To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management,...

95
To: Reviewers of proposed revision to ISO/IEC 197701:2006 SAM Processes From: ISO/IEC JTC1 SC7 WG21 Software Asset Management Date: 30 November 2010 Re: Call for feedback on draft of revised 197701 Tiered SAM Processes On 30 November 2010, the ISO/IEC JTC1 SC7 Working Group 21 for Software Asset Management (‘WG21’) is announcing the release of a Working Draft of a revision to the existing Software Asset Management standard (ISO/IEC197701:2006) that now allows attainment in four tiers to facilitate adoption of standardized Software Asset Management. The tiers are linked directly to the processes described in the 2006 standard, providing greater accessibility to the standard as well as newly incorporated guidance in the Annexes. This is a major development for Software Asset Management, developed directly in response to a formal ISO/IEC market survey in 2007. The base tier is called Trustworthy Data, which answers market demand for repeatable license compliance processes. It is important for WG21 to ensure that this proposed revision effectively meets market requirements. Special permission has been obtained from ISO for wider distribution of this draft than normally permitted by the standards development process. A copy of the draft is therefore attached strictly for standards development purposes. Major changes in the body are highlighted in yellow; furthermore all of the Annexes are new. We are asking you to review this document and to provide feedback using the web questionnaire at https://www.surveymonkey.com/s/7PX8RX5 . Through 01 March 2011 (end of survey) you may also pass this document on to specific individuals who may be interested, but you may not distribute it via a distribution list. The feedback period ends on 01 March 2011, but we encourage you to complete your review as soon as possible. Reviewers who provide contact details will be offered a summary of the feedback. Results are scheduled to be published in May 2011. If you have any questions, please contact [email protected]. Thank you for your support and help with this important step in SAM standards development. David Bicket Convener ISO/IEC JTC1 SC7 WG21 © ISO/IEC 2010. This PDF document, consisting of this cover letter plus the draft revision to ISO/IEC 197701, may only be made available through 1 March 2011 via website download from WG21 liaison organizations or via direct referral, and is not permitted for distribution by email (or similar) distribution lists. This document may not be modified or added to in any way, e.g. by bundling with other documents. Feedback is only via the web site questionnaire cited above, and aggregators are not accepted. Please report violations to [email protected].

Transcript of To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management,...

Page 1: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

  

To:  Reviewers of proposed revision to ISO/IEC 19770‐1:2006 SAM Processes 

From:    ISO/IEC JTC1 SC7 WG21 Software Asset Management  

Date:     30 November 2010 

Re:    Call for feedback on draft of revised 19770‐1 Tiered SAM Processes 

On 30 November 2010, the ISO/IEC JTC1 SC7 Working Group 21 for Software Asset 

Management (‘WG21’) is announcing the release of a Working Draft of a revision to the existing 

Software Asset Management standard (ISO/IEC19770‐1:2006) that now allows attainment in 

four tiers  to facilitate adoption of standardized Software Asset Management.  The tiers are 

linked directly to the processes described in the 2006 standard, providing greater accessibility to 

the standard as well as newly incorporated guidance in the Annexes.   

This is a major development for Software Asset Management, developed directly in response to 

a formal ISO/IEC market survey in 2007.  The base tier is called Trustworthy Data, which 

answers market demand for repeatable license compliance processes.  It is important for WG21 

to ensure that this proposed revision effectively meets market requirements. 

Special permission has been obtained from ISO for wider distribution of this draft than normally 

permitted by the standards development process.  A copy of the draft is therefore attached 

strictly for standards development purposes. Major changes in the body are highlighted in 

yellow; furthermore all of the Annexes are new. We are asking you to review this document 

and to provide feedback using the web questionnaire at 

https://www.surveymonkey.com/s/7PX8RX5. Through 01 March 2011 (end of survey) you may 

also pass this document on to specific individuals who may be interested, but you may not 

distribute it via a distribution list. 

The feedback period ends on 01 March 2011, but we encourage you to complete your review as 

soon as possible.  Reviewers who provide contact details will be offered a summary of the 

feedback.  Results are scheduled to be published in May 2011.   

If you have any questions, please contact [email protected]

Thank you for your support and help with this important step in SAM standards development. 

David Bicket 

Convener ISO/IEC JTC1 SC7 WG21 

© ISO/IEC 2010.  This PDF document, consisting of this cover letter plus the draft revision to ISO/IEC 

19770‐1, may only be made available through 1 March 2011 via web‐site download from WG21 liaison 

organizations or via direct referral, and is not permitted for distribution by email (or similar) distribution 

lists.  This document may not be modified or added to in any way, e.g. by bundling with other documents.  

Feedback is only via the web site questionnaire cited above, and aggregators are not accepted. Please 

report violations to [email protected]

   

Page 2: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

 Cover Letter – Page 2 ‐ Attachment  

Attachment to Review Document cover letter 

This attachment provides further information about the proposed revision to ISO/IEC 19770‐1:2006 

Software Asset Management Processes, to assist reviewers in understanding the changes and additions 

which have been made, and as notes to help answering the on‐line questionnaire.  (See cover letter for 

the link to the questionnaire.)   

It may be helpful to print this Attachment, or keep it open, so it is available as a quick‐reference for easy 

completion of the on‐line questionnaire. 

If you would prefer to read more about SAM standards before proceeding with your review and 

feedback, there are multiple industry sources which teach about standards.  For further information 

endorsed by WG21 see www.19770.org. 

 

A. Notes for completing Section 6 of Questionnaire: Whether the new draft meets identified 

needs 

Note for question 13: The proposed revision to ISO/IEC 19770‐1 was guided by the results of an ISO/IEC 

market survey conducted in 2007. The main findings which guided the proposed revision were the 

following: 

(1) The existing SAM standard (ISO/IEC 19770‐1:2006) was too big and too demanding for most 

organizations, because it was 'all or nothing'. Something was needed which was more achievable for 

the majority of organizations. 

(2) License compliance was viewed as the top priority objective for SAM by all types of users, by 

geography, industry, and whether internal employees or external consultants. 

(3) People wanted much more guidance about SAM and about implementing SAM 

Note for question 14: The proposed revision to ISO/IEC 19770‐1 achieves the first objective by splitting 

the requirements of ISO/IEC 19770‐1:2006 into four separate tiers which build on one another in a 

sequence which corresponds to pragmatic business priorities and the way organizations typically focus 

on SAM. Each tier is separately certifiable, meaning that it is much easier for the majority of 

organizations to achieve certification against at least one tier.  

Note for question 15: The proposed revision to ISO/IEC 19770‐1 achieves the second objective of 

addressing 'license compliance' as a top priority by making the focus of the first tier those processes 

which are essential for achieving repeatable license compliance. 

 

B. Notes for completing Section 7 of Questionnaire: Feedback about the new guidance 

Section 7 of the questionnaire particularly requests feedback on Annex C (on pages 53‐83 of the Review 

Document). Cross‐references are given in Annex C to three major sources of guidance relevant for SAM 

practitioners. It is not possible to include cross‐references to all possible sources of guidance, and it was 

judged that the ones selected were most appropriate for inclusion. These are: 

Page 3: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

 Cover Letter – Page 3 ‐ Attachment  

(1) Cobit from ISACA/ITGI. This is the main framework used by IT audit and control practitioners 

worldwide. For example, it is often the basis for IT control assessments to meet regulatory 

requirements. ISACA/ITGI is a liaison organization with WG21. 

(2) Best Practice Library from IAITAM. This is a library of best practices for IT Asset Management, 

including Software Asset Management, from IAITAM. It is the most extensive collection of such 

guidance available in the marketplace. IAITAM is a liaison organization with WG21. 

(3) SAM Standard Guidance from the SAM Consortium (SAMCon) in Japan. This is the primary source of 

SAM guidance in Japanese, but is also available in English, and is aligned to ISO/IEC 19770‐1:2006. It 

is the major non‐English source of SAM Guidance. SAMCon is a national organization, so cannot 

have an official liaison with WG21, but its members are largely the same as the Japanese WG21 

mirror working group. 

As further information for you, the reviewer, please note that the following annexes have been added 

to the proposed revision to ISO/IEC 19770‐1 (page numbers are from the Review Document): 

Annex A: Reference chart of outcomes by tier (pages 48‐50), showing how tiers are structured. 

Annex B: Guidance on selected topics (pages 51‐52), This covers a limited number of topics which 

market experience has demonstrated require more explanation than can easily be given in the main 

body of the standard, but which are important clarifications for organizations seeking certification. 

Annex C: Cross reference to industry best practice guidance (pages 53‐83). This is the most 

extensive section of guidance added to the proposed revision. It provides cross‐references from the 

standard to three of the most important industry sources of guidance relevant for SAM. There are 

two detailed questions about Annex C in Section 7 of the questionnaire 

Annex D: Roadmap (pages 84‐86), for future evolution of the standard.  ISO/IEC 19770‐1 is moving 

towards becoming a formal Management System Standard using the harmonized approach which 

all Management System Standards will have to use (including ISO 9001 for Quality Management, 

ISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also 

providing for capability/maturity assessments using the ISO/IEC 33000 approach (formerly ISO/IEC 

15504). 

Annex E: Industry capability/maturity approaches (pages 87‐91). Pending future generations. of 

ISO/IEC 19770‐1 as described in Annex D, this provides an overview of existing market approaches 

to providing capability/maturity assessment for SAM. There are two detailed questions about Annex 

E in the section 7 of the questionnaire. 

 

C. Notes for completing Section 8 of Questionnaire: Cost implications of Annexes C and E 

Annexes C and E in the proposed revision constitute approximately 40% of the current total page count 

of 91 pages. Since the cost of ISO/IEC standards is largely determined by the page count, it will increase 

the cost of the completed standard to have these Annexes. ISO and the individual national bodies can 

have different pricing approaches, so it is not possible to say exactly what impact the additional pages 

will have on pricing. However it is likely in most cases that the cost will be between 20 and 25% higher 

with these Annexes.  

For example, the current version of the standard with 30 pages (ISO/IEC 19770‐1:2006) costs CHF 112 

from the ISO store, and the USD value is approximately the same, say US$ 110. The revised standard 

Page 4: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

 Cover Letter – Page 4 ‐ Attachment  

with Annexes C and E included might be double the existing price, or US$ 220. [No guarantee can be 

made about costs, and these figures are indicative only.] 

 

D. Notes for completing Section 9 of Questionnaire: Opportunity to provide detailed feedback 

Section 9 of the questionnaire provides you with an opportunity to provide detailed feedback into the 

review process for the proposed revision of ISO/IEC 19770‐1. You may enter a maximum of 5 entries 

with a maximum of 30 words in each. Please select only your highest priority issues. 

Please note that providing feedback here is not a part of or substitute for the formal ISO/IEC 

commenting process. Anyone who has the ability to comment through official ISO/IEC member bodies 

(ANSI, BSI, DIN, etc) should do that. WG21 will endeavor to address all feedback submitted here, but 

cannot commit to doing it in the same way as for official ISO/IEC comments. 

Please signify the type of comment as follows: 

(1) Technical high: For major problems. For example, issues about fundamental definitions, process 

objectives or outcomes. 

(2) Technical low: For minor problems.  For example, modifications of outcomes or relocation of 

content. Readability (including localization) problems. These problems are more significant than a 

simple editorial change. 

(3) Editorial: For grammar, missing or duplicated text, missing or incorrect cross‐references, or spelling 

and punctuation. 

The following is an example of how one of these entries could be completed: 

(1)  Section reference:  B.2 Releases 

(2)  Select type of comment: Editorial 

(3)  Enter comment here: Text uses both 'authorised' and 'authorized'. Be consistent. 

 

Page 5: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

© ISO/IEC 2010 – All rights reserved i

FOR USE ONLY FOR ISO/IEC STANDARDS DEVELOPMENT PURPOSES

Date: 2010-11-23

ISO/IEC WD 19770-1

ISO/IEC JTC1 SC7

Secretariat: SCC

Information technology — Software asset management — Part 1: Processes and tiered assessment of conformance

Technologies de l'information — Gestion de biens de logiciel — Partie 1:

This is a working draft of a proposed revision to ISO/IEC 19770-1:2006. All of it is © ISO/IEC even in working draft form. This proposed standard is essentially the same as ISO/IEC 19770-1:2006 Software asset management processes, but with its processes now organized into tiers, each tier constituting successive achievements as defined by this standard. Significant portions of the document are therefore verbatim text from that standard. Some changes and clarifications have also been made on the basis of experience with the initial edition. Most additions and changes from ISO/IEC 19770-1:2006 have been highlighted for ease of review. The Annexes, however, are all new to this proposed revision, and therefore have not been shown with highlighting. This proposed standard contains essentially the same process definitions that were contained in 19770-1:2006, but the definitions are now enhanced to support assessment of conformance. This document includes references to other materials for which copyright and other permissions remain to be formalized.

Page 6: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

© ISO/IEC 2010 – All rights reserved 2

Contents Page

Foreword ..............................................................................................................................................................5

Introduction .........................................................................................................................................................6

1 Scope ......................................................................................................................................................9 1.1 Purpose ...................................................................................................................................................9 1.2 Field of application ................................................................................................................................9 1.3 Limitations ............................................................................................................................................10

2 Conformance ........................................................................................................................................12 2.1 Intended usage .....................................................................................................................................12 2.2 Full conformance .................................................................................................................................12

3 Terms and definitions .........................................................................................................................13

4 SAM processes ....................................................................................................................................15 4.1 General ..................................................................................................................................................15 4.1.1 Definition and relationship to service management ........................................................................15 4.1.2 Overview of SAM processes ...............................................................................................................15 4.1.3 Outcomes, activities and interfaces ..................................................................................................16 4.2 Control environment for SAM .............................................................................................................17 4.2.1 General ..................................................................................................................................................17 4.2.2 Corporate governance process for SAM ...........................................................................................17 4.2.3 Roles and responsibilities for SAM ...................................................................................................18 4.2.4 Policies, processes and procedures for SAM ..................................................................................19 4.2.5 Competence in SAM ............................................................................................................................21 4.3 Planning and implementation processes for SAM ...........................................................................21 4.3.1 General ..................................................................................................................................................21 4.3.2 Planning for SAM .................................................................................................................................22 4.3.3 Implementation of SAM .......................................................................................................................22 4.3.4 Monitoring and review of SAM ...........................................................................................................23 4.3.5 Continual improvement of SAM .........................................................................................................24 4.4 Inventory processes for SAM .............................................................................................................24 4.4.1 General ..................................................................................................................................................24 4.4.2 Software asset identification ..............................................................................................................25 4.4.3 Software asset inventory management .............................................................................................26 4.4.4 Software asset control ........................................................................................................................27 4.5 Verification and compliance processes for SAM .............................................................................28 4.5.1 General ..................................................................................................................................................28 4.5.2 Software asset record verification .....................................................................................................28 4.5.3 Software licensing compliance ..........................................................................................................29 4.5.4 Software asset security compliance ..................................................................................................30 4.5.5 Conformance verification for SAM .....................................................................................................30 4.6 Operations management processes and interfaces for SAM .........................................................31 4.6.1 General ..................................................................................................................................................31 4.6.2 Relationship and contract management for SAM ............................................................................31 4.6.3 Financial management for SAM .........................................................................................................32 4.6.4 Service level management for SAM ...................................................................................................33 4.6.5 Security management for SAM ...........................................................................................................34 4.7 Life cycle process interfaces for SAM ...............................................................................................35 4.7.1 General ..................................................................................................................................................35 4.7.2 Change management process ............................................................................................................35 4.7.3 Acquisition process ............................................................................................................................36

Page 7: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

3 © ISO/IEC 2010 – All rights reserved

4.7.4 Software development process ......................................................................................................... 37 4.7.5 Software release management process ............................................................................................ 37 4.7.6 Software deployment process ........................................................................................................... 38 4.7.7 Incident management process ........................................................................................................... 39 4.7.8 Problem management process .......................................................................................................... 39 4.7.9 Retirement process ............................................................................................................................. 40

5 Tiers ...................................................................................................................................................... 42 5.1 Overview ............................................................................................................................................... 42 5.2 Tier 1 – trustworthy data ..................................................................................................................... 44 5.3 Tier 2 – practical management ........................................................................................................... 45 5.4 Tier 3 – operational integration .......................................................................................................... 46 5.5 Tier 4 – full ISO/IEC SAM conformance ............................................................................................. 47

Annex A (informative) Reference chart of outcomes by tier ...................................................................... 48

Annex B (informative) Guidance on selected topics ................................................................................... 51 B.1 Introduction .......................................................................................................................................... 51 B.2 Releases ............................................................................................................................................... 51 B.3 Document and record management .................................................................................................. 51

Annex C (informative) Cross reference to industry best practice guidance ............................................. 53 C.1 Introduction .......................................................................................................................................... 53 C.2 ITIL, IAITAM, ISACA and SAM Consortium – Sources and References ........................................ 53 C.3 Further information on CobiT Selected Mappings ........................................................................... 54 C.3.1 About mapping Tier 1 trustworthy data to CobiT ............................................................................ 54 C.3.2 About mapping Tier 2 practical management to CobiT ................................................................... 54 C.3.3 About mapping Tier 3 operational integration to CobiT .................................................................. 55 C.3.4 About mapping Tier 4 full ISO/IEC SAM conformance to CobiT .................................................... 55 C.3.5 Other CobiT Processes. ...................................................................................................................... 56 C.4 Cross Reference Table of Outcomes to Industry Guidance ........................................................... 56

Annex D (informative) Roadmap .................................................................................................................... 84 D.1 Introduction .......................................................................................................................................... 84 D.2 Process requirement standards roadmap ........................................................................................ 84 D.2.1 Introduction .......................................................................................................................................... 84 D.2.2 Background .......................................................................................................................................... 84 D.2.3 Generations of process requirements .............................................................................................. 85 D.2.4 Third generation - ISO/IEC 19770-1:20yy (future management system standard) ....................... 85

Annex E (informative) Industry capability/maturity approaches ................................................................ 87 E.1 Introduction .......................................................................................................................................... 87 E.2 Major available capability/maturity models ...................................................................................... 88 E.2.1 Overview ............................................................................................................................................... 88 E.2.2 ISO/IEC 15504/33000 ........................................................................................................................... 88 E.2.3 CobiT™ ................................................................................................................................................. 88 E.2.4 BPPM maturity model ......................................................................................................................... 89 E.2.5 Microsoft SAM Optimization Model ................................................................................................... 89 E.2.6 IAITAM 360 assessment model .......................................................................................................... 90 E.2.7 SAM Consortium (SAMC) maturity model ........................................................................................ 90

Figures

Figure 1 - The four tiers of SAM ........................................................................................................................... 7

Figure 2 - Framework for SAM processes .......................................................................................................... 16

Figure 3 - SAM tier 1 – trustworthy data ............................................................................................................. 44

Figure 4 - SAM tier 2 – practical management ................................................................................................... 45

Page 8: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

© ISO/IEC 2010 – All rights reserved 4

Figure 5 - SAM tier 3 – operational integration .................................................................................................. 46

Figure 6 - SAM tier 4 – full ISO/IEC SAM conformance .................................................................................... 47

Figure 7 - Process standard roadmap ............................................................................................................... 84

Page 9: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

5 © ISO/IEC 2010 – All rights reserved

Foreword

ISO (the International Organization for Standardization) and IEC (the International Electrotechnical Commission) form the specialized system for worldwide standardization. National bodies that are members of ISO or IEC participate in the development of International Standards through technical committees established by the respective organization to deal with particular fields of technical activity. ISO and IEC technical committees collaborate in fields of mutual interest. Other international organizations, governmental and non-governmental, in liaison with ISO and IEC, also take part in the work. In the field of information technology, ISO and IEC have established a joint technical committee, ISO/IEC JTC 1.

International Standards are drafted in accordance with the rules given in the ISO/IEC Directives, Part 2.

The main task of the joint technical committee is to prepare International Standards. Draft International Standards adopted by the joint technical committee are circulated to national bodies for voting. Publication as an International Standard requires approval by at least 75 % of the national bodies casting a vote.

Attention is drawn to the possibility that some of the elements of this document may be the subject of patent rights. ISO and IEC shall not be held responsible for identifying any or all such patent rights.

ISO/IEC 19770-1 was prepared by Joint Technical Committee ISO/IEC JTC 1, Information technology, Subcommittee SC 7, Software and system engineering.

ISO/IEC 19770 consists of the following parts, under the general title Software asset management:

Part 1: Processes and tiered assessment of conformance

Part 2: Software Identification Tag

Part 3: Software Entitlement Tag

Part 5: Introduction and Vocabulary

Page 10: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

© ISO/IEC 2010 – All rights reserved 6

Introduction

This part of ISO/IEC 19770 is for organizations that want to achieve best practice in Software Asset Management (SAM) either in a single exercise or alternatively in tiers which correspond to natural levels of development and management priority. Achievement of these tiers can be independently certified, and recognition given to those organizations through the ability to publicly display that certification.

The term SAM rather than IT Asset Management (ITAM) is used for this part of ISO/IEC 19770 because for nearly all; practical purposes the two terms are synonymous. For example, it is impossible to manage software assets without also managing the hardware on which it runs and this part of ISO/IEC 19770 may be used for both. SAM reflects the organizational location of the responsible ISO/IEC Working Group and reflects market usage.

The overall benefits of SAM should include:

a) Risk management: for example interruption or deterioration of IT/services; legal and regulatory exposure;

b) Cost control: including reduced direct costs of software and related assets and wise support-investment;

c) Competitive advantage: better business decisions and satisfaction from trustworthy data always at-hand.

Typically business requirements may mean the benefits to be targeted will fall within a limited scope, such as for particular software manufacturers or sometimes for a specified group of organizational units. An organization will not normally cover everything possible in-scope and any scope may be defined so long as it is not ambiguous.

This part of ISO/IEC 19770 grew out of ISO/IEC 19770-1:2006 Software asset management processes which was a comprehensive standard designed to align to all of service management as specified in ISO/IEC 20000. However, market feedback was that organizations wanted something which could be accomplished in stages and to a stage most suited to the needs of the organization. This part of ISO/IEC 19770 has been designed to make this possible. The first three tiers consist of selected subsets of the total set of process areas and outcomes, maintaining the same structure and approach as for ISO/IEC 19770-1:2006. Conformance is now possible at any one of these tiers allowing for corresponding free-standing independent certification. Accomplishing the fourth and final tier of this part of ISO/IEC 19770 meets all of the requirements of the standard it replaces, ISO/IEC 19770-1:2006, subject to minimal improvements over the original text.

In principle it would also be possible to use a capability or maturity approach to define a standard which can be accomplished in stages. In practice however, such an approach is significantly more complex if it is to be independently certifiable. This notwithstanding, it is intended to develop such an approach in the future, after a planned revision of ISO/IEC 15504 Process assessment is completed. This will allow for a convergence of approaches based on this part of ISO/IEC 19770 and on other methodologies in the marketplace based on maturity.

The four tiers of SAM as defined in this part of ISO/IEC 19770 are shown in Figure 1. They can be briefly explained as follows:

Page 11: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

7 © ISO/IEC 2010 – All rights reserved

Figure 1 - The four tiers of SAM

An explanation of the tiers is given in section 5. In brief they are described below, with their major associated benefits.

Tier 1: Trustworthy Data. Achieving this means knowing what you have so that you can manage it. Good data is a prerequisite for good SAM. A common management observation which applies here is that “you cannot manage what you do not know”. This tier also provides the basis for license compliance, which is typically a high priority management objective.

Tier 2: Practical Management. Achieving this means improving management controls and driving immediate benefits. In practice, management typically only starts to take ownership of issues related to SAM after the organization has recognized the issues which result from not having trustworthy data. The organization recognizes the extent of the risks it faces as well as the opportunities for improvement and savings. This tier covers the basic management control environment, including policies, roles and responsibilities. It also includes targeting and delivering “quick wins” made obvious by the data of tier 1.

Tier 3: Operational Integration. Achieving this means improving efficiency and effectiveness.

Building on the foundation of the previous two tiers, this tier drives the integration of SAM into operational processes. The result is improved efficiency and effectiveness.

Tier 4: Full ISO/IEC SAM conformance. Achieving this means achieving best-in-class strategic SAM.

This tier addresses the more advanced and demanding aspects of full SAM, including its full integration into strategic planning for the organization.

Page 12: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

© ISO/IEC 2010 – All rights reserved 8

The tiers build on one another. Although each can be certified separately, each relies on the continued performance of the previous tiers. In practical terms, this would typically mean that an organization going through a certification exercise for a higher tier would receive the usual review visit by the certifier for surveillance of any previous tier or tiers, and this same certifier visit would review the higher tier too.

Division into tiers does not, however, imply that processes and detailed deliverables from previous tiers remain fixed. The accomplishment of higher tiers may result in significant changes to underlying processes and to the detailed deliverables of lower tiers, e.g. to facilitate greater efficiency and effectiveness. But the objectives and outcomes for the underlying process areas of lower tiers must continue to be met.

