SlideShare une entreprise Scribd logo
1  sur  16
Create a Configuration Management Roadmap
A CMDB is only as valuable as the processes it supports; select these before you invest.
Without a CMDB or formal Configuration Management system, there is no way to obtain accurate information about IT assets and the relationships between them. A Configuration Management Database (CMDB) ensures that IT decision makers have access to valuable information about
the IT environment, and enables better decision making and service delivery. However, CMDB projects can be difficult to right-size, and it can be difficult to ensure that the benefit of the system outweighs the cost of recording, maintaining, and analyzing the data.
Do not let stories of CMDB failure prevent you from deploying something with the potential to vastly improve IT’s service delivery. The potential for reward is significant. You should consider investing in a CMDB, but do not build or purchase a solution without first considering what the
CMDB will be used for.
Configuration management is an enabling process. Without defining what you want the CMDB to enable, it will be difficult to design a CMDB that gets used to realize tangible benefit. Decide which processes the CMDB will support and then build or purchase a solution that will meet
your needs.
Do not overthink it! A CMDB is simply a repository of configuration information. It serves one central purpose: to provide information about IT assets, their components, and the relationship between components.
When you know what is in your environment, and how it fits together, you can make smarter decisions, perform work faster, and deliver better service.
With a CMDB, you can rely less on the knowledge held by individual staff members and maintain more sustainable, accurate sources of truth. Every decision maker will have access to the same knowledgebase and they will be able to work faster because they are not starting from scratch
each time a request is received. Increasing access to information with a CMDB will enable repeatability of process and should drive significant service management improvement. Consider these practical applications:
The CMDB can be used to perform faster and more accurate change impact analysis, identifying dependencies before they cause incidents. This will also decrease the change turnaround time, increasing IT’s ability to meet business demands for new functionality.
The CMDB can be used to accurately determine the pre-requisities that must be in place for a target system to accept a release and avoid failures when the change goes live.
The CMDB can be used to perform quicker and more accurate root cause analysis of problems, preventing incidents before they occur.
The CMDB can be used to map reported incidents to the source, reducing incident resolution time and restoring service faster regardless of how familiar the technician is with the impacted component.
The CMDB can be used to proactively determine which assets are nearing the end of their useful lives and stay ahead of impending capacity shortages.
The scope of the CMDB can be easily managed. It will only contain the depth of information required to render it useful, nothing more and nothing less. Creating a solid roadmap that details the processes that will integrate use of a CMDB will help you design a solution that gets used and
drives value.
• Learn about the challenges associated with CMDB projects and understand Info-Tech’s approach to successfully implementing a CMDB and formal configuration management.
• Consider the potential benefits of implementing a CMDB and ensure that you are ready to kick-off this project.
• Many organizations skip this important objectives setting step and suffer when the CMDB does not provide any value.
• Avoid this pitfall by committing a small team to creating a roadmap that sets you up for CMDB success down the road.
• A CMDB is only as valuable as the IT processes it enables. The first step to creating a configuration management roadmap must be to select the processes the CMDB will support and decide how these processes will be improved through use of a CMDB.
• This should be done by identifying process pain points that can be directly reduced through use of a CMDB.
Step 2: Launch the Project: Pick the right group of explorers for the job!
Step 3: Gather Requirements: Identify your pirates! Pick the processes that will benefit most from a CMDB
Each pirate should be labelled with a process name, and should be dreaming of a benefit that his process can capture from the CMDB:
Change Management: Assess change impact more accurately and reduce change-related incidents
Incident Management: Identify impacted components faster to reduce incident resolution time
Problem Management: Identify root cause faster to prevent incidents before they occur
Release and Deployment Management: Verify configuration pre-requisites to facilitate more successful deployments
Capacity Planning: Proactively address shortages
Technology Obsolescence Assessment: Replace equipment before it becomes a problem
Financial Management: Cost Service more easily
Step 4: Select a Technology Target State: Equip your pirates with the appropriate key to maximize your CMDB’s value:
Each key represents a different technology target state: Excel spreadsheet, homegrown database, open-source CMDB, or vendor solution
Step 5: Build a Roadmap: Create a treasure map that will get you the treasure fast.
Step 6: Sell the Roadmap: Obtain stakeholder buy-in and get ready to unlock the secret to better service management!
• Vendor solutions are only one option – ideal for some, but too costly for others.
• Depending on the size and complexity of your environment and your configuration management needs, something as simple as an Excel spreadseet may suffice.
• Ensure that you strike a balance between cost and benefit when selecting a CMDB solution.
• The cost of achieving the benefits of a CMDB depends heavily on the level of data you need to record in the CMDB for a particular process.
• Process benefits wil be more costly to achieve for initial initiatives because a high level of data will need to be collected.
• Once one process, like change management, is re-designed and integrate, it will become easier and cheaper to integrate the next.
• The support of senior executive stakeholders is critical to the success of your roadmap roll-out.
• Focus on the ways in which the CMDB will support service management and increase SLA fulfillment.
• Don’t let this come across as a “boil the ocean” project – this will diminish your chances of obtaining approval and resources.
Create a Configuration Management Roadmap
Create a Configuration Management Roadmap
Create a Configuration Management Roadmap
Create a Configuration Management Roadmap
Create a Configuration Management Roadmap
Create a Configuration Management Roadmap
Create a Configuration Management Roadmap
Create a Configuration Management Roadmap
Create a Configuration Management Roadmap
Create a Configuration Management Roadmap
Create a Configuration Management Roadmap
Create a Configuration Management Roadmap
Create a Configuration Management Roadmap
Create a Configuration Management Roadmap
Create a Configuration Management Roadmap

