Back to Enterprise IT CMDB

Enterprise IT CMDB Implementation Guide

Complete reference for implementing the Enterprise IT CMDB Schema with 21 object types across three architectural tiers. Designed for organizations with complex multi-cloud environments, microservices architectures, and stringent compliance requirements.

πŸ“– 60 min read 🏒 Enterprise IT CMDB v1.0 🏒 Enterprise Tier πŸ“… February 2026

Executive Summary

The Enterprise IT CMDB Schema delivers a comprehensive Configuration Management Database designed for organizations with complex multi-cloud environments, microservices architectures, and stringent compliance requirements. This schema provides complete visibility across 21 object types spanning business capabilities, technical services, applications, infrastructure, and operational assets.

Target Organizations

  • Enterprises with 500+ servers across hybrid cloud environments
  • Organizations running containerized workloads on Kubernetes
  • Companies with regulatory compliance requirements (SOC 2, ISO 27001, PCI-DSS, HIPAA)
  • IT departments managing 50+ business applications
  • Teams adopting DevOps practices with infrastructure-as-code

Business Value Delivered

  • 40-60% reduction in Mean Time to Resolution (MTTR) through service dependency mapping
  • 30% decrease in failed changes via comprehensive impact analysis
  • Complete audit trail for compliance and regulatory requirements
  • Real-time visibility into cloud costs and resource utilization
  • Automated certificate and contract expiry tracking preventing service disruptions

Schema Capabilities

  • Business capability to technical service mapping
  • Application-to-infrastructure dependency chains
  • Multi-cloud resource management (AWS, Azure, GCP)
  • Kubernetes cluster and container image tracking
  • API inventory with authentication documentation
  • Certificate lifecycle management
  • Backup job monitoring and verification

Schema Architecture

ITIL v4 Practice Alignment

The Enterprise IT CMDB Schema aligns with ITIL v4 practices to support modern IT service management:

ITIL v4 Practice Schema Support
Service Configuration Management All 21 object types with relationship mapping
Change Enablement Impact analysis via Depends On, Runs On relationships
Incident Management Service-to-infrastructure tracing for root cause
Problem Management Pattern identification across related CIs
IT Asset Management Server, License, Contract tracking
Service Continuity Backup Job verification, DR location mapping
Information Security Certificate management, API authentication tracking

Three-Tier Architecture

The schema organizes object types into three logical tiers:

TIER 1 - BUSINESS LAYER
β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”   β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”   β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚ Business        │──▢│ Business        │──▢│ Technical       β”‚
β”‚ Capability      β”‚   β”‚ Service         β”‚   β”‚ Service         β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜   β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜   β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜
        β”‚                                           β”‚
        β–Ό                                           β–Ό
TIER 2 - APPLICATION LAYER
β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β” β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β” β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β” β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚Applicationβ”‚ β”‚Microserv β”‚ β”‚Container β”‚ β”‚   API    β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜ β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜ β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜ β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜
        β”‚           β”‚           β”‚
        β–Ό           β–Ό           β–Ό
TIER 3 - INFRASTRUCTURE LAYER
β”Œβ”€β”€β”€β”€β”€β”€β”β”Œβ”€β”€β”€β”€β”€β”€β”β”Œβ”€β”€β”€β”€β”€β”€β”β”Œβ”€β”€β”€β”€β”€β”€β”β”Œβ”€β”€β”€β”€β”€β”€β”β”Œβ”€β”€β”€β”€β”€β”€β”β”Œβ”€β”€β”€β”€β”€β”€β”
β”‚Serverβ”‚β”‚Cloud β”‚β”‚  K8s β”‚β”‚  DB  β”‚β”‚ Cert β”‚β”‚Networkβ”‚β”‚Contractβ”‚
β””β”€β”€β”€β”€β”€β”€β”˜β””β”€β”€β”€β”€β”€β”€β”˜β””β”€β”€β”€β”€β”€β”€β”˜β””β”€β”€β”€β”€β”€β”€β”˜β””β”€β”€β”€β”€β”€β”€β”˜β””β”€β”€β”€β”€β”€β”€β”˜β””β”€β”€β”€β”€β”€β”€β”˜
Tier 1 - Business Layer: Business Capability, Business Service, Technical Service - Represents what the organization delivers to customers and stakeholders
Tier 2 - Application Layer: Application, Microservice, Container Image, API - Represents the software components that implement services
Tier 3 - Infrastructure Layer: Server, VM, Cloud Instance, Kubernetes Cluster, Database, Load Balancer, Network Device, Location, Cloud Account, Certificate, DNS Record, Backup Job, Software License, Contract - Represents the foundation that hosts applications

Reference Types

The schema defines five relationship types that enable dependency mapping and impact analysis:

Reference Type Color Purpose Example Usage
Delivered By Blue (#0052CC) Service composition Business Service β†’ Technical Service
Depends On Green (#00875A) Runtime dependency Technical Service β†’ Application
Runs On Purple (#6554C0) Hosting relationship Microservice β†’ Container Image
Managed By Orange (#FF8B00) Ownership assignment Application β†’ Team/Person
Located In Red (#FF5630) Physical/logical placement Server β†’ Location, VM β†’ Cloud Account

Object Type Reference

The Enterprise IT CMDB includes 21 object types. Below are detailed descriptions for each:

1. Location

Purpose: Physical data centers, offices, colocation facilities, and edge sites where IT infrastructure is deployed. Locations provide critical context for disaster recovery planning, compliance with data residency requirements, and incident response coordination.

Key Attributes: Location Name, Location Type (Data Center, Office, Colocation, Edge Site, DR), Address, City, Country, Tier Rating, Compliance Certs, Status

Why it matters: DR planning, data residency compliance, maintenance windows, capacity planning, emergency response

2. Cloud Account

Purpose: AWS accounts, Azure subscriptions, GCP projects, and other cloud provider accounts. Cloud Account records enable cost allocation, security boundary definition, and multi-cloud visibility.

Key Attributes: Account Name, Account ID, Provider (AWS, Azure, GCP, Oracle Cloud, IBM Cloud), Alias, Owner, Cost Center, Monthly Budget, Environment, Status

Why it matters: Cost management, security boundaries, compliance, resource organization, budget tracking

3. Business Capability

Purpose: High-level business functions that the organization must perform, independent of how they are implemented. Business Capabilities provide the bridge between business strategy and IT services.

Key Attributes: Capability Name, Description, Owner, Criticality (Mission Critical, Business Critical, Business Operational, Administrative), Strategic Value, Status

Why it matters: Strategic alignment, investment prioritization, redundancy analysis, business continuity

4. Business Service

Purpose: Customer-facing services that deliver value directly to customers or stakeholders. Business Services are what the business "sells" or provides, supported by underlying technical services and applications.

Key Attributes: Service Name, Capability (reference), Description, Service Owner, SLA, RPO, RTO, Criticality (Tier 1-4), Compliance Tags, Status

Why it matters: Customer impact analysis, SLA tracking, recovery planning, change impact assessment

5. Technical Service

Purpose: IT services that support Business Services but are not directly customer-facing. Technical Services bridge the gap between business outcomes and technical implementation.

Key Attributes: Service Name, Business Service (reference), Service Type (Infrastructure, Platform, Application, Data, Security, Integration), Owner, Support Team, Tier, Status

Why it matters: Dependency mapping, incident routing, capacity planning, service catalog

6. Application

Purpose: Business applications that implement functionality for Technical Services. Applications are the software components that users interact with or that process business logic.

Key Attributes: Application Name, Technical Service (reference), Description, Version, Application Type (Web, Mobile, Desktop, API, Batch, Integration), Tech Stack, SDLC Phase, Compliance, Risk Rating, Owner, Status

Why it matters: Portfolio management, technology tracking, risk assessment, lifecycle planning

7. Microservice

Purpose: Individual service components within a distributed application architecture. Microservices enable tracking of independently deployable units with their own repositories and APIs.

Key Attributes: Service Name, Application (reference), Repository (URL), API Endpoint (URL), Owner, Health Check URL, Status

Why it matters: Deployment tracking, API discovery, ownership clarity, health monitoring

8. Container Image

Purpose: Docker images and other container images used to deploy microservices. Container Image records enable vulnerability tracking and version management.

Key Attributes: Image Name, Microservice (reference), Registry, Version/Tag, Base Image, Scan Status, Status

Why it matters: Security scanning, version control, deployment tracing, compliance with approved base images

9. Kubernetes Cluster

Purpose: K8s clusters that host containerized workloads. Cluster records enable capacity planning, version tracking, and workload placement decisions.

Key Attributes: Cluster Name, Cloud Account (reference), Provider (EKS, AKS, GKE, OpenShift, Rancher, Self-Managed), Version, Node Count, Environment, GitOps Repo, Status

Why it matters: Capacity planning, version management, environment mapping, GitOps tracking

10. Server

Purpose: Physical servers, virtual machines on-premises, and container hosts. Server records provide the foundation for infrastructure management and capacity planning.

Key Attributes: Hostname, Location (reference), IP Address, FQDN, Server Type (Physical, Virtual, Container Host), Operating System, CPU Cores, RAM (GB), Storage (GB), Serial Number, Asset Tag, Environment, Status

Why it matters: Asset management, capacity planning, lifecycle management, incident response

11. Virtual Machine

Purpose: VMs running on hypervisors (VMware, Hyper-V, KVM) or in cloud environments. VM records enable resource tracking and host-to-guest relationship mapping.