Page 13: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

9 © ISO/IEC 2010 – All rights reserved

Information technology — Software asset management —

Part 1: Tiered adoption of processes

1 Scope

1.1 Purpose

This part of ISO/IEC 19770 establishes a baseline for an integrated set of processes for Software Asset Management (SAM), divided into tiers to allow for implementing them, and achieving recognition, in tiers.

1.2 Field of application

This part of ISO/IEC 19770 applies to SAM processes and can be implemented by organizations to achieve immediate benefits. ISO/IEC 19770-2 provides a specification for SAM data, which requires implementation by software manufacturers (external and internal) and by tool developers for its full benefits to be achieved.

It is intended that this part of ISO/IEC 19770 be an implementation standard for organizations. Future editions may provide a measurement framework that is aligned to the requirements in ISO/IEC15504-2 or ISO/IEC 33003.

This part of ISO/IEC 19770 applies to all organizations of any size or sector. For the purposes of conformance, this part of ISO/IEC 19770 can only be applied to a legal entity, or to parts of a single legal entity. It may also be applied to multiple legal entities (e.g. the parent and subsidiaries of a multinational organization) where there is a legal controlling relationship between them, so that one entity may exercise control over the others with respect to the scope (as defined for purposes of conformance), and the assessor accepts this definition of organizational scope.

NOTE The definition of organizational scope is documented as part of the Corporate governance process for SAM.

This part of ISO/IEC 19770 may be applied to an organization which has outsourced SAM processes, with the responsibility for demonstrating conformance always remaining with the outsourcing organization.

This part of ISO/IEC 19770 can be applied to all software and related assets, regardless of the nature of the software. For example, it can be applied to executable software (such as application programs, operating systems and utility programs) and to non-executable software (such as fonts, graphics, audio and video recordings, templates, dictionaries, documents and data). It can be applied regardless of the technological environment (e.g. it is equally relevant in virtualized and cloud computing environments as for older in-house non-virtualized environments).

NOTE The definition of software asset scope (software types to be included within the scope) is documented as part of the SAM Plan developed in the Planning for SAM process. It may be defined in any way considered appropriate by the organization, such as for all software, for all program software, for all software on specific platforms, or for the software of specified manufacturers, as long as it is unambiguous.

With the exception of the requirements of 4.7.4 Software development process, it is not required for this part of ISO/IEC 19770 to be applied to software development in the sense of the development and maintenance of code. It is intended that it be applied to all software in a live environment and precursor activities, such as configuring software and creating and controlling production builds and releases. The exact dividing line between what is considered pure development, and therefore excluded, and what is related to the live environment, and therefore included, may be defined as part of a formal scope statement.

NOTE Software used to develop other software is considered part of the live environment, i.e. the software used by software developers must itself be controlled.

The following forms of software assets are within the scope of this part of ISO/IEC 19770:

Page 14: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

© ISO/IEC 2010 – All rights reserved 10

a) software use rights, reflected by full ownership (as for in-house developed software) and licenses (as for most externally sourced software, whether commercial or open-source);

b) software for use, which contains the intellectual property value of software (including original software provided by software manufacturers and developers, software builds, and software as installed and otherwise provisioned, consumed or executed); and

c) media holding copies of software for use.

NOTE From a financial accounting point of view, it is primarily category (a) which may be considered an asset, and even then it may have been completely written off. From a financial accounting point of view, category (b) may be viewed as actually creating a liability (rather than an asset) with commercial software if it is not properly licensed. This part of ISO/IEC 19770 considers categories (b) and (c) proper assets to be controlled as well as (a). Licenses may have bookkeeping value, but software in use in particular should have business value and needs to be treated as a business asset.

Related assets within the scope are all other assets with characteristics which are necessary to use or manage software in scope. Any characteristics of these related assets which are not required to use or manage software are outside of the scope. Table 1 provides examples of these.

Table 1 — Application of ISO/IEC 19770-1 to Non-Software Assets

Asset type Applicability Example

Hardware Normative for hardware assets with characteristics required for the use or management of software assets in scope

Inventory of equipment on which software can be stored, executed or otherwise used; number of processors or processing power; whether the hardware qualifies for counting for site licensing purposes

Not applicable for characteristics not required for the use or management of software assets in scope

Cost and depreciation of hardware, preventive maintenance renewal dates

Other assets Normative for other assets with characteristics required for the use or management of software assets in scope

Personnel names for identifying custodianship, personnel counts for licensing done on this basis

Not applicable for characteristics not required for the use or management of software assets in scope

Other personnel information

1.3 Limitations

This part of ISO/IEC 19770 does not detail the SAM processes in terms of methods or procedures required to meet the requirements for outcomes of a process.

This part of ISO/IEC 19770 does not specify the sequence of steps an organization should follow to implement SAM, nor is any sequence implied by the sequence in which processes are described. The only sequencing which is relevant is that which is required by content and context. For example, planning should precede implementation.

This part of ISO/IEC 19770 does not detail documentation in terms of name, format, explicit content and recording media.

Page 15: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

11 © ISO/IEC 2010 – All rights reserved

This part of ISO/IEC 19770 is not intended to be in conflict with any organization's policies, procedures and standards or with any national laws and regulations. Any such conflict should be resolved before using this part of ISO/IEC 19770.

Page 16: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

© ISO/IEC 2010 – All rights reserved 12

2 Conformance

2.1 Intended usage

This part of ISO/IEC 19770 is intended for use as best practice guidance, and also to allow for the possibility of independent certification of achievement of the individual tiers. There is choice, however, in the ways of assessing an organization’s conformance.

This part of ISO/IEC 19770 has been written to allow continuity with ISO/IEC 19770-1:2006, but also to allow assessment in the same way as for Management Systems standards. In particular, this means that the assessor has the newly added option of assessing against the overall objective for each process area, or the previous approach of assessing against all of the detailed outcomes for every process area, as for ISO/IEC 19770-1:2006. One chosen way of assessing must be applied consistently across all processes areas.

2.2 Full conformance

The requirements in this part of ISO/IEC 19770 are contained in the objectives and outcomes listed within Clause 4 of this part of ISO/IEC 19770. Any claim of conformance shall be a claim of full conformance to the provisions of this part of ISO/IEC 19770 as described below, including for any outsourced processes.

Full conformance with any of the tiers of this part of ISO/IEC 19770 is achieved in either of two ways:

By demonstrating that all of the requirements of the respective tier of this part of ISO/IEC 19770 have been satisfied using the outcomes as evidence; or

By demonstrating that all of the objectives of the respective tier of this part of ISO/IEC 19770 have been met.

Furthermore, it must be demonstrated that any underlying tiers are currently certified for full conformance and that they are being monitored for continuing full conformance by a surveillance program accepted by the assessor; or alternatively that any underlying tiers are being certified as part of the current assessment.

If full conformance is achieved by demonstrating that all of the objectives of the respective tier of this part of ISO/IEC 19770 have been met, two further requirements exist:

Where a process area includes outcomes in different tiers, the objective for that process area shall be interpreted correspondingly for assessments of each tier.

The assessor shall, in addition to reviewing evidence demonstrating that all objectives are met, still take into account the specified outcomes for the respective tier. Where there is any failure to meet all specified outcomes, for each such outcome the assessor shall explain in writing their reason(s) for accepting the objectives of a tier are nevertheless still fully satisfied without need for that outcome.

Page 17: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

13 © ISO/IEC 2010 – All rights reserved

3 Terms and definitions

For the purposes of this document, the following terms and definitions apply.

3.1 baseline (see ISO/IEC20000-1) snapshot of the state of a service or individual configuration items (3.2) at a point in time.

3.2 configuration item (see ISO/IEC20000-1) CI component of an infrastructure or an item which is or will be, under control.

NOTE1 For the purpose of this part of ISO/IEC19770-1, under control means under the control of inventory processes. Inventory processes for SAM are the basis not only for SAM, but for all of configuration management.

NOTE2 Configuration items or CIs are commonly defined as part of Service Management practice and may vary widely in complexity, size and type, ranging from an entire system including all hardware, software and documentation, to a single module or a minor hardware component.

3.3 corporate board or equivalent body person or group of people who assumes legal responsibility for conducting or controlling an organization at the highest level

3.4 definitive master version version of the software that is used to install or provision the software and to create distribution copies

NOTE Install can apply to executable or non-executable software, or related assets such as fonts. It can apply to installs on clients/local devices and/or server-side installs, for example as part of a service-type software asset provision.

3.5 distribution copy copy of the software definitive master version, for the purposes of installation onto other hardware, which resides for example on a server, or on physical media such as CDs

3.6 effective full license license rights for software which allow one full use of the software

NOTE1 An effective license consists of one or more underlying licenses (3.15).

EXAMPLE An underlying full license for version 1 of a software product, plus an underlying upgrade license to version 2 of the software product, combine to produce one effective full license for version 2 of the software product. In this example, sometimes the upgrade license rights can come from a support contract or subscription.

NOTE2 Full use of the software is as defined in the terms and conditions of the license(s).

3.7 local SAM owner individual at any level of the organization below that of the SAM owner (3.13) who is identified as being responsible for SAM for a defined part of the organization

3.8 personnel any individual expected to perform duties on behalf of the organization, including officers, employees and contractors

3.9 platform

Page 18: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

© ISO/IEC 2010 – All rights reserved 14

type of computer or hardware device and/or associated operating system, or a virtual environment, on which software can be installed or run

NOTE A platform is distinct from the unique instances of that platform, which are typically referred to as devices or instances.

3.10 procedure specified way to carry out an activity or process

NOTE When a procedure is specified as an outcome, the resulting deliverable will typically specify what must be done, by whom, and in what sequence. This is a more detailed level of specification than for a process (3.11).

3.11 process a set of interrelated activities, which transforms inputs into outputs

NOTE When a process definition is specified as an outcome, the resulting deliverable will typically specify inputs and outputs, and give a general description of expected activities. However, it does not require the same level of detail as for a procedure (3.10).

3.12 release (see ISO/IEC20000-1) collection of new and/or changed configuration items which are tested and introduced into a live environment together. ISO/IEC 20000-1:2005 Information technology -- Service management -- Part 1: Specification. 2.1

NOTE A release must have technical approval for this purpose but may not yet be authorized for deployment. A release may consist of source-code, code for execution or of multiple software assets packaged into an internal production release and tested for a target platform.

3.13 SAM owner (see 19770-5) individual at a senior organization-wide level who is identified as being responsible for SAM

3.14 software asset management (see 19770-5) SAM effective management, control and protection of software assets within an organization, and the effective management, control and protection of information about related assets which are needed in order to manage software assets.

NOTE A corresponding definition from the IT Infrastructure Library is “all of the infrastructure and processes necessary for the effective management, control and protection of the software assets within an organization, throughout all stages of their lifecycle”

3.15 underlying license license for software use as originally purchased or procured, and which can typically be linked directly to purchase records

NOTE An underlying license may have conditions associated with it, requiring it to be used in combination with another license or licenses to create an effective full license (3.6).

Page 19: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

15 © ISO/IEC 2010 – All rights reserved

4 SAM processes

4.1 General

4.1.1 Definition and relationship to service management

Software asset management is the effective management, control and protection of software assets within an organization, and the effective management, control and protection of information about related assets which are needed in order to manage software assets.

SAM processes as defined in this part of ISO/IEC 19770 are closely aligned to and intended to closely support IT service management as defined in ISO/IEC 20000.

4.1.2 Overview of SAM processes

The overall conceptual framework for SAM processes is comprehensive and does not by itself reflect the Tiers as described in the Introduction or in Clause 5 Tiers. Figure 1 below gives the conceptual framework for the SAM processes and is broken down into three main categories:

a) Organizational management processes for SAM;

b) Core SAM processes;

c) Primary process interfaces for SAM.

The processes are described in further detail in 4.2 to 4.7

Page 20: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

© ISO/IEC 2010 – All rights reserved 16

Figure 2 - Framework for SAM processes

4.1.3 Outcomes, activities and interfaces

This part of ISO/IEC 19770 has been written using the process elements of title, objective, and outcomes. This part of ISO/IEC 19770 does not include activities, which are actions which may be used to achieve the outcomes.

The outcomes specified in this part of ISO/IEC 19770 are designed to be readily assessable, but will not necessarily indicate the breadth of activities which may be needed to produce them. For example, the maintenance of inventories in the Software asset inventory management process will logically require data validation activities, although this is not cited as an outcome in this part of ISO/IEC 19770. (Data integrity is assured in this part of ISO/IEC 19770 by the Verification and compliance processes for SAM.)

Some of the most important activities are interface activities with other processes. For example, when a software asset is purchased (or 'acquired') the objective to be met is "The objective of the Acquisition process in respect of software and related assets is to ensure that they are acquired in a controlled manner and recorded." This process, and many others, will require an invoking of the Software asset inventory management process to record the data and validate it for required fields etc. Another example is the creation of baselines, which are created in the Software asset control process. This process is invoked by the Software development process and the Software release management process. It is not the objective of this part of ISO/IEC 19770 to specify this type of detail, but such activities or interfaces are implicitly required in order to achieve the stated objectives.

Page 21: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

17 © ISO/IEC 2010 – All rights reserved

4.2 Control environment for SAM

4.2.1 General

The objective of the Control environment for SAM is to establish and maintain the management system within which the other SAM processes are implemented.

The Control environment for SAM consists of the following:

a) Corporate governance process for SAM;

b) Roles and responsibilities for SAM;

c) Policies, processes and procedures for SAM;

d) Competence in SAM.

4.2.2 Corporate governance process for SAM

4.2.2.1 Objective

The objective of the Corporate governance process for SAM is to ensure that responsibility for management of software assets is recognized at the level of the corporate board or equivalent body, and that appropriate mechanisms are in place to ensure the proper discharge of this responsibility.

NOTE This process could be considered part of overall corporate governance of IT.

Tiers 2 and 4

4.2.2.2 Outcomes

Outcome Tier

1 2 3 4 Implementation of the Corporate governance process for SAM will enable the organization to demonstrate that:

a) There is a clear corporate statement for the purposes of this part of ISO/IEC 19770 about:

1) the legal entity or parts of a legal entity which are included in scope.

NOTE One factor to consider in defining organizational scope may be existing software contracts which are based on specific organizational scopes.

2) the specific single body or individual that has overall corporate management responsibility for that entity or parts of that entity.

NOTE This specific body or individual is referred to subsequently as the 'corporate board or equivalent body'.

b) Responsibility for corporate governance of software and related assets is formally recognized by the corporate board or equivalent body.

c) Corporate governance regulations or guidelines which are relevant to the organization for its use of software and related assets, in all countries where it operates, have been identified and documented, and are reviewed at least annually.

d) An assessment of the risks associated with software and related assets, and management-specified mitigation approaches, is documented, updated at least annually, and approved by the corporate board or equivalent body, covering at least the following:

Page 22: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

© ISO/IEC 2010 – All rights reserved 18

Outcome Tier

1 2 3 4 1) Risk of regulatory non-compliance.

NOTE This could refer for example to privacy protection for personnel software usage monitoring; data protection for SAM records held on individuals; and industry-specific requirements, such as in the pharmaceutical industry.

2) Risk of violation of security requirements.

NOTE The impact of security violations may include for example the interruption of business operations, the misuse of confidential information by competitors, and reputational damage resulting from insufficient protection of customer privacy.

3) Risk of licensing non-compliance.

4) Risk of interruption of operations due to problems with the IT infrastructure which could result from inadequate SAM.

5) Risk of excessive spending on licensing and other IT support costs due to inadequate SAM.

6) Risks associated with decentralized vs. centralized management approaches for software and related assets.

NOTE It may be highly desirable for culture and efficiency reasons to decentralize operational management of SAM. However, such approaches may find it more difficult to achieve cost savings, and may have higher risk exposures, such as to licensing non-compliance, than centralized management approaches. For example, any licensing non-compliance in any decentralized operation still threatens the reputation and creates legal exposure for the entire organization. It is probably prudent, even in a decentralized operational management environment, to retain a degree of centralized management oversight for SAM.

7) Risks associated with different countries of operation taking into account local compliance cultures and enforcement approaches.

e) The management objectives for SAM are approved by the corporate board or equivalent body, and reviewed at least annually.

4.2.3 Roles and responsibilities for SAM

4.2.3.1 Objective

The objective of the Roles and responsibilities for SAM process is to ensure that the roles and responsibilities for software and related assets are clearly defined, maintained and understood by all personnel potentially affected.

NOTE These roles and responsibilities should include in particular any which link into regulatory or corporate governance requirements.

Tier 2

4.2.3.2 Outcomes

Outcome Tier

1 2 3 4

Page 23: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

19 © ISO/IEC 2010 – All rights reserved

Outcome Tier

1 2 3 4 Implementation of the Roles and responsibilities for SAM process will enable the organization to demonstrate that: a) The role of the SAM owner, responsible for corporate governance of software and

related assets for the entire organization, is clearly defined and approved by the corporate board or equivalent body. Responsibilities assigned include the following for the entire organization:

1) Proposing management objectives for SAM.

2) Overseeing the development of the SAM plan.

3) Obtaining resources for implementing the approved SAM plan.

4) Delivering results against the SAM plan.

5) Ensuring that all local SAM owners discharge their responsibilities properly, and that all parts of the organization are covered by the SAM owner or local SAM owners, without conflicting overlap.

b) Local roles and responsibilities for corporate governance of software and related assets are documented and assigned to specified individuals. Responsibilities assigned include the following for the part of the organization for which each individual is responsible:

1) Obtaining resources for implementing the SAM plan.

2) Delivering results against the SAM plan.

3) Adopting and implementing necessary policies, processes and procedures.

4) Maintaining accurate records of software and related assets.

5) Ensuring that management and technical approvals are required for procurement, deployment and control of software assets.

6) Managing contracts, supplier relationships, and internal customer relationships

7) Identifying the need for and implementing improvements.

NOTE1 This part of ISO/IEC 19770 differentiates between the corporate SAM owner and local roles and responsibilities because some organizations with multiple locations make such a distinction in their management roles. Where there is only one location, or the remote locations are small and directly managed by the central location, then these two sets of functions merge.

NOTE2 Responsibilities may be assigned to specific positions, or to classes of positions, so long as the nature of those responsibilities, and accountability for their discharge, is clear. In practice, this means that it is not necessary to assign different responsibilities to different physical persons, especially in smaller organizations where such division of duties is not practical.

c) These responsibilities are communicated to all parts of the organization involved in any way with SAM, in the same way as other organization-wide and local policies are communicated.

4.2.4 Policies, processes and procedures for SAM

4.2.4.1 Objective:

The objective of the Policies, processes and procedures for SAM process is to ensure that an organization maintains clear policies, processes and procedures to ensure effective

Tier 2

Page 24: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

© ISO/IEC 2010 – All rights reserved 20

planning, operation and control of SAM.

4.2.4.2 Outcomes

Outcome Tier

1 2 3 4 Implementation of the Policies, processes and procedures for SAM process will enable the organization to demonstrate that:

a) There is a structured approach to creating, reviewing, approving, issuing, and controlling policies, processes, procedures and related documentation relevant to SAM so that it is always possible to determine the complete set available, which version of each document is currently in effect and which documents apply to different types of software and related assets.

NOTE This would typically be part of an overall approach adopted by an organization for all of its policies, processes and procedures, and not be unique for SAM.

b) Policy, process and procedure documentation required by this part of ISO/IEC 19770 are organized by the process classifications of this part of ISO/IEC 19770 or with a cross-reference to these classifications.

c) Policies are developed, approved and issued covering at a minimum: ●

1) Individual and corporate responsibilities for corporate governance of software and related assets.

2) Any restrictions on personal use of corporate software and related assets.

3) Requirement for compliance with legal and regulatory requirements, including for copyright and data protection.

4) Any procurement requirements (e.g. use of corporate agreements, or buying only from reputable/approved suppliers)

5) Any requirement for approvals for installation or use of software, whether purchased or not.

6) Disciplinary implications of violation of these policies.

NOTE The policies above are cover generic requirements, including for end-users in particular. Policies and procedures relevant for specific process areas are covered in the appropriate process areas.

d) Policies and procedures are communicated to all personnel in a way which (1) reaches all new personnel when they start, and continuing personnel at least annually; (2) requires positive acknowledgement back from personnel when they start and at least annually; and (3) is readily accessible at all times to personnel.

NOTE The documentation can be in any form or medium. The documentation may be issued in consolidated versions with other documents, such as consolidated policy statements covering also personnel confidentiality requirements.

Page 25: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

21 © ISO/IEC 2010 – All rights reserved

4.2.5 Competence in SAM

4.2.5.1 Objective

The objective of the Competence in SAM process is to ensure that appropriate competence and expertise in SAM is available and is being applied.

Tiers 2 and 4

4.2.5.2 Outcomes

Outcome Tier

1 2 3 4 Implementation of the Competence in SAM process will enable the organization to demonstrate that:

a) A review is documented and updated at least annually which covers the availability and uptake of training and certification by personnel with SAM responsibilities for:

1) SAM in general.

2) Licensing for software manufacturers whose software is being used.

NOTE Software covered by this requirement is only that software defined as being in scope

b) A review is undertaken at least annually to determine what constitutes "Proof of License" for the software manufacturer.

c) Personnel with SAM management responsibilities receive training in SAM and in relevant licensing, including both initial training and formal continuing education annually.

NOTE Individual certifications are also recommended, to the extent available.

d) A review is undertaken at least annually to ascertain what, if any, extra guidance is offered by the software manufacturers to enable compliance with their licenses.

4.3 Planning and implementation processes for SAM

4.3.1 General

The objective of Planning and implementation processes for SAM is to ensure the effective and efficient accomplishment of SAM management objectives.

The processes in this area map, in principle, to the 'Plan-Do-Check-Act' processes of ISO/IEC 9001.

Planning and implementation processes for SAM consists of the following:

a) Planning for SAM;

b) Implementation of SAM;

c) Monitoring and review of SAM;

d) Continual improvement of SAM.

Page 26: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

© ISO/IEC 2010 – All rights reserved 22

4.3.2 Planning for SAM

4.3.2.1 Objective

The objective of the Planning for SAM process is to ensure appropriate preparation and planning for the effective and efficient accomplishment of SAM objectives.

Tiers 2 and 4

4.3.2.2 Outcomes

Outcome Tier

1 2 3 4 Implementation of the Planning for SAM process will enable the organization to demonstrate that:

a) Management objectives for SAM are developed and proposed for approval by the corporate board or equivalent body, and updated at least annually.

b) A plan (the 'SAM plan') for implementing and delivering SAM is developed and documented, and updated at least annually, which includes:

1) A clear scope statement ('software asset scope') describing which types of software are included; the coverage of related assets, including any beyond the minimum required by this part of ISO/IEC 19770; and any interfaces with or requirements for other organizations or systems.

2) A clear specification of which policies, processes and procedures are required for assets in scope.

3) A clear explanation of the approach to managing, auditing and improving SAM including automation as appropriate to support the processes.

4) An explanation of the approach to be used to identifying, assessing and managing issues and risks related to the achievement of the defined management objectives.

5) Schedules and responsibilities for periodic activities, including preparation of management reports and performance of verification and compliance activities.

6) Identification of the resources including budget needed to implement the SAM plan.

7) Performance measures for tracking accomplishment against the SAM plan, including target measures for accuracy of the asset management records.

NOTE An appropriate level of automation should be implemented to ensure that processes do not become inefficient or error prone, or may not be followed at all.

c) The plan is approved by the corporate board or equivalent body. ●

4.3.3 Implementation of SAM

4.3.3.1 Objective

The objective of the Implementation of SAM process is to accomplish overall SAM objectives and the SAM plan.

Tier 4

Page 27: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

23 © ISO/IEC 2010 – All rights reserved

4.3.3.2 Outcomes

Outcome Tier

1 2 3 4 Implementation of the Implementation of SAM process will enable the organization to demonstrate that:

a) Mechanisms are in place to collect information, including from local SAM owners, about changes, issues and risks that affect the SAM plan throughout the year.

b) Regular status reports (at least quarterly) are prepared by the SAM owner detailing the overall progress against the SAM plan for reporting to the corporate board or equivalent body.

c) Follow-up on any variances identified takes place promptly and is documented. ●

4.3.4 Monitoring and review of SAM

4.3.4.1 Objective

The objective of the Monitoring and review of SAM process is to ensure that the management objectives for SAM are being achieved.

Tiers 2 and 4

4.3.4.2 Outcomes

Outcome Tier

1 2 3 4 Implementation of the Monitoring and review of SAM process will enable the organization to demonstrate that:

a) A formal review is conducted at least annually: ●

1) to assess whether management objectives for SAM and the SAM plan are being achieved

2) to summarize performance against all performance measures specified in the SAM plan and in service level agreements related to SAM

NOTE Service Level Agreements covering requirements for SAM could cover more than just SAM.