Contenu connexe

En vedette

HGConcept-CMDB-Blueprint Design
HGConcept-CMDB-Blueprint DesignHGConcept-CMDB-Blueprint Design
HGConcept-CMDB-Blueprint Design
HGConcept Inc.
 
HGConcept-CMDB-Service Design
HGConcept-CMDB-Service DesignHGConcept-CMDB-Service Design
HGConcept-CMDB-Service Design
HGConcept Inc.
 

En vedette (17)

Tools for Product Management
Tools for Product ManagementTools for Product Management
Tools for Product Management
 
Roadmap 101 of the ServiceNow business platform
Roadmap 101 of the ServiceNow business platformRoadmap 101 of the ServiceNow business platform
Roadmap 101 of the ServiceNow business platform
 
Effectively Planning for an Enterprise-Scale CMDB Implementation
Effectively Planning for an Enterprise-Scale CMDB ImplementationEffectively Planning for an Enterprise-Scale CMDB Implementation
Effectively Planning for an Enterprise-Scale CMDB Implementation
 
HGConcept-ITAM-Design
HGConcept-ITAM-DesignHGConcept-ITAM-Design
HGConcept-ITAM-Design
 
HGConcept-CMDB-Blueprint Design
HGConcept-CMDB-Blueprint DesignHGConcept-CMDB-Blueprint Design
HGConcept-CMDB-Blueprint Design
 
Continuous Delivery in the Enterprise
Continuous Delivery in the EnterpriseContinuous Delivery in the Enterprise
Continuous Delivery in the Enterprise
 
HGConcept-CMDB-Service Design
HGConcept-CMDB-Service DesignHGConcept-CMDB-Service Design
HGConcept-CMDB-Service Design
 
A Practical Guide to CMDB Deployment in a Tivoli Environment
A Practical Guide to CMDB Deployment in a Tivoli EnvironmentA Practical Guide to CMDB Deployment in a Tivoli Environment
A Practical Guide to CMDB Deployment in a Tivoli Environment
 
CMDB - Strategic Role in IT Services - Configuration Management Moves Front a...
CMDB - Strategic Role in IT Services - Configuration Management Moves Front a...CMDB - Strategic Role in IT Services - Configuration Management Moves Front a...
CMDB - Strategic Role in IT Services - Configuration Management Moves Front a...
 
CAPS: What's best for deploying and managing OpenStack? Chef vs. Ansible vs. ...
CAPS: What's best for deploying and managing OpenStack? Chef vs. Ansible vs. ...CAPS: What's best for deploying and managing OpenStack? Chef vs. Ansible vs. ...
CAPS: What's best for deploying and managing OpenStack? Chef vs. Ansible vs. ...
 