Key Attributes: VM Name, Host Server (reference), Cloud Account (reference), Hypervisor, vCPU, vRAM (GB), Storage (GB), Snapshots, Status

Why it matters: Resource allocation, host mapping, snapshot management, cloud correlation

12. Cloud Instance

Purpose: Cloud provider compute instances (EC2, Azure VMs, GCE instances). Cloud Instance records enable cost tracking and cloud resource management.

Key Attributes: Instance Name, Instance ID, Cloud Account (reference), Instance Type, Region, Availability Zone, Monthly Cost, Tags, Status

Why it matters: Cost optimization, right-sizing, tagging compliance, regional distribution

13. Database

Purpose: Database instances including relational databases, NoSQL databases, and caching systems. Database records enable data management and backup verification.

Key Attributes: Database Name, Server (reference), Database Type (PostgreSQL, MySQL, SQL Server, Oracle, MongoDB, Redis, Elasticsearch), Version, Port, Size (GB), Cluster Info, Replication, Backup Status, Encryption, Status

Why it matters: Data protection, compliance, performance monitoring, security

14. API

Purpose: Internal and external APIs exposed by applications. API records enable API governance, documentation tracking, and integration management.

Key Attributes: API Name, Application (reference), Endpoint (URL), Version, Auth Type (API Key, OAuth 2.0, JWT, Basic Auth, mTLS), Rate Limits, Documentation URL, Status

Why it matters: API inventory, security, documentation, rate limiting

15. Load Balancer

Purpose: Application and network load balancers distributing traffic to backend services. Load Balancer records enable traffic management and SSL termination tracking.

Key Attributes: LB Name, Cloud Account (reference), LB Type (Application, Network, Classic, Hardware), VIPs, Health Check URL, SSL Termination, Status

Why it matters: Traffic flow, SSL/TLS management, health checks, high availability

16. Network Device

Purpose: Routers, switches, firewalls, wireless access points, and other network infrastructure. Network Device records enable network topology documentation.

Key Attributes: Device Name, Location (reference), Device Type (Router, Switch, Firewall, Wireless AP, VPN Gateway), IP Address, Manufacturer, Model, Firmware, Serial Number, Status

Why it matters: Network topology, firmware management, capacity planning, security

17. Certificate

Purpose: SSL/TLS certificates used to secure communications. Certificate records enable proactive expiry management and security compliance.

Key Attributes: Certificate Name, Domain, Issuer, Issue Date, Expiry Date, Key Size, Auto-Renew, Status

Why it matters: Expiry prevention, key management, compliance, automation

18. DNS Record

Purpose: DNS entries that map domain names to infrastructure. DNS Record records enable DNS change management and service discovery documentation.

Key Attributes: Record Name, FQDN, Record Type (A, AAAA, CNAME, MX, TXT, NS, SRV, PTR), Value, TTL, Provider, Status

Why it matters: Service discovery, change management, troubleshooting, TTL management

19. Backup Job

Purpose: Scheduled backup configurations protecting data and systems. Backup Job records enable backup verification and data protection compliance.

Key Attributes: Job Name, Source System, Schedule, Retention (Days), Target, Last Run, Last Run Status, Success Rate (%), Status

Why it matters: Data protection, recovery testing, retention compliance, capacity planning

20. Software License

Purpose: Software licenses and entitlements. License records enable compliance management and cost optimization.

Key Attributes: License Name, Product, License Type (Perpetual, Subscription, Per User, Per Device, Enterprise), Quantity, Vendor, Annual Cost, Expiry Date, Status

Why it matters: Compliance, cost optimization, renewal planning, audit readiness

21. Contract

Purpose: Vendor contracts for support, licensing, services, and maintenance. Contract records enable renewal management and vendor governance.

Key Attributes: Contract Name, Vendor, Contract Type (Support, License, Service, Maintenance, Consulting), Start Date, End Date, Value, Auto-Renew, Terms, Status

Why it matters: Renewal planning, cost tracking, terms reference, auto-renewal management

Implementation Phases

1
Foundation
Weeks 1-3

Objectives: Establish schema and governance structure, populate organizational objects, define naming conventions and data standards

Activities:

  • Deploy Enterprise IT CMDB Schema to JSM Assets
  • Configure reference types and relationship rules
  • Import Location records from facilities inventory
  • Import Cloud Account records from cloud provider consoles
  • Document naming conventions for all object types
  • Assign data owners for each object type category

Deliverables: Deployed schema with all 21 object types, Populated Location and Cloud Account records, Documented naming standards, RACI matrix for data ownership

2
Business Services
Weeks 4-6

Objectives: Document business capabilities and services, establish service hierarchy, define criticality and recovery requirements

