| |
|
Asset & Config Management Table of Contents
|
|
|
"Configuration management is really the IT organization's (ITO) version of the Hippocratic oath... To do no harm in the IT environment, the ITO needs to know about what it has and how it all fits
together... to understand the capabilities and limitations of each item, and how that item will be impacted by changes in the environment. If an innocent-looking wire is pulled out over here, what will the result be over there?R"
Process Requires Re-writing for conformance with ITIL Version 3.
More...
|
|
|
Introduction to Asset and Configuration Management
Asset and Configuration Management is a process within the Service Transition module of the ITIL Service Lifecycle.

- Gone are the days when the resident shop “guru” is your single contact for information regarding your complete infrastructure architecture and all the associated components. The platforms that support service delivery are too complex and integrated for any one individual or group to identify.
- How many times have your Service Desk staff wished for a quick reference of all customers and their services affected by a failing IT infrastructure component?
- How often has your organization struggled with the identification of the technical components that enable the delivery of a service in order to set and measure meaningful service level objectives in support of Service Level Agreements?
It is the underlying process of Configuration Management that positions an organization to identify, track, record and report on IT infrastructure data as it relates to the management, costing and delivery of IT services." Activating Configuration Management In an It Organization, Hewlett=Packard Whitepaper, 2001, p. 4
|
In many systems the technical staff operate on a knife-edge of nervous tension caused by a lack of confidence in whether changes will work or cause problems. Why ? - because of the complex inter-relationships which build up between components in a computer configuration. Errors in configurations can open the IT infrastructure up to security vulnerabilities and introduce conflicts that result in service outages. In addition, with the onslaught of regulatory compliance mandates demanding companies to institute stringent controls within IT, managing configurations has become one of the key areas where IT controls can be established. For example, employing best practices for security-related configurations or establishing patch management processes are areas where configuration management can help protect corporate data. A small change to one part of a configuration can have an unexpected interaction elsewhere for no obvious reason. Clearly, it would be useful if the support staff could have a snap shot of the individual components of the whole configuration so as to advise on:-
- the practicality of new ideas and how to cope with them (or otherwise)
- the compatibility of proposed purchases with the present system
- when certain purchases are inadvisable and why
- whether suggested changes would be possible (with proper care)
- licence issues
A Configuration Management Database (CMDB) should describe the "Known and trusted state" of the infrastructure.
Only when this is highly defined, can faults and changes to that known state be properly identified and analyzed for potential impact. The impact analysis establishes the priority status of various components of the infrastructure for subsequent treatment in the event of failure or upgrade to maintain availability and overall performance commitments.
| “When analyzing
performance issues, most IT operations groups focus on their change, problem,
release/software distribution and asset management processes. Yet, many of
these problems are actually caused by inadequate configuration management,
rather than the primary operations process in question. Configuration
management provides essential information and auditing support for more
than 50 percent of all critical IT operational processes.”
Aperture Systems - Technical Brief
|
Everything within the CMDB is a CI, which are hierarchically decomposable. The Configuration Management business processes are all based around the concept of CIs. CIs comprise the Configuration Management Database (CMDB). The CMDB may consist of a single or multiple distinct databases. In a large organization this repository might contain information on thousands of Configuration Items (CIs). Maintaining an accurate inventory complete with reliable inter-relationships amongst the components is a formidable undertaking. In short, while a goal to be striven for, 100% accuracy will be almost impossible to obtain at acceptable costs. There will be trade-offs required between the accuracy of the database and the costs required to maintain it.
Configuration Management (CM) and a Configuration Management Database (CMDB) are difficult processes to administer well. While it may be relatively easy to produce an inventory of IT hardware assets, it is far more difficult to assess and track the inter-relationships amongst hardware and between hardware and software products on a continuing basis. Even the initial exercise of database population may involve daunting complexities which are compounded by considerations of how to keep the data current. For this reason Configuration Management policies will stress the importance of Change Management as the primary vehicle for modifying the CMDB.
In later years Discovery Tools have been increasingly used to uncover computer assets throughout networks. As Asset Management tools, they are very effective in locating workstations, servers and the software resident on these machines. However, modifying the discovery tool to include rules by which one Configuration Item relates to others is problematic at best and may be totally impractical for some kinds of relationships. This means that Assets cannot be totally purged at regular intervals as the results of one scan replacing those of another. Instead, the results of scans must typically update certain fields in a CI record while retaining much of the relationship data intact. The addition of relationship fields in a CMDB is what renders its' maintenance far more difficult than an Asset database. These relationships, however, are what make the CMDB a far more useful tool for other ITIL processes such as the Incident, Problem, Change, Release and Service Level Management.
Lastly, the concepts of CMDB is converging with that of a metadata repository, but, have yet to assume the rigour attached to the use of metadata models. Some authors have commented that ITIL-inspired implementations pay "insufficient attention to the data structures required to meet CMDB requirements. These data structures– including the user-defined Configuration Item concept– are meta-models, and the data they contain is metadata (data about data and the systems that manage it).".Ref.
![[To top of Page]](../images/up.gif)
Asset and Configuration Management
The objectives of configuration management are to:
- track and report on IT assets
- improved control of software licences
- proper assess the impact of an incident by better identification of infrastructure components (CIs) impacted,
- provide controls to ensure the system operates correctly throughout its life
- ensure that the configuration of all system components is available and accurate at all times
- ensure the pertinent functional and physical interfaces between systems, equipment, and software are correctly and adequately documented
- achieve efficiency in maintenance by ensuring that change proposals are adequately justified and promptly actioned
- ensure that the impact of any change on system functionality, security, performance, and costs is known at the time the change is approved.