MS SQL 2012 安裝與基本使用教學
MS SQL 2012 安裝與基本使用教學MS SQL 2012 安裝與基本使用教學
MS SQL 2012 安裝與基本使用教學
 
The Future of DevOps and UrbanCode
The Future of DevOps and UrbanCodeThe Future of DevOps and UrbanCode
The Future of DevOps and UrbanCode
 
Deployment Automation for Hybrid Cloud and Multi-Platform Environments
Deployment Automation for Hybrid Cloud and Multi-Platform EnvironmentsDeployment Automation for Hybrid Cloud and Multi-Platform Environments
Deployment Automation for Hybrid Cloud and Multi-Platform Environments
 
Git由超淺入超深
Git由超淺入超深Git由超淺入超深
Git由超淺入超深
 
Building a devops CMDB
Building a devops CMDBBuilding a devops CMDB
Building a devops CMDB
 
ELK at LinkedIn - Kafka, scaling, lessons learned
ELK at LinkedIn - Kafka, scaling, lessons learnedELK at LinkedIn - Kafka, scaling, lessons learned
ELK at LinkedIn - Kafka, scaling, lessons learned
 
SQL Server 資料庫版本控管
SQL Server 資料庫版本控管SQL Server 資料庫版本控管
SQL Server 資料庫版本控管
 

Plus de Info-Tech Research Group

Select and Implement a Next Generation Endpoint Protection Solution
Select and Implement a Next Generation Endpoint Protection SolutionSelect and Implement a Next Generation Endpoint Protection Solution
Select and Implement a Next Generation Endpoint Protection Solution
Info-Tech Research Group
 
Create a Winning BPI Playbook
Create a Winning BPI PlaybookCreate a Winning BPI Playbook
Create a Winning BPI Playbook
Info-Tech Research Group
 
Optimize Change Management
Optimize Change ManagementOptimize Change Management
Optimize Change Management
Info-Tech Research Group
 
Improve IT Business Alignment With An Infrastructure Roadmap
Improve IT Business Alignment With An Infrastructure RoadmapImprove IT Business Alignment With An Infrastructure Roadmap
Improve IT Business Alignment With An Infrastructure Roadmap
Info-Tech Research Group
 
Standardize the Service Desk
Standardize the Service DeskStandardize the Service Desk
Standardize the Service Desk
Info-Tech Research Group
 
Optimize Project Intake Approval and Prioritization
Optimize Project Intake Approval and PrioritizationOptimize Project Intake Approval and Prioritization
Optimize Project Intake Approval and Prioritization
Info-Tech Research Group
 
Optimize the IT Operating Model
Optimize the IT Operating ModelOptimize the IT Operating Model
Optimize the IT Operating Model
Info-Tech Research Group
 
Define an EA Operating Model
Define an EA Operating ModelDefine an EA Operating Model
Define an EA Operating Model
Info-Tech Research Group
 
Craft an End-to-End Data Center Consolidation Strategy to Maximize Benefits
Craft an End-to-End Data Center Consolidation Strategy to Maximize BenefitsCraft an End-to-End Data Center Consolidation Strategy to Maximize Benefits
Craft an End-to-End Data Center Consolidation Strategy to Maximize Benefits
Info-Tech Research Group
 
Build and Information Security Strategy
Build and Information Security StrategyBuild and Information Security Strategy
Build and Information Security Strategy
Info-Tech Research Group
 
Implement an enterprise service bus revised
Implement an enterprise service bus    revisedImplement an enterprise service bus    revised
Implement an enterprise service bus revised
Info-Tech Research Group
 
Implement a Shared Services Model
Implement a Shared Services ModelImplement a Shared Services Model
Implement a Shared Services Model
Info-Tech Research Group
 
Assess and Optimize EA Capability
Assess and Optimize EA CapabilityAssess and Optimize EA Capability
Assess and Optimize EA Capability
Info-Tech Research Group
 

Plus de Info-Tech Research Group (20)

Select and Implement a Next Generation Endpoint Protection Solution
Select and Implement a Next Generation Endpoint Protection SolutionSelect and Implement a Next Generation Endpoint Protection Solution
Select and Implement a Next Generation Endpoint Protection Solution
 
