{"id":48014,"date":"2022-04-29T09:39:23","date_gmt":"2022-04-29T01:39:23","guid":{"rendered":"https:\/\/version-2.com\/?p=48014"},"modified":"2022-05-30T10:42:12","modified_gmt":"2022-05-30T02:42:12","slug":"configuration-management-database-cmdb-learn-more-about-it","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2022\/04\/configuration-management-database-cmdb-learn-more-about-it\/","title":{"rendered":"Configuration Management Database (CMDB): Learn More About It"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"48014\" class=\"elementor elementor-48014\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a9966c4 post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a9966c4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;437ef7f&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2884b38\" data-id=\"2884b38\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-980bf1e elementor-widget elementor-widget-text-editor\" data-id=\"980bf1e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\n<p align=\"center\"><img decoding=\"async\" src=\"https:\/\/senhasegura.com\/wp-content\/uploads\/2022\/04\/Banco-de-Dados-de-Gestao-de-Configuracao-CMDB-conheca-mais-sobre-o-tema-1.jpg\" alt=\"\" width=\"958\" height=\"auto\"><\/p>\n\n<p><span style=\"font-weight: 400;\">Making a list of all the configuration items used in your company and keeping this list up to date can be quite challenging, but it is extremely important not only for the IT team but also for the business in general.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The good news is that this process can be streamlined through a <\/span><b>configuration management database (CMDB)<\/b><span style=\"font-weight: 400;\">, which allows managing and organizing assets to reduce operational and maintenance costs, reduce the redundancy of digital assets, and perform audits, among other numerous advantages.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">However, you may have never heard of this solution or do not know exactly how to implement it. Taking this into account, we prepared an article addressing the subject. To facilitate your reading, we divided our text into the following topics:<\/span><\/p>\n<ul>\n<li><b>What is Configuration Management Database (CMDB)?<\/b><\/li>\n<li><b>Why Can CMDB Be Important to Your Company\u2019s IT?<\/b><\/li>\n<li><b>Benefits that CMDB Can Provide to the IT of Your Business<\/b><\/li>\n<li><b>What Are the Challenges to Implementing the Solution?<\/b><\/li>\n<li><b>How to Implement CMDB in Your Organization?<\/b><\/li>\n<li><b>CMDB and Asset Management<\/b><\/li>\n<li><b>Relationship Between CMDB and ITIL 4<\/b><\/li>\n<li><b>Learn the Origins of CMDB<\/b><\/li>\n<li><b>About senhasegura<\/b><\/li>\n<li><b>Conclusion<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Check it out now!<\/span><\/p>\n<ul>\n<li>\n<h2><b>What is Configuration Management Database (CMDB)?<\/b><\/h2>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">If you own or manage a company, you need to deal with information regarding the assets required to carry out your operations, which include contracts, computers, vehicles, cell phones, among others. These assets in CMDB are called configuration items (CI).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The <\/span><b>configuration management database (CMDB)<\/b><span style=\"font-weight: 400;\"> consists of an IT model focused on the management and organization of these items, as it allows evaluating data such as names, characteristics, and details. In addition, one can store data on the relationship between services and different CIs.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">There are four fundamental guidelines among the indications for use of the <\/span><b>configuration management database (CMDB)<\/b><span style=\"font-weight: 400;\">. Check it out:&nbsp;<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Detect What the Configuration Items Are;<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Maintain the CIs and Update Them Regularly;<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Ensure that Only Authorized Users Have Access to the Information;<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Perform Audits for Data Verification.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">In the next topic, we cover the importance of the configuration management database for companies. Keep reading it.&nbsp;<\/span><\/p>\n<ul>\n<li>\n<h2><b>Why Can CMDB Be Important to Your Company\u2019s IT?<\/b><\/h2>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">The aspects listed below demonstrate why the Configuration Management Database (CMDB) can be important for IT operations:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">It allows for reducing the redundancy of digital assets and expanding their availability;<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">It enables the reduction of operational and maintenance costs, as it reduces redundancy and increases availability;<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">It allows to quickly detect if there is something inappropriate according to the audit criteria;<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">It allows one to check that all inventory and infrastructure are in agreement, whenever new software or equipment is installed;<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">It is a database that can be accessed by all team members and when a user includes data, the others have access to this update;<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">In organizations that adopt DevOps and Agile, it makes it possible to solve issues related to changes in real-time.