3) to provide a summary of the findings of the Conformance verification for SAM process

4) to conclude on the basis of the above whether:

i) the policies approved by management which are relevant for SAM have been effectively disseminated throughout the organizational scope defined for the purposes of this part of ISO/IEC 19770

ii) the processes and procedures which are relevant for SAM, as approved by management, have been effectively implemented throughout the organizational scope defined for the purposes of this part of ISO/IEC 19770

5) to summarize any exceptions identified and actions which may need to be taken as a result of the above

6) to identify opportunities for improvement in the provision of services for software and related assets

7) to consider whether there is a need for a review of policies, processes and procedures as to their continued appropriateness, completeness and correctness.

Page 28: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

© ISO/IEC 2010 – All rights reserved 24

Outcome Tier

1 2 3 4 b) The SAM owner formally approves the report, documents decisions and actions that

are to be taken as a result, and copies it to the corporate board or equivalent body. ●

c) There is a periodic review (at least annually) of whether software and related assets are deployed in the most cost-effective manner possible; and recommendations are made for possible improvement.

NOTE1 This process may be referred to as license optimization. It is to ensure that licensing is maximally cost effective. A value baseline of assets may be used as a base record from which to optimize.

NOTE2 The main coverage for this outcome is in tier 4. There is limited coverage in tier 2 to identify immediate opportunities for improvement.

● ●

4.3.5 Continual improvement of SAM

4.3.5.1 Objective

The objective of the Continual improvement of SAM process is to ensure that opportunities for improvement are identified and acted upon where considered justified, both in the use of software and related assets and in the SAM processes themselves.

Tier 4

4.3.5.2 Outcomes

Outcome Tier

1 2 3 4 Implementation of the Continual improvement of SAM process will enable the organization to demonstrate that:

a) A mechanism is in place to collect and record suggested improvements in SAM arising from all sources throughout the year.

b) Suggestions for improvement are periodically assessed, prioritized and approved for incorporation in SAM implementation and improvement plans.

4.4 Inventory processes for SAM

4.4.1 General

The objective of Inventory processes for SAM is to create and maintain all stores and records for software and related assets, and to provide the data management functionality which ensures the integrity of control of software and related assets in the other SAM processes.

Inventory processes for SAM are the basis not only for SAM, but for all of configuration management. Configuration management goes beyond the scope of SAM insofar as it covers all IT assets (not only software and related assets), may cover non-IT assets, and the relationships between all of these assets. In the context of a programme encompassing all of IT service management, Inventory processes for SAM would be considered part of configuration management.

The Inventory processes for SAM consist of the following:

a) Software asset identification;

Page 29: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

25 © ISO/IEC 2010 – All rights reserved

b) Software asset inventory management;

c) Software asset control

4.4.2 Software asset identification

4.4.2.1 Objective

The objective of the Software asset identification process is to ensure that the necessary classes of assets are selected and grouped; and defined by appropriate characteristics that enable effective and efficient control of software and related assets.

Tiers 1 and 4

4.4.2.2 Outcomes

Outcome Tier

1 2 3 4 Implementation of the Software asset identification process will enable the organization to demonstrate that:

a) Types of assets to be controlled and the information associated with them are formally defined, taking into account the following:

1) Items to be managed are chosen using established selection criteria, grouped, classified and identified to ensure that they are manageable and traceable throughout their lifecycle.

NOTE Business and safety critical assets and high risk assets need to be prioritized and may be controlled at a more detailed level.

2) Items to be managed include:

i) All devices or platform instances on which software can be installed or run

ii) Software definitive master versions and distribution copies

iii) Software builds and releases (originals and distribution copies)

iv) All installed software

v) Software versions

vi) Methodology by which software within scope is identified

vii) Patches and updates

viii) Licences including underlying licenses and effective full licenses

ix) Proof of license documentation

x) Contracts (including terms and conditions) relating to software assets, including both hard-copy and electronic

xi) Both physical and electronic stores of the above, as relevant

xii) Licensing models

3) Software should be manageable both by files and by packages corresponding to specific products released by software manufacturers or developers.

4) Basic information required for all assets is

i) Unique identifier

ii) Name/description

Page 30: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

© ISO/IEC 2010 – All rights reserved 26

Outcome Tier

1 2 3 4 iii) Location

iv) Custodianship (or owner)

v) Status (e.g. test/production status; development or build status)

vi) Type (e.g. software, hardware, facility)

vii) Version (where applicable)

NOTE Data validation requirements may also be defined as part of this process.

b) A register of stores and inventories exists, clarifying which stores and types of information are held, with duplication allowed only if duplicate information can be traced back to the definitive source record.

NOTE: Typically this register will include the following types of information about each store or inventory: 1) the defined type of SAM asset: 2) the name of the person who is in charge of managing this information; and 3) the location where this store or inventory can be consulted.

4.4.3 Software asset inventory management

4.4.3.1 Objective

The objective of the Software asset inventory management process is to ensure that physical instances of software assets are properly stored; and that required data about characteristics for all assets and configuration items is accurately recorded throughout the life cycle. It also provides information on software assets and related assets to support the effectiveness and efficiency of other business processes.

Tiers 1 and 4

4.4.3.2 Outcomes

Outcome Tier

1 2 3 4 Implementation of the Software asset inventory management process will enable the organization to demonstrate that:

a) Policies and procedures are developed, approved and issued which include the management and maintenance of inventories and physical/electronic stores including access controls which:

1) protect them from unauthorized access, change or corruption.

2) provide a means for disaster recovery.

b) Inventories exist of: ●

1) all devices or platform instances on which software assets can be installed or run.

2) all authorized installed software showing (a) packages and versions which can be individually licensed or authorized for deployment; and (b) update/patch status of software; all by platform on which installed.

NOTE: The inventory of software authorized for installation (or use) is an important reference which unambiguously determines what software is authorized to be installed and to determine whether any given instance of a platform/device may have software used or installed on it. The authorization may be at any level, e.g. at the level of the device, class of

Page 31: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

27 © ISO/IEC 2010 – All rights reserved

Outcome Tier

1 2 3 4 user, or organization-wide.

3) underlying licenses and effective full licenses held.

NOTE There is no requirement for separate inventories of underlying and effective full licenses, but there is a requirement to be able to differentiate between the two.

c) Inventories and corresponding physical/electronic stores exist of:

1) software (definitive master versions and distribution copies) ●

2) software builds and releases (originals and distribution copies) ●

3) contracts relating to software assets, both hard-copy and electronic ●

4) proof of license documentation. ●

d) Inventories or other clearly defined analysis or metric mechanisms exist to determine any licensing usage based on criteria other than software installations.

NOTE These requirements will depend on the licensing models of software being used. For example, they might include metrics such as personnel counts for specified parts of the organization; counts of PCs meeting specified criteria; numbers of users or terminals accessing server resources; numbers of processors; and power of processors.

e) Arrangements are made to ensure the continued availability of the inventory sources and stores listed above.

f) Each inventory report produced has a clear description including its identity, purpose, and details of the data source.

4.4.4 Software asset control

4.4.4.1 Objective

The objective of the Software asset control process is to provide the control mechanism over software assets and changes to software and related assets while maintaining a record of changes to status and approvals.

Tier 4

4.4.4.2 Outcomes

Outcome Tier

1 2 3 4 Implementation of the Software asset control process will enable the organization to demonstrate that:

a) An audit trail is maintained of changes made to software and related assets including changes in the status, location, custodianship and version

b) Policies and procedures are developed, approved and issued for the development, maintenance and management of software versions, images/builds and releases.

c) Policies and procedures are developed, approved and issued which require that a baseline of the appropriate assets is taken before a release of software to the live environment in a manner that can be used for subsequent checking against actual deployment.

Page 32: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

© ISO/IEC 2010 – All rights reserved 28

4.5 Verification and compliance processes for SAM

4.5.1 General

The objective of Verification and compliance processes for SAM is to detect and manage all exceptions to SAM policies, processes, and procedures; including licence use rights.

Verification and compliance processes for SAM are important functions performed by the organization itself. They do not refer to audits conducted by software manufacturers or industry associations, although there are similarities. They need to be performed on a regular basis for the proper functioning of the entire SAM process, and for any IT service management processes that rely on them.

The Verification and compliance processes for SAM consist of the following:

a) Software asset record verification;

b) Software licensing compliance;

c) Software asset security compliance;

d) Conformance verification for SAM.

4.5.2 Software asset record verification

4.5.2.1 Objective

The objective of the Software asset record verification process is to ensure that records reflect accurately and completely what they are supposed to record, and conversely that what they record has not changed without approval.

Tiers 1, 2 and 4

4.5.2.2 Outcomes

Outcome Tier

1 2 3 4 Implementation of the Software asset record verification process will enable the organization to demonstrate that:

a) Procedures are developed, approved and issued for the Software asset record verification process to include:

1) Whenever scope is defined or changed, there is a validation of that scope by reviewing contract and purchase history in order to ensure the organizational and software scopes are aligned with business requirements.

NOTE For example, such a review is required when another software manufacturer is included in scope, or when there is a merger or demerger of the organization using the standard, or a change of ownership of software among software manufacturers.

Page 33: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

29 © ISO/IEC 2010 – All rights reserved

Outcome Tier

1 2 3 4 2) At least quarterly there is reconciliation between what is installed on each device

or platform instance and what was authorized for installation, including reporting on exceptions identified in what is currently installed, and in what has changed since the previous reconciliation.

NOTE Some changes may be explained by updates in the methodology by which software is identified (e.g. updated signature files, so that a product previously reported as a single application is now properly identified as part of a suite.)

3) The hardware inventory including locations is verified at least 6-monthly, including reporting on exceptions identified. ●

4) The inventory of software programs (definitive master versions and distribution copies) is verified at least 6-monthly, including reporting on exceptions identified.

5) The inventory of software builds (originals and distribution copies) is verified at least 6-monthly, including reporting on exceptions identified.

6) The physical store of proof of license documentation is verified (including for authenticity) at least annually, including reporting on exceptions identified.

7) The bases for and calculations of effective licenses from underlying licenses are reviewed at least annually, to ensure that necessary underlying licenses exist and that quantities are not being double-counted.

8) The physical store of contractual documentation related to software assets is verified for completeness at least annually, including reporting on exceptions identified.

9) The contracts inventory is verified at least annually, including reporting on exceptions identified. ●

10) There is a periodic review of historical invoices for the purpose of identifying incorrect billing and overcharging.

NOTE This may be considered part of conformance verification but is more extensive and more formal than what is required for conformance verification.

NOTE Overcharging does not imply a right to a refund.

11) Follow-up corrective actions on any discrepancies or issues identified above take place and are documented. ● ● ●

4.5.3 Software licensing compliance

4.5.3.1 Objective

The objective of the Software licensing compliance process is to ensure that all intellectual property used by the organization but owned by others, pertaining to software and related assets, is properly licensed and used in accordance with its terms and conditions.

Tier 1

4.5.3.2 Outcomes

Outcome Tier

1 2 3 4 Implementation of the Software licensing compliance process will enable the organization to demonstrate that:

a) Procedures are developed, approved and issued for the Software licensing compliance process to include the following: ●

Page 34: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

© ISO/IEC 2010 – All rights reserved 30

Outcome Tier

1 2 3 4 1) Reconciliation is conducted at least quarterly between effective licences owned and

licences required for software used, taking into account the way licensing requirements are determined as per license terms and conditions.

NOTE1 This includes in particular license requirements determined on bases other than installed copies, such as server access rights.

NOTE2 The quarterly cycle of reconciliation is primarily a process of analysis and calculation, using measurement of licenses required and quantities from inventories and documented actual installs to calculate where more or less licenses are required. It is expected that terms and conditions are reviewed at least annually, with further checks within three months where new measures or license models are found to apply, where scope has changed, or where a manufacturer announces specific changes to licence terms.

2) Discrepancies identified in this reconciliation are promptly recorded, analysed and the root cause is determined.

3) Follow up actions are prioritised and executed.

4.5.4 Software asset security compliance

4.5.4.1 Objective

The objective of the Software asset security compliance process is to ensure that security requirements related to the use of software and related assets are complied with.

Tier 4

4.5.4.2 Outcomes

Outcome Tier

1 2 3 4 Implementation of the Software asset security compliance process will enable the organization to demonstrate that:

a) Actual practice is reviewed at least annually to detect security policy exceptions.

NOTE This should include access controls on software definitive master versions and distribution copies of software; and installation/usage rights specified by user or user group.

b) Follow-up on any discrepancies identified in this review takes place and is documented.

4.5.5 Conformance verification for SAM

4.5.5.1 Objective

The objective of the Conformance verification for SAM process is to ensure that there is continuing compliance with the requirements of this part of ISO/IEC 19770 including compliance with required policies and procedures.

NOTE This is one of the most important process areas specified in this part of ISO/IEC 19770, as it provides assurance that the other processes are functioning as expected. It is effectively self-verification, with a requirement to retain evidence of the checks performed.

In all tiers for the requirements of that tier.

Page 35: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

31 © ISO/IEC 2010 – All rights reserved

4.5.5.2 Outcomes

Outcome Tier

1 2 3 4 Implementation of the Conformance verification for SAM process will enable the organization to demonstrate that:

a) Policies and procedures are developed, approved and issued for verifying compliance with the relevant tier(s) of this part of ISO/IEC 19770, which ensure verification at least on a sample basis annually against all of the requirements specified in the relevant tier(s) of this part of ISO/IEC 19770. This shall include verification that procedures implemented by the organization for other SAM processes are meeting all requirements specified in this part of ISO/IEC 19770 for those procedures.

● ● ● ●

b) Documentary evidence exists that demonstrates (a) that the verification procedures above are being performed, and (b) that corrective follow-up action is taken until successful completion on the causes of all identified exceptions.

● ● ● ●

4.6 Operations management processes and interfaces for SAM

4.6.1 General

The objective of the Operations management processes and interfaces for SAM is to execute operational management functions which are essential to achieving overall SAM objectives and benefits.

The Operations management processes and interfaces for SAM consist of the following:

a) Relationship and contract management for SAM;

b) Financial management for SAM;

c) Service level management for SAM;

d) Security management for SAM.

4.6.2 Relationship and contract management for SAM

4.6.2.1 Objective

The objective of the Relationship and contract management for SAM process is to manage relationships with other organizations, both external and internal, to ensure the provision of seamless, quality SAM services, and to manage all contracts for software and related assets and services.

NOTE Relationship and contract management for SAM will typically operate closely together with Service level management for SAM since service levels will typically be defined to help manage such relationships

Tiers 2, 3 and 4

4.6.2.2 Outcomes

Outcome Tier

1 2 3 4

Page 36: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

© ISO/IEC 2010 – All rights reserved 32

Outcome Tier

1 2 3 4 Implementation of the Relationship and contract management for SAM process will enable the organization to demonstrate that:

a) Policies and procedures are developed, approved and issued for managing relationships with suppliers providing software and related assets and services, to include:

1) Definitions of responsibilities for supplier management with individuals assigned to have clear overall responsibility for managing each supplier.

2) Developing invitations to tender for the supply of software or related services; to ensure that the process includes consideration of requirements for SAM, including service level management, security controls, release and change management.

3) Formal documented reviews at least 6-monthly of supplier performance, achievements and issues, with documented conclusions and decisions about any actions to be taken.

b) Policies and procedures are developed, approved and issued for managing customer-side relationships, to include:

1) Definitions of responsibilities for managing customer-side business relationships with respect to software and related assets and services.

2) A formal review at least annually of current and future software requirements of customers and the business as a whole.

3) Formal documented reviews at least annually of service provider performance, customer satisfaction, achievements and issues, with documented conclusions and decisions about any actions to be taken.

c) Policies and procedures are developed, approved and issued for managing contracts, to include:

1) Ensuring that contractual details are recorded in an on-going contract management system as contracts are signed.

NOTE The contract management system can be an in-house developed manual or electronic system that permits management and control of contracts.

2) Holding copies of all signed contractual documentation securely with copies kept in a document management system.

NOTE Optionally this may include the terms and conditions accepted electronically when third-party software is installed.

3) Documented reviews at least 6-monthly and also prior to contract expiry, of all contracts for software and related assets and services, with documented conclusions and decisions about any actions to be taken.

NOTE The main coverage for this outcome is in tier 3. There is limited coverage in tier 2 to identify immediate opportunities for improvement, including in particular for maintenance on software not being used, and opportunities for improved purchasing arrangements.

● ●

4.6.3 Financial management for SAM

4.6.3.1 Objective

The objective of the Financial management for SAM process is budgeting and accounting for software and related assets; and ensuring that relevant financial information is readily

Tiers 2 and 3

Page 37: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

33 © ISO/IEC 2010 – All rights reserved

available for financial reporting, tax planning, and calculations such as total cost of ownership and return on investment.

NOTE Financial management for SAM does not cover charging. In practice, many organizations will be involved in charging for software and related assets and related services. However, since charging is an optional activity, it is not covered by this part of ISO/IEC 19770. It is recommended that where charging is in use, the mechanism for doing so is fully defined and understood by all parties.

4.6.3.2 Outcomes

Outcome Tier

1 2 3 4 Implementation of the Financial management for SAM process will enable the organization to demonstrate that:

a) Definitions of financial information relevant to the management of software and related assets are agreed with relevant parties and documented by asset type.

NOTE1 Financial classification of costs associated with software and related assets is an important part of Financial Management for SAM. The asset types used in financial management should be aligned with or mapped to the asset types in SAM if there are differences.

NOTE2 Data requirements for asset types are formally defined in tier 4. These will be evolved throughout tiers1-3. (See 4.4.2 Software asset identification ).

b) Formal budgets are developed for the acquisition of software assets (externally or internally) and the related support and infrastructure costs.

c) Actual expenditure on software assets and the related support and infrastructure costs is accounted for against budget.

d) Clearly documented financial information is readily available about software asset values (including historical cost and depreciated cost).

e) There are formal documented reviews at least quarterly of actual expenditure against budget, with documented conclusions and decisions about any actions to be taken.

f) License optimization is performed, consisting of cost-benefit analysis of drivers of licensing costs, and resulting in recommendations for improvement.

NOTE1 For example, a low-value business application such as a staff directory utility which consumes high-cost licenses for every user might be replaceable by an alternative less expensive approach to achieving the same business objective.

NOTE2 The main coverage for this outcome is in tier 3. There is limited coverage in tier 2 to identify immediate opportunities for improvement.

● ●

4.6.4 Service level management for SAM

4.6.4.1 Objective

The objective of the Service level management for SAM process is to define, record and manage levels of service related to SAM.

Tier 3

4.6.4.2 Outcomes

Outcome Tier

1 2 3 4

Page 38: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

© ISO/IEC 2010 – All rights reserved 34

Outcome Tier

1 2 3 4 Implementation of the Service level management for SAM process will enable the organization to demonstrate that:

a) Service level agreements and supporting agreements are developed and approved for services that are performed within the scope of SAM; to include that:

1) Services relating to software acquisition, installation, moves, and changes of software assets and related assets are defined and agreed with relevant parties together with the corresponding service level targets and workload characteristics.

2) The customer and user obligations and responsibilities in relation to SAM are defined or referenced from the service level agreement.

NOTE Service Level Agreements covering requirements for SAM could cover more than just SAM.

b) Actual workloads and service levels against targets for SAM are reported regularly (at least quarterly), and the reasons for non-conformance are documented.

c) Regular reviews (at least quarterly) by the relevant parties are held to review performance against service levels for SAM with documented conclusions and decisions about any actions to be taken.

4.6.5 Security management for SAM

4.6.5.1 Objective

The objective of the Security management for SAM process is to manage information security effectively within all SAM activities and support the approval requirements related to SAM.

NOTE ISO/IEC 27001 provides guidance on information security management. Organizations certified to ISO/IEC 27001 should satisfy the security requirements within this part of ISO/IEC 19770.

Tier 4

4.6.5.2 Outcomes

Outcome Tier

1 2 3 4 Implementation of the Security management for SAM process will enable the organization to demonstrate that:

a) A formal policy is developed and approved regarding security/access restrictions to all SAM resources, including physical/electronic stores of software, software builds and releases.

b) Access controls are specified, both physical and logical, to enforce the approval requirements of SAM policies.

c) There is documentary evidence that these specified access controls are being implemented in practice.

Page 39: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

35 © ISO/IEC 2010 – All rights reserved

4.7 Life cycle process interfaces for SAM

4.7.1 General

The Life cycle process interfaces for SAM are largely aligned to the primary life cycle processes of ISO/IEC 12207 in the context of SAM as well as to ISO/IEC 20000. The objective of this part of ISO/IEC 19770 is to specify SAM requirements for these life cycle processes.

The Life cycle process interfaces for SAM consist of requirements for the following life cycle processes:

a) Change management process;

b) Acquisition process;

c) Software development process;

d) Software release management process;

e) Software deployment process;

f) Incident management process;

g) Problem management process;

h) Retirement process.

4.7.2 Change management process

4.7.2.1 Objective

The objective of the Change management process with respect to software and related assets is to ensure that all changes which impact on SAM are assessed, approved, implemented and reviewed in a controlled manner and meet all record-keeping requirements.

NOTE The Change management process with respect to software and related assets is tightly linked to the Software asset control process, which provides the control mechanism underlying any changes to be made to software and related assets.

Tier 4

4.7.2.2 Outcomes

Outcome Tier

1 2 3 4 Implementation of the Change management process will enable the organization to demonstrate that:

a) There is a formal process of change management which includes: ●

1) All change requests that affect software or related assets or services, or SAM processes, are identified and recorded.

2) Change requests affecting software or related assets or services, or SAM processes, are assessed for possible impacts, prioritized, and approved by the responsible management.

3) The process implementing the approved change request does so only in accordance with the approval.

Page 40: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

© ISO/IEC 2010 – All rights reserved 36

Outcome Tier

1 2 3 4 4) All changes affecting software or related assets or services, or SAM processes,

are recorded.

5) The success or failure of such changes is documented and periodically reviewed.

4.7.3 Acquisition process

4.7.3.1 Objective

The objective of the Acquisition process in respect of software and related assets is to ensure that they are acquired in a controlled manner and properly recorded.

Tier 3

4.7.3.2 Outcomes

Outcome Tier

1 2 3 4 Implementation of the Acquisition process will enable the organization to demonstrate that:

a) Standard architectures are defined for the provision of software services, as are the criteria for deviating from those standards.

b) Standard software configurations are defined, as are the criteria for deviating from those standards.

c) Policies and procedures are developed, properly authorized and issued for requisitioning and ordering software assets and related assets, including:

1) How requirements are specified.

2) Management and technical approvals required.

3) Use/redeployment of existing licenses if available.

NOTE: The organization may choose the best method for itself for identifying if there are existing licenses available for deployment. Depending on how the organization implements software asset management, this may vary. For example, software may be authorized for installation but not yet be installed. To avoid the risk of trying to use the same licenses more than once, authorizations and ongoing deployment activities may need to be checked before redeploying licenses.

4) Recording future purchase requirements in those cases where software can be deployed before reporting and payment.

d) Policies and procedures are developed, properly authorized and issued for receipt-processing functions related to software and related assets, including:

1) Processing invoices, including reconciliations to orders and retention of copies for licence management purposes.

2) Ensuring the receipt and safe-keeping of valid proof of license for all licences purchased.

NOTE This may require checking for authenticity of proof of licence, i.e. checking that they are not counterfeit, especially when the proof of license is not received directly from the relevant software manufacturer.

Page 41: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

37 © ISO/IEC 2010 – All rights reserved

Outcome Tier

1 2 3 4 3) Processing incoming media which includes requirements for verification, record-

keeping and safe-keeping of contents (physical media and electronic copies).

4.7.4 Software development process

4.7.4.1 Objective

The objective of the Software development process in respect of software and related assets is to ensure that they are developed in a way which considers SAM requirements.

NOTE1 It is not required for this part of ISO/IEC 19770 to be applied to software development in the sense of the development and maintenance of source code or other components in development. It is intended that it be applied to all software used to facilitate these development environments, transitions to live environments and precursor activities such as configuring software and creating and controlling production builds and releases. The line between what is considered source software within pure development, and therefore excluded, and software for use, and therefore included, may be defined as part of a formal scope statement.

NOTE2 Software used to develop other software is considered software for use, i.e. the software used by software developers must itself be controlled.

Tier 4

4.7.4.2 Outcomes

Outcome Tier

1 2 3 4 Implementation of the Software development process will enable the organization to demonstrate that:

a) There is a formal process for software development ensuring the following have been considered:

1) Standard architectures and standard configurations.

2) Licence constraints and dependencies.

b) There is a formal process for software development ensuring that software products are placed under software asset control before being introduced into a live environment.

4.7.5 Software release management process

4.7.5.1 Objective

The objective of the Software release management process in respect of software and related assets is to ensure that releases are planned and executed in a way which supports SAM requirements.

NOTE The Software release management process covers the planning and actual release of software and related assets. The Software release management process works together closely with the Change management process.

Tier 4

Page 42: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

© ISO/IEC 2010 – All rights reserved 38

4.7.5.2 Outcomes

Outcome Tier

1 2 3 4 Implementation of the Software release management process will enable the organization to demonstrate that:

a) There is a formal process for release management ensuring that: ●

1) A controlled acceptance environment is used to build and test all proposed releases including patches prior to release.

