined activities to handle known and recurring types of Incidents and their effective and efficient elimination.



Incident Record


The Incident Record contains all information about an Incidents over ist lifecycle. Typically it is documented in the Service Desk System.



Individual IT Service


An Individual IT Service requires normally changes of underlying basic IT Services or Infrastructure Services. Thus an important focus on the functional and organizational requirements specification is necessary.



IT Budget


The IT Budget is a rolling business period related financial plan containing a prognosis of expenses and revenues to be expected for the IT Organization. Within the IT Budget funds are allocated to the processes of the IT Service Management respective to the organizational units of the IT Service Provider.



IT Financial Report


The IT Financial Report documents costs, revenues and contribution margins of IT services, the costs of IT System Operation allocated to the IT Services and provides a forecast to the development of the financial performance indicators.



IT Forecast


The IT Forecast provides a projection of the economic results (of individual IT Services or the complete IT Organization) to the end of the budgeting period based upon actual costs and revenues of previous periods.



IT Operations Schedule


The IT Operations Schedule contains the planning of all recurring activities for the maintenance of operation for the IT Systems and a friction free IT Operation:

  • system specific planning of backups

  • reorganisation of IT Systems

  • system maintenance

  • data cleansing

  • data archiving

  • batch jobs

  • aso.


IT Procurement Guideline


The IT Procurement Guideline specifies the terms and conditions for requesting external IT Supplies and IT Services for the Demand Carriers and for providing such Supplies and Services for the suppliers. It contains beside others

  • a register of standard suppliers for IT Supplies and IT Services

  • a catalogue of standard supplies and services with respective procurement terms and conditions.

During a purchasing activity it is supplemented by the common procurement terms of the company.



IT Purchase Requisition


The IT Purchasing Requisition is the defined ready to process order to buy according to the IT Requirements Request with specified scope of supply and specified supplier.



IT Requirements Request


An IT Requirements Request represents an application for procurement of services and/or goods from external suppliers of the IT. The IT Requirements Request describes the contents of the demand and is transformed into a definitive purchasing requisition within the IT Procurement Process.



IT Security Guideline


The IT Security Guideline defines mandatory rules for the utilization of IT Services and IT Systems for maintenance of an appropriate security level and for security controls.



IT Security Strategy


The IT Security Strategy defines the procedures for assuring the security of IT Services and IT Systems regarding the recognized relevant risks and the planned and implemented according Security Controls. The operational procedures and mandatory behaviours thereto are defined in the IT Security Guideline.



IT Service Continuity Report


The IT Service Continuity Report informs about the actual status of Contingency Planning and the actual emergency procedures.



IT Service Continuity Strategy


The IT Service Continuity Strategy defines procedures for desaster scenarios including risk prevention activities and restoring procedures for business critical processes and their systems support. Thus it is a major input for the Business Continuity Strategy of the company.



IT Supplier Strategy


The IT Supplier Strategy describes the rules for the selection of suppliers for IT Supplies and IT Services and the frame conditions for such supplies.


- K -


Known Error


A Known Error is a Problem whose cause is known and documented including a documented workaround (as far as available).


- M -


Major Incident


A Major Incident is an Incident with serious negative impact on the business activities of the company.



Minor Release


A Minor Release is a Release with low risk according to the following criteria:

  • not business critical

  • no data take - over required

  • no involvement of Service Validiation and Test required

  • no acceptance test by the user required.

- O -


Operational Task


Operational Tasks are routine tasks to maintain friction free operation of IT services:

  • backup

  • data cleansing

  • reorganization of IT systems

  • archiving

  • necessary batch processes

  • print services

  • aso.




An offer is an obligatory declaration of preparedness to deliver services or goods in defined amount and design with also defined prices and delivery conditions.



Operational Level Agreement


The Operational Level Agreement provides an internal contract between the IT Service Proivider and another part of the IT Organization regarding the provision of an IT Service Contribution. It defines besides others:

  • a description of the service contribution

  • the service level goals

  • the mutual responsibilities.