&nbsp;<\/span><\/li>\n<li>\n<h2><b>Benefits that CMDB Can Provide to the IT of Your Business<\/b><\/h2>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Check out some benefits of the <\/span><b>configuration management database<\/b> <b>(CMDB)<\/b><span style=\"font-weight: 400;\">, which go beyond IT operations and impact the business.<\/span><\/p>\n<ul>\n<li>\n<h3><b>More Reliable Systems<\/b><\/h3>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">With the possibility to identify problems faster and improve all items, the company\u2019s systems will be more reliable. This is because a regular assessment is performed on the incidents and their causes, preventing them from happening again.&nbsp;<\/span><\/p>\n<ul>\n<li>\n<h3><b>Control of IT Configuration Elements<\/b><\/h3>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Organizing assets and controlling their use can be exhausting for managers, however, it is often critical to support decision-making. With <\/span><b>Configuration Management Database (CMDB)<\/b><span style=\"font-weight: 400;\">, this task can be accomplished more easily, clearly, and effectively.&nbsp;<\/span><\/p>\n<ul>\n<li>\n<h3><b>Possibility of Anticipating Risks<\/b><\/h3>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Through the CMDB, one can detect and assess risks before an error becomes irreversible. That is, it allows fault reduction management capable of eliminating or minimizing its impacts.<\/span><\/p>\n<ul>\n<li>\n<h3><b>Cost Reduction<\/b><\/h3>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">The goal of every organization is to profit more, and for that, cost reduction is crucial. A <\/span><b>configuration management database (CMDB)<\/b><span style=\"font-weight: 400;\"> allows, for example, to store software licensing data and save unused licenses. It also makes it possible to eliminate investments in equipment that are not useful to the business.&nbsp;<\/span><\/p>\n<ul>\n<li>\n<h3><b>Identifies and Includes Items<\/b><\/h3>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">This control also allows an organization to detect which assets are outside the IT infrastructure and must be included to achieve better results.<\/span><\/p>\n<ul>\n<li>\n<h3><b>Updates and Records Configuration Items<\/b><\/h3>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Asset management through CMDB allows one to update and record their current status frequently, ensuring that changes are only carried out when it is actually necessary.<\/span><\/p>\n<p><b style=\"color: #333333; font-size: 26px;\">What Are the Challenges to Implementing the Solution?<\/b><b><\/b><\/p>\n<p><span style=\"font-weight: 400;\">Deploying a <\/span><b>Configuration Management Database (CMDB)<\/b><span style=\"font-weight: 400;\"> in an organization is very important, but it also involves several challenges, such as those listed below:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">First, it is important to know if the company has any control method with the data of its configuration items. Usually, the sector responsible for accounting has this information;<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Then, it is necessary to define which assets should be controlled and which characteristics of these items are relevant for registration in this control;<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The next step is to define which resource will be used in the development of the CMDB, evaluating, among several options, which is the most appropriate;<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Before using the chosen solution, it is necessary to define how this will be done.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Throughout implementation, other tasks will emerge, but these are the initial challenges.&nbsp;<\/span><\/p>\n<ul>\n<li>\n<h2><b>How to Implement CMDB in Your Organization?<\/b><\/h2>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">To implement the <\/span><b>Configuration Management Database (CMDB)<\/b><span style=\"font-weight: 400;\">, one must go through seven steps. Before that, though, let\u2019s recap what a CMDB is.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In practice, this database allows you to manage service assets, such as SLA contracts, hardware, and software, but is not limited to a type of environment where each data is inserted. A CMDB should enable them to relate in a broader context.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Now, let\u2019s go to the steps that must be covered to implement this solution in your company:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">First, it is necessary to develop a logical model of the <\/span><i><span style=\"font-weight: 400;\">Service Asset and Configuration Management<\/span><\/i><span style=\"font-weight: 400;\"> (SACM) process in order to define its scope of activities. This model should explain the level of the SACM relationship.