NOTE This part of ISO/IEC 19770 does not specify the detailed requirements for build or testing. For example, a) it does not require that all builds requiring a manufacturer patch be rebuilt and independently tested, although an organization may require this independently of what this part of ISO/IEC 19770 requires. Nonetheless, it would normally be expected that any change or patch would be tested in some way before deployment.

2) The frequency and type of releases are planned and agreed with the business and customers, including the frequency of security patch releases.

3) The planned release dates and deliverables are recorded with references to related change requests and problems, and communicated to incident management.

4) The release of software and related assets is approved by the responsible management.

5) The success or failure of releases is recorded, and periodically reviewed.

4.7.6 Software deployment process

4.7.6.1 Objective

The objective of the Software deployment process in respect of SAM is to ensure that software deployment and redeployment is executed in a way which supports SAM requirements.

Tier 3

4.7.6.2 Outcomes

Outcome Tier

1 2 3 4 Implementation of the Software deployment process will enable the organization to demonstrate that:

a) Policies and procedures are developed, approved and issued for deploying software to include the following:

1) Any new instance of a distribution copy of software and related assets is approved by the responsible management.

2) For any deployment there is a back out procedure or method of remediation if the deployment is not successful.

3) Security requirements are complied with, including over access to the software being deployed and after it is installed.

4) All changes to status of the relevant software and related assets are recorded accurately and on a timely basis, including any change of custodianship for the

Page 43: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

39 © ISO/IEC 2010 – All rights reserved

Outcome Tier

1 2 3 4 assets, and an audit trail kept of these changes.

NOTE There is no requirement for an audit trail of every single change made. It is essential to define what different statuses are to be used, and then ensure that there are audit trails of when those statuses change. Typical statuses might be connected with authorization for procurement (general authorization; authorization for named groups or individuals); authorization for release (as part of a build); authorization for deployment/removal (general, and for named groups or individuals); and actual deployment/installation/removal.

5) There is a documented control to verify that what was deployed is the same as what was authorized to be deployed and an exception raised detailing any variances or if an asset cannot be verified to be deployed within authorized limits.

NOTE1 Authorizations typically change over time. There should be a review of deployment versus authorizations whenever authorization changes, whether explicit or implicit, such as when there is a change of organizational scope.

NOTE2 A copy of the exception report should be sent to the owner for the Inventory of Software Authorized for Installation

6) The success or failure of deployments is recorded, and periodically reviewed.

4.7.7 Incident management process

4.7.7.1 Objective

The objective of the Incident management process in respect of software and related assets is to monitor and respond to incidents in ongoing operations relevant to software and related assets.

Tier 4

4.7.7.2 Outcomes

Outcome Tier

1 2 3 4 Implementation of the Incident management process will enable the organization to demonstrate that:

a) There is a formal process of incident management which includes: ●

1) All incidents that affect software or related assets or SAM processes are recorded and classified as to their priority for resolution.

2) All such Incidents are resolved in accordance with their priority for resolution, and the resolution is documented.

4.7.8 Problem management process

4.7.8.1 Objective

The objective of the Problem management process in respect of software and related assets is to keep software assets current and in operational fitness, including through proactive identification and analysis of the cause of incidents and addressing the underlying problems.

Tier 4

Page 44: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

© ISO/IEC 2010 – All rights reserved 40

4.7.8.2 Outcomes

Outcome Tier

1 2 3 4 Implementation of the Problem management process will enable the organization to demonstrate that:

a) There is a formal process of problem management which includes: ●

1) All incidents that affect software or related assets or services or SAM processes are recorded and classified as to their impact.

2) High priority and repeat incidents are analyzed for the underlying causes and prioritized for resolution.

3) Underlying causes are documented and communicated to incident management.

4) Problems are resolved in accordance with their priority for resolution, and the resolution is documented and communicated to incident management.

4.7.9 Retirement process

4.7.9.1 Objective

The objective of the Retirement process in respect of software and related assets is to remove software and related assets from use, including recycling of associated assets where appropriate, in accordance with company policy and meeting all record-keeping requirements.

NOTE Removing unlicensed software from use will generally not resolve a licensing shortfall problem because a licensing obligation has already been created through the use of the software. Reliance should be placed instead on controls over installation or over initial usage.

Tier 3

4.7.9.2 Outcomes

Outcome Tier

1 2 3 4 Implementation of the Retirement process will enable the organization to demonstrate that:

a) Policies and procedures are developed, approved and issued for securely retiring software or hardware on which software is installed, which ensure:

1) Deployed copies of software are removed from retired hardware, except when explicitly authorized by management after due consideration of any software licensing and data confidentiality implications.

NOTE1 For the purposes of this requirement, retirement consists of hardware being transferred outside of the organization potentially to be used by others. NOTE2 For the purposes of this requirement, deployed software does not include software which is bound to the hardware, such as OEM software which cannot be redeployed.

Page 45: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

41 © ISO/IEC 2010 – All rights reserved

Outcome Tier

1 2 3 4 2) Licenses and other assets which can be redeployed are identified for

redeployment.

3) Any assets transferred to other parties (whether those parties or related or unrelated, and however transferred, i.e. sold or otherwise) are transferred properly taking into account any confidentiality, licensing, or other contractual requirements.

4) Licenses and other assets which cannot be redeployed are properly disposed of.

5) Records are updated to reflect the changes above, and audit trails are maintained of the changes.

Page 46: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

© ISO/IEC 2010 – All rights reserved 42

5 Tiers

5.1 Overview

An overview of the tiers is given in the Introduction. Figure 1 which is included there shows the conceptual relationship between the tiers.

The principles which underlie the groupings and sequencing of the tiers are as follows:

a) Number of tiers. There needs to be only a limited number of tiers for conceptual simplicity.

b) Priority for license compliance. Formal research into market demand for SAM standards clarified that license compliance was consistently the top priority for all categories of respondents. The first tier, ‘Trustworthy Data’, provides the basis for repeatable license compliance. It does not guarantee license compliance, but any organization fully conforming to the requirements of tier 1 will know whether it is compliant with its software licensing, and it will only be a question as to how management is acting on this knowledge.

c) Natural groupings reflecting natural sequence. The groupings of outcomes and process areas in each tier are intended to be relatively natural groupings which reflect a natural progression as observed in reality. The actual groupings are described under each tier below in clauses 5.2 through 5.5. The supporting principles are as follows:

1) Having good data almost always comes first. Often this is driven by a vendor-initiated licensing audit. There is often a major gap between what is found and what was believed to be the case. Only then does management typically realize both the significance of exposures and of opportunities for improvement, including in security and in cost savings.

2) When management does take ownership of SAM issues as a result of having good data, there tend to be two different thrusts to actions taken. Firstly, basic improvements in management controls are instituted, such as clarification of roles and responsibilities, and better definition of policies. Secondly, specific projects are typically initiated to correct problems identified, and to obtain ‘quick wins’ where possible.

3) Improvements in efficiency and effectiveness are often cited as expected benefits from SAM, but often are not achieved to the level possible, because they typically require significant implementation effort involving process integration and re-design. However, an organization is more likely to proceed down this path after already seeing the clear benefits of ‘quick wins’ and recognizing that more are possible.

4) Best-in-class SAM practices typically come last. These tend to be those practices which have strategic impact and longer-term benefits.

d) Minimum requirements for recognition. The tiers are designed to be minimum requirements for recognizable achievement, but do not include everything which an organization may wish to do. For example, policies are not included in tier 1, but rather only in tier 2, yet most organizations will probably have some policies in place already during work on tier 1. This does not diminish the importance of policies, but merely reflects that policies are initially focused upon in tier 2. Indeed, the findings from achieving tier 1 will probably drive significant policy development in tier 2, or at least enforcement, because reality typically will not match expectations in terms of license compliance, security, standardization, etc. Likewise, an organization will probably wish to focus on some specific issues or process areas earlier than required by the tiers, where there are specific requirements or opportunities identified by management. This is to be expected. However, these issues or process areas will not be included in the scope of a potential certification project until the appropriate tier.

e) Limitations in technology and its use. There are, for example, hundreds of tools which support software discovery, but far fewer which support full configuration management, and their effective use is still rarer.

Page 47: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

43 © ISO/IEC 2010 – All rights reserved

The concept of ‘difficulty’ also needs to be considered:

a) Difficulty per se is not an underlying principle for the grouping and sequencing of tiers. For example, creating and maintaining inventories of software contracts and licenses is not easy, and is typically a highly manual task. Nonetheless it is in tier 1, because it is one of the critical types of data which must be under control to have trustworthy data.

b) There are many outcomes or process areas which are not typically achieved by less mature organizations, and these have generally been placed in tier 4. From one perspective, these may be viewed as ‘difficult’ outcomes and process areas. However, they reflect more about the stage of development of the organization than on their own intrinsic difficulty. Indeed, such outcomes and process areas are more accurately considered part of ‘best-in-class’ SAM.

Page 48: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

© ISO/IEC 2010 – All rights reserved 44

5.2 Tier 1 – trustworthy data

Figure 3 shows the process areas which are included in tier 1.

The natural groupings included in this tier are:

a) Core SAM records

b) License compliance

4.6 Operations Management Processes and Interfaces for SAMSecurity Managementfor SAM

Relationship and Contract Management for SAM

4.7 Life Cycle Process Interfaces for SAM

AcquisitionProcess

Incident ManagementProcess

Primary Process Interfaces for SAM

4.4 Inventory Processes for SAMSoftware Asset Identification

4.5 Verification and Compliance Processes for SAMSoftware Asset Record Verification

Core SAM Processes

Software Asset Inventory Management

Software Asset Control

Software Licensing Compliance

Conformance Verification for SAM

Software Asset SecurityCompliance

4.2 Control Environment for SAM

4.3 Planning and Implementation Processes for SAM

Corporate Governance Process for SAM

Roles and Responsibilities for SAM

Policies, Processes and Procedures for SAM

Competence in SAM

Planning for SAM

Implementation of SAM

Monitoring and Review of SAM

ContinualImprovement of SAM

Organizational Management Processes for SAM

Change ManagementProcess

Problem ManagementProcess

Retirement Process

Software DevelopmentProcess

Software Release Management Process

Software Deployment Process

Financial Management for SAM

Service LevelManagement for SAM

Key: Primary Emphasis of Tier; Secondary Emphasis of Tier; Not Included in Tier

Figure 3 - SAM tier 1 – trustworthy data

Page 49: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

45 © ISO/IEC 2010 – All rights reserved

5.3 Tier 2 – practical management

Figure 4 shows the process areas which are included in tier 2.

The natural groupings included in this tier are:

a) Quick wins

b) Essential control environment

4.6 Operations Management Processes and Interfaces for SAMSecurity Managementfor SAM

Relationship and Contract Management for SAM

4.7 Life Cycle Process Interfaces for SAM

AcquisitionProcess

Incident ManagementProcess

Primary Process Interfaces for SAM

4.4 Inventory Processes for SAMSoftware Asset Identification

4.5 Verification and Compliance Processes for SAMSoftware Asset Record Verification

Core SAM Processes

Software Asset Inventory Management

Software Asset Control

Software Licensing Compliance

Conformance Verification for SAM

Software Asset SecurityCompliance

4.2 Control Environment for SAM

4.3 Planning and Implementation Processes for SAM

Corporate Governance Process for SAM

Roles and Responsibilities for SAM

Policies, Processes and Procedures for SAM

Competence in SAM

Planning for SAM

Implementation of SAM

Monitoring and Review of SAM

ContinualImprovement of SAM

Organizational Management Processes for SAM

Change ManagementProcess

Problem ManagementProcess

Retirement Process

Software DevelopmentProcess

Software Release Management Process

Software Deployment Process

Financial Management for SAM

Service LevelManagement for SAM

Key: Primary Emphasis of Tier; Secondary Emphasis of Tier; Not Included in Tier

Figure 4 - SAM tier 2 – practical management

Page 50: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

© ISO/IEC 2010 – All rights reserved 46

5.4 Tier 3 – operational integration

Figure 5 shows the process areas which are included in tier 3.

The natural groupings included in this tier are:

a) Core life cycle processes (acquisition/deployment/retirement)

b) Core operations management processes

Figure 5 - SAM tier 3 – operational integration

Page 51: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

47 © ISO/IEC 2010 – All rights reserved

5.5 Tier 4 – full ISO/IEC SAM conformance

Figure 6 shows the process areas which are included in tier 4.

The natural groupings included in this tier are:

a) Strategic SAM (SAM is an enabler and part of strategy and planning)

b) Extended Service Management life cycle processes

c) Best-in-class SAM processes (not included in lower tiers)

Figure 6 - SAM tier 4 – full ISO/IEC SAM conformance

Page 52: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

© ISO/IEC 2010 – All rights reserved 48

Annex A (informative)

Reference chart of outcomes by tier

Major Name Minor Name Process Area Name Outcome Caption Additional Comments Tier 1 Tier 2 Tier 3 Tier 4Organizational Management Processes for SAM

Control Environment for SAM

Corporate Governance Process for SAM

4.2.2.2.a Organizational scope and overall responsibility x4.2.2.2.b Recognition of responsibility for SAM x4.2.2.2.c Legislation, regulation and guidance x4.2.2.2.d Risk assessment x4.2.2.2.e Approval of SAM management objectives x

Roles and Responsibilities for SAM 4.2.3.2.a Organization-wide SAM responsibilities x

4.2.3.2.b Local SAM responsibilities x4.2.3.2.c Communication of responsibilities x

Policies, Processes and Procedures for SAM 4.2.4.2.a Structured approach to policies, processes and procedures x

4.2.4.2.b Organization of policies, processes and procedures x4.2.4.2.c Issues covered by policies x4.2.4.2.d Communication of policies and procedures x

Competence in SAM 4.2.5.2.a Availability of training x4.2.5.2.b Proof of license x4.2.5.2.c Training taken x4.2.5.2.d Availability of guidance from software manufacturers x

Planning and Implementation Processes for SAM

Planning for SAM

4.3.2.2.a Development of SAM management objectives x4.3.2.2.b Development of SAM plans x4.3.2.2.c Approval of SAM plans x

Implementation of SAM 4.3.3.2.a Issue feedback x4.3.3.2.b Progress against SAM plan x4.3.3.2.c Follow-up on variances x

Monitoring and Review of SAM 4.3.4.2.a Annual management review of SAM x4.3.4.2.b SAM owner sign-off x

4.3.4.2.c Software deployment review

partial (quick wins) full

Continual Improvement of SAM 4.3.5.2.a Suggestions for improvement feedback x4.3.5.2.b Suggestions for improvement execution x

Page 53: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

49 © ISO/IEC 2010 – All rights reserved

Major Name Minor Name Process Area Name Outcome Caption Additional Comments Tier 1 Tier 2 Tier 3 Tier 4

Core SAM Processes

Inventory Processes for SAM

Software Asset Identification

4.4.2.2.a Initial identification of data requirements x4.4.2.2.b Master register of stores and inventories x

Software Asset Inventory Management 4.4.3.2.a Policies and procedures for inventory management x

4.4.3.2.b Inventories of hardware, installed software, and licenses x

4.4.3.2.c Inventories of software masters and contractual documentation 1, 3-4 24.4.3.2.d Measurement mechanisms for all other licensing metrics x4.4.3.2.e Continuity of operations x4.4.3.2.f Minimum report descriptors x

Software Asset Control 4.4.4.2.a Audit trail of changes x4.4.4.2.b Policies and procedures for version control x4.4.4.2.c Policies and procedures for deployment baselines x

Verification and Compliance Processes for SAM

Software Asset Record Verification

4.5.2.2.a Policies and procedures for record verification11 in all Tiers for relevant processes 1-3, 8-9

10 (quick wins) 4-7

Software Licensing Compliance4.5.3.2.a Policies and procedures for software licensing compliance x

Software Asset Security Compliance 4.5.4.2.a Execution of SAM security policy checks x

4.5.4.2.b Follow-up on exceptions identified xConformance Verification for SAM 4.5.5.2.a Policies and procedures for conformance verification

In all Tiers for relevant processes x x x x

4.5.5.2.b Execution of conformance verificationIn all Tiers for relevant processes x x x x

Relationship and Contract Management for SAM

4.6.2.2.a Policies and procedures for supplier relationship management x

4.6.2.2.bPolicies and procedures for customer-side relationship management x

4.6.2.2.c Policies and procedures for contract management

partial (quick wins) full

Financial Management for SAM4.6.3.2.a Definition of financial information required x4.6.3.2.b Budgets x4.6.3.2.c Reporting of actual against budget x4.6.3.2.d Availability of asset value information x4.6.3.2.e Reviews of actual against budget and follow-up x

4.6.3.2.f License optimization

partial (quick wins) full

Service Level Management for SAM 4.6.4.2.a Definition of service level agreements x

4.6.4.2.b Reporting of actuals against targets x4.6.4.2.c Reviews of performance x

Security Management for SAM 4.6.5.2.a Security policy for SAM resources x4.6.5.2.b Specification of access controls for SAM resources x4.6.5.2.c Execution of access controls x

Operations Management Processes and Interfaces for SAM

Page 54: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

© ISO/IEC 2010 – All rights reserved 50

Major Name Minor Name Process Area Name Outcome Caption Additional Comments Tier 1 Tier 2 Tier 3 Tier 4Primary Process Interfaces for SAM

Change Management Process

4.7.2.2.a Change management process definition xAcquisition Process 4.7.3.2.a Standard architectures x

4.7.3.2.b Standard configurations x4.7.3.2.c Procurement policies and procedures x4.7.3.2.d Policies and procedures for receipt processing x

Software Development Process4.7.4.2.a

Software development process definition for consideration of SAM requirements x

4.7.4.2.b Software development process definition for asset control xSoftware Release Management Process 4.7.5.2.a Software release management process definition xSoftware Deployment Process 4.7.6.2.a Software deployment process definition xIncident Management Process 4.7.7.2.a Incident management process definition xProblem Management Process 4.7.8.2.a Problem management process definition xRetirement Process 4.7.9.2.a Retirement process definition x

Life Cycle Process Interfaces for SAM

Key: ‘x’ – indicates tier includes all sub-clauses of this outcome; ‘partial’ – selected sub-clauses of this outcome included in tier (see normative clause for selections).

Page 55: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

51 © ISO/IEC 2010 – All rights reserved

Annex B (informative)

Guidance on selected topics

B.1 Introduction

This Annex provides guidance on selected topics relevant to this part of ISO/IEC 19770. Further industry guidance is also available, such as described in Annex C.

B.2 Releases

The term release will often apply to a final internal production release, for example, the release of a distribution copy which has been technically approved, or a corporate build which is then released for use with certain devices e.g. on a quantity of desktop computers.

A second usage variant of the terms release and build applies to software assets within the software development process. These terms are also in common use in the consumption of Open Source Software e.g. a release of OSS code to users who may then build this software themselves. This part of ISO/IEC 19770 does not define development-type processes but makes provision for assets to be identified and controlled, leaving freedom to apply SAM processes which could equally be applied to software assets in either of the two usage contexts above. (See 1.2 Field of application for a discussion of the applicability of this part of ISO/IEC 19770 to development.)

Whilst any release may be managed using this part of ISO/IEC 19770 it is recognized that where the term release appears twice in a sequence of events this may need further explanation, especially given that formal approval may be required for both releases. To give a combined example, a corporate build process may be made up of more than one successive step combining manufactured software with builds of released code from internal developers and may include a source-code release from OSS development. This process will typically include patches. Some or all of these activities are sometimes referred to as packaging. Packaging usually implies the addition of a software ‘wrapper’ that is required by a specific software deployment utility.

Several such corporate builds are usually tested and technically approved before a distribution copy (sometimes in the form of an image) is created and approved for final release to the live environment.

In conclusion, this part of ISO/IEC 19770 can be used to manage both kinds of released software assets - the code release by developers and the internal production release from successive packaging activities. Both may be in-scope, covered by inventory processes and record verifications and any release being managed must be technically approved and then finally be authorized for deployment, with an authorised inventory of installs.

B.3 Document and record management

There is no explicit requirement for document and record management in this part of ISO/IEC 19770, but nonetheless this is effectively required such as for 4.2.4.2 a) (“There is a structured approach to creating, reviewing, approving, issuing, and controlling policies, processes, procedures and related documentation relevant to SAM so that it is always possible to determine the complete set available, which version of each document is currently in effect and which documents apply to different types of software and related assets.”); 4.2.4.2 b) (“Policy, process and procedure documentation required by this part of ISO/IEC 19770 are organized by the process classifications of this part of ISO/IEC 19770 or with a cross-reference to these classifications.”); and 4.5.5.2 b) (“Documentary evidence exists that demonstrates (a) that the verification procedures above are being performed, and (b) that corrective follow-up action is taken until successful completion on the causes of all identified exceptions.”)

Page 56: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

© ISO/IEC 2010 – All rights reserved 52

It is strongly recommended that organizations implementing this part of ISO/IEC 19770 should also implement document and record management as required for Management System Standards such as ISO 9001:2000 and ISO/IEC 20000-1:2005, and this will provide the necessary general capabilities required.

Page 57: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

53 © ISO/IEC 2010 – All rights reserved

Annex C (informative)

Cross reference to industry best practice guidance

C.1 Introduction

As explained in clause 1.1, this part of ISO/IEC 19770 does not detail SAM processes in terms of methods or procedures required to meet the requirements for outcomes of a process. Likewise, this part of ISO/IEC 19770 does not specify the sequence of steps an organization should follow to implement SAM, nor is any sequence implied by the sequence in which processes are described.

Although this part of ISO/IEC 19770 does not detail these topics, nonetheless these topics are of major importance in being able to implement SAM and meet the requirements of this part of ISO/IEC 19770. This part of ISO/IEC 19770 does not endorse any specific source of guidance on SAM and no ISO/IEC endorsement of related products or the sourcing organizations is implied. However, it is relevant to indicate that sources of guidance do exist to which reference may be made as examples.

C.2 ITIL, IAITAM, ISACA and SAM Consortium – Sources and References

As of the writing of this part of ISO/IEC 19770, there are at least three major sources of such guidance on SAM. These are examples, not a comprehensive review. Major sources of guidance materials are:

ITIL® V3 Guide to Software Asset Management, TSO, ©2009, ISBN 978 0 11 331106 4. Version 2 of this publication was developed before ISO/IEC 19770-1:2006 was developed. In many respects it was the predecessor of ISO/IEC 19770-1:2006.

IAITAM Best Practice Library, International Association of IT Asset Managers, [www.iaitam.org] ©2008, ISBN 978-1-935019-00-8, 978-1-935019-01-5, 978-1-935019-02-2, 978-1-935019-03-9, 978-1-935019-04-6, 978-1-935019-05-3, 978-1-935019-06-0, 978-1-935019-07-7, 978-1-935019-08-4, 978-1-935019-09-1, 978-1-935019-10-7, 978-1-935019-11-4. This best practice guidance is a quite comprehensive 12 volume set, and covers all of IT Asset Management, not just Software Asset Management. It was developed before ISO/IEC 19770-1:2006 was published. This ISO/IEC document references IBPL, used by permission of IAITAM. ©2008 IAITAM. All rights reserved.

SAM Consortium Standard and Evaluation Criteria, SAMCon, [www.samconsortium.org] Software Asset Management Standard, Software Asset Management Consortium, Japan ©2007. This documentation is in Japanese and English. Although it is titled a standard, it is primarily best practice. It was revised after ISO/IEC 19770-1:2006 was published, and is aligned to ISO/IEC 19770-1:2006. This ISO/IEC document references the SAMCon standard v3, used by permission of the SAM Consortium. © SAMCon 2010. All rights reserved.

In order to facilitate access to this guidance, the table at the end of this annex gives mappings from this part of ISO/IEC 19770-1 to the last two of the sources cited above. The table also provides information on CobiT:

This ISO/IEC document also includes COBIT 4.1, used by permission of ISACA/ITGI. ©1996-2007 ITGI. All rights reserved. CobiT is a set of tools and techniques for controlling and managing IT. It forms a framework for IT governance helping managers set objectives for IT departments that in-turn support business objectives.

Similarly the ISO/IEC SAM standard provides set of outcomes that, if achieved, enable IT managers to gain control over IT assets and delivery more business value from them, again supporting IT governance and answering the business needs.

Page 58: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

© ISO/IEC 2010 – All rights reserved 54

C.3 Further information on CobiT Selected Mappings

CobiT is a set of tools and techniques for controlling and managing IT. It forms a framework for IT governance helping managers set objectives for IT departments that in-turn support business objectives.

Similarly the ISO/IEC SAM standard provides set of outcomes that, if achieved, enable IT managers to gain control over IT assets and delivery more business value from them, again supporting IT governance and answering the business needs.

Introducing best practices, both in the case of CobiT and this part of ISO/IEC 19770 or indeed any other IT management framework, takes time and requires many steps. Tiers enable selective targeting of immediate improvement and identify areas for later attention. A supporting approach may use CobiT but connected objectives are defined differently, so the following guidance shows some of the connections. It may be used by organizations who already use CobiT, providing an indication of which CobiT processes support each tier. (Completion of all CobiT connections does not imply conformance to the requirements of this tier of 19770-1.)

