There is a hazard, however, that implementation of these potentially helpful best practices can be expensive and unfocused if they are treated as merely technical guidance. To be most effectual, best practices should be applied inside the business circumstance, focusing on where their use would provide the most advantage to the organization. Top management, business administration, auditors, conformity officers and it managers should work together to make sure it best practices lead to gainful and well-controlled it delivery (Aligning CobiT® 4.1, ITIL® V3 and ISO/IEC 27002 for Business Benefit, 2008).
References
Aligning CobiT® 4.1, ITIL® V3 and ISO/IEC 27002 for Business Benefit. (2008). Retrieved
from http://www.isaca.org/Knowledge-Center/Research/Documents/Aligning-
COBIT,ITILV3,ISO27002-Bus-Benefit-12Nov08-Research.pdf
ISO/IEC 27002:2005 Information technology -- Security techniques -- Code of practice for information security management. (n.d.). Retrieved from http://www.iso27001security.com/html/27002.html#Introduction
ITIL & Security Management. (2001). Retreived from http://itil-service-management-
shop.com/security.htm
Service Management -- ITIL. (n.d.). Retrieved from http://www.best-management-
practice.com/Knowledge-Centre/Best-Practice-Guidance/ITIL/
Part 2
ITIL - the Information Technology Infrastructure Library - is a set of best practices and guidelines that characterize an incorporated, process-based approach...
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now