&nbsp;<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">In the case of a basic level, for example, you can create relationships between hardware, software, interfaces, and servers.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">However, with SACM, it is possible to track relationships to the level of the workstation.<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The next step is to define the configuration items, categorizing what you want to manage based on this logical model. Care must be taken not to make mistakes when trying to execute everything at once. Gradual notes should be taken of everything that needs to be followed up.<\/span><span style=\"font-weight: 400;\"><\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Choose a person responsible for each CI and its steps. This person should define what information to gather about these assets and how this should be done.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Then, the CI owners must establish the attributes necessary for their categorization. This information may include name, cost, version number, and location.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The next necessary measure is to understand where to find important information about CIs. For this, it is possible to make use of an automatic discovery tool and visually verify hardware data, such as purchase, invoice, warranty, and serial number documentation.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Map the relationships between the CIs by comparing the actual assets with the model created in the first step. This can also be done manually or through an automatic discovery tool<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Finally, implement one asset at a time. When creating or uploading a CI to the CMDB, compare it with your mapping and make sure it is correct before moving on to the next one.&nbsp;<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Creating a CMDB takes time and it depends on your dedication and the number of resources available in your company. However, you may already have a place to start. In this sense, keep in mind that having an active administration is essential to achieving this goal.<\/span><\/p>\n<ul>\n<li>\n<h3><b>CMDB and Asset Management<\/b><\/h3>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">A CMDB brings together IT asset management (ITAM) and configuration management characteristics, but its goal is not the same as that of an ITAM record. The latter focuses on the lifecycle of individual assets, to whom they belong, and where they are located.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The CMDB, on the other hand, goes beyond this concept and allows managing how CIs relate to each other in an IT infrastructure.&nbsp;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">However, these two processes can be integrated and a CMDB can assist ITAM in collecting data on CIs, managing incidents related to them, and reducing risks.<\/span><\/p>\n<ul>\n<li>\n<h3><b>Relationship Between CMDB and ITIL 4<\/b><\/h3>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Launched in 2019, ITIL 4 contains the best practices for information technology, which prioritize the increase of productivity in the IT sector of a company, to optimize the use of its technological infrastructure.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">According to this library, the CMDB has the role of storing configuration records within items such as systems, installations, software, and hardware, and it is up to IT professionals to determine what should be tracked and how this should be done.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Stored data may include classifications such as change history, type, owner, and importance of items, as well as interactions between them.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Items tracked in a configuration management database are known as configuration items and defined by ITIL 4 as \u201cany component that needs to be managed to deliver an IT service\u201d.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In practice, the CMDB must enable effective ITSM processes and the best business decisions, as it allows centralizing data and identifying critical configuration items.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">CMDBs allow:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Analyzing impacts;<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Analyzing the root cause;<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Managing incidents;<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Managing changes; and<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Verifying legal compliance.<\/span><\/li>\n<li>\n<h3><b>Learn the Origins of CMDB<\/b><\/h3>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">With the original function of helping to develop controls for IT service management, ITIL was created in the 1980s by the UK government and today has five volumes published. These are:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Service Strategy;<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Service Design;<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Service Transition;<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Service Operation; and<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Continual Service Improvement.