- the ability to conduct impact and trend analysis thereby addressing potential failures and performance bottlenecks before they occur
Critical Success Factors
- Close integration of CMDB with Incident, Service Request and Change processes,
- Common use of Category, Type and Item (CTI) to define elements of CMDB and tie them with Incidents, service requests and changes,
- CMDB update at source during Incident, Service Request and Change logging,
- Phased population and maintenance of CI types in conjunction with usage of Change Management procedures.
- Owners are established for all configuration elements and are responsible for maintaining the inventory and controlling change
- Configuration information is maintained and accessible, based on up-to-date inventories and a comprehensive naming convention
- An appropriate software library structure is in place, addressing the needs of development, testing and production environments
- There exists a release management policy and a system to enforce it
- Record keeping and physical custody duties are kept segregated
- There is integration with procurement and change management processes
- Vendor catalogues and configuration are aligned
- Configuration baselines exist, identifying the minimum standard components and integration requirements, consistency and integration criteria
- Use of available discovery tools to check accuracy of CMDB on a regular basis (and possibly to provide statistics on the accuracy of CMDB update procedures),
- An automatic distribution and upgrade process is implemented
- There is zero tolerance for illegal software
![[To top of Page]](../images/up.gif)
Configuration Management (CM) covers the identification, recording, and reporting of IT components, including their versions, constituent components and relationships.
Scope
In Scope
Items under the control of Configuration Management include:
- hardware and software, documentation and key personnel
- the revision of components of the IT infrastructure that have been released into production as Configuration Items (CIs). This may include hardware items, software components and object code, network items, documentation and any other elements within the IT infrastructure that an organization needs to control on a continuing basis.
- how one component relates to others so that the extent of a change to one component can be assessed against all components that may be affected by the Change
Usually Excluded
- Components that are the control of external service providers are retained in that organization's CMDB
- Configuration Management is not responsible for configurations to any components that are still under development. In most instances of major developments there will be associated configuration and change management processes inherent in the project management approach adopted.
- desktop/laptop sub-components such as mice, drives, etc.. In most organizations there is a discrete set of "standard" configurations which are controllable as single entities (and, which are tested and subject to Change Management processes as a single entity). The sub-components seldom vary within that standard configuration.
Discretionary
- the level of granularity at which components are maintained in the system is determined by the stated objectives of Configuration Management.
- the retention of information of staff skills and responsibilities presents a capability which can be accommodated through other management mechanisms
- the retention of documentation within a physical or logical division of the CMDB is probably a function of whether the organization has place that documentation under the aegis of its' Change Management process
- CIs and their relationships in the pre-production (QA Testing) environment due to the frequency of modifications which may occur in pre-production testing
- Gartner Corp offers a somewhat different definition of configuration management in the area of
inventory or asset tracking. Where ITIL's methodology defining the structure and organization for configuration
management has inventory as the prime component, Gartner's definition is broader, encompassing software distribution,
along with other components, such as remote control and license meteringR.
Process Inter-relationships
Relationship with Change and Configuration Management processes
Most commentaries, frameworks and models treat Configuration, Change and Release Management either together
N or inextricably linkedN .
Area Emphasized
Change Management
| Creating a CMDB is a whopping challenge," Casson said. "To do it correctly you have to use a change process to update every configuration item. We're not sure the market really understands that. For most IT shops, asset management is still done in the silos. It's not unusual to find a dozen different asset databases out there. To get to a federated configuration repository is a huge challenge, and you have to update it and create a systems awareness of it." Managers Underutilize ITIL, Survey Says, By Paula Musich, August 17, 2005 |
- Configuration Management Data is used to assess the impact of proposed changes on IT services (including their supporting infrastructure).
- Change Management:
- Provides the Control activity of the Configuration Management process (cannot complete an activation of a Configuration Management process in an organization without links to a formal Change Management process).
- Must be activated first in an organization (before Configuration Management) in order to control and comply with the control activity.
- Provides authorization to change CI content / status.
Release Management
CM provides :
- status changes for components, service functions, or end-to-end services; information about a production release.
- the ability to understand and assess the impact of production testing on other services through the definition of CI relationships and dependencies.
Build and Test
- within the CMDB, CM may stores document information about operating procedures, support procedures, recovery procedures, and information about resources modified in the test environment or limited production environment, status changes for components, service functions, or end-to-end services and the registration of a master blueprint.
- the CMDB provides an understanding of the impact of component, service function and end-to-end service testing on other services and CI relationships, information required to prepare training materials and for documenting versions.
Incident Management
- Provides the infrastructure data required to assess customer impact of an IT infrastructure component failure.
- Identifies the CI-Owners for Service Delivery support, Financial / Asset ownership and associated User(s).
- Is used to correlate the CI data with the appropriate SLA to determine the priority of actions and escalations.
Incident Management provides a feedback to the Configuration Management process re CI accuracy.
Problem Management
Configuration Management provides the infrastructure data required to identify the root cause of incidents and to determine the course of action for problems.
Operations Management
CM Provides :
- updated information about infrastructure components in the production environment (e.g., production jobs, server configurations, IP address assignments, etc.).
- infrastructure information required to perform day-to-day processing, to obtain status information and CI relationship information.
Service Planning
- CMDB may be used to store document information about external and internal design specifications for a service, service portfolio, service quality plan, service catalog.
- Data may be used to determine the fit of existing components and service functions, with new/modified end-to-end services.
Security Management
The Configuration Management CMDB is used to store information about security specific CIs, such as firewalls.
Availability Management
- CMDB may used to store document information about availability designs, models, plans, subcontractor terms and relationships.
