Skip to main content
TL;DR

Zero new JIRA custom fields. Labels-only enrichment across 12 structured fields. 4 ITIL execution paths (Incident / Service Request / Problem / Change). Agent-assisted classification of 102 existing tickets. One pipeline from intake to closure.

Amazon Working Backwards: PR/FAQ

Business Case: BC2 Modern ITSM Operating Model Framework: ADLC v3.7.3 | Date: 2026-04-13 | Status: Plan Complete (18 stories), Implementation Pending Enterprise Team: 1 HITL Manager + ADLC Agent Team (PO + SRE + Observability) Foundation: 8 existing ITSM skills, 4 Confluence templates, 102 live OPS tickets


1. Press Release

Modern ITSM Operating Model: One Pipeline from Alert to Resolution — Zero Schema Migration Required

Labels-only enrichment turns an existing JIRA OPS board into a structured ITSM command centre with 4 execution paths, agent-assisted classification, and SLA enforcement — without adding a single custom field.

SYDNEY, AU — April 2026 — Today we announce the Modern ITSM Operating Model, a complete intake-to-closure pipeline built on the ADLC Framework and JIRA Service Management. The model transforms an existing OPS board of 102 operational tickets into a governed ITSM operation with four distinct execution paths — Incident, Service Request, Problem, and Change — using a labels-only enrichment approach that requires zero JIRA schema changes and zero JSM migration risk.

Why This Matters

Enterprise operations teams face a paradox: ITSM frameworks like ITIL 4 promise structured service delivery, but traditional implementations require months of JSM customization, dozens of custom fields, and expensive consultants. Most attempts stall at the configuration phase — the team drowns in schema design before a single ticket is properly triaged. This model eliminates that bottleneck entirely by using JIRA's native label system as the enrichment layer, with AI agents handling classification decisions that would otherwise require a dedicated triage team.

The Problem

ChallengeImpactWhat Teams Actually Experience
Unclassified tickets60-80% of ops tickets lack consistent type assignmentSRE triages by gut feel; same issue type gets different treatment depending on who picks it up
No enrichment standardEach responder adds different context in different formatsQuarterly reporting requires manual ticket-by-ticket review to extract blast radius, root cause, and service impact
Manual triage overhead15-30 minutes per ticket for proper classification and routing102 tickets at 20 min each = 34 hours of pure triage labor per backlog cycle
Schema migration fearCustom fields require JSM admin changes that affect all projectsTeams avoid ITSM structure because "one wrong custom field breaks our workflows"
Disconnected execution pathsIncidents, problems, and changes follow the same generic workflowP0 incident and low-priority service request compete for the same queue with the same SLA

The Solution: Labels-Only ITSM on ADLC Framework

The Modern ITSM Operating Model is built on three design decisions that eliminate the traditional barriers to ITSM adoption:

Design DecisionWhatWhy It Matters
Labels-only enrichment12 structured fields encoded as JIRA labels (e.g., blast:org-wide, rca:config, service:ec2)Zero schema migration. Zero custom field creation. Instant JQL queryability. Reversible at any time.
4 execution pathsIncident, Service Request, Problem, Change — each with distinct SLA targets and workflow transitionsA P0 incident gets a 15-minute response SLA. A service request gets 8 hours. Different urgency, different treatment.
Agent-assisted classificationAI agents classify tickets using a decision tree (service down? recurring pattern? requires change?) with human approval102 tickets classified in minutes instead of hours. Consistent taxonomy. Auditable decision trail.

How It Works

  1. Intake: Ticket arrives on OPS board via any channel (manual, alert, automation, email)
  2. Classify: The /itsm:classify command applies a 4-question decision tree — Is the service down? Is this a recurring pattern? Does it require a change? None of the above? — and assigns Incident, Problem, Change, or Service Request
  3. Enrich: 12 labels are applied: blast radius, root cause category, known error status, affected service, environment, support tier, plus auto-generated IDs for traceability
  4. Prioritize: Impact and Urgency matrix determines Severity (P0-P3), which drives SLA timers automatically via JSM native configuration
  5. Route & Execute: Ticket enters the correct execution path with path-specific workflow transitions, escalation rules, and resolution documentation requirements

Leader Quote

"Every ITSM implementation I have seen fails at the same point: the schema design phase. Teams spend months debating custom fields, workflow states, and migration plans. By the time they finish configuring, the backlog has doubled. This model inverts that — start classifying tickets today using labels, prove the taxonomy works on real data, then decide if custom fields add value. Most teams find they never need them."

