This curriculum spans the full operational lifecycle of configuration items, comparable in scope to a multi-workshop program for aligning CMDB practices with release and deployment pipelines across complex, hybrid IT environments.
Module 1: Defining and Scoping Configuration Items (CIs)
- Selecting which components to treat as CIs based on business criticality, change frequency, and compliance requirements.
- Establishing naming conventions and CI hierarchies that align with existing CMDB structure and support integration with monitoring tools.
- Deciding whether infrastructure-as-code templates (e.g., Terraform, CloudFormation) should be modeled as CIs or linked artifacts.
- Resolving conflicts between development teams treating microservices as single CIs versus operations requiring per-container tracking.
- Determining ownership of CI data during handoff from development to operations in DevOps environments.
- Implementing lifecycle states (e.g., proposed, in test, live, retired) for CIs and synchronizing with deployment pipelines.
Module 2: CI Identification and Discovery
- Configuring automated discovery tools to reconcile agent-based and agentless scans without creating duplicate CIs.
- Handling shadow IT systems that appear in network scans but lack formal change authorization or documentation.
- Defining thresholds for auto-creating CIs versus requiring manual approval based on system sensitivity.
- Integrating discovery results with vulnerability scanners to flag unapproved or rogue CIs in production.
- Managing CI identification in containerized environments where ephemeral instances challenge persistent identity.
- Establishing reconciliation rules when discovery tools report configuration drift from CMDB records.
Module 3: CI Relationships and Dependency Mapping
- Modeling bidirectional relationships between CIs (e.g., application to database, VM to host) with accurate dependency directionality.
- Validating dependency maps through change impact simulations before high-risk production deployments.
- Handling circular dependencies in CI graphs that prevent automated deployment sequencing.
- Updating dependency records when legacy applications are refactored into microservices with dynamic service discovery.
- Excluding transient or test environments from production dependency maps to prevent false impact analysis.
- Integrating CI relationships with observability platforms to enable root cause analysis during incidents.
Module 4: CI Lifecycle Management
- Enforcing mandatory retirement procedures for CIs, including data archival and access revocation checks.
- Triggering CI decommission workflows automatically when infrastructure-as-code templates are deleted from version control.
- Managing CI versioning when minor patch updates do not warrant new CI records but must be tracked.
- Handling CI reactivation requests for systems previously marked as retired due to business reprioritization.
- Aligning CI lifecycle stages with formal change management gates in regulated environments.
- Auditing CI lifecycle transitions to detect unauthorized moves from test to production environments.
Module 5: CI Data Integrity and Governance
- Implementing role-based access controls to prevent unauthorized modifications to critical CI attributes.
- Designing audit trails that capture who changed CI data, what was modified, and associated change request references.
- Resolving data ownership disputes between teams when multiple groups maintain overlapping CI records.
- Establishing data quality SLAs (e.g., 99% CI accuracy in production) and monitoring compliance.
- Handling CI data synchronization conflicts when integrating multiple CMDB instances across business units.
- Enforcing mandatory CI updates as part of the deployment approval process in release gates.
Module 6: CI Integration with Release Management
- Validating that all CIs affected by a release are current in the CMDB before deployment scheduling.
- Automating pre-deployment backups of CI configuration data for rollback readiness.
- Mapping release packages to specific CI versions to ensure deployment consistency across environments.
- Blocking release promotions when CI dependency checks reveal unmet prerequisites.
- Generating deployment runbooks dynamically based on CI relationships and known configuration constraints.
- Using CI baselines to verify post-deployment configuration conformity and detect configuration skew.
Module 7: CI Integration with Deployment Automation
- Configuring deployment tools to update CI status fields (e.g., "last deployed", "version") upon successful rollout.
- Handling deployment failures by rolling back both application state and associated CI metadata changes.
- Using CI attributes to dynamically route deployments to appropriate environments based on hosting criteria.
- Enabling deployment scripts to query CI data for connection strings, ports, and other runtime dependencies.
- Preventing concurrent deployments to the same CI by implementing CI-level locking mechanisms.
- Integrating CI health indicators from monitoring systems to gate canary deployment progression.
Module 8: CI Reporting and Compliance
- Generating audit-ready reports that trace CI changes to approved change records over a fiscal period.
- Producing software license compliance reports based on CI-installed product instances and version data.
- Mapping CIs to regulatory control frameworks (e.g., SOX, HIPAA) for compliance evidence collection.
- Creating heat maps of CI change frequency to identify unstable components requiring refactoring.
- Exporting CI data in standardized formats (e.g., CMDB federation, OpenCMDB) for enterprise reporting tools.
- Responding to external audit findings by demonstrating CI data accuracy through sample validation procedures.