As with all Annexes this content is informative of the relating themes found in other practices and assessments. It is intended as a guide only and not as a definitive interpretation of CobiT knowledge. See also Annex E for further information about how CobiT relates to other available methodologies.

C.3.1 About mapping Tier 1 trustworthy data to CobiT

Achieving this means knowing what you have so that you can manage it.

Organizations achieving tier 1 rely on management activities for the collection and verification of knowledge about IT assets and their status. It is especially supported by configuration management disciplines. In CobiT these activities are related to managing and monitoring the information about IT infrastructure, resources and capabilities, information architecture, and other assets.

In particular the following CobiT processes support achieving the tier 1 outcomes:

CobiT Process Comment DS11 Manage Data The requirements for this process include

establishing procedures and identifying requirements for managing the SAM data

PO2 Define the information architecture. The definition of the Information Architecture establishes a solid base for managing the IT asset data

ME1 Monitor and Evaluate IT Performance The requirements for monitoring inventory and verification processes to ensure data is controlled

DS9 Manage the Configuration The CI information collected in this process includes significant amount of data to be managed in SAM.

C.3.2 About mapping Tier 2 practical management to CobiT

Achieving this means improving management controls and driving immediate benefits.

In this tier the activities are known as Management, Control and Governance activities. The outcomes to be achieved here require the introduction of pro-active management together with attention to the planning of SAM itself. It also requires control over the SAM processes now implemented, including monitoring and verification of their outcomes. In CobiT related processes are grouped and referred to as “Plan and Organize” and “Monitor and Evaluate”.

In particular the following CobiT processes support achieving the tier 2 outcomes:

Page 59: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

55 © ISO/IEC 2010 – All rights reserved

CobiT Process Comment PO4 Define the IT processes, organization and relationships.

The requirements for PO4 build the foundation for the SAM control environment

ME3 Ensure compliance with external requirements

Legislation and regulatory requirements are addressed as part of tier 2 control environment. (License compliance actions are decided in tier 1)

ME4 Provide IT Governance Governance establishment provides definitions for management and control

PO5 Manage the IT investment. Covers some of the outcomes of the Financial Management required in this tier

PO8 Manage quality Quality Management System supports and defines the management activities

PO9 Assess and manage IT risks Risk management is required in this tier DS7 – Educate and train users

Aligns closely with tier 2 Policies, procedures and procedures (especially communication of) for use of software assets.

C.3.3 About mapping Tier 3 operational integration to CobiT

Achieving this means improving efficiency and effectiveness.

In this tier the SAM processes integrate with the IT operation. Lifecycle of the Software and related assets is managed. Controls are established here to conform to the standards and external requirements. In CobiT, the lifecycle processes are defined mainly in the Acquire and Implement part and compliance is covered mainly in Deliver and Support processes.

In particular the following CobiT processes help achieving the tier 3 outcomes:

CobiT Process Comment AI3 Acquire and Maintain Technology Infrastructure

Supports the lifecycle management of the technology that underpins the software

AI2 Acquire and Maintain Application software Supports the lifecycle of software applications AI5 Procure IT resources Procurement procedures are defined and

managed DS1 Define and manage service levels Direct relationship with Service Level

Management requirements DS2 Manage third-party services Helps in managing the suppliers DS6 Identify and allocate costs Complete financial management is required in

this tier ME2 Monitor and evaluate internal control Critical for proper financial management DS3 – Manage performance and capacity Supports service level management for SAM.

C.3.4 About mapping Tier 4 full ISO/IEC SAM conformance to CobiT

Achieving this means achieving best-in-class strategic SAM.

The last tier completes the objectives for SAM to support the business in its strategic goals. Thus IT Service management processes are now fully supported. SAM also acquires processes that ensure its stability and its own continual improvement. As a result, SAM is a complete system of processes the organization can rely on.

In CobiT, the strategic processes are spread around the whole framework providing guidance for making the specific IT management elements focused on being the best in class.

Page 60: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

© ISO/IEC 2010 – All rights reserved 56

The following CobiT processes are identified as the most helpful in achieving the best possible strategic SAM:

CobiT Process Comment PO1 Define a Strategic IT Plan

*See also the general CobiT: PO6 communicate management objectives. Stakeholders thus support the SAM objectives approved by the board in Tier 4.

Establish processes in strategic planning helps achieve business and IT alignment and integration. Tier 4 also includes approval* of SAM management objectives for SAM (4.2.2.2.e).

AI6 Manage Changes Supports tier 4 Change Management Process AI7 Install and accredit solutions and changes Required as part of change management DS4 Ensure continuous service Continuity of operations is required in this tier DS5 Ensure systems security Security management is required in this tier DS8 Manage Service Desk and Incidents This tier requires managing the customer

feedback as well as the incident management process

DS10 Manage problems Problem management process is required explicitly in this tier

ME1 Monitor and evaluate IT performance Continual improvement is required in this tier.

Most connections in the above table show where a single CobiT process connect strongly to one tier. Some tiers, especially tier 4 are also supported by one or more generalized CobiT processes. These offer indirect support for the ISO objectives, of broad support over one or more tiers. An example of such a general CobiT process would be DS13 Manage Operations, which indirectly supports tier 3 Service Level Management and, in tier 4, also supports Monitoring and Review of SAM, Continual Improvement and Software Asset Control.

C.3.5 Other CobiT Processes.

In addition to those processes listed above which directly support a specific tier, there are also other CobiT processes supporting SAM, either indirectly or generally. The following list of other CobiT processes is placed here for reference:

PO3 – Determine technological direction

PO6 – Communicate management aims and direction

PO7 – Manage IT Human Resources

PO10 – Manage Projects

AI1 – Identify automated solutions

AI4 – Enable operation and use

DS12 – Manage the physical environment

DS13 – Manage operations.

C.4 Cross Reference Table of Outcomes to Industry Guidance

ISO/IEC 19770-1 Key Area Outcomes

19770-1 Reference

19770-1

Tier

IAITAM Best Practice

Library (IBPL) Key Area

Japanese SAM

Consortium Best

Practice

CobiT 4.1 Key Area

Page 61: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

57 © ISO/IEC 2010 – All rights reserved

ISO/IEC 19770-1 Key Area Outcomes

19770-1 Reference

19770-1

Tier

IAITAM Best Practice

Library (IBPL) Key Area

Japanese SAM

Consortium Best

Practice

CobiT 4.1 Key Area

4.2 Control Environment for SAM The objective of the Control Environment for SAM is to establish and maintain the management system within which the other SAM processes are implemented. 4.2.2 Corporate Governance Process for SAM The objective of the Corporate governance process for SAM is to ensure that responsibility for management of software assets is recognized at the level of corporate board or equivalent body, and that appropriate mechanisms are in place to ensure the proper discharge of this responsibility. Implementation of the Corporate governance process for SAM will enable the organization to demonstrate that:

4.2.2.2

There is a clear corporate statement for the purposes of this part of ISO/IEC 19770 about:

4.2.2.2.a Tier 2 Program

Management

Establishment

of Policy and

Regulation ME4 Provide IT governance

the legal entity or parts of a legal entity which are included in scope.

4.2.2.2.a.1 Tier 2 Project

Management

Establishment

of Policy and

Regulation

PO4 Define the IT Processes, Organisation and Relationships PO6 Communicate Management Aims and Direction ME4 Provide IT governance

the specific single body or individual that has overall corporate management responsibility for that entity or parts of that entity.

4.2.2.2.a.2 Tier 2 Project

Management

Establishment

of Policy and

Regulation

PO4 Define the IT Processes, Organisation and Relationships, ME4 Provide IT governance

Responsibility for corporate governance of software and related assets is formally recognized by the corporate board or equivalent body.

4.2.2.2.b Tier 2 Program

Management

Establishment

of Policy and

Regulation

PO1 Define a Strategic IT Plan PO4.2 IT Strategy Committee PO10.3 Project Management Approach PO10.6 Project Phase Initiation PO10.11 Project Change Control ME4 Provide IT governance

Corporate governance regulations or guidelines which are relevant to the organization for its use of software and related assets, in all countries where it operates, have been identified and documented, and are reviewed at least annually.

4.2.2.2.c Tier 2 Policy

Management

Establishment

of Policy and

Regulation

PO2 Define the Information Architecture ME3 Ensure compliance with external requirements

An assessment of the risks associated with software and related assets, and management-specified mitigation approaches, is documented, updated at least annually, and approved by the corporate board or equivalent body, covering at least the following:

4.2.2.2.d Tier 2 Compliance

Management

Establishment

of Policy and

Regulation PO9 Assess and Manage IT Risks

Risk of regulatory non-compliance; 4.2.2.2.d.1 Tier 2

Program Management Compliance

Management Legislation

Management

Establishment

of Policy and

Regulation PO9 Assess and Manage IT Risks

Risk of violation of security requirements.

4.2.2.2.d.2 Tier 2

Establishment

of Policy and

Regulation PO9 Assess and Manage IT Risks DS5 Ensure Systems Security

Risk of licensing non-compliance 4.2.2.2.d.3 Tier 2

Program Management Compliance

Management Acquisition

Management

Establishment

of Policy and

Regulation

PO9 Assess and Manage IT Risks ME3 Ensure compliance with external requirements AI2 Acquire and maintain application software

Page 62: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

© ISO/IEC 2010 – All rights reserved 58

ISO/IEC 19770-1 Key Area Outcomes

19770-1 Reference

19770-1

Tier

IAITAM Best Practice

Library (IBPL) Key Area

Japanese SAM

Consortium Best

Practice

CobiT 4.1 Key Area

Risk of interruption of operations due to problems with the IT infrastructure which could result from inadequate SAM.

4.2.2.2.d.4 Tier 2

Program Management Acquisition

Management Asset Id

Management Project

Management

Establishment

of Policy and

Regulation

PO2 Define the Information Architecture PO9 Assess and Manage IT Risks

Risk of excessive spending on licensing and other IT support costs due to inadequate SAM.

4.2.2.2.d.5 Tier 2

Program Management Acquisition

Management Asset ID

Management Financial

Management Disposal

Management

Establishment

of Policy and

Regulation

PO5 Manage the IT Investment AI1 Identify Automated Solutions DS6 Identify and Allocate Costs DS9 Manage the Configuration

Risks associated with decentralized vs. centralized management approaches for software and related assets.

4.2.2.2d.6 Tier 2

Program Management Acquisition

Management Asset ID

Management Disposal

Management

Establishment

of Policy and

Regulation PO9 Assess and Manage IT Risks

Risks associated with different countries of operation taking into account local compliance cultures and enforcement approaches.

4.2.2.2.d.7 Tier 2

Program Management Compliance

Management Legislation

Management

Establishment

of Policy and

Regulation

ME3 Ensure compliance with external requirements PO4 Define the IT Processes, Organisation and Relationships PO9 Assess and Manage IT Risks

The management objectives for SAM are approved by the corporate board or equivalent body, and reviewed at least annually.

4.2.2.2.e Tier 4 Program

Management

Establishment

of Policy and

Regulation

PO1 Define a Strategic IT Plan ME4 Provide IT governance ME2 Monitor and evaluate internal control

4.2.3 Roles and responsibility for SAM The objective of the roles and responsibilities for SAM process is to ensure that the roles and responsibilities for the software and related assets are clearly defined, maintained and understood by all personnel potentially affected. Implementation of the Roles and responsibilities for SAM Process will enable the organization to demonstrate that:

4.2.3.2 Program

Management PO4.6 Establishment of Roles and

Responsibilities ME4 Provide IT governance

The role of the SAM owner, responsible for corporate governance of software and related assets for the entire organization, is clearly defined and approved by the corporate board or equivalent body. Responsibilities assigned include the following for the entire organization:

4.2.3.2.a Tier 2

Establishment

of a

Managerial

System

PO4.6 Establishment of Roles and Responsibilities

Proposing management objectives for SAM

4.2.3.2.a.1 Tier 2 Program

Management

Establishment

of a

Managerial

System

PO4.6 Establishment of Roles and Responsibilities

Overseeing the development of the SAM plan

4.2.3.2.a.2 Tier 2 Program

Management

Establishment

of a

Managerial

System

PO4.6 Establishment of Roles and Responsibilities

Page 63: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

59 © ISO/IEC 2010 – All rights reserved

ISO/IEC 19770-1 Key Area Outcomes

19770-1 Reference

19770-1

Tier

IAITAM Best Practice

Library (IBPL) Key Area

Japanese SAM

Consortium Best

Practice

CobiT 4.1 Key Area

Obtaining resources for implementing the approved SAM plan

4.2.3.2.a.3 Tier 2 Program

Management

Establishment

of a

Managerial

System

PO4.10 Supervision

Delivering results against the SAM plan

4.2.3.2.a.4 Tier 2 Program

Management

Establishment

of a

Managerial

System

PO4.6 Establishment of Roles and Responsibilities

Ensuring that all local SAM owners discharge their responsibilities properly, and that all parts of the organization are covered by the SAM owner or local SAM owners, without conflicting overlap.

4.2.3.2.a.5 Tier 2 Program

Management

Establishment

of a

Managerial

System

PO4.6 Establishment of Roles and Responsibilities

Local roles and responsibilities for corporate governance of software and related assets are documented and assigned to specified individuals. Responsibilities assigned include the following for the part of the organization for which each individual is responsible:

4.2.3.2.b Tier 2 Program

Management

Establishment

of a

Managerial

System

PO4.6 Establishment of Roles and Responsibilities

Obtaining resources for implementing the SAM plan.

4.2.3.2.b.1 Tier 2 Program

Management

Establishment

of a

Managerial

System

PO4 Define the IT Processes, Organisation and Relationships

Delivering results against the SAM plan.

4.2.3.2.b.2 Tier 2 Program

Management

Establishment

of a

Managerial

System

PO4 Define the IT Processes, Organisation and Relationships

Adopting and implementing necessary policies, processes and procedures.

4.2.3.2.b.3 Tier 2

Program Management

Policy Management

Establishment

of a

Managerial

System

PO6 Communicate Management Aims and Direction

Maintaining accurate records of software and related assets.

4.2.3.2.b.4 Tier 2 Program

Management

Establishment

of a

Managerial

System

PO1.4 IT Strategic Plan

Ensuring that management and technical approvals are required for procurement, deployment and control of software assets.

4.2.3.2.b.5 Tier 2 Acquisition

Management

Establishment

of a

Managerial

System

PO10.8 Project Resources

Managing contracts, supplier relationships, and internal customer relationships

4.2.3.2.b.6 Tier 2

Program Management

Documentation Management

Vendor Management

Establishment

of a

Managerial

System

PO4 Define the IT Processes, Organisation and Relationships PO8.4 Customer Focus PO10 Manage Projects DS1.6 Review of Service Level Agreements and Contracts

Page 64: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

© ISO/IEC 2010 – All rights reserved 60

ISO/IEC 19770-1 Key Area Outcomes

19770-1 Reference

19770-1

Tier

IAITAM Best Practice

Library (IBPL) Key Area

Japanese SAM

Consortium Best

Practice

CobiT 4.1 Key Area

Identifying the need for and implementing improvements

4.2.3.2.b.7 Tier 2 Program

Management

Establishment

of a

Managerial

System

DS10.4 Integration of Configuration, Incident and Problem Management

These responsibilities are communicated to all parts of the organization involved in any way with SAM, in the same way as other organization-wide and local policies are communicated.

4.2.3.2.c Tier 2 Communication &

Education Management

Establishment

of a

Managerial

System

PO4.6 Establishment of Roles and Responsibilities

4.2.4 Policies, processes and procedures for SAM The objective of the Policies, processes and procedures for SAM process is to ensure that an organization maintains clear policies, processes and procedures to ensure effective planning, operation, and control of SAMImplementation of the Policies, processes and procedures for SAM process will enable the organization to demonstrate that:

4.2.4.2 PO4 Define the IT Processes, Organisation and Relationships

There is a structured approach to creating, reviewing, approving, issuing, and controlling policies, processes, procedures and related documentation relevant to SAM so that it is always possible to determine the complete set available, which version of each document is currently in effect and which documents apply to different types of software and related assets.

4.2.4.2.a Tier 2 Policy

Management

Establishment

of Policy and

Regulation

PO2 Define the Information Architecture ME2 Monitor and evaluate internal control PO3 Determine Technological Direction

Policy, process and procedure documentation required by this part of ISO/IEC 19770 are organized by the process classifications of this part of ISO/IEC 19770 or with a cross-reference to these classifications.

4.2.4.2.b Tier 2 Policy

Management

Establishment

of Policy and

Regulation

PO2 Define the Information Architecture PO2.1 Enterprise Information Architecture PO2.3 Data Classification Scheme

Policies are developed, approved and issued covering at a minimum:

4.2.4.2.c Tier 2

Policy Management

Communication & Education

Management

Establishment

of Policy and

Regulation

PO1 Define a Strategic IT Plan PO2 Define the Information Architecture PO6 Communicate Management Aims and Direction PO8 Manage Quality DS7 Educate and train users

Individual and corporate responsibilities for corporate governance of software and related assets.

4.2.4.2.c.1 Tier 2

Policy Management

Program Management

Establishment

of Policy and

Regulation

PO1 Define a Strategic IT Plan PO2 Define the Information Architecture PO4 Define the IT Processes, Organisation and Relationships PO4.6 Establishment of Roles and Responsibilities PO4.7 Responsibility for IT Quality Assurance

Any restrictions on personal use of corporate software and related assets.

4.2.4.2.c.2 Tier 2 Policy

Management

Establishment

of Policy and

Regulation PO4.8 Responsibility for Risk, Security and Compliance

Requirement for compliance with legal and regulatory requirements, including for copyright and data protection.

4.2.4.2.c.3 Tier 2 Compliance

Management Policy

Management

Establishment

of Policy and

Regulation

ME3 Ensure compliance with external requirements PO4.8 Responsibility for Risk, Security and Compliance

Page 65: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

61 © ISO/IEC 2010 – All rights reserved

ISO/IEC 19770-1 Key Area Outcomes

19770-1 Reference

19770-1

Tier

IAITAM Best Practice

Library (IBPL) Key Area

Japanese SAM

Consortium Best

Practice

CobiT 4.1 Key Area

Any procurement requirements (e.g. use of corporate agreements, or buying only from reputable/approved suppliers)

4.2.4.2.c.4 Tier 2 Acquisition

Management Policy

Management

Establishment

of Policy and

Regulation

AI1 Identify Automated Solutions PO4.8 Responsibility for Risk, Security and Compliance

Any requirement for approvals for installation or use of software, whether purchased or not.

4.2.4.2.c.5 Tier 2 Acquisition Management

Establishment

of Policy and

Regulation

PO2 Define the Information Architecture PO10 Manage Projects

Disciplinary implications of violation of these policies.

4.2.4.2.c.6 Tier 2 Policy Management

Establishment

of Policy and

Regulation

ME2 Monitor and evaluate internal control DS5 Ensure Systems Security

Policies and procedures are communicated to all personnel in a way which (a) reaches all new personnel when they start, and continuing personnel at least annually; (b) requires positive acknowledgement back from personnel when they start and at least annually; and (c) is readily accessible at all times to personnel.

4.2.4.2.d Tier 2 Communication &

Education Management

Establishment

of a

Managerial

System

DS7 Educate and train users PO1 Define a Strategic IT Plan PO2 Define the Information Architecture PO6 Communicate Management Aims and Direction PO8 Manage Quality

4.2.5 Competence in SAM The objective of the Competence in SAM process is to ensure that appropriate competence and expertise in SAM is available and is being applied. Implementation of the Competence in SAM process will enable the organization to Demonstrate that:

4.2.5.2 PO6 Communicate Management Aims and Direction PO7 Manage IT Human Resources

A review is documented and updated at least annually which covers the availability and uptake of training and certification by personnel with SAM responsibilities for:

4.2.5.2.a Tier 2 Communication &

Education Management

Establishment

of a

Managerial

System

PO7 Manage IT Human Resources

SAM in general. 4.2.5.2.a.1 Tier 2 Communication &

Education Management

Establishment

of a

Managerial

System

PO7 Manage IT Human Resources

Licensing for software manufacturers whose software is being used.

4.2.5.2.a.2 Tier 2 Communication &

Education Management

Establishment

of a

Managerial

System

AI5 Procure IT Resources AI6 Manage Changes DS9 Manage the Configuration DS9.3 Configuration Integrity Review DS9.3 Configuration Integrity Review

A review is undertaken at least annually to determine what constitutes "Proof of License" for the software manufacturer.

4.2.5.2.b Tier 4 Compliance

Management

Establishment

of a

Managerial

System

ME2 Monitor and evaluate internal control AI6 Manage Changes DS9 Manage the Configuration DS9.3 Configuration Integrity Review

Personnel with SAM management responsibilities receive training in SAM and in relevant licensing, including both initial training and formal continuing education annually.

4.2.5.2.c Tier 2 Communication &

Education Management

Establishment

of a

Managerial

System

PO7 Manage IT Human Resources

Page 66: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

© ISO/IEC 2010 – All rights reserved 62

ISO/IEC 19770-1 Key Area Outcomes

19770-1 Reference

19770-1

Tier

IAITAM Best Practice

Library (IBPL) Key Area

Japanese SAM

Consortium Best

Practice

CobiT 4.1 Key Area

A review is undertaken at least annually to ascertain what, if any, extra guidance is offered by the software manufacturers to enable compliance with their licenses

4.2.5.2.d Tier 2 Compliance

Management

Establishment

of a

Managerial

System

PO1 Define a Strategic IT Plan PO2 Define the Information Architecture PO3 Determine Technological Direction PO3.4 Technology Standards PO3.5 IT Architecture Board PO4 Define the IT Processes, Organisation and Relationships PO4.1 IT Process Framework Define an IT process PO4.8 Responsibility for Risk, Security and Compliance PO6 Communicate Management Aims and Direction PO8.6 Quality Measurement, Monitoring and Review

4.3 Planning and Implementation Processes for SAM The objective of Planning and implementation processes for SAM is to ensure the effective and efficient accomplishment of SAM management objectives.

4.3.2 Planning for SAM The objective of the Planning for SAM process is to ensure appropriate preparation and planning for the effective and efficient accomplishment of SAM objectives. Implementation of the Planning for SAM process will enable the organization to demonstrate that:

4.3.2.2 PO1 Define a Strategic IT Plan PO3 Determine Technological Direction P010 Manage projects

Management objectives for SAM are developed and proposed for approval by the corporate board or equivalent body, and updated at least annually

4.3.2.2.a Tier 4 Program

Management

Introduction:

SAM as a

Management

System

PO4.8 Responsibility for Risk, Security and Compliance PO5 Manage the IT Investment PO9.6 Maintenance and Monitoring of a Risk Action Plan AI1 Identify Automated Solutions PO6 Communicate Management Aims and Direction ME4 Provide IT governance

A plan (the 'SAM plan') for implementing and delivering SAM is developed and documented, and updated at least annually, which includes:

4.3.2.2.b Tier 2 Program

Management

Introduction:

SAM as a

Management

System

PO4.8 Responsibility for Risk, Security and Compliance PO5 Manage the IT Investment PO9.6 Maintenance and Monitoring of a Risk Action Plan AI1 Identify Automated Solutions PO1 Define a Strategic IT Plan

A clear scope statement ('software asset scope') describing which types of software are included; the coverage of related assets, including any beyond the minimum required by this part of ISO/IEC 19770; and any interfaces with or requirements for other organizations or systems.

4.3.2.2.b.1 Tier 2

Program Management Compliance

Management

Introduction:

SAM as a

Management

System

AI1 Identify Automated Solutions DS9 Manage the Configuration

A clear specification of which policies, processes and procedures are required for assets in scope.

4.3.2.2.b.2 Tier 2

Program Management

Policy Management Acquisition

Management

Introduction:

SAM as a

Management

System

PO6 Communicate Management Aims and Direction P07 Manage IT human resources

A clear explanation of the approach to managing, auditing and improving SAM including automation as appropriate to support the processes.

4.3.2.2.b.3 Tier 2 Program Management

Introduction:

SAM as a

Management

System

PO2 Define the Information Architecture PO3 Determine Technological Direction PO8.3 Development and Acquisition Standards AI1 Identify Automated Solutions

Page 67: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

63 © ISO/IEC 2010 – All rights reserved

ISO/IEC 19770-1 Key Area Outcomes

19770-1 Reference

19770-1

Tier

IAITAM Best Practice

Library (IBPL) Key Area

Japanese SAM

Consortium Best

Practice

CobiT 4.1 Key Area

An explanation of the approach to be used to identifying, assessing and managing issues and risks related to the achievement of the defined management objectives.

4.3.2.2.b.4 Tier 2

Program Management Compliance

Management Legislation

Management

Introduction:

SAM as a

Management

System

PO2 Define the Information Architecture PO3 Determine Technological Direction PO8.3 Development and Acquisition Standards AI1 Identify Automated Solutions DS8 Manage service desk and incidents DS10 Manage Problems

Schedules and responsibilities for periodic activities, including preparation of management reports and performance of verification and compliance activities.