HITL Manager, xOps Platform (50+ AWS Accounts)

Business Outcomes

OutcomeMetricMechanism
Triage time reductionFrom ~20 min/ticket (manual) to ~2 min/ticket (agent-assisted)Decision tree classification + label auto-application
Classification consistencyFrom ad-hoc (no standard) to 100% taxonomy compliance6 label prefixes with defined value sets enforced by skill definitions
Reporting readinessFrom manual quarterly review to real-time JQL dashboardsEvery enrichment field is a native JIRA label — queryable instantly
Zero migration risk0 custom fields added, 0 workflow schema changesLabels are additive — they cannot break existing JSM configuration
SLA differentiation4 distinct response/resolution targets (P0: 15min/4hr through P3: 8hr/72hr)JSM native SLA policies bound to Severity field (already configured)

Customer Quote

"We had 102 operational tickets sitting in a flat Kanban board with no consistent classification. After running the agent classification on the backlog, every ticket had a type, blast radius, root cause category, and service label. Our first JQL dashboard took 5 minutes to build because the data was already structured. No JSM admin changes. No migration plan. No consultant."

Senior CloudOps Engineer, ANZ Enterprise Platform Team

Getting Started

Three steps: classify existing backlog (validate taxonomy on real tickets) to configure SLA policies (bind severity to response targets) to operationalize intake (new tickets enter the pipeline automatically). Full implementation plan: 18 stories across 6 requirements, available in the Agile Ceremonies methodology.

Availability

ComponentStatusDetail
8 ITSM Skills (classification, enrichment, service catalog, change mgmt, PIR, runbook, known errors, dashboard)Available.claude/skills/product/operations/
4 Confluence Templates (change management, known errors, post-incident review, runbook)Available.claude/templates/confluence/itsm-*.md
OPS JIRA Board (102 tickets, 4 issue types)Active1xops.atlassian.net/jira/software/c/projects/OPS/
/itsm:classify CommandPlannedSprint implementation
Batch Reclassification ScriptPlannedSprint implementation
SLA Policy Configuration GuidePlannedSprint implementation

Framework: adlc.oceansoft.io | Source: github.com/1xOps/adlc-framework


2. Frequently Asked Questions

Customer FAQs

Q1: What is the "labels-only" approach and why does it matter?

Traditional ITSM implementations require creating custom fields in JIRA — fields like "Blast Radius", "Root Cause Category", "Affected Service". Each custom field:

  • Requires JSM admin access to create
  • Appears on every ticket form in the project (cluttering the UI)
  • Cannot be easily removed once tickets reference it
  • Needs screen scheme configuration to display correctly
  • Breaks if the project scheme changes

The labels-only approach encodes the same information as structured labels with defined prefixes:

Instead of Custom FieldUse LabelExample
Blast Radius (dropdown)blast:{scope}blast:single-account
Root Cause (dropdown)rca:{category}rca:config
Known Error Status (dropdown)ke:{status}ke:workaround
Affected Service (dropdown)service:{name}service:ec2
Environment (dropdown)env:{environment}env:production
Support Tier (dropdown)tier:{level}tier:tier-1

Labels are additive, queryable via JQL (labels = "blast:org-wide"), and cannot break existing workflows. The only custom field retained is Severity (customfield_10127) because JSM SLA timers require it — and it already exists.

Q2: How does agent-assisted classification work?

The /itsm:classify command applies a 4-step decision tree to each ticket:

StepQuestionIf YesIf No
1Is a service currently down or degraded?IncidentContinue
2Is this a recurring pattern across 3+ incidents?ProblemContinue
3Does this require infrastructure, config, or code change?ChangeContinue
4DefaultService Request

The agent reads the ticket summary and description, evaluates each condition, and proposes a classification with labels. The HITL reviews and approves. Classification decisions are logged for audit purposes.

For batch reclassification of existing tickets, the same decision tree runs across the full backlog with a summary report showing classification distribution before any changes are applied.

Q3: What are the 4 execution paths and how do SLAs differ?

Purpose: Restore service as quickly as possible.