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">This library allows you to align IT services with the objectives of a business and its standards are updated regularly in order to support procedures and processes in an increasingly efficient way.&nbsp;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Thus, its latest version was released in 2011, but since the 1980s, its purpose was to create and maintain a database that would allow tracking of IT services.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This means the CMDB concept emerged during this period, becoming necessary for the management of IT services. Despite this, configuration management would only become a process in ITIL in 2000.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In 2007, this process was renamed <\/span><i><span style=\"font-weight: 400;\">Service Asset and Configuration Management<\/span><\/i><span style=\"font-weight: 400;\"> by ITIL 3.&nbsp;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Currently, the challenge is to reduce the failure rates in the implementation of a CMDB, which would be 80% according to <\/span><i><span style=\"font-weight: 400;\">Gartner Research<\/span><\/i><span style=\"font-weight: 400;\">.<\/span><\/p>\n<ul>\n<li>\n<h3><b>About senhasegura<\/b><\/h3>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">We at senhasegura are committed to digital sovereignty, which we believe is a right of citizens, institutions, and society as a whole. Therefore, our focus is to avoid <\/span><a href=\"https:\/\/www.correiobraziliense.com.br\/brasil\/2021\/06\/4928596-estudo-aponta-16-bilhao-de-casos-de-roubo-de-dados-pessoais-na-internet.html\"><span style=\"font-weight: 400;\">data theft<\/span><\/a><span style=\"font-weight: 400;\"> and allow traceability of administrator actions on networks, servers, databases, and a multitude of devices.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We also help our customers achieve compliance with audit requirements and the most demanding standards, such as Sarbanes-Oxley, <\/span><a href=\"https:\/\/senhasegura.com\/iso-27001-4-reasons-to-implement-it-in-your-company\/\"><span style=\"font-weight: 400;\">ISO 27001<\/span><\/a><span style=\"font-weight: 400;\">, <\/span><a href=\"https:\/\/senhasegura.com\/hipaa-five-tips-for-complying-with-the-certificate\/\"><span style=\"font-weight: 400;\">HIPAA<\/span><\/a><span style=\"font-weight: 400;\">, and PCI DSS. Click <\/span><a href=\"https:\/\/senhasegura.com\/company\/\"><span style=\"font-weight: 400;\">here<\/span><\/a><span style=\"font-weight: 400;\"> and check out the mentions and awards we have received throughout our history.<\/span><\/p>\n<ul>\n<li>\n<h3><b>Conclusion<\/b><\/h3>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">By reading this article, you learned that:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The configuration management database (CMDB) consists of an IT model focused on asset management and organization;<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">It also makes it possible to store data on the relationship between services and different CIs;<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Ii impacts not only the IT teams but the business as a whole;<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">It is important for the reduction of operational and maintenance costs;<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">It allows the company to follow audit parameters;<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">It can be accessed by all members of a work team;<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">It enables to anticipate risks and minimize threats, in addition to identifying missing items;<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Its implementation involves a series of challenges, such as those listed in topic 4, which include defining how assets will be controlled;<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">We also demonstrated step by step how to implement this solution in your company and differentiate CMDB from an ITAM record;<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">We showed that the CMDB concept emerged at about the same time as the ITIL standards;<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">We revealed that the failure rates in the implementation of the CMDB currently are 80%;<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Finally, we addressed <\/span><b>senhasegura<\/b><span style=\"font-weight: 400;\">\u2018s area of expertise.<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Was our <\/span><b>Configuration Management Database (CMDB)<\/b><span style=\"font-weight: 400;\"> article helpful to you? So, share it with someone.