Home
ServiceDesk Plus > Resources > ITSM best practices > What is configuration management?
Home > Resources > What is configuration management?
A comprehensive guide to configuration management

Configuration Management Explained

Try ServiceDesk Plus

Last updated on: Feb 18, 2025

If you’ve been tasked with adopting configuration management best practices within your organization, this configuration management page is for you. It provides a wealth of configuration management information and insights that include what configuration management is, why it’s important, key elements of what configuration management entails (including the configuration management database (CMDB)), the benefits, configuration management best practices, what to look for in a configuration management tool, and where the future of configuration management is heading.

Let’s start with what configuration management is.

What is configuration management?

Configuration management in ITSM with CIs and assets

Wikipedia defines configuration management, in an IT service management (ITSM) context, as the:

“...process that tracks all of the individual configuration items (CI) in an IT system which may be as simple as a single server, or as complex as the entire IT department. In large organizations a configuration manager may be appointed to oversee and manage the configuration management process.”

https://en.wikipedia.org/wiki/Configuration_Management_(ITSM)

Where a CI is defined as: “Any component that needs to be managed in order to deliver an IT service.

Source: Axelos, ITIL Foundation: ITIL 4 Edition Glossary

Example configuration items

Configuration management applies to various IT infrastructure elements, not just the technology employed. For example:

  • Hardware CIs include servers, client devices, network devices, and storage systems
  • Software CIs include operating systems, applications, databases, and middleware
  • Network CIs include routers, switches, firewalls, and load balancers
  • Documentation CIs include technical documentation, configuration guides, standard operating procedures, and knowledge articles.

Configuration management also applies to virtualized and cloud environments. It involves managing the configurations of virtual machines, containers, cloud services, and orchestration tools.

The earlier configuration management definitions are probably best understood using a configuration management example.

A configuration management example

The easiest configuration management example to understand is that of configuration management data and insight being used to identify the impact of a proposed change.

Suppose a company is planning a major upgrade to its enterprise resource planning (ERP) system. The upgrade is complex and involves deploying a new software version, migrating data, and reconfiguring the integrations with other IT systems. The company has a formal change management capability, but this is facilitated by configuration management.

At a high level, configuration management data will play a crucial change management role throughout the ERP system upgrade, starting with the change request submission. This will detail a high-level view of the change’s impact on configurations and integrations. However, it’s at the impact assessment stage where configuration management data is used to identify dependencies, relationships, and potential conflicts with other CIs. At the change approval stage, the change advisory board (CAB) will rely on the accuracy of the employed configuration management data to make informed decisions about the change’s potential risks and benefits.

The potential use cases for configuration management data continue beyond this as the change, once approved, moves into release and then deployment.

The ITIL perspective of configuration management

While the IT industry has long called configuration management “configuration management,” the ITIL body of service management best practices has called it various things. For example, in ITIL 4 – the latest version of ITIL – the related ITSM practice is called “service configuration management.” In the previous version of ITIL – ITIL v3 2011 Edition – the relevant ITSM process was called “service asset and configuration management.” Ultimately, though, it’s still a body configuration management best practice, no matter the terminology used.

This is demonstrated by the ITIL 4 definition of the service configuration management practice:

“The purpose of the service configuration management practice is to ensure that accurate and reliable information about the configuration of services, and the configuration items that support them, is available when and where it is needed. This includes information on how configuration items are configured and the relationships between them.”

Source: Axelos, “Service configuration management: ITIL 4 Practice Guide” (2023)

Why is configuration management important?

Configuration Management process steps in ITSM

The elevator pitch for configuration management’s importance is that it facilitates better ITSM decision-making that improves IT operations and business outcomes (including better customer and employee experiences).

Digging deeper into its importance, configuration management helps IT organizations with:

  • Decision-making – configuration management data provides valuable insights into the organization’s IT infrastructure, including CIs, relationships, and dependencies for decision-making processes such as capacity planning, resource allocation, and technology investments.
  • Service quality – thanks to accurate and up-to-date information about CIs being available for various ITSM practices or processes.
  • Change and risk management – as per the above example.
  • Incident and problem management – when incidents or problems arise, the relevant personnel can use accurate configuration management information to diagnose issues, identify root causes, and invoke appropriate solutions.
  • Security – with reduced risk of security breaches thanks to change tracking and increased visibility of the IT infrastructure.
  • Compliance and auditing – configuration management data helps organizations to meet regulatory requirements, industry standards, and internal policies.
  • Continual improvement – configuration management provides data for performance monitoring, trend analysis, and root cause analysis that can identify opportunities for improvement, including cost reduction when needed.