Activities:

  • Workshop with business stakeholders to identify capabilities
  • Document Business Capability records
  • Map Business Services to capabilities
  • Define SLA, RPO, RTO for each service
  • Assign service owners
  • Create Technical Service records

Deliverables: Complete Business Capability inventory, Business Service catalog with SLAs, Technical Service mapping, Service ownership matrix

3
Application Portfolio
Weeks 7-10

Objectives: Document application inventory, map applications to services, capture technology stack details

Activities:

  • Import application inventory from existing sources
  • Link Applications to Technical Services
  • Document Microservices for distributed applications
  • Capture API inventory
  • Record Container Images for containerized apps
  • Document Kubernetes Clusters

Deliverables: Application portfolio in CMDB, Microservice registry, API inventory, Container image catalog

4
Infrastructure
Weeks 11-14

Objectives: Document physical and virtual infrastructure, establish infrastructure-to-application relationships, enable impact analysis

Activities:

  • Import Server records from discovery tools
  • Create Virtual Machine records
  • Import Cloud Instance records from cloud providers
  • Document Database instances
  • Record Network Devices
  • Create Load Balancer records

Deliverables: Complete infrastructure inventory, Application-to-infrastructure mapping, Network topology documentation

5
Operational Assets
Weeks 15-17

Objectives: Document certificates, DNS, and backups, capture licenses and contracts, enable proactive expiry management

Activities:

  • Import Certificate inventory
  • Document DNS Records
  • Create Backup Job records
  • Import Software License records
  • Document Contract records
  • Configure expiry alerting

Deliverables: Certificate inventory with expiry tracking, DNS record documentation, Backup coverage verification, License compliance baseline, Contract renewal calendar

6
Optimization
Weeks 18-20

Objectives: Verify data quality, enable automation, train users

Activities:

  • Execute data quality audits
  • Configure automation rules
  • Integrate with discovery tools
  • Train service desk on CMDB usage
  • Train change managers on impact analysis
  • Establish ongoing governance processes

Deliverables: Data quality baseline metrics, Automated data validation, Discovery tool integration, Trained users, Governance operating procedures

Migration Strategies

From Spreadsheet-Based CMDB

Approach:

  1. Export spreadsheets to CSV format
  2. Map spreadsheet columns to schema attributes
  3. Normalize data (standardize values, fix inconsistencies)
  4. Use JSM Assets CSV import
  5. Validate imported data
  6. Establish relationships post-import

Key Considerations: Data normalization is typically 60% of effort. Plan for relationship creation as separate step. Archive spreadsheets after successful migration.

From Legacy CMDB Tools

Approach:

  1. Export from legacy tool using native export or API
  2. Map legacy CI types to Enterprise schema object types
  3. Transform data to match attribute formats
  4. Import using JSM Assets API or CSV
  5. Recreate relationships using reference attributes
  6. Validate data completeness

Tool-Specific Guidance:

  • HP UCMDB: Export via Integration Studio, map CIT to object types
  • BMC Atrium: Use CMDB Export utility, transform class structure
  • ServiceNow: Export via Table API, map tables to object types

From Discovery Tools Only

Approach:

  1. Deploy discovery tool across infrastructure
  2. Configure scans for servers, VMs, cloud instances
  3. Map discovered attributes to schema
  4. Import discovered data
  5. Manually enrich with ownership and service mapping
  6. Establish ongoing sync

Recommended Discovery Tools: Lansweeper (on-premises infrastructure), Qualys Asset Inventory (security-focused), AWS Config/Azure Resource Graph/GCP Asset Inventory (cloud), Kubernetes cluster APIs (container platforms)

Integration Patterns

Discovery Tool Integration

Pattern: Scheduled sync from discovery tools updates infrastructure records

Implementation:

  1. Configure discovery tool API credentials
  2. Create sync job mapping discovered assets to CMDB records
  3. Define conflict resolution rules (discovery wins vs. CMDB wins)
  4. Schedule regular sync (daily recommended)
  5. Configure alerting for sync failures

ITSM Integration

Pattern: Bi-directional sync between CMDB and ITSM for incident/change management

Implementation:

  1. Configure ITSM connector (native JSM or third-party)
  2. Map CMDB objects to ITSM CI records
  3. Enable CI attachment to incidents and changes
  4. Sync status updates back to CMDB
  5. Enable impact analysis from CMDB relationships

Monitoring Integration

Pattern: Alert enrichment with CMDB context

Implementation:

  1. Configure monitoring tool webhook to query CMDB
  2. Map monitoring host identifiers to CMDB records
  3. Enrich alerts with service ownership, criticality
  4. Route alerts based on CMDB owner attributes
  5. Include service dependencies in alert context