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><b>ALSO READ IN SENHASEGURA\u2019S BLOG<\/b><\/p>\n<p><a href=\"https:\/\/senhasegura.com\/high-availability\/\"><span style=\"font-weight: 400;\">High Availability: Technology that Guarantees Productivity and Credibility<\/span><\/a><\/p>\n<p><a href=\"https:\/\/senhasegura.com\/disaster-recovery-strategies\/\"><span style=\"font-weight: 400;\">Invest in Disaster Recovery Strategies and Avoid Damages to Your Company<\/span><\/a><\/p>\n<p><a href=\"https:\/\/senhasegura.com\/why-identity-and-access-management-is-important-for-lgpd-compliance\/\"><span style=\"font-weight: 400;\">Why Identity and Access Management is Important for LGPD Compliance<\/span><\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a7b53ad elementor-widget elementor-widget-shortcode\" data-id=\"a7b53ad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18134\" class=\"elementor elementor-18134\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a909055 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"a909055\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4e3c0d4\" data-id=\"4e3c0d4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-10af45e elementor-widget elementor-widget-text-editor\" data-id=\"10af45e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About Segura\u00ae <\/strong><br \/>Segura\u00ae strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Making a list of all the configuration items used in yo [&hellip;]<\/p>","protected":false},"author":143524195,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[419,488,61],"tags":[420,489],"class_list":["post-48014","post","type-post","status-publish","format-standard","hentry","category-segura","category-488","category-press-release","tag-segura","tag-489"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Configuration Management Database (CMDB): Learn More About It - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/senhasegura.com\/configuration-management-database-cmdb-learn-more-about-it\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Configuration Management Database (CMDB): Learn More About It - Version 2\" \/>\n<meta property=\"og:description\" content=\"Making a list of all the configuration items used in yo [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/senhasegura.com\/configuration-management-database-cmdb-learn-more-about-it\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-29T01:39:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-05-30T02:42:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/senhasegura.com\/wp-content\/uploads\/2022\/04\/Banco-de-Dados-de-Gestao-de-Configuracao-CMDB-conheca-mais-sobre-o-tema-1.jpg\" \/>\n<meta name=\"author\" content=\"version2hk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"version2hk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/senhasegura.com\\\/configuration-management-database-cmdb-learn-more-about-it\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/04\\\/configuration-management-database-cmdb-learn-more-about-it\\\/\"},\"author\":{\"name\":\"version2hk\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\"},\"headline\":\"Configuration Management Database (CMDB): Learn More About It\",\"datePublished\":\"2022-04-29T01:39:23+00:00\",\"dateModified\":\"2022-05-30T02:42:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/04\\\/configuration-management-database-cmdb-learn-more-about-it\\\/\"},\"wordCount\":2045,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/senhasegura.com\\\/configuration-management-database-cmdb-learn-more-about-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/senhasegura.com\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/Banco-de-Dados-de-Gestao-de-Configuracao-CMDB-conheca-mais-sobre-o-tema-1.jpg\",\"keywords\":[\"Segura\",\"2022\"],\"articleSection\":[\"Segura\",\"2022\",\"Press Release\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/04\\\/configuration-management-database-cmdb-learn-more-about-it\\\/\",\"url\":\"https:\\\/\\\/senhasegura.com\\\/configuration-management-database-cmdb-learn-more-about-it\\\/\",\"name\":\"Configuration Management Database (CMDB): Learn More About It - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/senhasegura.com\\\/configuration-management-database-cmdb-learn-more-about-it\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/senhasegura.com\\\/configuration-management-database-cmdb-learn-more-about-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/senhasegura.com\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/Banco-de-Dados-de-Gestao-de-Configuracao-CMDB-conheca-mais-sobre-o-tema-1.jpg\",\"datePublished\":\"2022-04-29T01:39:23+00:00\",\"dateModified\":\"2022-05-30T02:42:12+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/senhasegura.com\\\/configuration-management-database-cmdb-learn-more-about-it\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/senhasegura.com\\\/configuration-management-database-cmdb-learn-more-about-it\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/senhasegura.com\\\/configuration-management-database-cmdb-learn-more-about-it\\\/#primaryimage\",\"url\":\"https:\\\/\\\/senhasegura.com\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/Banco-de-Dados-de-Gestao-de-Configuracao-CMDB-conheca-mais-sobre-o-tema-1.jpg\",\"contentUrl\":\"https:\\\/\\\/senhasegura.com\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/Banco-de-Dados-de-Gestao-de-Configuracao-CMDB-conheca-mais-sobre-o-tema-1.