Target Operating Model Builder Map your IT service responsibilities
  1. Fill in your details at the top of the page. Use your work email — personal inboxes (Gmail, Hotmail, Yahoo, Outlook.com, iCloud etc.) aren't accepted.
  2. Click a tile to cycle through who owns that service. Each click advances the tile: CustomerManaged247Other 3rd PartyNot Required → back to Customer.
  3. Every tile starts as Customer. Work across all six columns and set each service to the party that will be responsible for it in your target operating model.
  4. Your progress auto-saves in this browser as you go. If you close the tab and come back later on the same device, you'll be offered the option to resume where you left off.
  5. Need to continue on another device, or share progress with a colleague? Click Save progress (download) to download a JSON file, then open this page elsewhere and click Load saved file to pick it back up.
  6. Made a mess? Reset all to Customer returns every tile to the starting state — your customer details aren't touched.
  7. When you're done, click Complete & email report. An invisible spam check runs in the background, then a PDF report downloads to your device and your email app opens with a pre-filled message to Managed247 — just attach the downloaded PDF and send.
Please use your work email address (no Gmail, Hotmail, etc.).
Protected by an invisible Cloudflare Turnstile security check — no clicks required.
Not saved yet

Colour key

Customer (default)
Managed247
Other 3rd Party
Not Required
Click a tile to cycle through the four options.

Process Management

Incident Management
Major Incident Management
Service Request Management
Problem Management
Change Management
Release & Deployment Management
Knowledge Management
Configuration Management (CMDB)
Access Management
Asset Management
Service Level Management
Continual Service Improvement

Service Desk Management

First Line Support Service
Second Line Support Service
Third Line Support Service
Out of Hours Coverage
On Site Support
Vendor Ticket Escalation
Service Reporting & Dashboards
Customer Success / Service Delivery Manager

Technology Management

ITSM Tooling & Platform
Business Application Support & Maintenance
Endpoint Device Management
Mobile Device Management
Network Device Management
Server, Storage & Infrastructure Management
Microsoft 365 Management
Identity Platform (Entra ID / AD)
Public Cloud Management (Azure / AWS / GCP)
Database Management
Monitoring & Observability
Backup & DR Management

Patch & Vulnerability Management

Server OS Patching
Workstation OS Patching
macOS Patching
Linux / Unix Server Patching
3rd Party Application Patching
Firmware & BIOS Patching
Network Device Patching
Emergency / Zero-Day Response
Vulnerability Scanning
Risk-Based Remediation & SLA

Cyber Security Management

Security Event Monitoring (SIEM)
Managed Detection & Response (Endpoints)
Identity Threat Detection & Response (ITDR)
Identity & Access Management (IAM / SSO / MFA)
Privileged Identity & Access Management
Information Protection & Data Loss Prevention
Network & Platform Security Management
Email & Web Security Management
Cloud Security Posture Management (CSPM)
Security Incident Response (IR Retainer)
Phishing Simulation
Cyber Awareness Training

Governance, Risk & Compliance

Information Security Governance (ISO 27001 / SOC 2)
Cyber Essentials / Cyber Essentials Plus
Regulatory Compliance (GDPR / NIS2 / PCI DSS)
Risk Management & Risk Register
Policy & Standards Management
Audit Support & Evidence Management
Business Continuity & Disaster Recovery Planning
Supplier & Third-Party Risk Management

When you click Complete & email report, a PDF summary will download to your device and your email client will open with a pre-filled message. Please attach the downloaded PDF before sending.