SLAP0P1P2P3
Response15 min1 hr4 hr8 hr
Resolution4 hr8 hr24 hr72 hr

Workflow: Detect → Triage → Investigate → Resolve → Post-Incident Review

Q4: Can this work with our existing JIRA project without disruption?

Yes. The design is explicitly non-disruptive:

  • Zero custom fields added: Labels are metadata that coexist with any existing configuration
  • Zero workflow changes required: Execution paths are documented process patterns — JSM automation rules are optional enhancements, not prerequisites
  • Zero screen scheme modifications: Labels appear automatically on tickets; no form redesign needed
  • Fully reversible: Labels can be removed at any time. No data migration. No rollback plan needed.

The only prerequisite is that the OPS project has the 4 ITIL issue types configured: Incident, Service Request, Problem, and Change. If the project already has these (as the current OPS board does with 102 tickets), the model is immediately applicable.

Q5: What does the enrichment schema look like on an actual ticket?

A classified and enriched Incident ticket would have these labels:

blast:single-account
rca:infrastructure
ke:not-applicable
service:ec2
env:production
tier:tier-1
rsid:OPS-42
pattern_id:ec2-20260413

Plus the built-in fields:

  • Issue Type: Incident
  • Severity: High (P1) — via Impact x Urgency matrix
  • Priority: High — derived from Severity

Every label is immediately queryable. Example JQL for a P1 dashboard:

project = OPS
AND issuetype = Incident
AND labels = "blast:org-wide"
AND cf[10127] = "High"
ORDER BY created DESC

Internal FAQs

Q6: Why labels instead of custom fields? Is this a scaling limitation?

Labels scale better than custom fields for enrichment metadata because:

DimensionCustom FieldsLabels
Admin access requiredJSM AdminAny project member
Schema migration riskHigh (affects all tickets)None (additive only)
JQL queryabilitycf[10127] = "value"labels = "prefix:value"
Cross-project portabilityField must exist in target projectLabels work in any project
Removal/cleanupDifficult (field persists in DB)Trivial (remove label)
Autocomplete supportYes (dropdown)Yes (JIRA suggests recent labels)
ValidationDropdown constrains valuesConvention-based (SKILL.md defines valid values)

The trade-off is that labels lack dropdown validation — a user could type blast:ogr-wide instead of blast:org-wide. The mitigation is agent-assisted classification, where the agent applies labels from the defined taxonomy and the HITL reviews. Manual label typos become a training issue, not a system design flaw.

For organizations that later want dropdown validation, the label taxonomy maps 1:1 to custom fields. Migration path: create custom field, run a script to copy label values into the field, remove labels. The labels-only approach is a stepping stone, not a ceiling.

Q7: How does this integrate with the existing ADLC Framework and xOps platform?

The ITSM Operating Model is the operations layer (OPS board) of the same platform that manages product development (SPM board):

DimensionSPM Board (Product Dev)OPS Board (ITSM Operations)
ProjectSPMOPS
MethodologyScrum (sprints)Kanban (continuous flow)
Issue TypesStory, Epic, TaskIncident, Service Request, Problem, Change
EnrichmentINVEST scoring, story pointsITSM labels (blast, rca, ke, service, env, tier)
Bridgepattern_id:{svc}-{date} label links OPS findings to SPM product storiesSame label on both boards

The OPS-to-SPM bridge works via the pattern_id: label. When an operational pattern is identified across multiple incidents (e.g., recurring EC2 health check failures), the pattern is scrubbed of PII and converted into a product story on SPM. This ensures operational pain drives product roadmap decisions.

The 8 existing ITSM skills, 4 Confluence templates, and the runbooks CLI (122 commands for AWS automation) provide the execution tooling. The ITSM Operating Model is the orchestration layer that connects these existing components into a coherent pipeline.

Q8: What is the implementation effort and timeline?
PhaseStoriesEffortWhat Gets Delivered
Phase 1: Classify & Enrich6 P01 sprint/itsm:classify command, batch reclassification of 102 tickets, enrichment schema validation
Phase 2: Route & Execute7 P11 sprint4 execution path documentation, SLA policy configuration guide, escalation rules
Phase 3: Automate & Scale5 P21-2 sprintsJSM automation rules (HITL-configured), dashboard templates, cross-validation with runbooks CLI

Total: 18 stories across 3 phases. Phase 1 delivers immediate value (structured backlog). Phase 2 and 3 are incremental enhancements.