- CM provides relationships between service components, service functions, and end-to-end services in order to design the availability reporting relationships.
- CM provides a baseline snapshot of the IT infrastructure information which could then be used to assist with recreation of the IT environment in the event of a disaster or major interruption to service delivery.
Financial Management
- CM identifies the IT infrastructure components that enable delivery of a service to the customer which allows for the accurate costing and pricing of IT services
- CMDB is used to store financial data documents such as service budgets and costing analysis reports
- Infrastructure information can be used to evaluate service performance against a defined standard
Service Level Management
- CM identifies the IT infrastructure components that enable delivery of a service to the customer which allows for the accurate setting and measurement of Service Level Objectives in a Service Level Agreement (SLA).
- CMDB is used to store information about specific SLAs and registration of custom services.
- Data is used to prepare SLA exhibits and to prepare for service performance reviews.
Capacity Management
- CMDB data is used to track CI performance characteristics which provide the current baseline relative to new demand and workload requirements.
- CM may stores document information about capacity design and plan, capacity analysis.
- Data is used to review relationships between service components, fitting end-to-end capacity and performance requirements specified in the design.
- Identifies the IT infrastructure components and their role within service delivery to measure and report that the particular component meets its capacity objective.
IT Strategy Development
- Data is used to identify funding limits for service investments.
- Stores document information for IT Strategy.
- Data is used to review summarized data about CIs to determine future directions and to determine skill categories (e.g., internet, NT, etc.).
- Business Assessment
- Configuration Management data is used to compare existing services with market needs and to identify existing services.
Customer Management
Configuration Management Is used to access current customer information and to update new customer information.
![[To top of Page]](../images/up.gif)
- The CMDB represents the definitive current "Known state" of the infrastructure and is comprised of Configuration Items (CIs) which describe the elements of that infrastructure.
- Where practical and cost effective the CMDB should be used to describe past and future "states" of the infrastructure.
- All changes to CIs maintained in the CMDB will be traced to an approved RfC.
- All CIs will should an "Owner" assigned who is responsible for its' operational performance and integrity. The Owner is accountable for the accurate description of the CI in the CMDB.
- CIs identified by the Change Management process as "Standard" severity should be updated at the time of service as part of the Service Request or Incident resolution processes on the authority of the Owner. The CI Owner may delegate this responsibility to the Service Desk or a recognized workgroup.
- The Configuration Manger will validate the integrity of the CMDB at regular intervals and through Configuration audits.
- All external service partners who own CIs will have an resource assigned to the CI as co-owner to ensure those partners adhere to policies and procedures. Conversely, the enterprise should cooperate with the administration and update of any local CMDBs administered by those partners.
![[To top of Page]](../images/up.gif)
Small organization's may be able to maintain an inventory of their assets in a spreadsheet. However, this is a difficult vehicle to describe component dependencies and inter-relationships. Larger organizations will select an Asset database as a means to keep track of assets, particularly workstations and laptops which have a propensity to disappear. Often the savings due to the more effective control of licences is enough to pay for the Asset system.
The introduction of a viable Change Management system leads to the need for better identification of the impact of changes. Describing what applications and operating systems reside on a server and what servers are implicated in an application are examples. This information facilitates risk assessment and better decision-making about when and how to conduct changes. Because maintaining these relationships is a major administrative chore, the organization may populate a CMDB with only the CIs most often experiencing change or most important to the enterprise. This is usually servers and mission critical applications.
The inclusion of services and documents into a real or virtual CMDB reflects and organization's commitment to a highly organized approach to resource management.
![[To top of Page]](../images/up.gif)
Configuration Management Planning
Configuration Management planning consists of agreeing and defining:
- The strategy, policy, scope and objectives of Configuration Management.
- The analysis of the current position of assets and configurations.
- The organizational context, both technical and managerial, within which the Configuration Management activities are to be implemented.
- The policies for related processes such as Change Management and Release Management.
- Interfaces, e.g. between projects, suppliers, application and support teams.
- The relevant processes, procedures, guidelines, support tools, roles and responsibilities for each of the Configuration Management activities.
- The location of storage areas and libraries used to hold hardware, software and documentation.
- The Configuration policy/strategy sets the objectives and key success factors of what should be achieved by Configuration Management. The detailed activities and resources required to achieve the objectives will be documented in a project plan.
CMDB Design
It is importamnt to decide the core information which needs to be stored in the CMDB and which information can be kept in other repositories that link to the CMDBN.
A configuration item (CI) contains three types of dataR:
- Core Cl data: Data that defines the Cl, its attributes, and relationships with other Cls.Example: A server, its name, and attributes (such as amount of memory, CPU speed, location, users) and how that server relates to other Cls like a business service Cl.
- Detailed Cl data: Data that provides highly detailed information about a Cl. Example: Registry information and settings on that server.
- Related Cl data: Information that does not describe the Cl, but rather provides information about that Cl. Example: Help desk tickets, change requests, and other incidents related to that server.
| "Using the federated CMDB approach, data that should be stored in the CMDB is sorted out from data that should not. By providing a simple means to access detailed and related CI data stored in other repositories, we can build a CMDB that will be much easier to manage, maintain, and scale while continuing to leverage existing investments in different IT management technologies. It is this core value proposition that makes the federated CMDB approach so important ." Federation and a CMDB, BMC Whitepaper available at Bitepipe
|
| CI relationships are described by:
| Association Inverse Association
|
| Accessed By | Accesses
|
| Connected To | Connected To
|
| Documented By | Documents
|
| Impacted By | Impacts
|
| Installed On | Running
|
| Interfaces With | Interfaces With
|
| Member Of | Contains
|
| Served by | Serves
|
| Supported On | Supports
|
| Used By | Uses
|
| Instance Of | Hosts Instance
|
| Parent Of | Child Of
|
| Associated With | Associated With
|
Hardware
Hardware specific policies and guidelines:
- Workstations should be recorded at the basic model purchased with the components and pre-loaded productivity software of that model available through lookup. Additional hardware components, which have undergone compatibility testing, will be distinguished in the CMDB. Note: non-tested workstation products introduce unknown risks to the infrastructure and should be approved by the Change Manager and entered into the CMDB as part of the Change Management process.
