Service Operation
Delve into the practices required to manage service operations effectively.
Content
Access Management
Versions:
Watch & Learn
AI-discovered learning video
Sign in to watch the learning video for this topic.
Access Management — The Gatekeeper of IT Services (but less moody)
Imagine your service is an exclusive club. Service Transition got the velvet rope installed and the bouncers hired. Event Management watches the crowd for fights and fainting drunks. Problem Management figures out why the same guy keeps trying to sneak in through the bathroom window.
Welcome to Access Management — the person who checks IDs, enforces the dress code, and decides who gets to dance on the metaphorical stage. This is Service Operation's answer to: who may use which service, and how do we prove it?
What is Access Management (and why you should care)
Access Management is the process responsible for allowing users to make use of IT services, data, or other resources. It ensures people have the right authorization — not just the right password — at the right time, and removes access when it’s no longer needed.
Why it matters:
- Security: prevents unauthorized access and data breaches
- Compliance: supports audits and regulatory controls
- Availability: prevents accidental misuse that could affect service performance
- Continuity: ties directly into Service Transition so new services don’t open gaping security holes
Core concepts (one-liners that actually help)
- Identity: who the user is (person, system, service account)
- Authentication: proof they are who they say they are (password, MFA)
- Authorization: what they are allowed to do (roles, privileges)
- Provisioning: creating or updating accounts and permissions
- De-provisioning: revoking access when it’s no longer needed
Big idea: Authentication answers ‘are you?’; Authorization answers ‘can you?’. Both must be logged and auditable.
The Access Lifecycle (step-by-step — like a soap opera)
- Request — user asks for access (self-service portal or service desk ticket)
- Verify — identity and business justification checked
- Authorize — manager or data owner approves
- Provision — account/privileges created/changed
- Monitor — usage and events logged (Event Management hooks in here)
- Review — periodic access reviews and recertification
- Revoke — remove access at end-of-life or role change
# Pseudocode for a simple provisioning flow
if request.valid and owner.approves:
provision(account, role)
log.event('ACCESS_GRANTED', user, role)
else:
log.event('ACCESS_DENIED', user, reason)
notify(user, 'Request denied: ' + reason)
Where Access Management plugs into the ITIL machine
- Service Transition: during a go-live, ensure roles and accounts exist, test provisioning, validate least-privilege mapping
- Event Management: failed logins and suspicious activity generate events; Access Management decides if they are incidents
- Incident Management: access-related incidents (locked account, lost credentials) often need quick remediation
- Problem Management: recurring access-related incidents (e.g., password sync failures) escalate to root cause analysis
- Change Management: major access model changes (e.g., introducing SSO) must pass change controls
- Service Desk: first-line for access requests and emergency credentials
Quick cross-reference: if Event Management watches the security alarms, Access Management is the keyholder deciding whether to open the door.
Policies, principles, and controls (the boring stuff that saves you)
- Principle of Least Privilege: users get only what they need — nothing more
- Segregation of Duties: split critical tasks among multiple roles to prevent fraud or error
- Role-Based Access Control (RBAC): assign permissions to roles, not individuals
- Attribute-Based Access Control (ABAC): permissions based on attributes (time, location, device)
- Just-in-Time (JIT) access: temporary elevated privileges that expire automatically
Emergency scenarios: 'Break glass' access
When the building is on fire and the janitor is the only one with the master key, you still need an auditable process. Break-glass access means:
- Temporary, logged, and time-limited elevated access
- Pre-approval criteria and post-event review
- Automated revocation after the emergency window
Don’t let break-glass become break-forever.
KPIs and metrics that matter
| Metric | Why it matters |
|---|---|
| Time to provision (TTProvision) | Speed of onboarding — impacts productivity |
| % of automated provisioning | Lower manual errors and costs |
| Access-related incidents per month | Security and usability signal |
| % of access reviews completed on time | Compliance health |
| Unauthorized access incidents | Ultimate risk metric |
Tools and automation (your robot coworkers)
- Identity and Access Management (IAM) platforms (e.g., Azure AD, Okta)
- Privileged Access Management (PAM) for admin/privileged accounts
- Single Sign-On (SSO) and MFA solutions
- ITSM integration so requests flow between Service Desk and provisioning systems
- Audit and logging platforms (SIEM) for monitoring and correlation with Event Management
Automation is the secret sauce: self-service portals, approvals as code, and APIs remove the human slow lane.
Common mistakes and how to avoid them
- Mistake: Granting broad privileges to speed things up. Fix: enforce RBAC and JIT escalation.
- Mistake: Forgetting de-provisioning during offboarding. Fix: tie account lifecycle to HR systems.
- Mistake: Manual, undocumented break-glass use. Fix: enforce automated logging and post-mortem review.
- Mistake: Not testing access during Service Transition. Fix: include access test cases in pre-live validation.
Quick checklist for Service Transition teams (so ops won’t hate you at go-live)
- Map roles required by the new service and owners of those roles
- Implement and test provisioning workflows in staging
- Confirm audit logging and Event Management alerts are configured
- Document emergency access procedures and reviewers
- Schedule initial access review cadence and expected KPIs
Final takeaways (because you deserve clarity)
- Access Management is the operational gatekeeper: it keeps things usable and secure.
- It sits at the crossroads of Service Transition, Event Management, Incident and Problem Management — so coordination is non-negotiable.
- Automate where you can, minimize privilege where you can’t, and always log everything.
Access is not a feature. It’s a responsibility. Treat it like the critical control it is, and your services will be safer, faster, and less drama-filled.
Tags: keep this in your head as you design or operate services — less friction, less risk, fewer midnight calls.
Comments (0)
Please sign in to leave a comment.
No comments yet. Be the first to comment!