Create a Winning BPI Playbook
Create a Winning BPI PlaybookCreate a Winning BPI Playbook
Create a Winning BPI Playbook
 
Master Contract Review and Negotiation For Software Agreements-sample
Master Contract Review and Negotiation For Software Agreements-sampleMaster Contract Review and Negotiation For Software Agreements-sample
Master Contract Review and Negotiation For Software Agreements-sample
 
Optimize Change Management
Optimize Change ManagementOptimize Change Management
Optimize Change Management
 
Improve IT Business Alignment With An Infrastructure Roadmap
Improve IT Business Alignment With An Infrastructure RoadmapImprove IT Business Alignment With An Infrastructure Roadmap
Improve IT Business Alignment With An Infrastructure Roadmap
 
Build a Business-Driven IT Risk Management Program
Build a Business-Driven IT Risk Management ProgramBuild a Business-Driven IT Risk Management Program
Build a Business-Driven IT Risk Management Program
 
Standardize the Service Desk
Standardize the Service DeskStandardize the Service Desk
Standardize the Service Desk
 
Optimize Project Intake Approval and Prioritization
Optimize Project Intake Approval and PrioritizationOptimize Project Intake Approval and Prioritization
Optimize Project Intake Approval and Prioritization
 
Modernize Communications and Collaboration Infrastructure
Modernize Communications and Collaboration InfrastructureModernize Communications and Collaboration Infrastructure
Modernize Communications and Collaboration Infrastructure
 
Optimize the IT Operating Model
Optimize the IT Operating ModelOptimize the IT Operating Model
Optimize the IT Operating Model
 
Info-Tech Membership Overview
Info-Tech Membership OverviewInfo-Tech Membership Overview
Info-Tech Membership Overview
 
Define an EA Operating Model
Define an EA Operating ModelDefine an EA Operating Model
Define an EA Operating Model
 
Become a Transformational CIO
Become a Transformational CIOBecome a Transformational CIO
Become a Transformational CIO
 
Craft an End-to-End Data Center Consolidation Strategy to Maximize Benefits
Craft an End-to-End Data Center Consolidation Strategy to Maximize BenefitsCraft an End-to-End Data Center Consolidation Strategy to Maximize Benefits
Craft an End-to-End Data Center Consolidation Strategy to Maximize Benefits
 
Build and Information Security Strategy
Build and Information Security StrategyBuild and Information Security Strategy
Build and Information Security Strategy
 
Build an Application Integration Strategy
Build an Application Integration StrategyBuild an Application Integration Strategy
Build an Application Integration Strategy
 
Develop a Project Portfolio Management Strategy
Develop a Project Portfolio Management StrategyDevelop a Project Portfolio Management Strategy
Develop a Project Portfolio Management Strategy
 
Implement an enterprise service bus revised
Implement an enterprise service bus    revisedImplement an enterprise service bus    revised
Implement an enterprise service bus revised
 
Implement a Shared Services Model
Implement a Shared Services ModelImplement a Shared Services Model
Implement a Shared Services Model
 
Assess and Optimize EA Capability
Assess and Optimize EA CapabilityAssess and Optimize EA Capability
Assess and Optimize EA Capability
 

