Weak Link in Continual Service Improvement

It’s difficult to make a case than any of the ITIL books are more important than any of the others. There are convincing arguments that can be made in support of any one of the five core books being the most important. While there are both things I like and things I don’t like about the current Continual Service Improvement (CSI) book, organizations that fail to properly attend to this aspect of service management are at a severe disadvantage.

Read more

Powershell Security Model: Script Security Officer, Part 2

In the first post in this series, we explored the security need for an IT professional to identify who the author of a piece of code (like a PowerShell script) is. The challenge with that is producing evidence of the identity of the author that’s formatted in a way that the consumer of that script can use it.

That interaction is somewhat like the interaction between a speeder and a police officer. The officer needs to prove the identity of the driver in much the same way that an IT pro needs to identify a scripter. The officer can ask for a driver’s license, but what can an IT Pro ask for?

Read more