4.3.2.2.b.5 Tier 2 Program Management

Introduction:

SAM as a

Management

System

PO2 Define the Information Architecture PO3 Determine Technological Direction PO8.3 Development and Acquisition Standards AI1 Identify Automated Solutions ME1 Monitor and evaluate IT performance

Identification of the resources including budget needed to implement the SAM plan.

4.3.2.2.b.6 Tier 2 Program Management

Introduction:

SAM as a

Management

System

PO2 Define the Information Architecture PO3 Determine Technological Direction PO8.3 Development and Acquisition Standards AI1 Identify Automated Solutions PO5 Manage the IT Investment, DS6 Identify and Allocate Costs

Performance measures for tracking accomplishment against the SAM plan, including target measures for accuracy of the asset management records.

4.3.2.2.b.7 Tier 2 Program

Management Compliance

Management

Introduction:

SAM as a

Management

System

PO2 Define the Information Architecture PO3 Determine Technological Direction PO8.3 Development and Acquisition Standards AI1 Identify Automated Solutions ME1 Monitor and evaluate IT performance

The plan is approved by the corporate board or equivalent body

4.3.2.2.c Tier 2 Program

Management

Introduction:

SAM as a

Management

System

PO4.8 Responsibility for Risk, Security and Compliance PO5 Manage the IT Investment PO9.6 Maintenance and Monitoring of a Risk Action Plan ME4 Provide IT governance

4.3.3 Implementation of SAM The objective of the Implementation of SAM process is to accomplish overall SAM objectives and the SAM plan. Implementation of the Implementation of SAM process will enable the organization to demonstrate that:

4.3.3.2

Mechanisms are in place to collect information, including from local SAM owners, about changes, issues and risks that affect the SAM plan throughout the year

4.3.3.2.a Tier 4

Program Management

Communication & Education

Management

Introduction:

SAM as a

Management

System

AI6 Manage Changes PO9 Assess and Manage IT Risks PO6 Communicate Management Aims and Direction

Regular status reports (at least quarterly) are prepared by the SAM owner detailing the overall progress against the SAM plan for reporting to the corporate board or equivalent body.

4.3.3.2.b Tier 4

Program Management

Communication & Education

Management

Introduction:

SAM as a

Management

System

ME2 Monitor and evaluate internal control PO6 Communicate Management Aims and Direction

Page 68: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

© ISO/IEC 2010 – All rights reserved 64

ISO/IEC 19770-1 Key Area Outcomes

19770-1 Reference

19770-1

Tier

IAITAM Best Practice

Library (IBPL) Key Area

Japanese SAM

Consortium Best

Practice

CobiT 4.1 Key Area

Follow-up on any variances identified takes place promptly and is documented. 4.3.3.2.c Tier 4

Program Management

Introduction:

SAM as a

Management

System

ME1 Monitor and evaluate IT performance ME2 Monitor and evaluate internal control ME3 Ensure compliance with external requirements ME4 Provide IT governance PO6 Communicate Management Aims and Direction PO7 Manage IT Human Resources

4.3.4 Monitoring and review of SAM The objective of the Monitoring and review of SAM process is to ensure that the management objectives for SAM are being achieved

Implementation of the Monitoring and review of SAM process will enable the organization to demonstrate that:

4.3.4.2 ME1 Monitor and evaluate IT performance

A formal review is conducted at least annually:

4.3.4.2.a Tier 4 Program

Management

Introduction:

SAM as a

Management

System

ME1 Monitor and evaluate IT performance

to assess whether management objectives for SAM and the SAM plan are being achieved

4.3.4.2.a.1 Tier 4 Program

Management

Introduction:

SAM as a

Management

System

ME1 Monitor and evaluate IT performance

to summarize performance against all performance measures specified in the SAM plan and in service level agreements related to SAM

4.3.4.2.a.2 Tier 4 Program

Management

Introduction:

SAM as a

Management

System

ME2 Monitor and evaluate internal control PO8 Manage Quality

to provide a summary of the findings of the Conformance verification for SAM process

4.3.4.2.a.3 Tier 4 Compliance

Management

Introduction:

SAM as a

Management

System

PO8 Manage Quality ME3 Ensure compliance with external requirements

to conclude on the basis of the above whether:

4.3.4.2.a.4 Tier 4

Introduction:

SAM as a

Management

System

the policies approved by management which are relevant for SAM have been effectively disseminated throughout the organizational scope defined for the purposes of this part of ISO/IEC 19770

4.3.4.2.a.4.i Tier 4

Policy Management

Communication & Education

Management

Introduction:

SAM as a

Management

System

PO1 Define a Strategic IT Plan PO2.4 Integrity Management PO4 Define the IT Processes, Organisation and Relationships PO4.14 Contracted Staff Policies and Procedures

the processes and procedures which are relevant for SAM, as approved by management, have been effectively implemented throughout the organizational scope defined for the purposes of this part of ISO/IEC 19770

4.3.4.2.a.4.ii Tier 4

Program Management Compliance

Management

Introduction:

SAM as a

Management

System

PO1 Define a Strategic IT Plan PO2.4 Integrity Management PO4 Define the IT Processes, Organisation and Relationships PO4.14 Contracted Staff Policies and Procedures

Page 69: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

65 © ISO/IEC 2010 – All rights reserved

ISO/IEC 19770-1 Key Area Outcomes

19770-1 Reference

19770-1

Tier

IAITAM Best Practice

Library (IBPL) Key Area

Japanese SAM

Consortium Best

Practice

CobiT 4.1 Key Area

to summarize any exceptions identified and actions which may need to be taken as a result of the above

4.3.4.2.a.5 Tier 4 Program

Management

Introduction:

SAM as a

Management

System

PO1 Define a Strategic IT Plan PO2.4 Integrity Management PO4 Define the IT Processes, Organisation and Relationships PO4.14 Contracted Staff Policies and Procedures

to identify opportunities for improvement in the provision of services for software and related assets

4.3.4.2.a.6 Tier 4 Program

Management

Introduction:

SAM as a

Management

System

PO1 Define a Strategic IT Plan PO1.1 IT Value Management PO1.3 Assessment of Current Capability and Performance PO1.4 IT Strategic Plan PO1.5 IT Tactical Plans PO3 Determine Technological Direction PO4.3 IT Steering Committee PO4 Define the IT Processes, Organisation and Relationships

to consider whether there is a need for a review of policies, processes and procedures as to their continued appropriateness, completeness and correctness.

4.3.4.2.a.7 Tier 4 Policy

Management

Introduction:

SAM as a

Management

System

PO9 Assess and Manage IT Risks DS9 Manage the Configuration

The SAM owner formally approves the report, documents decisions and actions that are to be taken as a result, and copies it to the corporate board or equivalent body.

4.3.4.2.b Tier 4 Program

Management

Introduction:

SAM as a

Management

System

PO2 Define the Information Architecture

There is a periodic review (at least annually) of whether software and related assets are deployed in the most cost-effective manner possible; and recommendations are made for possible improvement.

4.3.4.2.c Tier 4 Program

Management

Introduction:

SAM as a

Management

System

PO9 Assess and Manage IT Risks DS9 Manage the Configuration

4.3.5 Continual Improvement of SAM The objective of the Continual improvement of SAM process is to ensure that opportunities for improvement are identified and acted upon where considered justified, both in the use of software and related assets and in the SAM processes themselves. Implementation of the Continual improvement of SAM process will enable the organization to demonstrate that:

4.3.5.2 PO2 Define the Information Architecture PO4.1 IT Process Framework

A mechanism is in place to collect and record suggested improvements in SAM arising from all sources throughout the year.

4.3.5.2.a Tier 4 Communication &

Education Management

Introduction:

SAM as a

Management

System

PO2 Define the Information Architecture PO4.1 IT Process Framework

Suggestions for improvement are periodically assessed, prioritized and approved for incorporation in SAM implementation and improvement plans.

4.3.5.2.b Tier 4 Program

Management

Introduction:

SAM as a

Management

System

PO2 Define the Information Architecture PO4.1 IT Process Framework

4.4 Inventory Processes for SAM The objective of Inventory processes for SAM is to create and maintain all stores and records for software and related assets, and to provide the data management functionality which ensures the integrity of control of software and related assets in the other SAM processes. Inventory processes for SAM are the basis not only for SAM, but for all of configuration management. Configuration management goes beyond the scope of SAM insofar as it covers all IT assets (not only software and related assets), may cover non-IT assets, and the relationships between all of these assets. In the context of a project encompassing all of IT service management, Inventory processes for SAM would be considered part of configuration management.

4.4.2 Software Asset Identification The objective of the Software asset identification process is to ensure that the necessary classes of assets are selected and grouped; and defined by appropriate characteristics that enable effective and efficient control of software and related assets.

Page 70: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

© ISO/IEC 2010 – All rights reserved 66

ISO/IEC 19770-1 Key Area Outcomes

19770-1 Reference

19770-1

Tier

IAITAM Best Practice

Library (IBPL) Key Area

Japanese SAM

Consortium Best

Practice

CobiT 4.1 Key Area

Implementation of the Software asset identification process will enable the organization to demonstrate that:

4.4.2.2

PO2 Define the Information Architecture PO4.1 IT Process Framework DS9 Manage the Configuration

Types of assets to be controlled and the information associated with them are formally defined, taking into account the following:

4.4.2.2.a Tier 4

Introduction:

SAM as a

Management

System

PO2 Define the Information Architecture AI1 Identify Automated Solutions PO1.5 IT Tactical Plans PO5 Manage the IT Investment PO9 Assess and Manage IT Risks

Items to be managed are chosen using established selection criteria, grouped, classified and identified to ensure that they are manageable and traceable throughout their lifecycle.

4.4.2.2.a.1 Tier 4 Asset

Identification Management

Introduction:

SAM as a

Management

System

PO9 Assess and Manage IT Risks DS5 Ensure Systems Security DS9.1 Configuration Repository and Baseline

Items to be managed include: 4.4.2.2.a.2 Tier 4

Introduction:

SAM as a

Management

System

PO9 Assess and Manage IT Risks

All platforms on which software can be installed or run

4.4.2.2.a.2.i Tier 4 Asset

Identification Management

Introduction:

SAM as a

Management

System

PO9 Assess and Manage IT Risks PO10 Manage Projects DS9 Manage the Configuration

Software definitive master versions and distribution copies

4.4.2.2.a.2.ii Tier 4 Asset

Identification Management

Introduction:

SAM as a

Management

System

DS9 Manage the Configuration

Software builds and releases (originals and distribution copies)

4.4.2.2.a.2.iii Tier 4 Asset

Identification Management

Introduction:

SAM as a

Management

System

DS9 Manage the Configuration

All installed software 4.4.2.2.a.2.iv Tier 4 Asset

Identification Management

Introduction:

SAM as a

Management

System

PO10 Manage Projects DS9 Manage the Configuration

Software versions 4.4.2.2.a.2.v Tier 4

Asset Identification Management

Program Management

Introduction:

SAM as a

Management

System

DS9 Manage the Configuration

Methodology by which software within scope is identified

4.4.2.2.a.2.vi Tier 4 Asset

Identification Management

Introduction:

SAM as a

Management

System

PO10 Manage Projects DS9 Manage the Configuration

Page 71: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

67 © ISO/IEC 2010 – All rights reserved

ISO/IEC 19770-1 Key Area Outcomes

19770-1 Reference

19770-1

Tier

IAITAM Best Practice

Library (IBPL) Key Area

Japanese SAM

Consortium Best

Practice

CobiT 4.1 Key Area

Patches and updates 4.4.2.2.a.2.vii Tier 4 Asset

Identification Management

Introduction:

SAM as a

Management

System

DS9 Manage the Configuration

Licenses including underlying licenses and effective full licenses

4.4.2.2.a.2.viii Tier 4

Asset Identification Management Compliance

Management

Introduction:

SAM as a

Management

System

AI2 Acquire and maintain application software

Proof of license documentation 4.4.2.2.a.2.ix Tier 4

Compliance Management

Documentation Management

Introduction:

SAM as a

Management

System

AI2 Acquire and maintain application software

Contracts (including terms and conditions) relating to software assets, including both hard-copy and electronic

4.4.2.2.a.2.x Tier 4

Compliance Management

Documentation Management Acquisition

Management

Introduction:

SAM as a

Management

System

AI2 Acquire and maintain application software

Both physical and electronic stores of the above, as relevant

4.4.2.2.a.2.xi Tier 4 Asset

Identification Management

Introduction:

SAM as a

Management

System

PO9 Assess and Manage IT Risks DS9 Manage the Configuration

Licensing models 4.4.2.2.a.2.xii Tier 4 Compliance

Management

Introduction:

SAM as a

Management

System

PO9 Assess and Manage IT Risks PO5 Manage the IT Investment

Software should be manageable both by files and by packages corresponding to specific products released by software manufacturers or developers.

4.4.2.2.a.3 Tier 4 Asset

Identification Management

Introduction:

SAM as a

Management

System

PO9 Assess and Manage IT Risks DS12 Manage the Physical Environment

Basic information required for all assets is

4.4.2.2.a.4 Tier 4 Asset

Identification Management

Introduction:

SAM as a

Management

System

DS9 Manage the Configuration

Unique identifier 4.4.2.2.a.4.i Tier 4 Asset

Identification Management

Introduction:

SAM as a

Management

System

DS9 Manage the Configuration

Name/description 4.4.2.2.a.4.ii Tier 4 Asset

Identification Management

Introduction:

SAM as a

Management

System

DS9 Manage the Configuration

Page 72: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

© ISO/IEC 2010 – All rights reserved 68

ISO/IEC 19770-1 Key Area Outcomes

19770-1 Reference

19770-1

Tier

IAITAM Best Practice

Library (IBPL) Key Area

Japanese SAM

Consortium Best

Practice

CobiT 4.1 Key Area

Location 4.4.2.2.a.4.iii Tier 4

Asset Identification Management

Program Management

Introduction:

SAM as a

Management

System

DS9 Manage the Configuration

Custodianship (or owner) 4.4.2.2.a.4.iv Tier 4

Asset Identification Management

Program Management Acquisition

Management

Introduction:

SAM as a

Management

System

DS9 Manage the Configuration

Status (e.g. test/production status; development or build status)

4.4.2.2.a.v Tier 4

Asset Identification Management

Program Management

Introduction:

SAM as a

Management

System

DS9 Manage the Configuration

Type (e.g. software, hardware, facility)

4.4.2.2.a.vi Tier 4 Asset

Identification Management

Introduction:

SAM as a

Management

System

DS9 Manage the Configuration

Version (where applicable) 4.4.2.2.a.vii Tier 4 Asset

Identification Management

Introduction:

SAM as a

Management

System

DS9 Manage the Configuration

A register of stores and inventories exists, clarifying which stores and types of information are held, with duplication allowed only if duplicate information can be traced back to the definitive source record.

4.4.2.2.b Tier 1

Asset Identification Management

Documentation Management

Introduction:

SAM as a

Management

System

DS9 Manage the Configuration DS12 Manage the Physical Environment

4.4.3 Software asset Inventory management The objective of the Software asset inventory management process is to ensure that physical instances of software assets are properly stored; and that required data about characteristics for all assets and configuration items is accurately recorded throughout the life cycle. It also provides information on software assets and related assets to support the effectiveness and efficiency of other business processes. Implementation of the Software asset inventory management process will enable the organization to demonstrate that:

4.4.3.2 DS13.4 Sensitive Documents and Output Devices

Policies and procedures are developed, approved and issued which include the management and maintenance of inventories and physical/electronic stores including access controls which:

4.4.3.2.a Tier 1

Policy Management

Communication & Education

Management

Inventory

Management

Framework in

Software

Asset

Management

DS9 Manage the Configuration , DS13.4 Sensitive Documents and Output Devices

protect them from unauthorized access, change or corruption.

4.4.3.2.a.1 Tier 1 Policy

Management

Inventory

Management

Framework in

Software

Asset

Management

PO7.8 Job Change and Termination DS5.3 Identity Management

Page 73: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

69 © ISO/IEC 2010 – All rights reserved

ISO/IEC 19770-1 Key Area Outcomes

19770-1 Reference

19770-1

Tier

IAITAM Best Practice

Library (IBPL) Key Area

Japanese SAM

Consortium Best

Practice

CobiT 4.1 Key Area

provide a means for disaster recovery.

4.4.3.2.a.2 Tier 1 Documentation Management

Inventory

Management

Framework in

Software

Asset

Management

DS4.1 IT Continuity Framework

Inventories exist of: 4.4.3.2.b Tier 1

Inventory

Management

Framework in

Software

Asset

Management

all platforms on which software assets can be installed or run.

4.4.3.2.b.1 Tier 1 Asset

Identification Management

Inventory

Management

Framework in

Software

Asset

Management

DS9 Manage the Configuration PO10 Manage Projects

all authorized installed software showing (a) packages and versions which can be

4.4.3.2.b.2 Tier 1 Asset

Identification Management

Inventory

Management

Framework in

Software

Asset

Management

DS9 Manage the Configuration PO10 Manage Projects

underlying licenses and effective full licenses held.

4.4.3.2.b.3 Tier 1

Asset Identification Management

Documentation Management

Inventory

Management

Framework in

Software

Asset

Management

PO9 Assess and Manage IT Risks DS9 Manage the Configuration

Inventories and corresponding physical/electronic stores exist of:

4.4.3.2.c Tier 1 Asset

Identification Management

Inventory

Management

Framework in

Software

Asset

Management

PO9 Assess and Manage IT Risks DS9 Manage the Configuration

software (definitive master versions and distribution copies)

4.4.3.2.c.1 Tier 1 Asset

Identification Management

Inventory

Management

Framework in

Software

Asset

Management

PO9 Assess and Manage IT Risks DS9 Manage the Configuration

Page 74: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

© ISO/IEC 2010 – All rights reserved 70

ISO/IEC 19770-1 Key Area Outcomes

19770-1 Reference

19770-1

Tier

IAITAM Best Practice

Library (IBPL) Key Area

Japanese SAM

Consortium Best

Practice

CobiT 4.1 Key Area

software builds and releases (originals and distribution copies)

4.4.3.2.c.2 Tier 4 Asset

Identification Management

Inventory

Management

Framework in

Software

Asset

Management

PO9 Assess and Manage IT Risks DS9 Manage the Configuration

contracts relating to software assets, both hard-copy and electronic

4.4.3.2.c.3 Tier 1

Asset Identification Management

Documentation Management

Inventory

Management

Framework in

Software

Asset

Management

PO9 Assess and Manage IT Risks DS9 Manage the Configuration

Proof of license documentation. 4.4.3.2.c.4 Tier 1 Documentation Management

Inventory

Management

Framework in

Software

Asset

Management

PO9 Assess and Manage IT Risks DS9 Manage the Configuration PO5 Manage the IT Investment AI1 Identify Automated Solutions AI2 Acquire and maintain application software

Inventories or other clearly defined analysis or metric mechanisms exist to determine any licensing usage based on criteria other than software installations.

4.4.3.2.d Tier 1

Asset Identification Management

Program Management

Inventory

Management

Framework in

Software

Asset

Management

PO9 Assess and Manage IT Risks PO10 Manage Projects

Arrangements are made to ensure the continued availability of the sources listed above.

4.4.3.2.e Tier 4 Documentation Management

Inventory

Management

Framework in

Software

Asset

Management

PO5 Manage the IT Investment AI1 Identify Automated Solutions

Each inventory report produced has a clear description including its identity, purpose, and details of the data source.

4.4.3.2.f Tier 4

Asset Identification Management

Inventory

Management

Framework in

Software

Asset

Management

PO5 Manage the IT Investment AI1 Identify Automated Solutions DS13.4 Sensitive Documents and Output Devices

4.4.4 Software Asset Control The objective of the Software asset control process is to provide the control mechanism over software assets and changes to software and related assets while maintaining a record of changes to status and approvals. Implementation of the Software asset control process will enable the organization to demonstrate that:

4.4.4.2

Page 75: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

71 © ISO/IEC 2010 – All rights reserved

ISO/IEC 19770-1 Key Area Outcomes

19770-1 Reference

19770-1

Tier

IAITAM Best Practice

Library (IBPL) Key Area

Japanese SAM

Consortium Best

Practice

CobiT 4.1 Key Area

An audit trail is maintained of changes made to software and related assets including changes in the status, location, custodianship and version

4.4.4.2.a Tier 4

Asset Identification Management

Program Management

Inventory

Management

Framework in

Software

Asset

Management

AI7 Install and Accredit Solutions and Changes AI7.5 System and Data Conversion DS9 Manage the Configuration

Policies and procedures are developed, approved and issued for the development, maintenance and management of software versions, images/builds and releases.

4.4.4.2.b Tier 4

Policy Management

Communication & Education

Management

Inventory

Management

Framework in

Software

Asset

Management

PO1 Define a Strategic IT Plan PO2.4 Integrity Management PO4 Define the IT Processes, Organisation and Relationships PO4.14 Contracted Staff Policies and Procedures DS9 Manage the Configuration

Policies and procedures are developed, approved and issued which require that a baseline of the appropriate assets is taken before a release of software to the live environment in a manner that can be used for subsequent checking against actual deployment.

4.4.4.2.c Tier 4

Policy Management

Communication & Education

Management

Inventory

Management

Framework in

Software

Asset

Management

PO1 Define a Strategic IT Plan PO2.4 Integrity Management PO4 Define the IT Processes, Organisation and Relationships PO4.14 Contracted Staff Policies and Procedures DS9 Manage the Configuration

4.5 Verification and Compliance Processes for SAM The objective of Verification and compliance processes for SAM is to detect and manage all exceptions to SAM policies, processes, and procedures; including license use rights. Verification and compliance processes for SAM are important functions for an organization. They do not refer to audits conducted by software manufacturers, although there are similarities. They need to be performed on a regular basis for the proper functioning of the entire SAM process, and for any IT service management processes that rely on them.

4.5.2 Software Asset Record Verification The objective of the Software asset record verification process is to ensure that records reflect accurately and completely what they are supposed to record, and conversely that what they record has not changed without approval.

Implementation of the Software asset record verification process will enable the organization to demonstrate that:

4.5.2.2

PO1 Define a Strategic IT Plan PO1 Define a Strategic IT Plan PO3 Determine Technological Direction P010 Manage projects DS9 Manage the Configuration ME2 Monitor and evaluate internal control

Procedures are developed, approved and issued for the Software asset record verification process to include:

4.5.2.2.a Tier 1

Program Management Compliance

Management

Monitoring

License

Ownership

PO1 Define a Strategic IT Plan PO2.4 Integrity Management PO4 Define the IT Processes, Organisation and Relationships PO4.14 Contracted Staff Policies and Procedures

Whenever scope is defined or changed, there is a validation of that scope by reviewing contract and purchase history in order to ensure the organizational and software scopes are aligned with business requirements.

4.5.2.2.a.1 Tier 1

Program Management Compliance

Management

Monitoring

Software

Deployment

PO1 Define a Strategic IT Plan PO2.4 Integrity Management PO4 Define the IT Processes, Organisation and Relationships PO4.14 Contracted Staff Policies and Procedures

At least quarterly there is reconciliation between what is installed on each platform and what was authorized for installation, including reporting on exceptions identified in what is currently installed, and in what has changed since the previous reconciliation.

4.5.2.2.a.2 Tier 1

Program Management Compliance

Management Asset

Identification Management

Preventative

Environment

for Illegal

Software

DS9 Manage the Configuration , ME2 Monitor and evaluate internal control PO9 Assess and Manage IT Risks PO10 Manage Projects

Page 76: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

© ISO/IEC 2010 – All rights reserved 72

ISO/IEC 19770-1 Key Area Outcomes

19770-1 Reference

19770-1

Tier

IAITAM Best Practice

Library (IBPL) Key Area

Japanese SAM

Consortium Best

Practice

CobiT 4.1 Key Area

The hardware inventory including locations is verified at least 6-monthly, including reporting on exceptions identified.

4.5.2.2.a.3 Tier 1

Program Management Compliance

Management Asset

Identification Management

Monitoring

License

Ownership

DS9 Manage the Configuration , ME2 Monitor and evaluate internal control PO5 Manage the IT Investment AI1 Identify Automated Solutions DS13.4 Sensitive Documents and Output Devices

The inventory of software programs (definitive master versions and distribution copies) is verified at least 6-monthly, including reporting on exceptions identified.

4.5.2.2.a.4 Tier 4 Asset

Identification Management

Monitoring

Software

Deployment

AI2 Acquire and maintain application software DS9 Manage the Configuration ME2 Monitor and evaluate internal control PO5 Manage the IT Investment AI1 Identify Automated Solutions DS13.4 Sensitive Documents and Output Devices

The inventory of software builds (originals and distribution copies) is verified at least 6-monthly, including reporting on exceptions identified.

