DS9 Manage the Configuration

Ensuring the integrity of hardware and software configurations requires the establishment and maintenance of an accurate and complete configuration repository. This process includes collecting initial configuration information, establishing baselines, verifying and auditing configuration information, and updating the configuration repository as needed. Effective configuration management facilitates greater system availability, minimizes production issues and resolves issues more quickly.

Control over the IT process of Manage the Configuration that satisfies the business requirement for IT of
  • optimizing the IT infrastructure, resources and capabilities, and accounting for IT assets
by focusing on
  • establishing and maintaining an accurate and complete repository of asset configuration attributes and baselines, and comparing them against actual asset configuration
is achieved by
  • Establishing a central repository of all configuration items
  • Identifying configuration items and maintaining them
  • Reviewing integrity of configuration data
and is measured by
  • Number of business compliance issues caused by improper configuration of assets
  • Number of deviations identified between the configuration repository and actual asset configurations
  • Percent of licenses purchased and not accounted for in the repository
Management of the process of Manage the Configuration that satisfies the business requirement for IT of optimizing the IT infrastructure, resources and capabilities, and accounting for IT assets is:

1 Non-existent
2 Initial/Ad Hoc
3 Repeatable but Intuitive
4 Defined
5 Managed and Measurable
6 Optimized


Benchmarks/Guidelines for Scoring

1 Non-existent when
Management does not have an appreciation of the benefits of having a process in place that is capable of reporting on and managing the IT infrastructure, for either hardware or software configurations.
2 Initial/Ad Hoc when
The need for configuration management is recognized. Basic configuration management tasks, such as maintaining inventories of hardware and software, are performed on an individual basis. No standard practices are defined.
3 Repeatable but Intuitive when
Management is aware of the need for controlling the IT configuration and understands the benefits of accurate and complete configuration information, but there is implicit reliance on technical personnel knowledge and expertise. Configuration management tools are being employed to a certain degree, but differ amongst platforms. Moreover, no standard working practices are defined. Configuration data content is limited and not used by interrelated processes, such as change management and problem management.
4 Defined when
The procedures and working practices are documented, standardized and communicated, but training and application of the standards is up to the individual. In addition, similar configuration management tools are being implemented across platforms. Deviations from procedures are unlikely to be detected, and physical verifications are performed inconsistently. Some automation occurs to assist in tracking equipment and software changes. Configuration data are being used by interrelated processes.
5 Managed and Measurable when
The need to manage the configuration is recognized at all levels of the organization, and good practices continue to evolve. Procedures and standards are communicated and incorporated into training, and deviations are monitored, tracked and reported. Automated tools, such as push technology, are utilized to enforce standards and improve stability. Configuration management systems do cover most of the IT assets and allow for proper release management and distribution control. Exception analysis, as well as physical verifications, are consistently applied and their root causes are investigated.
6 Optimized when
All IT assets are managed within a central configuration management system that contains all necessary information about components, their interrelationships and events. The configuration data are aligned with vendor catalogs. There is full integration of interrelated processes, and they use and update configuration data in an automated fashion. Baseline audit reports provide essential hardware and software data for repair, service, warranty, upgrade and technical assessments of each individual unit. Rules for limiting installation of unauthorized software are enforced. Management forecasts repairs and upgrades from analysis reports, providing scheduled upgrades and technology refreshment capabilities. Asset tracking and monitoring of individual IT assets protect them and prevent theft, misuse and abuse.