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/senhasegura.com\\\/configuration-management-database-cmdb-learn-more-about-it\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Configuration Management Database (CMDB): Learn More About It\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\",\"name\":\"version2hk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"caption\":\"version2hk\"},\"sameAs\":[\"http:\\\/\\\/version2xfortcom.wordpress.com\"],\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/version2hk\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Configuration Management Database (CMDB): Learn More About It - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/senhasegura.com\/configuration-management-database-cmdb-learn-more-about-it\/","og_locale":"en_US","og_type":"article","og_title":"Configuration Management Database (CMDB): Learn More About It - Version 2","og_description":"Making a list of all the configuration items used in yo [&hellip;]","og_url":"https:\/\/senhasegura.com\/configuration-management-database-cmdb-learn-more-about-it\/","og_site_name":"Version 2","article_published_time":"2022-04-29T01:39:23+00:00","article_modified_time":"2022-05-30T02:42:12+00:00","og_image":[{"url":"https:\/\/senhasegura.com\/wp-content\/uploads\/2022\/04\/Banco-de-Dados-de-Gestao-de-Configuracao-CMDB-conheca-mais-sobre-o-tema-1.jpg","type":"","width":"","height":""}],"author":"version2hk","twitter_card":"summary_large_image","twitter_misc":{"Written by":"version2hk","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/senhasegura.com\/configuration-management-database-cmdb-learn-more-about-it\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2022\/04\/configuration-management-database-cmdb-learn-more-about-it\/"},"author":{"name":"version2hk","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db"},"headline":"Configuration Management Database (CMDB): Learn More About It","datePublished":"2022-04-29T01:39:23+00:00","dateModified":"2022-05-30T02:42:12+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2022\/04\/configuration-management-database-cmdb-learn-more-about-it\/"},"wordCount":2045,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/senhasegura.com\/configuration-management-database-cmdb-learn-more-about-it\/#primaryimage"},"thumbnailUrl":"https:\/\/senhasegura.com\/wp-content\/uploads\/2022\/04\/Banco-de-Dados-de-Gestao-de-Configuracao-CMDB-conheca-mais-sobre-o-tema-1.jpg","keywords":["Segura","2022"],"articleSection":["Segura","2022","Press Release"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2022\/04\/configuration-management-database-cmdb-learn-more-about-it\/","url":"https:\/\/senhasegura.com\/configuration-management-database-cmdb-learn-more-about-it\/","name":"Configuration Management Database (CMDB): Learn More About It - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/senhasegura.com\/configuration-management-database-cmdb-learn-more-about-it\/#primaryimage"},"image":{"@id":"https:\/\/senhasegura.com\/configuration-management-database-cmdb-learn-more-about-it\/#primaryimage"},"thumbnailUrl":"https:\/\/senhasegura.com\/wp-content\/uploads\/2022\/04\/Banco-de-Dados-de-Gestao-de-Configuracao-CMDB-conheca-mais-sobre-o-tema-1.jpg","datePublished":"2022-04-29T01:39:23+00:00","dateModified":"2022-05-30T02:42:12+00:00","breadcrumb":{"@id":"https:\/\/senhasegura.com\/configuration-management-database-cmdb-learn-more-about-it\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/senhasegura.com\/configuration-management-database-cmdb-learn-more-about-it\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/senhasegura.com\/configuration-management-database-cmdb-learn-more-about-it\/#primaryimage","url":"https:\/\/senhasegura.com\/wp-content\/uploads\/2022\/04\/Banco-de-Dados-de-Gestao-de-Configuracao-CMDB-conheca-mais-sobre-o-tema-1.jpg","contentUrl":"https:\/\/senhasegura.com\/wp-content\/uploads\/2022\/04\/Banco-de-Dados-de-Gestao-de-Configuracao-CMDB-conheca-mais-sobre-o-tema-1.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/senhasegura.com\/configuration-management-database-cmdb-learn-more-about-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"Configuration Management Database (CMDB): Learn More About It"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db","name":"version2hk","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","caption":"version2hk"},"sameAs":["http:\/\/version2xfortcom.wordpress.com"],"url":"https:\/\/version-2.com\/en\/author\/version2hk\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-cuq","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/48014","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/143524195"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=48014"}],"version-history":[{"count":4,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/48014\/revisions"}],"predecessor-version":[{"id":48018,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/48014\/revisions\/48018"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=48014"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=48014"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=48014"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}