4.5.2.2.a.5 Tier 4 Asset

Identification Management

Preventative

Environment

for Illegal

Software

AI2 Acquire and maintain application software DS9 Manage the Configuration ME2 Monitor and evaluate internal control

The physical store of proof of license documentation is verified (including for authenticity) at least annually, including reporting on exceptions identified.

4.5.2.2.a.6 Tier 4 Documentation Management

Monitoring

License

Ownership

PO9 Assess and Manage IT Risks DS9 Manage the Configuration

The bases for and calculations of effective licenses from underlying licenses are reviewed at least annually, to ensure that necessary underlying licenses exist and that quantities are not being double-counted.

4.5.2.2.a.7 Tier 4

Compliance Management Acquisition

Management

Monitoring

Software

Deployment

PO9 Assess and Manage IT Risks DS9 Manage the Configuration

The physical store of contractual documentation related to software assets is verified for completeness at least annually, including reporting on exceptions identified.

4.5.2.2.a.8 Tier 1 Documentation Management

Preventative

Environment

for Illegal

Software

PO9 Assess and Manage IT Risks DS9 Manage the Configuration

The contracts inventory is verified at least annually, including reporting on exceptions identified.

4.5.2.2.a.9 Tier 1

Documentation Management

Asset Identification Management

Monitoring

License

Ownership

PO5 Manage the IT Investment AI1 Identify Automated Solutions DS13.4 Sensitive Documents and Output Devices PO5 Manage the IT Investment AI1 Identify Automated Solutions DS13.4 Sensitive Documents and Output Devices

There is a periodic review of historical invoices for the purpose of identifying incorrect billing and overcharging.

4.5.2.2.a.10 Tier 2 Financial

Management

Monitoring

Software

Deployment

ME2 Monitor and evaluate internal control ME3 Ensure compliance with external requirements DS2 Manage Third-party Services

Follow-up corrective actions on any discrepancies or issues identified above take place and are documented

4.5.2.2.a.11 Tier 1 –4

Program Management

Preventative

Environment

for Illegal

Software

DS5 Ensure Systems Security DS10 Manage Problems ME3.4 Positive Assurance of Compliance

4.5.3 Software Licensing Compliance The objective of the Software licensing compliance process is to ensure that all intellectual property used by the organization but owned by others, pertaining to software and related assets, is properly licensed and used in accordance with its terms and conditions.

Page 77: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

73 © ISO/IEC 2010 – All rights reserved

ISO/IEC 19770-1 Key Area Outcomes

19770-1 Reference

19770-1

Tier

IAITAM Best Practice

Library (IBPL) Key Area

Japanese SAM

Consortium Best

Practice

CobiT 4.1 Key Area

Implementation of the Software licensing compliance process will enable the organization to demonstrate that:

4.5.3.2

PO1 Define a Strategic IT Plan PO3 Determine Technological Direction P010 Manage projects

Procedures are developed, approved and issued for the Software licensing compliance process to include the following:

4.5.3.2.a Tier 1

Monitoring

License

Ownership

PO1 Define a Strategic IT Plan PO2.4 Integrity Management PO4 Define the IT Processes, Organisation and Relationships PO4.14 Contracted Staff Policies and Procedures

Reconciliation is conducted at least quarterly between effective licenses owned and licenses required for software used, taking into account the way licensing requirements are determined as per license terms and conditions.

4.5.3.2.a.1 Tier 1

Compliance Management

Asset Identification Management

Monitoring

Software

Deployment

PO9 Assess and Manage IT Risks DS9 Manage the Configuration

Discrepancies identified in this reconciliation are promptly recorded, analyzed and the root cause is determined.

4.5.3.2.a.2 Tier 1

Compliance Management

Asset Identification Management

Monitoring

License

Ownership

DS10 Manage Problems PO4.8 Responsibility for Risk, Security and Compliance

Follow up actions are prioritized and executed.

4.5.3.2.a.3 Tier 1

Program Management

Asset Identification Management

Monitoring

Software

Deployment

PO4.8 Responsibility for Risk, Security and Compliance

4.5.4 Software Asset Security Compliance The objective of the Software asset security compliance process is to ensure that security requirements related to the use of software and related assets are complied with.

Implementation of the Software asset security compliance process will enable the organization to demonstrate that:

4.5.4.2

PO1 Define a Strategic IT Plan PO3 Determine Technological Direction P010 Manage projects DS5 Ensure Systems Security

Actual practice against policy is reviewed at least annually.

4.5.4.2.a Tier 3 Policy

Management

Preventative

Environment

for Illegal

Software

Security

Considerations

PO9 Assess and Manage IT Risks DS9 Manage the Configuration

Follow-up on any discrepancies identified in this review takes place and is documented.

4.5.4.2.b Tier 4

Policy Management

Program Management

Establishment

of Policy and

Regulation

PO4.8 Responsibility for Risk, Security and Compliance

4.5.5 Conformance Verification for SAM The objective of the Conformance verification for SAM process is to ensure that there is continuing compliance with the requirements of this part of ISO/IEC 19770 including compliance with required policies and procedures.

Implementation of the Conformance verification for SAM process will enable the organization to demonstrate that:

4.5.5.2

PO1 Define a Strategic IT Plan PO3 Determine Technological Direction P010 Manage projects ME2 Monitor and evaluate internal control ME3 Ensure compliance with external requirements

Page 78: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

© ISO/IEC 2010 – All rights reserved 74

ISO/IEC 19770-1 Key Area Outcomes

19770-1 Reference

19770-1

Tier

IAITAM Best Practice

Library (IBPL) Key Area

Japanese SAM

Consortium Best

Practice

CobiT 4.1 Key Area

Policies and procedures are developed, approved and issued for verifying compliance with the relevant tier(s) of this part of ISO/IEC 19770, which ensure verification at least on a sample basis annually against all of the requirements specified in the relevant tier(s) of this part of ISO/IEC 19770. This shall include verification that procedures implemented by the organization for other SAM processes are meeting all requirements specified in this part of ISO/IEC 19770 for those procedures.

4.5.5.2.a Tier 1 -

4

Compliance Management

Policy Management

Communication & Education

Management

Establishment

of Policy and

Regulation

ME2 Monitor and evaluate internal control ME3 Ensure compliance with external requirements PO1 Define a Strategic IT Plan PO2.4 Integrity Management PO4 Define the IT Processes, Organisation and Relationships PO4.14 Contracted Staff Policies and Procedures

Documentary evidence exists that demonstrates (a) that the verification procedures above are being performed, and (b) that corrective follow-up action is taken until successful completion on the causes of all identified exceptions.

4.5.5.2.b Tier 1 -

4

Compliance Management

Documentation Management

Establishment

of Policy and

Regulation

Establishment

of a

Managerial

System

ME2 Monitor and evaluate internal control ME3 Ensure compliance with external requirements PO4.8 Responsibility for Risk, Security and Compliance

4.6 Operations Management Processes and Interfaces for SAM The objective of the Operations management processes and interfaces for SAM is to execute operational management functions which are essential to achieving overall SAM objectives and benefits.

4.6.2 Relationship and contract management for SAM The objective of the Relationship and contract management for SAM process is to manage relationships with other organizations, both external and internal, to ensure the provision of seamless, quality SAM services, and to manage all contracts for software and related assets and services. Implementation of the Relationship and contract management for SAM process will enable the organization to demonstrate that:

4.6.2.2

PO1 Define a Strategic IT Plan PO3 Determine Technological Direction P010 Manage projects

Policies and procedures are developed, approved and issued for managing relationships with suppliers providing software and related assets and services, to include:

4.6.2.2.a Tier 3 Vendor

Management

Operational

Management

Processes

AI5 Procure IT Resources PO1 Define a Strategic IT Plan PO2.4 Integrity Management PO4 Define the IT Processes, Organisation and Relationships PO4.14 Contracted Staff Policies and Procedures

Definitions of responsibilities for supplier management with individuals assigned to have clear overall responsibility for managing each supplier.

4.6.2.2.a.1 Tier 3 Vendor

Management

Operational

Management

Processes

AI5 Procure IT Resources PO2 Define the Information Architecture PO3 Determine Technological Direction PO4 Define the IT Processes, Organisation and Relationships AI1 Identify Automated Solutions AI5 Procure IT Resources DS2 Manage Third-party Services

Developing invitations to tender for the supply of software or related services; to ensure that the process includes consideration of requirements for SAM, including service level management, security controls, release and change management.

4.6.2.2.a.2 Tier 3

Acquisition Management Compliance

Management Program

Management

Operational

Management

Processes DS2 Manage Third-party Services

Page 79: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

75 © ISO/IEC 2010 – All rights reserved

ISO/IEC 19770-1 Key Area Outcomes

19770-1 Reference

19770-1

Tier

IAITAM Best Practice

Library (IBPL) Key Area

Japanese SAM

Consortium Best

Practice

CobiT 4.1 Key Area

Formal documented reviews at least 6-monthly of supplier performance, achievements and issues, with documented conclusions and decisions about any actions to be taken.

4.6.2.2.a.3 Tier 3 Vendor

Management

Operational

Management

Processes DS2 Manage Third-party Services

Policies and procedures are developed, approved and issued for managing customerside relationships, to include:

4.6.2.2.b.4 Tier 4

Operational

Management

Processes

PO1 Define a Strategic IT Plan PO2.4 Integrity Management PO4 Define the IT Processes, Organisation and Relationships PO4.14 Contracted Staff Policies and Procedures

Definitions of responsibilities for managing customer-side business relationships with respect to software and related assets and services.

4.6.2.2.b.5 Tier 4

Acquisition Management

Vendor Management

Operational

Management

Processes

DS1 Define and manage service levels PO8 Manage Quality

A formal review at least annually of current and future software requirements of customers and the business as a whole.

4.6.2.2.b.6 Tier 4 Program

Management

Operational

Management

Processes

DS1 Define and manage service levels PO8 Manage Quality PO9 Assess and Manage IT Risks DS9 Manage the Configuration

Formal documented reviews at least annually of service provider performance, customer satisfaction, achievements and issues, with documented conclusions and decisions about any actions to be taken.

4.6.2.2.b.7 Tier 4

Vendor Management

Program Management

Operational

Management

Processes

DS1 Define and manage service levels PO8 Manage Quality ME1 Monitor and evaluate IT performance PO9 Assess and Manage IT Risks DS9 Manage the Configuration

Policies and procedures are developed, approved and issued for managing contracts, to include:

4.6.2.2.c Tier 3

Operational

Management

Processes

Ensuring that contractual details are recorded in an on-going contract management system as contracts are signed.

4.6.2.2.c.1 Tier 3

Acquisition Management Compliance

Management Policy

Management Vendor

Management

Operational

Management

Processes DS2 Manage Third-party Services

Holding copies of all signed contractual documentation securely with copies kept in a document management system.

4.6.2.2.c.2 Tier 3 Documentation Management

Operational

Management

Processes DS2 Manage Third-party Services

Documented reviews at least 6-monthly and also prior to contract expiry, of all contracts for software and related assets and services, with documented conclusions and decisions about any actions to be taken.

4.6.2.2.c.3 Tier 3

Compliance Management

Vendor Management

Operational

Management

Processes

ME2 Monitor and evaluate internal control

4.6.3 Financial Management for SAM The objective of the Financial management for SAM process is budgeting and accounting for software and related assets; and ensuring that relevant financial information is readily available for financial reporting, tax planning, and calculations such as total cost of ownership and return on investment.

Implementation of the Financial management for SAM process will enable the organization to demonstrate that:

4.6.3.2

PO1 Define a Strategic IT Plan PO3 Determine Technological Direction P010 Manage projects PO5 Manage the IT Investment

Page 80: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

© ISO/IEC 2010 – All rights reserved 76

ISO/IEC 19770-1 Key Area Outcomes

19770-1 Reference

19770-1

Tier

IAITAM Best Practice

Library (IBPL) Key Area

Japanese SAM

Consortium Best

Practice

CobiT 4.1 Key Area

Definitions of financial information relevant to the management of software and related assets are agreed with relevant parties and documented by asset type.

4.6.3.2.a Tier 3

Financial Management

Program Management

Operational

Management

Processes

PO5 Manage the IT Investment, AI1 Identify Automated Solutions DS6 Identify and Allocate Costs

Formal budgets are developed for the acquisition of software assets (externally or internally) and the related support and infrastructure costs.

4.6.3.2.b Tier 3

Program Management

Financial Management

Operational

Management

Processes

PO5 Manage the IT Investment DS6 Identify and Allocate Costs

Actual expenditure on software assets and the related support and infrastructure costs is accounted for against budget.

4.6.3.2.c Tier 3

Program Management

Financial Management

Operational

Management

Processes

PO5 Manage the IT Investment DS6 Identify and Allocate Costs

Clearly documented financial information is readily available about software asset values (including historical cost and depreciated cost).

4.6.3.2.d Tier 3 Documentation Management

Operational

Management

Processes DS6 Identify and Allocate Costs

There are formal documented reviews at least quarterly of actual expenditure against budget, with documented conclusions and decisions about any actions to be taken.

4.6.3.2.e Tier 3 Financial

Management

Operational

Management

Processes PO5 Manage the IT Investment

License optimization is performed, consisting of cost-benefit analysis of drivers of licensing costs, and resulting in recommendations for improvement.

4.6.3.2.f Tier 3

Asset Identification Management

Program Management

PO2 Define the Information Architecture PO4.1 IT Process Framework

4.6.4 Service Level Management for SAM The objective of the Service level management for SAM process is to define record and manage levels of service related to SAM.

Implementation of the Service level management for SAM process will enable the organization to demonstrate that:

4.6.4.2

DS1 Define and manage service levels PO1 Define a Strategic IT Plan PO1 Define a Strategic IT Plan PO3 Determine Technological Direction P010 Manage projects

Service level agreements and supporting agreements are developed and approved for services that are performed within the scope of SAM; to include that:

4.6.4.2.a Tier 3

Operational

Management

Processes PO1 Define a Strategic IT Plan PO1.1 IT Value Management

Services relating to software acquisition, installation, moves, and changes of software assets and related assets are defined and agreed with relevant parties together with the corresponding service level targets and workload characteristics.

4.6.4.2.a.1 Tier 3

Acquisition Management

Program Management

Operational

Management

Processes

AI6 Manage Changes PO9 Assess and Manage IT Risks PO10 Manage Projects

The customer and user obligations and responsibilities in relation to SAM are defined or referenced from the service level agreement.

4.6.4.2.a.2 Tier 3 Program

Management

Operational

Management

Processes

DS1 Define and manage service levels PO1 Define a Strategic IT Plan PO1.1 IT Value Management

Actual workloads and service levels against targets for SAM are reported regularly (at least quarterly), and the reasons for non-conformance are documented.

4.6.4.2.b Tier 3

Program Management Compliance

Management

Operational

Management

Processes

PO7 Manage IT Human Resources ME1 Monitor and evaluate IT performance

Page 81: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

77 © ISO/IEC 2010 – All rights reserved

ISO/IEC 19770-1 Key Area Outcomes

19770-1 Reference

19770-1

Tier

IAITAM Best Practice

Library (IBPL) Key Area

Japanese SAM

Consortium Best

Practice

CobiT 4.1 Key Area

Regular reviews (at least quarterly) by the relevant parties are held to review performance against service levels for SAM with documented conclusions and decisions about any actions to be taken.

4.6.4.2.c Tier 3

Program Management Compliance

Management Vendor

Management

Operational

Management

Processes

DS1 Define and manage service levels ME1 Monitor and evaluate IT performance

4.6.5 Security Management for SAM The objective of the Security management for SAM process is to manage information security effectively within all SAM activities and support the approval requirements related to SAM.

Implementation of the Security management for SAM process will enable the organization to demonstrate that:

4.6.5.2

PO1 Define a Strategic IT Plan PO3 Determine Technological Direction P010 Manage projects DS5 Ensure Systems Security

A formal policy is developed and approved regarding security/access restrictions to all SAM resources, including physical/electronic stores of software, software builds and releases.

4.6.5.2.a Tier 4 Policy

Management

Operational

Management

Processes

PO2.3 Data Classification Scheme DS5.3 Identity Management

Access controls are specified, both physical and logical, to enforce the approval requirements of SAM policies.

4.6.5.2.b Tier 4 Policy

Management

Operational

Management

Processes

PO2.3 Data Classification Scheme DS5.3 Identity Management PO2.3 Data Classification Scheme DS5.3 Identity Management

There is documentary evidence that these specified access controls are being implemented in practice.

4.6.5.2.c Tier 4

Policy Management Compliance

Management

Operational

Management

Processes

PO2.3 Data Classification Scheme DS5.3 Identity Management

4.7 Life Cycle Process Interface for SAM The Life cycle process interfaces for SAM are largely aligned to the primary life cycle processes of ISO/IEC 12207 in the context of SAM as well as to ISO/IEC 20000. The objective of this part of ISO/IEC 19770 is to specify SAM requirements for these life cycle processes.

4.7.2 Change management process The objective of the Change management process with respect to software and related assets is to ensure that all changes which impact on SAM are assessed, approved, implemented and reviewed in a controlled manner and meet all record-keeping requirements.

Implementation of the Change management process will enable the organization to demonstrate that:

4.7.2.2

AI6 Manage Changes PO1 Define a Strategic IT Plan PO3 Determine Technological Direction P010 Manage projects

There is a formal process of change management which includes:

4.7.2.2.a Tier 4

Operational

Management

Processes

AI2.9 Applications Requirements Management AI3.3 Infrastructure Maintenance AI6.1 Change Standards and Procedures

All change requests that affect software or related assets or services, or SAM processes, are identified and recorded.

4.7.2.2.a.1 Tier 4 Program

Management

Operational

Management

Processes

AI2.9 Applications Requirements Management AI3.3 Infrastructure Maintenance AI6.1 Change Standards and Procedures

Change requests affecting software or related assets or services, or SAM processes, are assessed for possible impacts, prioritized, and approved by the responsible management.

4.7.2.2.a.2 Tier 4 Program

Management

Operational

Management

Processes

AI2.9 Applications Requirements Management AI3.3 Infrastructure Maintenance AI6.1 Change Standards and Procedures

The process implementing the approved change request does so only in accordance with the approval.

4.7.2.2.a.3 Tier 4

Program Management

Project Management

Operational

Management

Processes

AI2.9 Applications Requirements Management AI3.3 Infrastructure Maintenance AI6.1 Change Standards and Procedures

Page 82: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

© ISO/IEC 2010 – All rights reserved 78

ISO/IEC 19770-1 Key Area Outcomes

19770-1 Reference

19770-1

Tier

IAITAM Best Practice

Library (IBPL) Key Area

Japanese SAM

Consortium Best

Practice

CobiT 4.1 Key Area

All changes affecting software or related assets or services, or SAM processes, are recorded.

4.7.2.2.a.4 Tier 4

Program Management

Project Management

Operational

Management

Processes

AI2.9 Applications Requirements Management AI3.3 Infrastructure Maintenance AI6.1 Change Standards and Procedures

The success or failure of such changes is documented and periodically reviewed.

4.7.2.2.a.5 Tier 4 Program

Management

Operational

Management

Processes

AI2.9 Applications Requirements Management AI3.3 Infrastructure Maintenance AI6.1 Change Standards and Procedures

4.7.3 Acquisition process The objective of the Acquisition process in respect of software and related assets is to ensure that they are acquired in a controlled manner and properly recorded. Implementation of the Acquisition process will enable the organization to demonstrate that:

4.7.3.2

Standard architectures are defined for the provision of software services, as are the criteria for deviating from those standards.

4.7.3.2.a Tier 3

Acquisition Management

Program Management

Operational

Management

Processes

PO2 Define the Information Architecture PO3 Determine Technological Direction

Standard software configurations are defined, as are the criteria for deviating from those standards.

4.7.3.2.b Tier 3 Program

Management

Operational

Management

Processes

PO2 Define the Information Architecture PO3 Determine Technological Direction DS9 Manage the Configuration

Policies and procedures are developed, properly authorized and issued for requisitioning and ordering software assets and related assets, including:

4.7.3.2.c Tier 3

Operational

Management

Processes

How requirements are specified. 4.7.3.2.c.1 Tier 3

Acquisition Management

Policy Management

Operational

Management

Processes

PO1 Define a Strategic IT Plan PO2.4 Integrity Management PO4 Define the IT Processes, Organisation and Relationships PO4.14 Contracted Staff Policies and Procedures

Management and technical approvals required.

4.7.3.2.c.2 Tier 3

Acquisition Management

Policy Management

Operational

Management

Processes

PO1 Define a Strategic IT Plan PO2.4 Integrity Management PO4 Define the IT Processes, Organisation and Relationships PO4.14 Contracted Staff Policies and Procedures

Use/redeployment of existing licenses if available.

4.7.3.2.c.3 Tier 3 Acquisition

Management

Operational

Management

Processes

PO1 Define a Strategic IT Plan PO2.4 Integrity Management PO4 Define the IT Processes, Organisation and Relationships PO4.14 Contracted Staff Policies and Procedures

Recording future purchase requirements in those cases where software can be deployed before reporting and payment.

4.7.3.2.c.4 Tier 3 Acquisition

Management

Operational

Management

Processes

PO1 Define a Strategic IT Plan PO2.4 Integrity Management PO4 Define the IT Processes, Organisation and Relationships PO4.14 Contracted Staff Policies and Procedures

Policies and procedures are developed, properly authorized and issued for receipt processing functions related to software and related assets, including:

4.7.3.2.d Tier 3

Operational

Management

Processes

PO1 Define a Strategic IT Plan PO2.4 Integrity Management PO4 Define the IT Processes, Organisation and Relationships PO4.14 Contracted Staff Policies and Procedures

Page 83: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

79 © ISO/IEC 2010 – All rights reserved

ISO/IEC 19770-1 Key Area Outcomes

19770-1 Reference

19770-1

Tier

IAITAM Best Practice

Library (IBPL) Key Area

Japanese SAM

Consortium Best

Practice

CobiT 4.1 Key Area

Processing invoices, including reconciliations to orders and retention of copies for license management purposes.

4.7.3.2.d.1 Tier 3

Asset Identification Management

Financial Management

Operational

Management

Processes

PO9 Assess and Manage IT Risks DS5 Ensure Systems Security DS9.1 Configuration Repository and Baseline

Ensuring the receipt and safe-keeping of valid proof of license for all licenses purchased.

4.7.3.2.d.2 Tier 3

Acquisition Management

Documentation Management

Operational

Management

Processes

Processing incoming media which includes requirements for verification, recordkeeping and safe-keeping of contents (physical media and electronic copies).

4.7.3.2.d.3 Tier 3

Asset Identification Management

Operational

Management

Processes

PO9 Assess and Manage IT Risks DS5 Ensure Systems Security DS9.1 Configuration Repository and Baseline

4.7.4 Software development process The objective of the Software development process in respect of software and related assets is to ensure that they are developed in a way which considers SAM requirements.

Implementation of the Software development process will enable the organization to demonstrate that:

4.7.4.2

PO1 Define a Strategic IT Plan PO3 Determine Technological Direction P010 Manage projects

There is a formal process for software development ensuring the following have been considered:

4.7.4.2.a Tier 4 n/a

AI2 Acquire and maintain application software PO2 Define the Information Architecture

Standard architectures and standard configurations.

4.7.4.2.a.1 Tier 4 Program

Management n/a

PO3 Determine Technological Direction PO2 Define the Information Architecture

License constraints and dependencies.

4.7.4.2.a.2 Tier 4

Compliance Management

n/a PO2 Define the Information Architecture

There is a formal process for software development ensuring that software products are placed under software asset control before being introduced into a live environment.

4.7.4.2.b Tier 4

Program Management

Asset Identification Management

n/a

AI2 Acquire and maintain application software PO9 Assess and Manage IT Risks DS5 Ensure Systems Security DS9.1 Configuration Repository and Baseline

4.7.5 Software release management process The objective of the Software release management process in respect of software and related assets is to ensure that releases are planned and executed in a way which supports SAM requirements.

Implementation of the Software release management process will enable the organization to demonstrate that:

4.7.5.2

AI2 Acquire and maintain application software PO1 Define a Strategic IT Plan PO3 Determine Technological Direction P010 Manage projects

There is a formal process for release management ensuring that:

4.7.5.2.a Tier 4

Operational

Management

Processes

A controlled acceptance environment is used to build and test all proposed releases including patches prior to release.

4.7.5.2.a.1 Tier 4 Acquisition

Management

Operational

Management

Processes

AI2 Acquire and maintain application software PO1 Define a Strategic IT Plan PO2.4 Integrity Management PO4 Define the IT Processes, Organisation and Relationships PO4.14 Contracted Staff Policies and Procedures

The frequency and type of releases are planned and agreed with the business and customers, including the frequency of security patch releases.

4.7.5.2.a.2 Tier 4

Operational

Management

Processes

AI6 Manage Changes AI7 Install and Accredit Solutions and Changes DS9 Manage the Configuration

Page 84: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

© ISO/IEC 2010 – All rights reserved 80

ISO/IEC 19770-1 Key Area Outcomes

19770-1 Reference

19770-1

Tier

IAITAM Best Practice

Library (IBPL) Key Area

Japanese SAM

Consortium Best

Practice

CobiT 4.1 Key Area

The planned release dates and deliverables are recorded with references to related change requests and problems, and communicated to incident management.