Dernier

Dernier (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 

Create a Configuration Management Roadmap

  • 1. Create a Configuration Management Roadmap A CMDB is only as valuable as the processes it supports; select these before you invest. Without a CMDB or formal Configuration Management system, there is no way to obtain accurate information about IT assets and the relationships between them. A Configuration Management Database (CMDB) ensures that IT decision makers have access to valuable information about the IT environment, and enables better decision making and service delivery. However, CMDB projects can be difficult to right-size, and it can be difficult to ensure that the benefit of the system outweighs the cost of recording, maintaining, and analyzing the data. Do not let stories of CMDB failure prevent you from deploying something with the potential to vastly improve IT’s service delivery. The potential for reward is significant. You should consider investing in a CMDB, but do not build or purchase a solution without first considering what the CMDB will be used for. Configuration management is an enabling process. Without defining what you want the CMDB to enable, it will be difficult to design a CMDB that gets used to realize tangible benefit. Decide which processes the CMDB will support and then build or purchase a solution that will meet your needs. Do not overthink it! A CMDB is simply a repository of configuration information. It serves one central purpose: to provide information about IT assets, their components, and the relationship between components. When you know what is in your environment, and how it fits together, you can make smarter decisions, perform work faster, and deliver better service. With a CMDB, you can rely less on the knowledge held by individual staff members and maintain more sustainable, accurate sources of truth. Every decision maker will have access to the same knowledgebase and they will be able to work faster because they are not starting from scratch each time a request is received. Increasing access to information with a CMDB will enable repeatability of process and should drive significant service management improvement. Consider these practical applications: The CMDB can be used to perform faster and more accurate change impact analysis, identifying dependencies before they cause incidents. This will also decrease the change turnaround time, increasing IT’s ability to meet business demands for new functionality. The CMDB can be used to accurately determine the pre-requisities that must be in place for a target system to accept a release and avoid failures when the change goes live. The CMDB can be used to perform quicker and more accurate root cause analysis of problems, preventing incidents before they occur. The CMDB can be used to map reported incidents to the source, reducing incident resolution time and restoring service faster regardless of how familiar the technician is with the impacted component. The CMDB can be used to proactively determine which assets are nearing the end of their useful lives and stay ahead of impending capacity shortages. The scope of the CMDB can be easily managed. It will only contain the depth of information required to render it useful, nothing more and nothing less. Creating a solid roadmap that details the processes that will integrate use of a CMDB will help you design a solution that gets used and drives value. • Learn about the challenges associated with CMDB projects and understand Info-Tech’s approach to successfully implementing a CMDB and formal configuration management. • Consider the potential benefits of implementing a CMDB and ensure that you are ready to kick-off this project. • Many organizations skip this important objectives setting step and suffer when the CMDB does not provide any value. • Avoid this pitfall by committing a small team to creating a roadmap that sets you up for CMDB success down the road. • A CMDB is only as valuable as the IT processes it enables. The first step to creating a configuration management roadmap must be to select the processes the CMDB will support and decide how these processes will be improved through use of a CMDB. • This should be done by identifying process pain points that can be directly reduced through use of a CMDB. Step 2: Launch the Project: Pick the right group of explorers for the job! Step 3: Gather Requirements: Identify your pirates! Pick the processes that will benefit most from a CMDB Each pirate should be labelled with a process name, and should be dreaming of a benefit that his process can capture from the CMDB: Change Management: Assess change impact more accurately and reduce change-related incidents Incident Management: Identify impacted components faster to reduce incident resolution time Problem Management: Identify root cause faster to prevent incidents before they occur Release and Deployment Management: Verify configuration pre-requisites to facilitate more successful deployments Capacity Planning: Proactively address shortages Technology Obsolescence Assessment: Replace equipment before it becomes a problem Financial Management: Cost Service more easily Step 4: Select a Technology Target State: Equip your pirates with the appropriate key to maximize your CMDB’s value: Each key represents a different technology target state: Excel spreadsheet, homegrown database, open-source CMDB, or vendor solution Step 5: Build a Roadmap: Create a treasure map that will get you the treasure fast. Step 6: Sell the Roadmap: Obtain stakeholder buy-in and get ready to unlock the secret to better service management! • Vendor solutions are only one option – ideal for some, but too costly for others. • Depending on the size and complexity of your environment and your configuration management needs, something as simple as an Excel spreadseet may suffice. • Ensure that you strike a balance between cost and benefit when selecting a CMDB solution. • The cost of achieving the benefits of a CMDB depends heavily on the level of data you need to record in the CMDB for a particular process. • Process benefits wil be more costly to achieve for initial initiatives because a high level of data will need to be collected. • Once one process, like change management, is re-designed and integrate, it will become easier and cheaper to integrate the next. • The support of senior executive stakeholders is critical to the success of your roadmap roll-out. • Focus on the ways in which the CMDB will support service management and increase SLA fulfillment. • Don’t let this come across as a “boil the ocean” project – this will diminish your chances of obtaining approval and resources.