The FAANG incremental delivery approach means Phase 1 is validated on real tickets before Phase 2 begins. If the taxonomy needs adjustment, it is corrected on 102 real tickets — not on a theoretical model.

Q9: What compliance requirements does this address?
RequirementHow the ITSM Model Addresses It
APRA CPS 234 (Information Security)Incident classification provides audit trail; post-incident reviews are documented via Confluence template; blast radius labels demonstrate impact assessment
SOC 2 Type II (Change Management)Change execution path includes risk assessment and CAB approval; all changes traceable via JIRA workflow transitions
ISO 27001 (Incident Management)Structured incident response with defined SLA targets; known error records track workarounds; root cause analysis via Problem management
ITIL 4 (Service Management)Four practice areas (Incident, Problem, Change, Service Request) mapped to JIRA issue types with consistent taxonomy

The enrichment schema's rca: (root cause) and blast: (blast radius) labels directly map to the data points auditors request during compliance reviews. Instead of assembling this data manually per quarterly audit, it exists as structured metadata on every ticket from the moment of classification.

Q10: What are the risks and how are they mitigated?
RiskLikelihoodImpactMitigation
Label convention sprawl (inconsistent naming)MediumMediumDocumented taxonomy in Confluence; agent-assisted classification enforces valid values; SKILL.md defines the canonical set
Over-customization of JSM workflowsLowHighDesign principle: use JSM native defaults first. Custom automation rules are Phase 3 enhancements, not prerequisites
Enrichment accuracy depends on AWS/Azure profile availabilityMediumLowGraceful degradation — tickets can be classified without cloud enrichment; cloud context is additive
False positives in agent classificationMediumLowHITL reviews every classification before approval; first 10 tickets manually validated to calibrate the decision tree
HITL bottleneck on change approvalsLowMediumStandard changes classified as pre-approved; only Normal and Emergency changes require explicit CAB review

3. Implementation Roadmap

What Exists Today (As-Is)

AssetStatusEvidence
OPS JIRA BoardActive, 102 tickets, 4 issue types1xops.atlassian.net/jira/software/c/projects/OPS/
8 ITSM SkillsPublished, v1.0.0.claude/skills/product/operations/itsm-*
4 Confluence TemplatesPublished.claude/templates/confluence/itsm-*.md
Severity Custom FieldConfiguredcustomfield_10127 (JSM built-in)
SLA PolicyConfiguredP0: 15min/4hr through P3: 8hr/72hr
3 Label ConventionsIn useblast:, rca:, ke: — established in prior operations
runbooks CLIPublished on PyPI122 commands for AWS automation
OPS-SPM Bridge PatternEstablishedpattern_id: label for cross-board traceability

What Will Be Built (To-Be)

DeliverableStoriesPriority
/itsm:classify command (agent-assisted ticket classification)2P0
Enrichment schema enforcement (12-field label taxonomy)2P0
Batch reclassification of 102 existing tickets2P0
4 execution path documentation (Incident/SR/Problem/Change)4P1
SLA configuration guide (bind Severity to response targets)1P1
Escalation rules and on-call routing documentation2P1
JSM automation rules for intake pipeline2P2
JQL dashboard templates for ITSM reporting2P2
Cross-validation with runbooks CLI for enrichment accuracy1P2

Success Criteria

MetricTargetMeasurement
Tickets with consistent classification100% of new intakeJQL: project = OPS AND labels IS NOT EMPTY vs total
Average triage timeUnder 5 minutes per ticketTimestamp delta: ticket created to first label applied
Label taxonomy compliance100% (only valid prefix:value pairs)JQL audit: labels matching blast:* against defined values
SLA breach rateUnder 5%JSM SLA reports per execution path
Backlog classification coverage100% of 102 existing ticketsJQL: project = OPS AND labels IN (blast:*) count

About This Document

This PR/FAQ follows Amazon's Working Backwards methodology. The Press Release describes the intended outcome as if the product has already launched — this is standard Amazon practice for pre-approval artifacts, not a claim that the implementation is complete. The current state and planned work are documented in Section 3 (Implementation Roadmap). See also: xOps BC1 PR/FAQ | Agile Ceremonies