- No changes may be made to the configuration managed item without first having an approved reason for making the change. Change is introduced by submitting an RfC to a Change authority. Changes which are pre-authorized or under the auspices of a Local Change Board (LCB) do not require CIs identified in the CMDB; however, the documentation underpinning the pre-authorization and/or pre-approval (ie. RfC) will be included in the CMDB.
Software
Software specific policies and guidelines:
- All software Configuration Items (CIs) in the production infrastructure, recorded in the CMDB, must have version numbers.
- Only CIs that have passed pre-production testing will be recorded in the CMDB.
- Software CIs will contain a reference to the location where the software is physically located. This location forms part of a Definitive Software Library (DSL).
- Productivity Software packages will be recorded in the CMDB as one entry which is cited by workstations by a "RUNNING" relationship. Each version (including service packs/patches) of the productivity package which is currently available anywhere in the production infrastructure will be recorded as a CI.
Documentation
The types of Documentation that will be put under change Management include:
- Procedures managed by Change Management to establish pre-approved and/or pre-authorized processes.
- Policies and guidelines
- Release "Build books" describing software build methods.
- Process descriptions and architectural models.
- Material may be resident on web pages with hyperlinks established in CMDB. All changes to documentation are under Change Management - though changes might be delegated to a local change authority.
Configuration Identification and CIs
| "Critical configuration data includes both static asset inventory and licensing information, the mapping of assets to owners and users, and run-time information about device and software settings, parameters, patch levels, and so forth. Tools are needed to federate and correlate this information and identify dependencies and relationships across servers, storage, software, security and provisioning platforms. Making robust, accurate, configuration data management systems available is an imperative, as IT staff cannot be expected to make the right decisions if they don't have access to the right information Getting Started with Change and Configuration Management Process Improvement, Mary Johnson Turner, BMC Whitepaper, July, 2005
|
Configuration Identification is the selection, identification and labeling of the configuration structures and CIs, including their respective 'owner' and the relationships between them. CIs may be hardware, software, documentation or key personnel. Examples include services, servers, environments, equipment, network components, desktops, mobile units, applications, licenses, telecommunication services, and facilities. Configuration identification includes allocating identifiers for CIs, including individual versions of the CI and their configuration documents. Other records and data associated with a CI include Incidents, Known Errors and Problems, and corporate data about employees, suppliers, locations, business units, and procedures.
An important part of Configuration Management is deciding the level at which control is to be exercised, with top-level CIs broken down into components which are themselves CIs, and so on. This matter is covered in more depth later, but to provide an illustration, Figure "A" shows example System A - which is an assembly of components A1, A2, A3. Each of these components can be broken down into smaller components. Each of the components shown is a CI, including the total system.
In distributed environments, individual components occur within many different services and configuration structures. For example, a person may use a desktop computer that is on the network for a building but may be running a central financial system that is linked to a database on the other side of the world. A Change to the network or the financial system may have an impact on this person and his/her business process. Correct configuration identification and documentation enables Change Management to be effective by knowing fully the potential impact of a particular change.
Data ReconciliationR
A CMDB must provide capabilities that help rationalize diverse IT infrastructure data - ie., coming from multiple discovery sources, to existing data repositories, to IT applications. A reconciliation process helps rationalize this data, bring it into a common format, and ultimately uses the data to help keep an accurate representation of the IT environment stored within a CMDB, which can then by leveraged by IT processes.
There are different approaches and capabilities for data reconciliation, but all revolve around three important activities. Working together to ensure consistency and accuracy across Cl data stored within a CMDB, these three activities comprise:
- Identifying Data - identifying and matching duplicate instances across the incoming data sets.
The identification activity lets you compare multiple data sets and, based on unique identifiers, determine whether information contained in these data sets refers to the same CI. Not only is this step critical to identifying data across multiple data sources, it is also key to identifying similarities between discovered data and the data that is stored within the CMDB.
- Comparing Data - comparing incoming information about CIs with what is actually stored within the CMDBN.
By comparing CMDB data with incoming discovery data, a determination is made as to whether unplanned changes have occurred (e.g., the CMDB CI data was not supposed to change, but the discovery tool indicates that it did). Alternatively, a planned change can be verified (e.g., whether a new patch planned to roll out actually did, based on the latest set of discovered data).
- Merging Configuration Items - determine how and when to bring idenitfied and compared information into a single, reconciled data set that can update the CMDB by making changes to CI data. By creating rules that govern the merge activity, you can create one set of CI information with the best of all discovered data.
Configuration Control
Configuration Control is concerned with ensuring that only authorized and identifiable CIs are recorded from receipt to disposal. It ensures that no CI is added, modified, replaced or removed without appropriate controlling documentation e.g. an approved Change request.
Configuration Status Accounting
Configuration status accounting is the reporting of all current and historical data concerned with each CI throughout its life-cycle. It enables tracking of changes to CIs and their records, e.g. tracking the status as a CI changes from one state to another.
