We are independent & ad-supported. We may earn a commission for purchases made through our links.
Advertiser Disclosure
Our website is an independent, advertising-supported platform. We provide our content free of charge to our readers, and to keep it that way, we rely on revenue generated through advertisements and affiliate partnerships. This means that when you click on certain links on our site and make a purchase, we may earn a commission. Learn more.
How We Make Money
We sustain our operations through affiliate commissions and advertising. If you click on an affiliate link and make a purchase, we may receive a commission from the merchant at no additional cost to you. We also display advertisements on our website, which help generate revenue to support our work and keep our content free for readers. Our editorial team operates independently of our advertising and affiliate partnerships to ensure that our content remains unbiased and focused on providing you with the best information and recommendations based on thorough research and honest evaluations. To remain transparent, we’ve provided a list of our current affiliate partners here.
Software

Our Promise to you

Founded in 2002, our company has been a trusted resource for readers seeking informative and engaging content. Our dedication to quality remains unwavering—and will never change. We follow a strict editorial policy, ensuring that our content is authored by highly qualified professionals and edited by subject matter experts. This guarantees that everything we publish is objective, accurate, and trustworthy.

Over the years, we've refined our approach to cover a wide range of topics, providing readers with reliable and practical advice to enhance their knowledge and skills. That's why millions of readers turn to us each year. Join us in celebrating the joy of learning, guided by standards you can trust.

What is a Configuration Item?

By S.A. Keel
Updated: May 16, 2024

A configuration item (CI) is a component of the Information Technology Infrastructure Library's (ITIL®) method for change management. It is the smallest principal component of the configuration management system (CMS), which is stored and tracked within what's known as the configuration management database (CMDB). The collection of configuration items in the database is used by an information technology (IT) manager to track relationships with other items and monitor an IT project or service's life cycle. Configuration items may be anything identified in the IT service as needing management tracking, including computer hardware, software, protocols and processes.

Upon being identified and entered into a CMDB, the configuration item becomes a configuration record. The record details the parameters of the CI, as well as its relationship with other CIs. As virtually anything can be a CI, there can be a bit of confusion with regards to the potential granularity. Configuration items can be higher-level concepts, such as a process description that needs to be managed for changes over time. As part of that process, however, sub-components such as the computers or people who implement the process may further be identified as CIs.

This tiered structure typically finds configuration item records in a number of databases, perhaps even managed by different levels in an IT service offering. A help desk service, for example, with a process for on-site hardware replacement will have that process entered into the help desk's CMDB as a configuration item. The hardware items for replacement, such as a hard disk, are also stored in the CMDB as CIs, along with the personnel who move throughout the organization and enact the physical replacement. In this scenario, the highest-tier CI is the help desk, where beneath it is the hardware replacement process, then another tier for the hardware, and so forth.

Identification of configuration items varies greatly depending on a myriad of factors. Typically, most of the components pertaining to a project's start-up are included, but as the project lifecycle progresses, changes may be necessary. Recognition of new CIs for the system are evaluated for necessity and their interrelationships, while older CIs receive periodic audits to ensure their continued validity. In this way, the CMDB is kept clean of unnecessary records, and further requirements analysis can occur based on accurate data.

EasyTechJunkie is dedicated to providing accurate and trustworthy information. We carefully select reputable sources and employ a rigorous fact-checking process to maintain the highest standards. To learn more about our commitment to accuracy, read our editorial process.
Discussion Comments
Share
EasyTechJunkie, in your inbox

Our latest articles, guides, and more, delivered daily.

EasyTechJunkie, in your inbox

Our latest articles, guides, and more, delivered daily.