CMDB
Asset inventory and infrastructure mapping for comprehensive IT environment visibility.
The CMDB (Configuration Management Database) module provides centralized asset inventory management and infrastructure relationship mapping. Track hardware, software, network devices, and their interdependencies to maintain accurate IT environment documentation and support incident response, change management, and compliance reporting.
Overview
CMDB enables organizations to:
Asset Discovery: Automatically discover and inventory IT assets
Relationship Mapping: Track dependencies between infrastructure components
Change Tracking: Record configuration changes and their impact
Compliance Support: Maintain accurate inventory for audit requirements
Incident Response: Quickly identify affected systems during security events
Asset Management
Asset Types
CMDB tracks multiple asset categories:
Servers: Physical and virtual servers with OS, applications, and services
Network Devices: Routers, switches, firewalls, and load balancers
Endpoints: Workstations, laptops, and mobile devices
Applications: Software applications and their dependencies
Cloud Resources: Cloud instances, containers, and services
Asset Attributes
Each asset maintains comprehensive attributes:
Hostname/FQDN
IP addresses and network configuration
Operating system and version
Installed software and patches
Hardware specifications
Location and ownership
Criticality and business impact
Infrastructure Mapping
Relationship Types
CMDB tracks various relationship types:
Runs On: Application → Server
Connects To: Server → Database
Depends On: Service → Network Device
Hosts: Physical Server → Virtual Machines
Protected By: Application → Firewall
Topology Visualization
Visual representation of infrastructure:
Network topology diagrams
Application dependency maps
Service relationship views
Critical path identification
Impact analysis visualization
Integration with Security Operations
SIEM Integration
CMDB enriches security events with asset context:
Map security alerts to affected assets
Identify asset criticality and business impact
Track asset ownership for incident assignment
Correlate events across related infrastructure
Incident Response Support
During security incidents:
Quickly identify all affected systems
Understand dependencies and potential impact
Locate asset owners for notification
Access configuration baselines for comparison
Data Collection
Discovery Methods
CMDB populates through multiple sources:
Network Scanning: Active discovery of network devices
Agent-Based Collection: Installed agents report system details
Log Integration: Parse system logs for asset information
API Integration: Import from external CMDBs or asset management systems
Manual Entry: Administrative input for assets not auto-discovered
Update Frequency
Asset data refresh:
Critical systems: Real-time or every 15 minutes
Standard systems: Hourly updates
Network devices: Every 4 hours
Applications: Daily refresh
Manual verification: Monthly review
Reporting and Analytics
Standard Reports
Pre-built CMDB reports:
Asset inventory by type and location
Software installation compliance
Hardware lifecycle management
Configuration drift detection
Vulnerability exposure by asset
Custom Reports
Build custom views:
Filter by asset attributes
Group by location, owner, or criticality
Export to CSV or PDF
Schedule automated report delivery
Best Practices
Maintain Accuracy: Regular audits to verify CMDB data
Define Ownership: Assign asset owners for accountability
Document Changes: Record all configuration modifications
Classify Assets: Categorize by criticality and business impact
Integrate Workflows: Connect CMDB to incident and change management