- P -


Planned Service Outage


Planned Service Outages due to the implementation of Changes by Service Transition. These Planned Service Outages are normally within the maintenance time frames according to the Service Level Agreements and thus do not reduce the contractual agreed Availability of the respective IT Services.



Problem Management Report


The Problem Management Report informis all involved ITSM Disciplines about open Problems and Problems in process and the related solutions and workarounds.



Problem Record


The Problem Record contains all information of a Problem over ist lifecycle. Typically it is documented in the Service Desk System.



Process Architecture


The Process Architecture documents the process landscape of the IT Service Provider with all interfaces and process performance indicators to ensure friction free collaboration of all processes.



Process Design


The Process Design describes a process in total with

  • responsibility

  • input

  • output

  • process steps (activities)

  • interfaces

  • process metrics.

Process designs follow the requirements of the process architecture and the process management.



Process Evaluation Report


The Process Evaluation Report documents the results of the Process Evaluation Reviews with (as appropriate):

  • process maturity

  • benchmarks

  • weaknesses

  • potentials for optimization.


Process Performance Report


The Process Performance Report documents the values for the performance indicators defined for the process on a periodical basis compared with the defined goals.



Project Order


The Project Order contains the relevant description of the project:

  • project name

  • principal

  • project start and end

  • short description, business demand and goals

  • expected project results

  • project budget

  • project manager

  • project team (resources)

  • assumptions and limitations

  • resource allocation

  • target deadline.

Approval of the Project Order is the start of the project realization.



Purchase Order


The Purchase Order is the binding order to the supplier to deliver the goods and/or services specified in the purchase order under the conditions described there respective in accompanying related documents.


- R -




Notification of defects due to unsufficient or not contract conforming delieveries and services. Possible consequences are rework, claim and cancellation of order.



Recommendations for Demand Control


Trigger for the optimization of service consumation behaviour as input for the Demand Management.



Recommendations for Process Quality Improvement


Trigger for the optimization of the quality of IT processes as input for the process review.



Recommendations for Service Quality Improvement


Trigger for the optimization of the quality of IT services and IT infrastructure services by changes in

  • service level agreements

  • operational level agreements

  • underpinning contracts

as input for the service review.



Recovery Plan


The Recovery Plan describes activities and procedures for the restart of IT Services after emergency situations referring to Emergency Procedures.



Release Guideline


The Release Guideline describes the organizational and technical rules for the transfer of a Release to the production environment regarding the criticality and priority of the Realeases to ensure an optimal approach.



Release Package


The release package contains all configuration items belonging to the respective release. Those configuration items may be

  • hard- and software components

  • IT infrastructure services

  • IT applications

  • aso.


Release Record


The Release Record documents the complete lifecycle of a Transition Project.



Request 3rd Level Support


Notification of a detected malfunction of an IT System respective IT System Component within a externally provided IT Service respective IT Service Contribution to the external supplier.



Request for Change


The Request for Change is a formal request to perform a Change required for all types of Change not defined as release free Standard Change.



Request for User Account


The Request for User Account is an application for installation of an user access within an IT System. This installation requires an authorization by a respective user role and the availability of licenses for the involved IT system as well.



Risk Log


The Risk Log is a rated catalogue of identified risks and accordingly defined activities for minimization and mitigation.



Risk Message


Message about recognized necessary activities from Risk Management.


- S -


Security Alert


A Security Alert serves as initial information about newly recognized or even actually ocurred security threats, providing the possibility to avoid or defend the threat for the receiver.



Security Control Report


The Security Control Report documents the results of performed Security Controls.



Security Management Report


The Security Management Report provides information about security relevant ocurrences and activities and about the security situation of the IT Organization.



Service Acceptance Criteria


The Service Acceptance Criteria describe the criteria against which IT Services and IT Infrastructure Services are checked prior to release to operation according to the underlying Service Arrangements (Service Level Agreement, Operational Level Agreement, Underpinning Contract). Thus the conformity of these Services or Service Contributions with qualitative and functional requirements is assured.