Configuration management process

The ITSM configuration management process has the following four steps:

  • Identification – to identify the CIs to be managed, including their attributes. This is usually undertaken using network discovery tools, and a configuration baseline is created within the CMDB.
  • Configuration control – to manage changes to CIs and maintain configuration integrity. This will be done via a formal change control or change management process.
  • Status accounting – to document and report on the status of CIs and changes. This includes the creation of reports.
  • Audit and verification – to verify CIs conform to their documented specifications and requirements. This step also includes identifying and resolving discrepancies.

This is the traditional approach to configuration management, where the CMDB is updated with CI configurations within the IT infrastructure. Modern IT management practices, where automation is heavily leveraged, also allow for an alternative approach called “infrastructure as code.” This uses the CMDB to drive change – so the infrastructure reflects the CMDB rather than the reverse. The CMDB view prevails if there’s a difference between the CMDB data and the IT infrastructure. This infrastructure as code approach is returned to in the next section.

How configuration management fits with DevOps, CI/CD, and Agile

Configuration management in DevOps, CI/CD, and Agile

DevOps brings automation to infrastructure management and deployment (along with other approach elements), especially through the infrastructure as code approach outlined earlier. Configuration files and scripts are used to automate environment setup and configuration management helps to ensure that environments are identical across the lifecycle and to detect drift between environments.

Continuous Integration and Continuous Delivery (CI/CD) is a process that facilitates multiple changes to a codebase simultaneously. It uses pull request-based code review workflows to automate the deployment of code changes to the live environment. This same flow applies to configuration changes, so approved configuration changes can be immediately deployed. Configuration management also:

  • Helps ensure version control across different pipeline stages
  • Maintains consistency between build artifacts and deployment configurations
  • Helps ensure test environments match production environments.

The Agile approach focuses on iterative development. Here, configuration management can track changes incrementally, manage the changing requirements and environments, and provide a shared understanding of configurations among Agile team members.

What are the benefits of configuration management?

Benefits of configuration management in ITSM

The earlier “Why is configuration management important?” section shared some high-level reasons for using configuration management. This configuration management benefits section further describes the better outcomes of using configuration management.

  • Improved visibility of the IT environment, including hardware, software, and network components
  • Better cost management and more informed purchasing decisions
  • Improved asset utilization and reduced waste by tracking the status and lifecycle of assets
  • Better control over the IT infrastructure, tracking changes and their impacts, and reducing unexpected changes or disruptions
  • Improved stability, reducing inconsistencies to maintain IT infrastructure stability
  • Service consistency and improved service quality
  • Better strategic planning thanks to a detailed view of the current state
  • Increased compliance with regulatory requirements, internal policies, and standards
  • Improved ITSM capabilities that include:
    • Faster incident resolution
    • Improved problem management capabilities thanks to quicker root cause identification
    • Better controlled, assessed, and managed changes.

Best practices in configuration management

Best practices for effective configuration management

Some configuration management best practices include:

  • Focusing on business value and operations, understanding how configuration management data will help
  • Ensuring that the development configuration management practices and the CMDB incorporate the needs of all relevant business stakeholders, i.e. the people who will benefit from configuration management data
  • Defining clear objectives for configuration management before starting – this includes the CI types within scope and the attributes to be stored in the CMDB
  • Creating configuration management policies, processes and procedures, and roles and responsibilities
  • Integrating with other ITSM processes (and the enabling tools), including incident, service request, and change management
  • Using fit-for-purpose tools for the automated discovery, identification, and classification of CIs
  • Making the CMDB the single source of truth for CI data, including the relationships between CIs
  • Standardizing configuration templates and profiles
  • Leveraging automation for related tasks, including provisioning, change management, monitoring/tracking, and auditing
  • Training everyone involved in the configuration management process
  • Conducting regular audits to help ensure the accuracy and completeness of the CMDB
  • Using continual improvement practices to improve configuration management practices

How to build a high-integrity CMDB

Building a high-integrity CMDB for ITSM success

When looking to learn more about configuration management using ITSM best practices, you might come across the term “high-integrity CMDB.” (A CMDB definition is included in the FAQs section below.)

