Virima V6.0 will soon be available with an all-new look, enhanced discovery, mapping and vulnerability features and more. Stay tuned!

Successful CMDB implementation in six steps

Successful CMDB implementation in six steps

The value of a Configuration Management Database (CMDB) is undisputed when carefully implemented with a clear plan in place about how the CMDB database will be used and maintained within the organization.

Below is a list of six steps that you should have in place to ensure the success of your CMDB implementation to get the maximum value from your configuration management activities.

Step 1. Determine business objectives

What problems are you trying to solve by implementing a CMDB? Defining clear business objectives for Change and Configuration Management  will help you understand what kind of configuration you need, where to source it from, who will use it, and how much data quality matters to your organization. 

Having a clear set of business objectives before starting implementation will enable you to deliver value more quickly and avoid the adoption challenges that IT organizations often face after deploying something new. 

Step 2. CMDB discovery tools

If you are going to manage change within your IT environment effectively, you need a set of discovery tools to help you. It isn’t practical to manually update configuration data when systems or dependencies change. Robust IT discovery tools such as the one Virima offers, enable you, through the use of installed agents, to see everything in your IT environment. It helps you identify changes as soon as they occur, and capture configuration data that you’ll need for security and compliance activities.

Step 3. ITSM system integration

A CMDB is simply a database – a place to store information. Your IT Service Management (ITSM) system provides the tools, workflows, and interfaces that enable users to interact with your configuration data and convert it into tangible business value. 

Whether you are choosing to use an out-of-the-box CMDB that comes with your ITSM system or augmenting it with a product like Virima’s CMDB, it is critically important that you integrate your CMDB database and ITSM system properly. 

If you don’t, you are at risk of losing capabilities for data analysis, real-time business insights, and workflow integration. There are a number of ITSM processes—incident, problem, change, release, and so on—that are supported and enhanced by the capabilities that your CMDB provides. Strong integration between your ITSM system and CMDB database can make these processes run more effectively and efficiently.

(Also read, A CMDB Without Discovery is Just a Database)

Step 4. Equip data owners/data stewards with the right tools

Configuration management data for your organization is continuously changing. Every time a system is added, removed, or changed, your configuration data must be updated to keep it accurate and current. Most failed CMDB implementations aren’t caused by system deficiencies but rather the failure to assign ownership of your configuration data to the right people within the organization. 

  1. A best practice is to assign two groups or individuals to each piece of data
  2. A data owner, typically a business stakeholder, who owns the source system of the incoming data.

A data steward who is either a business analyst or an IT staff member is responsible for keeping the configuration data up to date. 

Data owners and data stewards have shared accountability for your data quality. They can help you measure quality, highlight gaps/issues in your data, and provide updates when needed. 

CMDB automation is an important part of enabling your data owners and data stewards to do their jobs effectively. These staff members need to spend their time focusing on the quality of data and making decisions based on the data, not performing mechanical update processes in your CMDB implementation. Automated IT discovery and integrations with configuration item data sources are a big productivity enhancer.

(Also read, Intelligent Automation: the solution to your IT skills shortage)

Step 5. Data management and retention plan

Populating data into your CMDB database is important, but archiving and purging obsolete data is equally critical to the success of your configuration management initiative. One of the most significant quality issues that ITSM organizations report is old configuration records for systems that are no longer present in the IT environment or are no longer used by business processes. 

CMDB data follows a data lifecycle, just like your IT systems follow either a hardware lifecycle or application lifecycle. When the IT systems are retired or no longer used, their associated configuration records in the CMDB also need to be archived and/or purged depending on your company’s policies. If you want your CMDB implementation to have a high level of data quality, you need to establish a data management and retention plan, which includes a set of tools, processes, and policies for how to get data out of your CMDB when it is no longer needed.

