Glossary

CMDB

Configuration Management Database — a repository that stores information about IT infrastructure components and their relationships.

Definition

A CMDB, or Configuration Management Database, is a centralized repository that stores information about the components of an IT environment. These components, called configuration items (CIs), include servers, workstations, network devices, software applications, and the relationships between them. The CMDB concept comes from ITIL (Information Technology Infrastructure Library), where it serves as the foundation for change management, incident management, and service mapping.

In theory, a CMDB provides a single source of truth for IT infrastructure. In practice, CMDBs are only as accurate as the data entered into them, and that data is often entered manually, updated infrequently, and validated rarely.

Why It Matters

CMDBs were designed for IT service management, not security. Security teams need to answer questions like "is this device patched?" or "does this server have an open vulnerability?" A CMDB can tell you the device exists and who owns it, but it rarely tracks the real-time security posture data that defenders need.

The bigger problem is data decay. Studies suggest CMDB accuracy drops below 80% within months of a major cleanup effort. People forget to update records when they decommission a server, add a virtual machine, or move a workload to the cloud. The resulting gaps create the exact blind spots that shadow IT exploits.

How It Works

The CMDB's limitations have driven the rise of CAASM platforms. Where a CMDB relies on manual input and ITIL workflows, CAASM pulls data directly from live tools via APIs. Where a CMDB stores static records, CAASM continuously refreshes from source systems. The two are not mutually exclusive: many organizations feed CAASM data back into their CMDB to improve its accuracy.

For security teams evaluating whether to invest in CMDB improvements or adopt a CAASM platform, the question comes down to use case. If the primary need is ITIL service management, a CMDB remains necessary. If the primary need is security visibility and cyber asset inventory accuracy, CAASM delivers faster results with less manual effort. See our detailed CAASM vs CMDB comparison for more.

How Koopic Helps

Koopic complements existing CMDBs by pulling live data from security and IT tools, then merging it into accurate golden records. Teams that rely on a CMDB for ITIL workflows can use Koopic for security-focused asset visibility without replacing their existing investment. See it in Koopic — Free Trial.

See it in action

Start your free 30-day trial. No credit card required.

See it in Koopic — Free Trial