IT services are typically made up of a bunch of individual components — things like servers, software and middleware, and unique configuration information.
In ITIL v3, Service Asset and Configuration Management (SACM) is about properly planning and managing (and reporting and auditing) the relationships and attributes of all of these components, across every service in your infrastructure.
In this article, we'll be exploring the activity of SACM as it functions in ITIL v3. This is part of our ITIL v3 Guide, which you can navigate using the right-hand menu. For the latest ITIL version, see our ITIL 4 Guide.
SACM is a combination of two important processes:
These all-new for 2020 ITIL e-books highlight important elements of ITIL 4 best practices. Quickly understand key changes and actionable concepts, written by ITIL 4 contributors.
According to ITIL, SACM is:
The process responsible for ensuring that the assets required to deliver services are properly controlled, and that accurate and reliable information about those assets is available when and where it is needed. This information includes details of how the assets have been configured and the relationships between assets.
This critical practice spans the entire service lifecycle. Nailing SACM is important to the health of both your individual services and your entire IT organization — and as such, it’s often one of the first ITIL processes implemented in top IT organizations.
At its core, SACM is about ensuring that you are able to identify and control all assets across your infrastructure, and can manage their integrity through effective recording, reporting, and auditing.
More specifically, ITIL dictates that the objectives of SACM are to:
Before we dive deeper, it’s helpful to get a few definitions out of the way that you’ll see regularly throughout this process and beyond. There are a ton of definitions, but we’ll limit it to the most important ones for a basic functional understanding of the ITIL Asset and Configuration Management.
A Configuration Management System is basically just a set of tools (like databases, files, etc.) that are used to gather, update, and analyze data about all of your configuration items and their relationships. A CMS may also include information about:
This is different from a CMDB.
A CMDB is a database that stores configuration records. One or more CMDB’s may be part of the overarching CMS.
Config records describe your CIs by recording information about:
CIs are simply any component that needs to be managed in order to deliver an IT service. A server, a virtual server, or even the configuration of an application could be considered a CI, for example.
There are different types of CIs, including:
Service assets can be any resources or capabilities that contribute to the delivery of a service. Unlike CIs, which can be specifically managed by IT, service assets can’t always. The knowledge of an IT worker, for example, is a service asset. The overall ability for a team to respond to an incident or problem is a service asset.
If it’s an asset that you use during the Service Lifecycle, it typically falls under the scope of SACM. Most things are fair game, including virtual assets, but there are some exceptions to the scope of SACM:
In general, the scope of SACM includes management of the complete lifecycle of every CI — including interfaces to internal and external service providers where there are assets and configuration items that need to be controlled.
Benefits of service asset and config management include:
Along the way, service asset and configuration management will interface with nearly all of your other IT process, including change management, financial management, incident and problem management, and more.
There are six main activities in service asset and configuration management:
For each of the services you offer, ITIL suggests that you create a Service Management Plan — which is essentially just a document that addresses the critical components of a service before you implement it. It typically covers:
Service Management Plans typically go into quite a bit more detail, though — outlining explicitly how the change management and configuration management processes will interface, how and when CI data will be audited, and much more.
This is essentially creating a complete “inventory” of all the CI’s in your infrastructure. In this activity, you are essentially recording every bit of data about your CIs that is necessary for effective operations — from the version of a piece of hardware or software to all the documentation, configurations, ownership details, etc.
To do so, ITIL recommends that you give all CIs unique identifiers (for example, numbers) and record all the relevant attributes of the CI (including the owner). Attributes you may want to capture include:
Here, ITIL recommends that all CIs follow a strict process for being added, changed, and removed from your CMS or CMDB. The goal is to ensure that changes of any kind don’t occur without following your approved procedures for a wide variety of processes like license management, change management, version management, and even deployment.
Along the way, you will need to create your own policies and procedures for things like:
Throughout the lifecycle of every CI, ITIL encourages you to keep track of the complete status — including what changes have been proposed, the status of approved changes, etc.Being able to view and provide status reports gives you important insight into both the current and historical state of your CI’s, and can even help you detect unauthorized CI’s along the way.Reports typically include things like:
At any given time, you need assurance that your data is accurate on all of your CIs. Regular reviews and audits are essential, and ITIL recommends that you perform them to prevent discrepancies between your actual environment and how it is documented.
In ITIL terminology:
Verifications and audits can be performed anytime, both randomly and according to a planned schedule. Tools are available to automate the process, too — comparing the configuration of designated servers with the master configuration you’ve recorded, for example. Audits are also often performed before major changes or releases are deployed, to avoid potential incidents or service disruptions.
Ensuring the integrity of your configuration and asset data and systems is equally important. As part of the asset and configuration management process, you need to regularly back up the CMS, keep detailed records about archived and historical CI versions, and take appropriate measures to ensure data integrity across the entire lifecycle.
To get the most from your SACM activities, follow these best practices:
For more on this topic, explore the ITIL v3 Guide, with 20+ articles on the official ITIL methodology. For more information on ITSM in general, explore the BMC Service Management Blog.