Configuration Verification and Audit
Configuration verification and audit comprises a series of reviews and audits that verify the physical existence of CIs and check that the CIs are correctly recorded in the CMDB and controlled libraries. It includes the verification of Release and configuration documentation before changing the live environment.
Configuration Baseline
A Configuration Baseline is the configuration of a product or system established at a specific point in time, which captures both the structure and details of a configuration. It serves as reference for further activities. An application or software baseline provides the ability to change or to rebuild a specific version at a later date.
A configuration baseline is also a snapshot, or a position, that is recorded. Although the position may be updated later, the configuration baseline remains fixed as the original state and is thus available to be compared with the current position. A configuration baseline is used to assemble all relevant components in readiness for a Change or Release, and to provide the basis for a configuration audit and regression, e.g. after a Change. The Configuration Management system should be able to save, protect and report on a configuration baseline, its contents and documentation.
Configuration Management Database (CMDB)
Many organizations are already using some elements of Configuration Management, often using spreadsheets, local databases or paper-based systems. In today's large and complex IT infrastructures, Configuration Management requires the use of support tools, which includes a Configuration Management Database (CMDB). Physical and electronic libraries are needed along with the CMDB to hold definitive copies of software and documentation.
The CMDB is likely to be based upon database technology that provides flexible and powerful interrogation facilities. A few examples of its potential use are to list:
- Release contents, including component CIs and their version numbers.
- Component CIs and their version numbers in the test and live environments.
- CIs affected by a scheduled Change.
- All Requests for Change (RfCs) relating to one particular CI.
- CIs purchased from a particular supplier within a specific period.
- CI history.
- Equipment and software at a given location, for example to assist in an audit.
- CIs that are scheduled to be upgraded replaced or decommissioned.
- Changes and Problem records associated with a CI.
- All CIs affected by a Problem.
The CMDB should hold the relationships between all system components, including Incidents, Problems, Known Errors, Changes and Releases. The CMDB also contains information about Incidents, Known Errors and Problems, and corporate data about employees, suppliers, locations and business units.
Automated processes to load and update the Configuration Management database should be developed where possible so as to reduce errors and reduce costs. Discovery tools, inventory and audit tools, enterprise systems and network management tools can be interfaced to the CMDB. These tools can be used initially to populate the CMDB, and subsequently to compare the actual 'live' configuration with the records stored in the CMDB.
The CMDB may also be used to store and control details of IT Users, IT staff and business units, although the legal implications of holding information about people in the CMDB should be considered. Storing such information in the CMDB would allow personnel Changes to be related to Changes in CI ownership.
In addition to storing personnel information, the CMDB is often used for Service Level Management to hold details of services and to relate them to the underlying IT components. The CMDB is also used to store inventory details of CIs, such as supplier, cost, purchase date and renewal date for a license. An additional bonus is the use of the CMDB to cover the legal aspects associated with the maintenance of licenses and contracts.
Software and Document Libraries
A controlled library is a collection of software or document CIs of known type and status. Access to items in a controlled library should be restricted. Software libraries are used for controlling and releasing software throughout the systems development life-cycle, e.g. in development, building, testing and operations.
Definitive Software Library (DSL)
The Definitive Software Library (DSL) is the term used for the library in which the definitive authorized versions of all software CIs are stored and protected. It is a physical library or storage repository where master copies of software versions are placed. This one logical storage area may in reality consist of one or more physical software libraries or file stores. The libraries should be separate from development, test or live file store areas. The DSL may also include a physical store to hold master copies of bought-in software, e.g. a fireproof safe. Only authorized software should be accepted into the DSL, strictly controlled by Change and Release Management.
The DSL is a common foundation for the Release Management and Configuration Management processes.
License Management
Company directors, senior managers, and others, are liable to face imprisonment and fines if illegal software is found to be in use within their enterprise. Configuration Management enables an enterprise to monitor and control software licenses, from purchase to disposal. Software license structures, and corporate and multi-licensing schemes, need to be understood and communicated to service-provider staff and Customers.
Responsibility for controlling and auditing software licenses should be unambiguous and should involve purchasing and Asset or Configuration Management. This may be difficult when Users find it so easy to purchase and download software from the Internet, but this can be resolved by links to disciplinary procedures detailed within the organization's Security Policy.
Configuration Management Process Owner
Owns the Configuration Management Process at all levels.
Configuration Manager
The Configuration Manager is responsible for managing the operational activities. The Manager is involved in ensuring integration with other Service Management processes. The Manager is also involved in developing the configuration management database (CMDB) data model, core policies, maintenance processes and procedures, key performance indicators and ongoing management reports. Responsibilities include:
- Facilitating negotiation of the scope of the configuration management process, in collaboration with the project steering committee, Owner and IT business stakeholders.
- Identifying which CIs (configuration items) need to be managed and controlled from this base of inventory, asset (including contracts, costs, vendors and warranties) and configuration management.
- Ensuring data integrity and compliance, distributing management reports and defining integration with other IT systems and processes.
- Continually reviewing the configuration management process for efficiency and effectiveness.
- Planning and executing population of the CMDB (manual or automated), performing regular housekeeping and plans for growth.
Configuration Coordinator
Technical domains often maintain records of the assets under their management and control, often using data repositories in spreadsheets and databases. This data needs to be consolidated and transferred to a central CMDB. It stands to reason that due to the complexity of the infrastructure and the sheer number of CIs to be managed, these technical domains could maintain the data within the physical layer of the CMDB data model under their control. Each technical domain should establish and formalize a role responsible for ensuring active and consistent updating of the configuration management database.
Responsibilities are as follows:
- Defining which CI types and attributes are to be tracked within their respective technical domain.
