Home » ITIL » Examining Service Operation Processes: Access Management

Examining Service Operation Processes: Access Management

Businessman using smart phoneThe Service Operation phase of the ITIL® Service Lifecycle ensures that customers and users are receiving services at the agreed upon levels.  Service Operation is also responsible for maintaining the applications, technology, and infrastructure that support service delivery.  To help Service Operation achieve its objectives, there are five processes (Incident Management, Problem Management, Event Management, Request Fulfillment and Access Management) and four main functions (the Service Desk, Technical Management, IT Operations Management and Application Management). All of these processes and functions come together to play an extremely pivotal role in Service Operation.

This article will focus on the Access Management process within Service Operation.

The purpose of Access Management is to allow access rights to authorized users so that they may utilize a service or a group of services. This access should be provided in such a manner that unauthorized users are unable to access the services.

Access Management will help an organization manage the confidentiality, availability and integrity of its data and intellectual property. Three key terms in this process are access, identity, and rights. Access is defined as the level and extent of a service a user is permitted to use. Identity is defined as the unique information which helps differentiate one individual from another. Rights can be defined as the entitlements or permissions granted to a user to access company services and data.

Access Management does not define the security standards for any organization. This process simply implements the Security and Availability policies and actions that have already been put in place.

There are six key steps involved in Access Management:

  • Requesting access
  • Verification
  • Providing rights
  • Monitoring identity status
  • Logging and tracking user access
  • Removing and restricting user rights

To learn more about the steps involved in the Access Management process, contact Ashford Global IT today!

Tags: , , , ,

About this author:

Avatar

Mary is a leading trainer in Microsoft® and Business Applications.

Comments are closed.