Service Catalogue


The Service Catalogue is the part of the Service Portfolio (see there) visible for the IT Service Consumers. It contains a complete listing of all active IT Services of the IT Service Provider including those released for deployment.



Service Contribution


A Service Contribution is a necessary part of the provision of an IT Service (Business Service), normally IT Basic or Infrastructure Services necessary to fulfill the Service Level Arrangements of the IT Services part of which they are.



Service Design Guideline


The Service Design Guideline contains necessary rules and regulations

  • for consistent implementation of Service Designs

  • for the decision which changes and projects require formal Service Design

  • which roles have to be involved in the phase of Service Design.


Service Design Package


The Service Design Package describes the requirements to the development of IT Services based upon Service Level Requirements. It contains the requirements from the customer's perspective and describes how they will be realized from technical and organizational perspective.



Service Design Planning


The Service Design Planning contains all relevant activities of the service design phase.



Service Documentation


The Service Documentation contains the complete description of the IT Services including all documentation needed for operation, maintenance and further development. This includes besides others:

  • development documentation

  • user documentation

  • functional descriptions

  • maintenance plans

  • maintenance processes.


Service Landscape


The Service Landscape documents the relations between Business Services and IT Services at one hand and the relations between IT Services and IT Infrastructure at the other hand. Thus it assures the logical link from Business Service down to Configuration Items.

Furthermore it is the basis of a holistic Risik Management for the IT Services with the aspects:

  • criticality from business perspective

  • criticality from technology perspective

  • criticality from resource perspective.


Service Level Agreement


The Service Level Agreement defines the mutual contractual requirements regarding the IT Service. This contains besides others:

  • service description

  • entitled Service Consumers

  • service level goals

  • mutual responsibilities.


Service Level Arrangement


Service Level Arrangements cover all service level relevant agreements and contracts:

  • service level agreements

  • operational level agreements

  • underpinning contracts.


Service Level Arrangements Catalogue


The Service Level Agreements Catalogue contains all actual Service Level Contracts including:

  • service level agreements

  • operational level agreements

  • underpinning contracts

referring to the IT Service Consumers.



Service Level Management Guideline


The Service Level Management Guideline contains all rules and templates for the definition and release of agreements for IT Services.



Service Level Report


The Service Level Report informs about the agreed service quality of the Service Providers respective Suppliers comparing the agreed and achieved Service Levels. The report furthermore provides information about the utilization of the IT Services, ongoing activities for Service Improvement and extraordinary ocurrences.



Service Level Requirement


The Service Level Requirement contains all requirements to an IT service from the business perspective of the IT Service Consumer. It defines besides others:

  • service requirements

  • service level goals

  • mutual responsibilities.

During service designs the service level requirement is the basis for the service contract and the service level agreement.



Service Portfolio


The Service Portfolio contains a complete listing of all IT services of the IT Service Provider:

  • actual IT services (contractual requirements defined by service level agreements)

  • new IT services under development

  • disabled IT services.

Visible for the IT Service Consumer is the service catalogue (see there) as subset of the service portfolio.
Not visible for the IT Service Consumer are:

  • IT service contributions defined by operational level agreements

  • IT service contributions defined by underpinning contracts (external supplies defined by supplier contracts).


Service Request


Request from an IT Service Consumer or from an IT employee for:

  • standard change

  • user permissions

  • data recovery

  • information

  • consulting.


Service Review Report


The Service Review Report documents the results of the service evaluation reviews with

  • weaknesses

  • technical and economical optimization potentials.


Service Transition Plan


The Service Transition Plan is the project plan mandatory and released for all ITSM Disciplines involved in Service Transition including results-, milestone-, activity-, resource- and cost planning.



Service Portfolio Review Report


The Service Portfolio Review Report contains all organizational, technical and economic outcomes of the Service Portfolio Review. It is an essential input for the strategic evaluation of the IT Services.



