Home » ITIL » Key Principles of Service Design

Key Principles of Service Design

The Service Design phase of the ITIL® Service Lifecycle begins with the development of the business requirements and ends with the creation of a service solution that is appropriately designed to meet the stated business requirements.  The total solution is put together as a Service Design Package (SDP) that can be handed over to Service Transition.

Service Design is focused on the following 5 aspects:

  1. The new or changed service
  2. Service Management systems and tools, particularly the Service Portfolio
  3. The technology architectures and various management systems used by the service
  4. The processes, roles and capabilities necessary to support the service
  5. Measurement methods and metrics to gauge the performance of the service

Overall, Service Design should be viewed using a holistic approach. This ensures that all IT processes and activities are consistent, integrated and provide an end-to-end business related functionality and quality.

To achieve a quality service design, there must be an emphasis on the Four P’s of Service Design. These are people, products, processes and partners. The first P of Service Design, people, is concerned with the individuals, their skill sets, and competencies that are involved in the provision of IT services in the business.  The second P of Service Design, products, refers to the technology and management systems that are used in the deployment and support of the IT services.  The third P of Service Design, processes, represents the different processes, roles and actions that are involved in the provision of the IT services.  The final P of Service Design, partners, refers to the vendors, manufacturers and suppliers that are used to assist and support the efficient delivery of IT services.

An appropriately developed Service Design prepares a business to address the needs of all clients with the necessary resources.

To learn more, contact Ashford Global IT today!

Tags: , , ,

About this author:


Frank is a leading trainer in IT Security.

Leave a Reply

Your email address will not be published. Required fields are marked *


This site uses Akismet to reduce spam. Learn how your comment data is processed.