itSMF Bulletin August 2021 | Page 12

Define data population and validation strategy and plan.  Migrate data which is really needed from Legacy system.  Define the process to ensure data is up to date and accurate in future.

 

Identify the Reports and Dashboards to be configured.  Configure Critical reports and Interactive dashboards to support the business process.

5.     Integrations and Bespoke Application

Analise the systems which are currently integrated to legacy Service Management technology.  Identify the integrations to be configured in target state (Integrate Service Management technology with external systems). 

 

Consider the following parameters while building the integrations for each interface

- data-flow directions

trigger point to initiate the record/ data

- data/ record flow details (e.g., full or delta)

schedule details

Integration protocols (including authentication mechanism)

- Any need for a translator (Middleware or Gateway)

- Event aggregation and corelation strategy (for event integrations)

 

Analyse the Bespoke Applications currently configured in legacy system.  Try to achieve a similar outcome leveraging OOB Service management technology wherever possible. 

 

6.    Risk and Compliance Requirements

Involve organizations Risk and Compliance team from the beginning and ensure you understand the security and compliance requirements. Consider the data security (both data in rest or data in flight) (authentication mechanism, encryption, or hardening requirements).  Identify the need for Penetration test/ Load Test.

 

Identify and address if there is any need for customer data segregations.