- Uploading the data from existing data repositories into the central CMDB.
- Updating the CI records under their control on an ongoing basis.
- Maintaining the system and service relationships of the CIs under their control.
- Assisting with periodic integrity audits on the CIs within their domain.
- Data entry and reporting.
CI Owner
The CI Owners function involves planning, design, development and implementation activities and they are responsible for:
- Perform impact assessment on RfC and identify any change dependencies.
- Ensure accuracy of CMDB data for owned CIs including relationships to other CIs.
- Creating RfCs for changes they initiate and secure approval for the change.
- Managing the implementation of RfCs for CIs that they own.
- Compiling & maintaining detailed documentation of the configuration of their system
Operations
Operations is responsible for supporting the CI infrastructure, including:
- Assume responsibility for performance and availability of production infrastructure
- Monitor performance
- Perform regular maintenance and support activities
- Respond to incidents and correct problems
- Implement changes
![[To top of Page]](../images/up.gif)
Configuration Management should continually assess the efficiency and effectiveness of the Configuration Management system using regular management reports. A review of the expected growth of demand of Configuration Management activities should be scheduled on a regular basis, for example, every six months, although in more volatile situations more frequent reviews may be appropriate.
Management Reporting
Management reports for Configuration Management should cover the following:
- Results of configuration audits.
- Information on any non-registered or inaccurately registered CIs that have been detected and the corrective action.
- Information on the number of registered CIs and CI versions, broken down by CI category, type and status (and possibly also by location or other CI attributes).
- Growth and capacity information.
- Information on the rate of change of CIs/CMDB and the DSL
- Details of any backlogs of Configuration Management work or any delays caused by Configuration Management activities, and proposed remedies
- The amount of authorized work done out of hours by other IT services staff.
- The results of efficiency/effectiveness reviews, growth reviews and audits of the Configuration Management system and proposals for tackling actual or potential Problems.
- Data and analyses on the number of CIs by type (e.g. services, servers, routers, hubs, software licensees, desktop PCs, etc).
- The location of CIs by business unit, support group or service.
Management reports should be designed to support Service Management activities such as progress monitoring, Problem Management, Change Management, Release Management, Configuration audits and service planning. The reports should be made available for interrogation and trend analysis by IT Service Management and other groups within the IT services structure.
In general, IT Service Management should set the future direction for Configuration Management in the light of these management reports, taking account of the planned Configuration Management workload and growth.
Key Performance Indicators
Measurable targets for objective metrics will be set for the effectiveness of the Configuration Management process. The following metrics will have set targets designed to improve them over a realistic timeframe:
- Occasions when the 'configuration' is not as authorized.
- Incidents and Problems that can be traced back to wrongly made Changes.
- RfCs that were not completed successfully because of poor impact assessment, incorrect data in the CMDB, or poor version control.
- The cycle time to approve and implement Changes.
- Exceptions reported during configuration audits.
- Unauthorized IT components detected in use.
Other indicators and targets that will be looked at include:
- The change in the proportion of Service Desk calls that are received per month that are resolved while the User is on the telephone, without the need for further escalation.
- The change in the number and seriousness of Incidents and Problems.
- The change in the average time and cost of diagnosing and resolving Service Desk calls that cannot be resolved immediately.
- The change in the number and seriousness of occasions when a Service Level Agreement has been breached where the Problem can be traced back to errors made in the Change Management, Configuration Management, Release Management, Problem Management or Service Desk functions.
- The number of changes to the CMDB per month because of identified errors in the CMDB.
![[To top of Page]](../images/up.gif)
Configuration Management Summary
|
| Controls
- Policies and Guidelines
- CI naming conventions
- relationship definitions
- Configuration Verification procedures
|
|
Inputs
- Configuration baselines
- Software and document libraries
- Approved RfCs
- CI Ownership
- Service Request updates
- Incident Management updates
- Change Management updates
| Activities
| Outputs
- Management Reports
- CI Status accounting
- Configuration audits
|
|
| Mechanisms
- CMDB population
- CMDB updating
- Discovery tools
|
|
![[To top of Page]](../images/up.gif)
Activities
CfM1 - CMDB/ CI Planning
Staged Implementation
Configuration Management and CMDB implementation is an important IT asset and pivotal to an organization's ability to centrally manage IT resources and improve its' ITIL-managed processes. While ITIL Configuration Management best practices can provide guidance in devising and implementing a CMDB its' ultimate form will be conditional on a number of organizational factors which will either be difficult to articulate at the outset or will be constantly evolving as the technology tools and internal infrastructure characteristics adapt and change. A staged implementation which allows the organization to adopt a 'pivot position' (ie., a position from which it can take a number of courses of action - that is, achieve flexibility) is desirable.
Single or Multiple CMDBs
If multiple, logical CMDBs are designed, single primary keys will need to be defined to link to the Local level CMDBs, such as CI # or CI (logical) name. Access to the Local level CMDBs must be provided to the people requiring more information than is contained in the Enterprise level CMDB in order to manage service delivery. This is stated as a concern for the purpose of recording this as an option to consider upon implementation of Phases II and III. Remedy Service Desk - "out of the box" is a single data base containing generalized attributes, some of which may not be relevant for particular kinds of CIs.
Granularity
When planning to activate a Configuration Management process, the organization will need to determine the breadth, depth and scope of the CMDB and the associated costs linked to these decisions. As detailed in figure "B", the CMDB breadth includes the definition of CI attributes, the CMDB depth or level includes the number and degree of CI relationships that are maintained and the CMDB scope involves identifying which CIs will be stored. The deeper and broader the scope and level of the CMDB design exponentially increases the cost of initial population and ongoing maintenance of the infrastructure data.