What is a high-integrity CMDB?

A high-integrity CMDB is a repository that stores information about all the CIs in an organization’s IT infrastructure. The term “high-integrity” denotes that the CMDB and configuration management practices ensure that the stored CI data is consistently maintained, accurate, up-to-date, and can effectively support ITSM practices.

These are some of the key attributes expected with a high-integrity CMDB:

  • Accuracy – that the CI and service data within the CMDB accurately reflect the corporate IT environment
  • Completeness – that details of all CIs and their attributes and relationships are sufficiently recorded
  • Consistency – that CI information is consistently formatted
  • Currency – that configuration management data is kept up-to-date with changes
  • Automation – that automated discovery and update tools are used to keep configuration data current and accurate
  • Reliability – that the CMDB acts as a trusted source of information
  • Integration – that the CMDB integrates seamlessly with other ITSM tools and systems
  • Auditability – that a history of changes allows for auditing and the tracking of changes
  • Business stakeholder alignment – that the CMDB reflects the needs of various business stakeholders, including those outside of IT operations.

How to build a high-integrity CMDB from scratch

There are many steps required to build a high-integrity CMDB; these include:

  • Defining the CMDB’s objectives and scope. What business needs and processes should the CMDB support? The scope also agrees the CIs that will be included.
  • Planning and design. Create a data model for the CMDB’s structure, including the various CI types, attributes, and relationships. Plus, the data sources required.
  • Establishing governance policies and procedures. This includes for CI data entry, updates, access control, and data quality management.
  • Selecting a CMDB solution and CI discovery tools. Not only does the CMDB need to meet scope and data model requirements, but it must also integrate with existing ITSM tools.
  • Data collection. Ideally, automated tools should be used to discover and populate the CMDB with CI data. However, manual data entry and importing will be necessary for some systems and data.
  • Service mapping. Map IT services to the underlying CIs to understand the dependencies and to support impact analysis.
  • Establishing data quality processes. To ensure the CMDB is accurate and up-to-date.
  • Performance measurement. Employ key performance indicators (KPIs) to measure and improve the effectiveness and integrity of the CMDB and configuration management practices.

How does configuration management serve other functions like SIEM, etc.?

How configuration management supports ITSM and SIEM

Configuration management is designed to support other ITSM practices and business processes rather than to simply collect and store CI data. Example use cases are:

  • Security management, including identifying and managing vulnerabilities (thanks to CI configuration data, including patch levels) and implementing access controls.
  • Incident management, including identifying the root cause analysis and assessing the impact of incidents on related services and CIs.
  • Change management, including risk assessment for proposed changes and the planning and coordination of changes.
  • Service level management, including monitoring the performance of services and service improvement.
  • Capacity management, including helping in understanding IT resource utilization and planning for future capacity needs.
  • Availability management, including analyzing service availability and implementing proactive measures to improve availability.
  • IT governance, including audit and compliance and policy enforcement.
  • Business continuity and disaster recovery, including recovery planning and assessing the potential impact of disasters on the IT environment and business operations.

What to look for in a configuration management tool

Key features of configuration management tools

The reality of modern IT operations means there might be a need for a portfolio of configuration management tools rather than simply one. For example, a fit-for-purpose ITSM tool will provide the ability to manage CIs in a CMDB. However, an organization might require additional discovery capabilities or tools designed to manage cloud environments in addition to the CIs in a physical data center. The tool or tools will also need to support various CI types as defined in the earlier CI examples. Configuration management tools will also need to be integrated with third-party solutions, especially when DevOps configuration management use cases are considered. For example:

  • Git – a version control system for code change tracking
  • Docker – for containerization management
  • Terraform – for infrastructure-as-code-based management of cloud infrastructure

Plus, IT automation frameworks such as Ansible, Chef, Puppet, and Salt Stack.

