Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary Β» COBIT Β» IT Infrastructure Library

IT Infrastructure Library

IT Infrastructure Library, abbreviated as ITIL, is a compilation of guidelines for managing IT services to enhance service levels. One of the primary objectives of ITBM is to ensure that IT services remain relevant to the business agenda and on track as that agenda evolves.

ITIL has evolved a lot over the years. The first version was upgraded and enlarged and gradually became the present international standard. Today, the newest description of the ITIL framework is ITIL 4, but it is more useful to understand the framework’s evolution than to value the current version.

The current one is ITIL 4, which came in 2019, while ITIL 3 has been in practice since 2007. ITIL 4 is more contemporary to use compared to ITIL V3, and its major change is that since ITSM is mainly about delivering value to customers and users through IT services, it aims to establish stable environments, control costs, manage risks, and provide support services. 

Another major change in ITIL 4 is that this framework places a great emphasis on automation. This removes service management from IT’s dominion and promotes interaction and teamwork throughout the enterprise. Overall, this goes beyond the conventional service lifecycle approach.

With that being said, ITIL 4’s framework is built around four essential factors for successful value delivery:

  • Organizations and people: Organise the management of people in the firm so that their human capital reflects the business’s strategic plan.
  • Information and technology: Again, security should always go hand in hand with technology, and more emphasis should be given to how data is managed.
  • Partners and suppliers: Bring together external stakeholders to easily facilitate service delivery.

Value streams and processes: Processes that increase demand and convert it into value should be managed.

Additional reading

Why Does Your Existing TPRM Stack Need to Evolve?

Third-party risk management has always been one of the hardest mandates in GRC. But if you’re running a TPRM program today, the pressure is more acute than ever. Maybe you’re still on spreadsheets and know it’s not sustainable. Maybe you invested in a platform that promised to fix things, but somehow made the work heavier….

Cyber Risk Quantification: Assessing and Prioritizing Cyber Threats

Keeping your cloud business safe has never been harder. The problem? An infinitely growing pile of risks, shoestring budgets, crunched bandwidth, and teams stretched thin.  But there’s a solution hiding in plain sight: Cyber risk quantification. It’s the antidote to guesswork and helps you pinpoint the business-critical risks, quantify their potential impact, and prioritize accordingly….

Article 20 GDPR Right to Data Portability

The GDPR right to data portability focuses on protecting the data privacy rights of the citizens of the European Union. Article 20’s Right to Data Portability focuses on one aspect of the rights and freedom an individual has under the GDPR law. Are you finding it challenging to differentiate Article 20’s service requests from the…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.