Secure Discovery Tool
In order to populate and maintain the accuracy of asset records it is necessary to secure a discovery tool. Possible alternatives include:
- Microsoft System Management Server (SMS) - Microsoft Systems Management Server Planning Guide.
- Altiris Asset Management - Active Asset Management.
- Marval MSM - vended in Canada by Stroma Service Consulting.
- ViaTIL Configuration/Asset Management.
- InfraEnterprise version 7.0 - Configuration Mgmt - builds on the technology of Infra Corporation's infraActive application.
- Axios Systems' assystDiscovery - used by the National Audit Office (NAO), which scrutinizes public spending on behalf of the UK Parliament
- ManageSoft Asset Management - close integration with HP Openview.
Initial Implementation
As depicted in Figure 1, Once the CMDB is defined and all data sources and migration strategies have been identified, it is critical to ensure that as soon as the CMDB is populated it is under change control, otherwise the CMDB will soon be out of date. Once an initial load of the CMDB is completed a physical audit should be performed against that information. This information will then validated and updated online. Once the audit is complete and the information updated the CMDB is submitted to Change control to be placed into production. From this point all changes to the CMDB should go through the change management process.

Cfm2 - CMDB Maintenance
Identification
Configuration Identification is the function of identifying the CIs (building-blocks) of a system for the purpose of systematically controlling changes to this configuration and maintaining the integrity and traceability of this configuration throughout the system lifecycle.
CI Selection
The selection of CIs should be determined by the organization's need to control specific components of its infrastructure. It should be optimized to allow proper control both in the acquisition and in-service stages.
It must be emphasized that whenever items are not selected as CIs, it does not necessarily mean that the configuration of those items is not controlled. Their configuration could be controlled through the documentation of a higher level item that has been selected as a CI (e.g., a PC disk drive is controlled by the standard desktop model in production).
If any asset falls under the CI Category Tree Structure then it will need to be brought under CFM.
CI Labeling
Naming conventions should be established and applied to the identification of CIs, configuration documents and Changes, as well as to baselines, Releases and assemblies. The naming conventions should be unique and take into account the existing corporate or supplier naming/numbering structures. The naming conventions or information management system should permit the management of:
- Hierarchical relationships between CIs within a configuration structure
- Hierarchical or subordinate relationships in each CI
- Relationships between CIs and their associated documents
- Relationships between documents and Changes
- Relationships between Incidents and Changes.
CI Control
Once Configuration Items have been identified and documented, they themselves are placed under Configuration Management. Service Providers are responsible for ensuring that changes to the infrastructure are implemented as approved in RfCs and that all changes to Configuration Items, resulting from approved changes, are reflected back into the CMDB.
To be useful, the list of Configuration Items must be easily accessible and readily amendable. Appropriate tools/mechanisms will be put in place to provide for ease of update while ensuring the integrity of this departmental resource.
An important aspect of CM is the concept of baseline management. A baseline is a reference point in the development or lifecycle; at the end of each stage of system lifecycle a formal baseline should be defined. In-service lifecycle management on operational baseline is maintained through Configuration Management.
CI Status Accounting
Configuration status accounting is the reporting of all current and historical data concerned with each CI throughout its life cycle. It involves recording and reporting the status of a CI throughout its' lifecycle. This process is tightly linked to the Change Management process, which instigates changes to the status of a CI.
A CI exists in the production environment in a number of different states. Possible states include:
- Planned - The CI is being planned for the future, however it does not yet exist. An Operational Concept Document will describe the expected performance of the CI;
- In-Development - The CI exists, however it is not in its final state. The configuration of the CI is still evolving. A Functional Design Specification could describe the CI;
- Tested - Development of the CI is considered complete and all tests have been completed. A full Test Report and Design Specification should be available to describe the CI. The CI is ready for implementation in accordance with local baseline procedures. This is the responsibility of either the Life Cycle Application Manager or the Life Cycle Materiel Manager for the CI;
- Implemented - A CI has been implemented into the domain
- Inactive - The CI has been procured but has not yet been put into service or is being held as part of a disaster recovery plan. Although intended for use primarily with hardware CIs, this status can apply equally to older versions of software existing as "backups" and which have not yet been archived; and
- Archived - A CI has been retired from the infrastructure, however the reference to it still exists.
![[To top of Page]](../images/up.gif)
CfM3 - CMDB Verification
Configuration Verification can be defined as the processes or procedures used to ensure Configuration Control is executed consistently and effectively.
Configuration Audit can be defined as the process of verifying that the identified infrastructure, systems and software configurations are what they are declared to be. Under the ITIL methodology, this process is described as comparing data within the CM Repository to the actual physical infrastructure.
![[To top of Page]](../images/up.gif)
Terms
| Term | Definition
|
| Asset Management | The business process that manages an asset throughout its financial lifecycle. Asset Management includes activities such as contract management, cost depreciation, total cost of ownership, total value of ownership and obsolescence for each asset.
|
| Asset Management Database | Maintain details on assets above a certain value, their business unit and location. Relationships to other assets are not usually recorded.
|
| Change Calendar | A documented record of the sequence of steps involved in building a release (implementing a change).
|
| Change Management | Process of controlling Changes to the infrastructure or any aspect of services, in a controlled manner, enabling approved Changes with minimum disruption.
|
| Configuration Baseline | A frozen "picture" of the IT environment at a set point in time that identifies the structure of the IT environment and the underlying dependencies of the components of that environment.