The future of configuration management

The future of configuration management: automation and AI

Configuration management practices will continue to evolve, with the following six factors all contributing to the future of configuration management:

  • Automation and AI adoption – automation will continue to play a significant role in configuration management, with AI-driven capabilities employed to streamline the configuration management process in areas such as anomaly detection and troubleshooting.
  • Additional capabilities for cloud and hybrid environments – this includes the ability to seamlessly manage resources across various cloud service providers and platforms.
  • Greater focus on security needs – there will be a greater emphasis on integrating security features directly into configuration management processes so that configurations comply with security policies from the outset.
  • Continued DevOps integration – ITSM configuration management practices will continue to integrate more deeply with DevOps (and Agile) practices to support continuous delivery and deployment.
  • Infrastructure as code growth – managing and provisioning infrastructure through code will expand further.
  • A focus on sustainability – configuring IT environments to minimize energy consumption and carbon footprint.

Frequently asked questions

Expand all

1. What are the risks of not using configuration management?

Configuration management is an extra cost for your organization. So, it can be tempting to minimize or altogether avoid its use. However, failing to use configuration management seriously affects IT and the wider business.

The bottom line for your organization is that if it’s not using configuration management practices, it increases the risks and impact on business operations (such as downtime and increased costs) that result from improperly configured hardware and software. This can adversely affect productivity, revenue, and even business reputation.

Change effectiveness is affected, too. Without configuration management, your organization can’t understand how changes to the IT infrastructure will impact both IT and business operations – this can delay changes and incur extra costs. It’s also unable to know whether configuration changes were authorized. This and the inability to patch CIs when needed can result in security-related risks and issues.

The impact of these operational issues is felt across three key areas:

  • Compliance – it’s harder to ensure that IT systems comply with regulatory and industry standards
  • Scaling operations – the lack of configuration management data makes the integration and management of new technologies or expansion into new markets more challenging
  • Disaster recovery – restoring systems and operations to their pre-disaster state can be slow and error-prone without configuration management data.

2. What is a configuration manager?

In ITSM, a Configuration Manager is responsible for the configuration management process. One of their primary objectives is to ensure that the CMDB holds accurate and up-to-date information about the configuration of the IT infrastructure and services and is available to support other ITSM processes and activities.

ITIL configuration management best practice states that the Configuration Manager is responsible for the following:

  • “Managing the service configuration management approach
  • Communicating the service configuration management approach and procedures
  • Integrating the service configuration management approach into value streams
  • Deciding whether to include new resources and resource types in the scope
  • Managing exceptions
  • Ensuring CI models are followed
  • Ensuring the CMDB contains valid data
  • Ensuring the organization complies with practice-related requirements, if applicable
  • Optimizing and automating the practice
  • Reporting on the service configuration management performance.”

ITIL configuration management best practice includes two additional operational roles: Configuration Coordinator and Configuration Librarian. While the former is a junior role to the Configuration Manager across the above responsibilities, the latter is focused on manually updating configuration management data, periodically verifying the CMDB, and handling requests for configuration information in organizations with a low level of automation.

3. What are the five pillars of configuration management?

When people mention the five pillars of configuration management, it’s possible that they’re not always talking about the same five pillars. Four of the pillars are usually similar:

  • Identification – identifying and defining the CIs essential to the delivery of IT services.
  • Configuration control – the processes and procedures for requesting, evaluating, approving, and implementing changes to CIs.
  • Status accounting – maintaining accurate and up-to-date information about the status and history of CIs. This includes tracking changes, current versions, and relationships.
  • Audit and verification – to help ensure the actual configuration of IT assets matches the documented configuration information. Discrepancies, unauthorized changes, or inconsistencies are identified and addressed as a result.

However, the stated fifth pillar could be from either the front or tail end of the configuration management process – either configuration planning or reporting. Another aspect of configuration management could also be viewed as a pillar – integration with other ITSM processes (or practices in ITIL 4).

4. What is a configuration management database?

The Service Configuration Management: ITIL 4 Practice Guide defines a configuration management database (CMDB) as:

“A database used to store configuration records throughout their lifecycle. It also maintains the relationships between configuration records.”

This definition might seem somewhat alien in its use of the term “configuration record.” This is likely caused by the “mutation” of the term configuration item (or CI) records to configuration records.

The key functions of a CMDB include the following:

  • Storage of CI data
  • Relationship mapping – it should map and track the relationships between different CIs
  • Versioning and baselines
  • Integration with other ITSM processes (or practices)
  • Auditing and compliance
  • Reporting and analytics.

An important point to note about CMDBs (and configuration management itself) is that value isn’t created by the collection, storage, and management of CI data. Instead, it’s created using CI and relationship data for specific ITSM purposes such as incident management, change management, and capacity management.