(Also read, Your CMDB: Your ITSM-ITOM Connection)

Step 6. CMDB: data visualization

Even small IT environments are too complex to understand in rows and columns. Data visualization tools are essential for making sense of the CMDB data. Configuration data is a digital representation of your physical, virtual, and cloud IT environments. It is the relationships between configuration items that describe how individual IT components fit together into systems and services used by your business functions. 

Dependency data is complex, and the easiest, fastest, and most valuable way for your ITSM staff to use it is through business service maps that depict end-to-end dependency chains. Without visualization tools, you will find it difficult to harvest the full value potential from your CMDB implementation.

Your CMDB data and the configuration data contain some of the most valuable resources your IT team has access to. Configuration data is what makes all your other ITSM processes work effectively, it helps you manage risks, and it gives you the information you need to optimize your company’s operational processes. 

The steps discussed above will help you maximize the value of your CMDB investment and set your configuration management processes up for ongoing success. 

(Also read, The CMDB as a Source of Truth)

Learn more about these steps by watching our webinar, 6 steps to CMDB Success.

Get started with Virima

Virima features can automatically discover and map your critical IT resources and the interconnections that link them to one another, your applications and services, and your users.

To get started, contact us today. Our experts will guide you on CMDB implementation best practices, and provide information on our past implementations and information on CMDB. Schedule a demo and explore the possibilities!

Subscribe to Our Newsletter

More to Explore

Table of contentsWhat is CMDB, and why is it important for your cloud initiatives?CMDBs and change managementCMDBs and incident managementCMDBs and problem managementCompliance reporting made easy with CMDBsImpact analysis with CMDBs and cloud assetsMake better, fact-based decisions with Virima for…

Table of contentsHow does asset discovery work?What types of IT assets can you discover?NetworksServersPCs, laptops, and mobile devicesBenefits of IT asset discoveryLess time spent on cataloging IT assetsBetter and detailed IT reportsStreamlined IT asset acquisitionEnsuring compliance with security policies A single…

Table of contentsWhy stakeholder communications are importantHow to prepare for incident communicationIncident management best practicesCommunication plan High-quality major incident management communication plan Using visualizations in stakeholder communicationsIncident mitigation with visualizations Virima can help you with incident management Incidents are a part of business,…

Table of contentsAsset managementTracking and labeling assets’ locations and states through an asset register Tracking and managing software licenses Managing end-user devicesKeeping tabs and handling decommissioned assetsConfiguration managementIdentifying configuration items in the CMS Controlling  and managing all changes made to assets Understanding impact on…

Some people think that an IT service desk is the same thing as an IT help desk. It isn’t and we’re  going to explain the difference between service desk and help desk. Sure, there are some similarities, but there are…

Table of contentsA CMDB tool can maintain all other tools What is CMDB in ServiceNow?What are ServiceNow CMDB best practices?A few ServiceNow CMDB best practices include:Defining your goalsForming a configuration management teamEstablishing a governance structureUnderstanding configuration item designIntegrating with key business…

Table of contentsStep 1. Determine business objectivesStep 2. CMDB discovery toolsStep 3. ITSM system integrationStep 4. Equip data owners/data stewards with the right toolsStep 5. Data management and retention planStep 6. CMDB: data visualizationLearn more about these steps by watching…

Incident management is crucial while dealing with major incidents. They are the crises that have widespread impacts on your employees, disrupt your operations, and impact your ability to deliver on customer expectations.  While you may assume your company is prepared…

Table of contentsUnderstanding business service mappingA modern approach to business service dependency mappingDiscovery planning processUse casesVirima simplifies service mapping and IT discovery Business service mapping is the area of configuration management that perplexes so many IT professionals. Yet, it provides…

Understanding the Configuration Management Database (CMDB) and its core functions is a critical aspect of service management. The CMDB forms the hub of numerous service management practices and provides a means of correlation needed to deliver business services successfully.   The…

IT asset management (ITAM) and inventory management are both useful practices that can benefit any organization using IT. Inventory management can exist without IT asset management, and in fact, it does in many organizations as it has been in existence…