|
| Configuration Item (CI) | Component of an infrastructure - or an item, such as a Request for Change, associated with an infrastructure - that is (or is to be) under the control of Configuration Management.CIs may vary widely in complexity, size and type, from an entire system (including all hardware, software and documentation) to a single module or a minor hardware component.
|
| Configuration Management Database (CMDB) | A database that contains all relevant details of each CI and details of the important relationships between CIs.
|
| Definitive Software Library (DSL) | Term used to describe a secure compound in which the definitive authorized versions of all software CIs are stored and protected. This one Storage area may in reality consist of one or more software libraries or file-storage areas. It contains the master copy of all controlled software in the organization. The DSL should include definitive copies of purchased software (along with license documents or information), as well as software developed on site. Master copies of controlled documentation for a system will also be stored in the DSL form.
|
| Environment | A collection of hardware, software, network and procedures that work together to provide a discrete type of computer service. There may be one or more environments on a physical platform e.g. test, production. An environment has unique features and characteristics that dictate how they are administered in similar, yet diverse, manners.
|
| Forward Schedule of Change | see Change Calendar
|
| Incident | Any event that is not part of the standard operation of a service and that causes, or may cause, an interruption to, or a reduction in, the quality of that service.
|
| Process | A connected series of actions, activities, Changes etc. performed by agents with the intent of satisfying a purpose or achieving a goal.
|
| Process Control | The process of planning and regulating, with the objective of performing a process in an effective and efficient way.
|
| Release | A collection of new and/or changed CIs which are tested and introduced into the live environment together.
|
| Release Management | The process of coordinating and managing releases to a live environment to ensure that releases are implemented in a controlled and systematic way that limits negative impacts to the IT environment.
|
| Request for Change (RFC) | Form, or screen, used to record details of a request for a Change to any CI within an infrastructure or to procedures and items associated with the infrastructure.
|
| Service Level Agreement | A written agreement between a service provider and Customer(s) that documents agreed services and the levels at which they are provided at various costs.
|
| System | An integrated composite that consists of one or more of the processes, hardware, software, facilities and people, that provides a capability to satisfy a stated need or objective.
|
![[To top of Page]](../images/up.gif)
Best practices for developing a CMDB
The following provides some best practices for developing a CMDB:
- Combine CMDB and discovery tool(s) to create Enterprise level and virtual CMDBs: Keep the minimal information required in the Enterprise CMDB and if more detail on a specific CI is required, then access the "virtual" CMDB to get this information.
- Keep the number of attributes to a minimum: Have the Incident Management group provide you with the minimum attributes they would require to perform the Incident Management process (and likewise for each ITSM process). It is easy to add more attributes at a later date. Use the analogy "If you were on a desert island and could only have 4-5 attributes, what would they be….?"
- Ensure that your discovery tool and CMDB structure match: If your collection tools support three-tier data gathering, your CMDB tool should also reflect the same structure. You do not want to spend hours of data mapping time when you update or refresh your CMDB.
- Ensure that your discovery tool and CMDB classifications match: If the discovery tool uses a specific classification for a shrink-wrapped application, make sure it is the same in your CMDB. This is a real time saver when mapping data fields. Template your CIs. You can make the assumption that all PCs have a mouse and a keyboard, so create a PC template and incorporate these components into it. For "like" CIs, you can also template hard disk size, installed memory, NIC and video cards.
- Build meaningful relationships between CIs: CMDBs with little or no relationships are cumbersome to search and perform incident analysis and problem management. Ensure that you can make the relationship between a person and their PC, and the same for servers and their installed applications. It is difficult to break the relationships between CIs if you decide to reduce the depth of your CMDB at a later date.
- Ensure that most of the data in the CMDB can be automatically updated from your discovery tools: Audit your moves, adds and changes (Change Management process) to ensure that the CMDB is being updated before the closure of the service request.
- Design your CMDB from a "Service" view: Ensure that only business critical CIs are entered into the CMDB and that all the components of a "Service" view are accounted for (i.e. networks, firewalls, servers, and applications).
- Use "Type" CIs whenever possible: Normally, for each occurrence of a CI in the infrastructure, a CI record in the CMDB is created. For an application such as an office automation software package, you need only record that CI once, but ensure that you have multiple instances of it. Unique CIs are necessary when you want to track specific attributes such as serial number and asset tag information.
![[To top of Page]](../images/up.gif)
PinkScan Configuration Criteria
A "Pinkscan" is a set of criteria used by Pink Elephant to assess the capabilities of a Configuration Management or Asset tool to be ITIL compliant.
PinkScan Criteria:
- Does the tool facilitate the registration and management of an organization's configuration items (CIs)? For example, hardware, Software, Contracts/ SLAs.
- Does the tool facilitate the recording of CI attributes? For example, serial number, version, and location attributes.
- Does the tool facilitate the automated validation of CI data? For example, are all CI names unique?
- Does the tool facilitate the establishment of relationships between CIs? For example, parent / child, peer-to-peer, upstream / downstream relationships.
- Does the tool support customizable CI lifecycle status management? For example, planned, ordered, under development, in test, implementation, production, in repair/ maintenance
- Does the tool facilitate only authorized access to the CMDB for read, write, and modify activities?
- Does the tool facilitate the recording of CI baseline information? For example, reverting to a previous version of CI configuration in the event that a change fails.
- Does the tool facilitate the logging of historical changes to the CI record for auditing purposes? For example, installation date, records of changes, previous locations.
- Does the tool facilitate the verification of the CI data with the actual physical infrastructure by automated or manual means? For example, the use of systems management tools to validate real time vs. static information.
- Does the tool provide flexible management reports regarding CI inventory, asset and financial information to facilitate configuration audits?
![[To top of Page]](../images/up.gif)