4.7.5.2.a.3 Tier 4

Operational

Management

Processes

AI6 Manage Changes AI7 Install and Accredit Solutions and Changes DS9 Manage the Configuration

The release of software and related assets is approved by the responsible management.

4.7.5.2.a.4 Tier 4

Operational

Management

Processes

AI6 Manage Changes AI7 Install and Accredit Solutions and Changes DS9 Manage the Configuration

The success or failure of releases is recorded, and periodically reviewed.

4.7.5.2.a.5 Tier 4

Operational

Management

Processes

AI6 Manage Changes AI7 Install and Accredit Solutions and Changes DS9 Manage the Configuration

4.7.6 Software deployment process The objective of the Software deployment process in respect of SAM is to ensure that software deployment and redeployment is executed in a way which supports SAM requirements.

Implementation of the Software deployment process will enable the organization to demonstrate that:

4.7.6.2

PO1 Define a Strategic IT Plan PO3 Determine Technological Direction P010 Manage projects

Policies and procedures are developed, approved and issued for deploying software to include the following:

4.7.6.2.a Tier 3

Operational

Management

Processes

PO1 Define a Strategic IT Plan PO2.4 Integrity Management PO4 Define the IT Processes, Organisation and Relationships PO4.14 Contracted Staff Policies and Procedures

Any new instance of a distribution copy of software and related assets is approved by the responsible management.

4.7.6.2.a.1 Tier 3 Acquisition

Management

Operational

Management

Processes

PO3.2 Technology Infrastructure Plan PO8 Manage Quality

For any deployment there is a back out procedure or method of remediation if the deployment is not successful.

4.7.6.2.a.2 Tier 3

Operational

Management

Processes

PO3.2 Technology Infrastructure Plan PO8 Manage Quality

Security requirements are complied with, including over access to the software being deployed and after it is installed.

4.7.6.2.a.3 Tier 3

Program Management

Asset Identification Management Acquisition

Management

Operational

Management

Processes

PO9 Assess and Manage IT Risks PO10 Manage Projects

All changes to status of the relevant software and related assets are recorded accurately and on a timely basis, including any change of custodianship for the assets, and an audit trail kept of these changes.

4.7.6.2.a.4 Tier 3 Asset

Identification Management

Operational

Management

Processes

PO9 Assess and Manage IT Risks PO10 Manage Projects AI6 Manage changes

There is a documented control to verify that what was deployed is the same as what was authorized to be deployed and an exception raised detailing any variances or if an asset cannot be verified to be deployed within authorized limits.

4.7.6.2.a.5 Tier 3 Asset

Identification Management

Operational

Management

Processes

PO9 Assess and Manage IT Risks PO10 Manage Projects

Page 85: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

81 © ISO/IEC 2010 – All rights reserved

ISO/IEC 19770-1 Key Area Outcomes

19770-1 Reference

19770-1

Tier

IAITAM Best Practice

Library (IBPL) Key Area

Japanese SAM

Consortium Best

Practice

CobiT 4.1 Key Area

The success or failure of deployments is recorded, and periodically reviewed.

4.7.6.2.a.6 Tier 3 Compliance

Management

Operational

Management

Processes

DS8 Manage service desk and incidents DS10 Manage Problems

4.7.7 Incident management process The objective of the Incident management process in respect of software and related assets is to monitor and respond to incidents in ongoing operations relevant to software and related assets.

Implementation of the Incident management process will enable the organization to demonstrate that:

4.7.7.2

PO1 Define a Strategic IT Plan PO3 Determine Technological Direction P010 Manage projects

There is a formal process of incident management which includes:

4.7.7.2.a Tier 4

Operational

Management

Processes

DS3 Manage Performance and Capacity DS4 Incident/disaster thresholds DS8 Manage service desk and incidents

All incidents that affect software or related assets or SAM processes are recorded and classified as to their priority for resolution.

4.7.7.2.a.1 Tier 4 Program

Management

Operational

Management

Processes

DS3 Manage Performance and Capacity DS4 Incident/disaster thresholds DS8 Manage service desk and incidents

All such Incidents are resolved in accordance with their priority for resolution, and the resolution is documented.

4.7.7.2.a.2 Tier 4 Program

Management

Operational

Management

Processes

DS3 Manage Performance and Capacity DS4 Incident/disaster thresholds DS8 Manage service desk and incidents

4.7.8 Problem management process The objective of the Problem management process in respect of software and related assets is to keep software assets current and in operational fitness, including through proactive identification and analysis of the cause of incidents and addressing the underlying problems.

Implementation of the Problem management process will enable the organization to demonstrate that:

4.7.8.2

PO1 Define a Strategic IT Plan PO3 Determine Technological Direction P010 Manage projects DS10 Manage Problems

There is a formal process of problem management which includes:

4.7.8.2.a Tier 4

Operational

Management

Processes

DS9 Manage the Configuration DS9.2 Identification and Maintenance of Configuration Items DS10 Manage Problems

All incidents that affect software or related assets or services or SAM processes are recorded and classified as to their impact.

4.7.8.2.a.1 Tier 4 Program

Management

Operational

Management

Processes

DS9 Manage the Configuration DS9.2 Identification and Maintenance of Configuration Items DS10 Manage Problems

High priority and repeat incidents are analyzed for the underlying causes and prioritized for resolution.

4.7.8.2.a.2 Tier 4 Program

Management

Operational

Management

Processes

DS9 Manage the Configuration DS9.2 Identification and Maintenance of Configuration Items DS10 Manage Problems

Underlying causes are documented and communicated to incident management.

4.7.8.2.a.3 Tier 4 Program Management

Operat

ional

Manag

ement

Proce

sses

DS9 Manage the Configuration DS9.2 Identification and Maintenance of Configuration Items DS10 Manage Problems

Page 86: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

© ISO/IEC 2010 – All rights reserved 82

ISO/IEC 19770-1 Key Area Outcomes

19770-1 Reference

19770-1

Tier

IAITAM Best Practice

Library (IBPL) Key Area

Japanese SAM

Consortium Best

Practice

CobiT 4.1 Key Area

Problems are resolved in accordance with their priority for resolution, and the resolution is documented and communicated to incident management.

4.7.8.2.a.4 Tier 4 Program Management

Operat

ional

Manag

ement

Proce

sses

DS9 Manage the Configuration DS9.2 Identification and Maintenance of Configuration Items DS10 Manage Problems

4.7.9 Retirement process The objective of the Retirement process in respect of software and related assets is to remove software and related assets from use, including recycling of associated assets where appropriate, in accordance with company policy and meeting all record-keeping requirements.

Implementation of the Retirement process will enable the organization to demonstrate that:

4.7.9.2

PO1 Define a Strategic IT Plan PO3 Determine Technological Direction P010 Manage projects

Policies and procedures are developed, approved and issued for securely retiring software or hardware on which software is installed, which ensure:

4.7.9.2.a Tier 3 Disposal Management

Policy Management

Operat

ional

Manag

ement

Proce

sses

PO1 Define a Strategic IT Plan PO2.4 Integrity Management PO4 Define the IT Processes, Organisation and Relationships PO4.14 Contracted Staff Policies and Procedures PO9 Assess and Manage IT Risks PO10 Manage Projects ME3 Ensure compliance with external requirements

Deployed copies of software are removed from retired hardware, except when explicitly authorized by management after due consideration of any software licensing and data confidentiality implications.

4.7.9.2.a.1 Tier 3 Disposal Management

Operat

ional

Manag

ement

Proce

sses

DS11 Manage Data DS11.4 Disposal

Licenses and other assets which can be redeployed are identified for redeployment.

4.7.9.2.a.2 Tier 3 Disposal Management

Operat

ional

Manag

ement

Proce

sses

DS11 Manage Data DS11.4 Disposal

Any assets transferred to other parties (whether those parties or related or unrelated, and however transferred, i.e. sold or otherwise) are transferred properly taking into account any confidentiality, licensing, or other contractual requirements.

4.7.9.2.a.3 Tier 3 Disposal Management

Operat

ional

Manag

ement

Proce

sses

DS11 Manage Data DS11.4 Disposal

Licenses and other assets which cannot be redeployed are properly disposed of.

4.7.9.2.a.4 Tier 3 Disposal Management

Operat

ional

Manag

ement

Proce

sses

DS11 Manage Data DS11.4 Disposal

Page 87: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

83 © ISO/IEC 2010 – All rights reserved

ISO/IEC 19770-1 Key Area Outcomes

19770-1 Reference

19770-1

Tier

IAITAM Best Practice

Library (IBPL) Key Area

Japanese SAM

Consortium Best

Practice

CobiT 4.1 Key Area

Records are updated to reflect the changes above, and audit trails are maintained of the changes.

4.7.9.2.a.5 Tier 3 Disposal Management

Operat

ional

Manag

ement

Proce

sses

DS11 Manage Data DS11.4 Disposal

Page 88: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

© ISO/IEC 2010 – All rights reserved 84

Annex D (informative)

Roadmap

D.1 Introduction

The following sub clauses contain a summary roadmap for the process requirement standards of the ISO/IEC 19770 family of Software Asset Management standards. For a roadmap that covers the entire family, see 19770-5.

D.2 Process requirement standards roadmap

D.2.1 Introduction

The Process Requirements standards subset of the roadmap described fully in ISO/IEC 19770-5 covers three generations of standards as illustrated in Figure 7 - Process standard roadmap, namely:

1) First generation - ISO/IEC 19770-1:2006

2) Second generation - ISO/IEC 19770-1:20xx (this standard)

3) Third generation - ISO/IEC 19770-1:20yy (future full management system standard)

Figure 7 - Process standard roadmap

D.2.2 Background

To achieve business objectives, organizations develop SAM as a continuing programme of processes, growing over time to contribute to wider governance of related IT assets, licensed intellectual property and regulatory and contractual obligations.

A wide variety of implementations are possible, all having in common a dependence on continuous improvement of processes for their effective management. Organizations tend to improve such managerial

Page 89: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

85 © ISO/IEC 2010 – All rights reserved

systems in evolutionary phases driven by complex factors including business needs, other programmes touching the operational environment and external forces such as those influencing regulation and compliance. Organizations increasingly wish to demonstrate their processes are effective and look to standards to provide a variety of ways to help them improve.

SAM is a broad discipline and ISO/IEC 19770-1:2006 provides a fully comprehensive source of processes. Some organizations have business-justification to show wide conformance to all best practices , others wish to show only the essential process elements to control licensing compliance. The pressing market requirement is for several tiers of processes, all still founded on a common body of knowledge for processes for SAM.

To an increasing extent, organizations also favour improving systems of management by means of comparisons with organizations which have similar business and operating environments. There are established and increasingly standardised means of achieving this which SAM standards can draw upon, aligning with proven ways organizations already use to measure maturity using standards.

Additionally, a common approach is desirable across assessments of various management systems. As organizations adopt other standards for other (non-SAM) purposes, they wish to eliminate duplication and combine efforts, knowing that the same principles and expertise can be re-applied, for example across all management systems standards improvement work. The road ahead will feature greater opportunity for standards efforts to be combined and reused for more cost-effective adoption.

The process requirements standards roadmap covers three generations of standards specifically created so that organizations can benefit from work on assessments and related certifications that are fully integrated.

D.2.3 Generations of process requirements

D.2.3.1 First generation - ISO/IEC 19770-1:2006

ISO/IEC 19770-1:2006 is described in terms akin to a product specification. Full conformance is defined in ISO/IEC 19770-1 as being achieved by demonstrating that all of the requirements have been satisfied using the outcomes as evidence.

The requirements contained in ISO/IEC 19770-1:2006 have been widely embraced as a foundational framework for SAM processes. It remains a sound framework for what is required for standardised SAM. However its 'all or nothing’ approach to conformance of requiring every outcome of every objective to be achieved is generally regarded as too demanding for many organizations.

D.2.3.2 Second generation - ISO/IEC 19770-1:20xx

ISO/IEC 19770-1:20xx subdivides the requirements contained in ISO/IEC 19770-1:2006 into a set of groupings called tiers. All existing ISO/IEC 19770-1:2006 outcomes (with consistent numbers) are assigned to tiers, and those tiers are related to established industry practices and other guidance. Conformance to ISO/IEC 19770-1:20xx can be claimed separately for each tier, and may be claimed in terms of either process outcomes (as in ISO/IEC 19770-1:2006) or in the attainment of objectives. This ability to achieve conformance in tiers addresses the main challenge of ISO/IEC 19770-1:2006 of being too comprehensive and too demanding for most organizations.

D.2.4 Third generation - ISO/IEC 19770-1:20yy (future management system standard)

A future development of the process requirements in the ISO/IEC 19770 family of standards is expected to reflect the maturing of those standards into a full management system standards framework that meets the requirements of ISO Guide 72. This development will also allow the capability/maturity assessment approach that has been proven in other areas, and which aligns well with other standards developments going forward in parallel (e.g. ISO/IEC 20000).

ISO/IEC 19770-1:20yy will further develop the options for demonstrating conformance defined by the first two generations. In this generation, conformance will be possible at assessment levels defined for the ISO/IEC process assessment standard family of ISO/IEC 33000 (previously ISO/IEC 15504). The third generation of

Page 90: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

© ISO/IEC 2010 – All rights reserved 86

ISO/IEC 19770-1 will also facilitate consistent assessment against proprietary SAM models, such as the Microsoft SAM Optimization Model.

Page 91: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

87 © ISO/IEC 2010 – All rights reserved

Annex E (informative)

Industry capability/maturity approaches

E.1 Introduction

Capability and maturity approaches are not included in the normative text of this part of ISO/IEC 19770. However, there is a significant market demand for such approaches, and it is intended to include such an approach as part of the third generation of evolution of this part of ISO/IEC 19770. (See D.2 Process requirement standards roadmap.)

It is desirable and pragmatic to have the ability to assess the effectiveness of the implementation of the processes outlined in ISO/IEC 19770-1:2006 utilizing a defined capability or maturity model. However, while there are various established models in existence, there is not a specific and universally accepted capability or maturity model for assessing SAM today. The development of a specific and universally accepted capability or maturity model for SAM will require additional time and will allow for a convergence of approaches based on ISO/IEC 19770 and other methodologies available in the marketplace.

Management in both public and private organizations has a need to understand how well their organization’s software assets are being managed. A well defined capability or maturity model will enable organizations to use objective measurements to evaluate the effectiveness of their SAM processes to meet their prescribed objectives. By focusing on the outcomes of SAM processes and not the methods used, organizations enhance their ability to make better decisions on how to best improve their SAM processes. Furthermore, organizations may gain additional insight by comparing their measurements with similar organizations.

Effective SAM processes tie together people, tools/technology and methods into an integrated whole focused on achieving prescribed objectives. As an organization’s SAM program matures, SAM processes become better defined and more consistently implemented throughout the organization. But how does an organization objectively evaluate or assess just how effective the outcomes of their SAM processes meet their prescribed objectives? This is where the SAM capability or maturity model plays its part.

By utilizing a well defined capability or maturity model as the basis for a consistent evaluation, measurements become more objective and results more meaningful.

A capability or maturity model defines a framework to assess the effectiveness of implemented processes to achieve desired objectives. This capability or maturity model will have various levels which will correlate with the level of effectiveness to meet the prescribed objective. The various levels will range from basic or without effectiveness to best practice. Based on the assessed capability or maturity levels, organizations can determine what improvements are needed to their processes in order to achieve the desired effectiveness. In addition, capability or maturity model assessments can include measurement frameworks that provide suitable options for organizations to compare their process maturity levels with other organizations.

The objective of a SAM capability or maturity model are to: 1) provide a defined model from which to assess the effectiveness of SAM processes to achieve their prescribed objectives; 2) where possible align with existing capability or maturity standards developments (such as the widely used 15504 approach) so that organizations may use consistent approaches for measuring processes; and 3) provide a methodology by which an organization can track the continuous improvement within their SAM program.

In addition it is hoped to provide additional guidance from which organizations can improve their SAM program processes.

Page 92: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

© ISO/IEC 2010 – All rights reserved 88

E.2 Major available capability/maturity models

E.2.1 Overview

There are various established and well defined capability or maturity models utilized to assess process management today. Of these, the most common measurement models utilized to assess SAM related processes include: ISO/IEC 15504 (often referred to as SPICE); Control Objective for Information and related Technology (CobiT); Capability Maturity Model Integration (CMMI); Business Process Maturity Model (BPMM); Microsoft’s Software Asset Management Optimization Model (SOM); IAITAM’s 360 Assessment Model and the Software Asset Management Consortium’s (SAMC) Software Asset Management Standards. Currently, Microsoft’s, IAITAM’s and SAMC’s models specifically address SAM in their models. CobiT is more generic but still applicable and widely used. a) Further information on CobiT Selected Mappings gives further specific information about CobiT and SAM.

NOTE: . This part of ISO/IEC 19770 does not endorse any specific source of external models of guidance on SAM and no ISO/IEC endorsement of related products or the sourcing organizations is implied. [A standard form of references for the above section may be added, consistent with that in intro to Appendix C]

These various capability or maturity models utilize two different methodologies in their assessment process. The most common methodology is based on assessing each individual process based on its ability to achieve its prescribed objectives or outcomes. The other methodology, which is used by both Microsoft’s SOM and IAITAM’s 360 Assessment models, is based on grouping like processes and then assessing these groups based on the ability to achieve prescribed objectives or outcomes. In addition, the CobiT and BPMM models could easily accommodate the grouping methodology around recognized business and IT goals.

Below is a brief overview of the more common capability or maturity models in the environment.

E.2.2 ISO/IEC 15504/33000

ISO/IEC 15504 series is currently in revision to become the 33000 series. The ISO/IEC 15504 series not only provides an introduction to the concepts of process assessment, it also provides an assessment framework and some exemplar process assessment models. ISO/IEC 15504 utilizes the following 6 levels when evaluating the effectiveness of a process:

0 - Incomplete process: The process is not implemented, or fails to achieve its process purpose. At this level there is little or no evidence of any systematic achievement of the process purpose.

1 - Performed process: The implemented process achieves its process purpose.

2 - Managed process: The previously described Performed process is now implemented in a managed fashion (planned, monitored and adjusted) and its work products are appropriately established, controlled and maintained.

3 - Established process: The previously described Managed process is now implemented using a defined process that is capable of achieving its process outcomes.

4 - Predictable process: The previously described Established process now operates within defined limits to achieve its process outcomes.

5 - Optimizing process: The previously described Predictable process is continuously improved to meet relevant current and projected business goals.

E.2.3 CobiT™

(See alsoa) Further information on CobiT Selected Mappings.) CobiT’s process model subdivides IT into four domains and 34 processes in line with the responsibility areas of plan, build, run and monitor, providing an end-to-end view of IT. CobiT utilizes the following 6 levels when evaluating the effectiveness of a process:

Page 93: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

89 © ISO/IEC 2010 – All rights reserved

0 - Non-existent: Complete lack of any recognisable processes. The enterprise has not even recognised that there is an issue to be addressed. 1 - Initial/Ad Hoc: There is evidence that the enterprise has recognised that the issues exist and need to be addressed. There are, however, no standardized processes; instead, there are ad hoc approaches that tend to be applied on an individual or case-by-case basis. The overall approach to management is disorganized. 2 - Repeatable but Intuitive: Processes have developed to the stage where similar procedures are followed by different people undertaking the same task. There is no formal training or communication of standard procedures, and responsibility is left to the individual. There is a high degree of reliance on the knowledge of individuals and, therefore, errors are likely. 3 - Defined Process: Procedures have been standardised and documented, and communicated through training. It is mandated that these processes should be followed; however, it is unlikely that deviations will be detected. The procedures themselves are not sophisticated but are the formalisation of existing practices. 4 - Managed and Measurable: Management monitors and measures compliance with procedures and takes action where processes appear not to be working effectively. Processes are under constant improvement and provide good practice. Automation and tools are used in a limited or fragmented way. 5 - Optimised: Processes have been refined to a level of good practice, based on the results of continuous improvement and maturity modelling with other enterprises. IT is used in an integrated way to automate the workflow, providing tools to improve quality and effectiveness, making the enterprise quick to adapt.

E.2.4 BPPM maturity model

BPMM’s maturity model is based on CMMI model principles. While BPMM covers a broad range of domains utilizing 30 process areas, it can be extended to cover a specific domain in more detail. BPMM utilizes the following 5 levels when evaluating the effectiveness of a process:

1 - Initial or “Fire-fighting management”: There are no specific objectives. Success in these organizations depends on the competence and heroics of the people in the organization and not on the use of proven processes.

2 - Managed or “Work unit management”: The objective is to create a management foundation within each work unit or project.

3 – Standardized or “Process management”: The objective is to establish and use a common organizational process infrastructure and associated process assets to achieve consistency in how work is performed to provide the organization’s products and services.

4 – Predictable or “Capability management”: The objective is to manage and exploit the capability of the organizational process infrastructure and associated process assets to achieve predictable results with controlled variation

5 - Innovating or “Change management”: The objective is to continuously improve the organization’s processes and the resulting products and services through defect and problem prevention, continuous capability, and planned innovative improvements.

E.2.5 Microsoft SAM Optimization Model

Microsoft’s SAM Optimization Model (SOM) grouped the 27 processes identified in ISO/IEC 19770-1 into 6 categories then identified 10 key competencies to measure. Microsoft believes these 10 competencies focus on what organizations need to follow to implement an effective SAM program. The SOM utilizes the following 4 levels when evaluating the effectiveness of a competency:

Page 94: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

© ISO/IEC 2010 – All rights reserved 90

:

Basic SAM - “Ad Hoc”: Little control over what IT assets are being used and where. Lacks policies, procedures, resources, and tools.

Standardized SAM — “Tracking Assets”: SAM processes exist as well as tool/data repository. Information may not be complete and accurate and typically not used for decision making.

Rationalized SAM — “Active Management”: Vision, policies, procedures, and tools are used to manage the IT S/W asset lifecycle. Reliable information used to manage the assets to business targets.

Dynamic SAM — “Optimized”: Near real-time alignment with changing business needs. Business competitive advantage through SAM.

E.2.6 IAITAM 360 assessment model

(See also Annex C.) IAITAM’s 360 Assessment model is based on the 12 Key Process Areas (KPAs) identified in the IAITAM Best Practice Library (IBPL). IAITAM groups the various processes into the 12 KPAs for assessment and utilizes the following 5 levels when evaluating the effectiveness of a process:

Ad hoc: No processes are defined; functions and policies exist only in silos; Internal communication is at minimum; Reactive instead of proactive actions; Compliance risk exists; Productivity is minimized; and Value is minimized.

Repeatable: Major processes are being repeated throughout the organization; Processes are beginning to show financial successes; Processes are beginning to be defined and repeatable, yet still function independently; Policies are defined and executed; Procedures are established; Interdependencies are at a minimum; Alignment with business needs are at a minimum; Roles are emerging; and Executive buy in is achieved

Alignment: Major processes are well defined and interaction with other processes and KPAs is clearly understood; Efficiencies exist within the program but are not yet maximized; Interdependencies exist but are not yet maximized; ITAM Program is beginning to function as a core competency; Communication effectiveness is maximized throughout the organization; Compliance risks are markedly reduced; and Roles are defined and executed.

Strategic: Process performance is optimized as is the interaction between processes and KPAs; Proactive decision making is becoming a standard action; Roles are functioning toward a common goal; Projects are planned according to needs; Business goals are being achieved; Program is aligned with business needs and goals; and Organizational buy in is achieved.

Adaptive Valuation: Process outcomes are predictable; Process outcomes are adjustable as necessary; Program is functioning as a core competency within the organization; and Compliance risks are understood or eliminated.

E.2.7 SAM Consortium (SAMC) maturity model

(See also Annex C.) SAMC’s maturity model is based on their Software Asset Management Standards document which defines 13 managerial domains on how organizations might conduct SAM. This maturity model utilizes the following 6 levels when evaluating the effectiveness of a process:

Level 0 - Incomplete: Management is not implemented at all. This is the lowest evaluation (maturity level). Level 1 - Initial/Ad Hoc: Management is not organized, and is implemented dependent upon responsible persons and other individuals.

Page 95: To: Reviewers of proposed revision to ISO/IEC SAM ProcessesISO/IEC 27001 for Security Management, and ISO/IEC 20000‐1 for Service Management); and also providing for capability/maturity

91 © ISO/IEC 2010 – All rights reserved

Level 2 - Repeatable: An organizational system exists in part, and continuous management is implemented. Level 3 - Defined: Policies and regulations across the organization and management systems are appropriately prescribed, and contain no serious flaws. Level 4 - Managed: Implementation of management in accordance with the prescribed policies, regulations and management systems is monitored. Level 5 - Optimized: SAM is reviewed on an as-needed and periodical basis in order to implement optimal management to reflect the changing environment surrounding SAM. This is the highest evaluation (maturity level).