Additional Resources: Rationalized to Dynamic Checklist

The following checklist outlines the requirements you must meet to move to the Dynamic level. After you have addressed each item under the main topics, you have successfully moved from the Rationalized level to the Dynamic level.

Capability: Identity and Access Management

Requirement 1

Yes

No

Centralized automated user account provisioning (for example , issuing new accounts , changing passwords , synchronizing permissions , enabling access to business applications) across 80 percent or more of heterogeneous systems.

 

 

Attributes:

  • Defined current identity object provisioning workflows in your organization, as well as areas to improve or optimize.

  • Identified technologies used to manage object identity life cycles.

  • Implemented a consolidated solution to automate common user account provisioning workflows.

Requirement 2

Yes

No

Implemented a federated directory-based tool to enable authenticated access to external customers , service providers , and business partners.

 

 

Attributes:

  • Validated need for providing authenticated access to external entities.

  • Determined strategies and policies for providing external access to defined resources.

  • Implemented technologies to ensure secure access for defined external users to defined services.

Capability: Desktop, Device and Server Management

Requirement 1

Yes

No

Tools in place to perform automated infrastructure capacity planning for primary IT services (such as e-mail).

 

 

Attributes:

  • Identified primary IT service candidates for automated capacity planning.

  • Created capacity models to automate capacity planning or implemented capacity planning tools.

Requirement 2

Yes

No

Management of mobile devices and access to IT services and applications nearly at parity with managed desktop and laptop computers.

 

 

Attributes:

  • Implemented secure technologies to provide access to primary line-of-business applications (for example, LOB apps, CRM, supply chain) via mobile devices.

  • Established defined set of standard basic images for mobile devices.

  • Implemented an automated solution to continuously update configuration settings and/or applications in mobile devices.

  • Deployed an automated quarantine solution for mobile devices.

  • Implemented an automated patch management solution for mobile devices.

  • Implemented an automated asset management solution for mobile devices.

Requirement 3

Yes

No

Implemented virtualization to dynamically move workloads from server to server based on resource needs or business rules.

 

 

Attributes:

  • Deployed a subset of production IT services or applications to virtual machines.

  • Actively managing and optimizing system resources on shared hardware devices.

Capability: Security and Networking

Requirement 1

Yes

No

Integrated threat management and mitigation across clients and server edge.

 

 

Attributes:

  • Assessed server edge security threats and evaluated threat mitigation solutions.

  • Implemented technology solutions to protect against Internet-based threats across the client and server edge.

Requirement 2

Yes

No

Model-enabled service level monitoring of desktops , applications , and server infrastructure.

 

 

Attributes:

  • Defined desktop, application, and server infrastructure service models.

  • Evaluated technologies for monitoring availability of connections and components across defined services.

  • Implemented automated solution to define and monitor service levels.

Requirement 3

Yes

No

Automated quarantine solution for unpatched or infected computers.

 

 

Attributes:

  • Evaluated technologies to enable network quarantine for remote and on-site users.

  • Implemented VPN quarantine solution for remote users.

Capability: Data Protection and Recovery

Requirement 1

Yes

No

Implemented defined backup and restore services with service level agreements for 80 percent or more of desktops.

 

 

Attributes:

  • Established goals for the desktop backup and recovery service.

  • Defined and implemented a suitable backup and restore service for desktops in the organization and established SLAs.

Capability: Security Process

Requirement 1

Yes

No

Established security processes and technologies to enable advanced two-factor user authentication (such as biometric scans) for highly sensitive data.

 

 

Attributes:

  • Developed and implemented advanced two-factor identity and access management policies for highly sensitive data.

Capability: ITIL/COBIT-based Management Process

Requirement 1

Yes

No

Implemented best practices for further optimizing your IT organization.

 

 

Attributes:

  • Implemented best practice Availability Management.

  • Implemented best practice Financial Management.

  • Implemented best practice Infrastructure Engineering.

  • Implemented best practice IT Service Continuity Management.

  • Implemented best practice Workforce Management.