Service Strategy


Systematic, cyclic and operationalized long range planning of the goals of the IT Service Provider and for the IT services.



Standard Change


A Standard Change is a low risk recurring change, which does not need a explicit release by the Change Manager beeing genarally released. Each standard change is described in a change model.



Standard IT Service


A Standard IT Service needs normally no change of the underlying IT Basic Services and Infrastructure Services. Thus the process of requirements specification is concentrating on the definition of service level goals and their control.



Standard Operating Procedures


The Standard Operating Procedures contain the rules for recurring standard activities of the IT Operation and the according targets for these activities and processes.



Standard Service Catalogue


The Standard Service Catalogue beeing a part of the Service Catalogue contains all Services predefined by supplier contracts thus not needing envolvement of Service Level Managements in case of demand.



Supplier Profile


The Supplier Profile describes the requirements to suppliers for a specified demand as basis for the supplier selection for the procurement activity satisfying this demand.



Supplier Service Level Report


The Supplier Service Level Report desribes the achieved performance of suppliers compared to the agreed performance described in supplier contracts or purchase orders. Furthermore the recognized weaknesses and activities to improve performance or even possible contract cancellations form the Supplier Reviews are documented.


- T -


Tactical Charge Rates


Tactical Charge Rates are used for demand control by financial means.



Test Model


Test models define the whole tests (timeframe, content, scope) of a Release Deployment to the production environment.



Transition Management Report


The Transition Management Report contains information about all active and planned Transition Projects (status, milestones, finish).


- U -


Underpinning Contract


An Underpinning Contract is a contract between the IT Serviceprovider and an external service supplier about the provision of service contributions. It defines besides others:

  • description of the service contribution

  • service level goals

  • mutual responsibilities.


User Information


Proactive information of the IT Service Consumers about

  • the status of his incident message

  • his/her service request

  • ocurrences influencing the availability of the consumed IT services

  • other miscellaneous information needs.


User Permission


The User Permission grants a defined scope of access to defined IT services or IT systems.



User Record


The User Record contains the system specific permissions of an user besides the identifying basic data.



User Role


The User Role describes the correlation of business oriented roles of users and the corresponding defined user permissions in IT Systems.


- W -




A Workaround is a bypass solution for an incident or a problem, where no cause eliminating solution is available so far. Goal of the workaround is to reduce or avoid the effects of the incident respective problem until a final solution is available.
Workarounds for incidents without related problem record are documented in their incident record, while workarounds for problems are documented in the known errors database.


How do these documents support the processes of IT Service Management ?


See the information flows of ITSM in our practice proven process templates !


Load immediately implementable processes according to ITIL® and ISO 20000




The ISM Process Library - condensed knowledge of the successful

 Proceed here in case you only need the know how provided by our best in class process templates



Proceed here in case you are prepared to start your own implementation with editable best in class process templates


Don't reinvent the wheel - if you save even a few hours of your ITSM implementation, the purchase has already paid off!


Field Report at no charge: ITSM in Practice



Free access to our ITSM Archive and update to the new release (due to the new ITIL® 4)!


All customers of the complete package of five ITSM Process Collections will get an everlasting access to our ITSM Archive (templates, KPI proposals, checklists) which we are creating during the further development of our ITSM Process Library - thus you receive always the most actual ITSM documents independent of the purchasing date for free!


Furthermore all customers of our complete package of five ITSM Process Collections and the ITSM Process Library with a purchase date of October 15th or later will get a free update to the new version (due to the new ITIL® 4), as soon as available.


Visit our ITSM Archive!


Please keep me informed in case of updates of the ITSM Archive!


Please click the above button in case you want to be informed in case of an update of our ITSM Archive.

ITIL® is registered trademark of AXELOS Limited.

 © 2006 - 2021 Dipl.-Ing. Walter Abel Management Consulting

Last update 2021-09-07