Beyond CMDBs: Modernizing IT Asset Management (ITAM)
Published on May 21, 2026 | Last updated on May 21, 2026 | 2 min read
The configuration management database is one of those enterprise systems that almost everyone has and almost no one fully trusts. I say this not as a criticism of the people who maintain them, they are doing their best with a tool designed for a different problem in a different era. I say it because the gap between what most CMDBs represent and what the actual enterprise digital environment looks like has become one of the most consequential blind spots in enterprise security today.
Key Takeaways for Security Leaders:
- The Flaw of CMDBs: Traditional configuration databases capture a delayed snapshot of the environment, not real-time reality.
- The Blind Spot: Ephemeral cloud assets, shadow IT, and APIs bypass manual IT asset tracking, creating massive attack surfaces.
- The Solution: Modernizing IT Asset Management (ITAM) requires continuous, native asset intelligence built directly into your security data platform.
Why Legacy IT Asset Management (ITAM) Fails Security
CMDBs were designed for IT service management. Their original purpose was tracking assets through procurement, deployment, and lifecycle management, providing the configuration records that support change management, service desk operations, and compliance reporting. For these traditional IT Asset Management (ITAM) purposes, a CMDB that reflects the environment as it existed at the last scheduled update is adequate.
For security purposes, it is fundamentally inadequate. Here is why.
A modern enterprise's digital environment changes continuously. Cloud instances are provisioned and deprovisioned on demand, sometimes in minutes, through infrastructure-as-code pipelines that bypass traditional change management entirely. Containers and serverless functions are created and destroyed as part of normal application operation - no change request filed, no CMDB entry created. SaaS applications are adopted by business teams without IT visibility. Acquired subsidiaries bring legacy systems whose configurations were never mapped into the parent organization's asset management. Contractor devices connect and disconnect. APIs are exposed to external services through developer decisions that never surface to the security team.
Every one of these is a potential attack surface. Almost none of them are in the CMDB.
The CMDB is a Photograph of a River
I use a simple image when I describe this problem. A CMDB is a photograph of a river. It was accurate when it was taken. The river has moved since. In a cloud-native enterprise operating at the pace modern organizations require, the river moves every hour. A photograph updated quarterly is not an asset inventory. It is a delayed record of a reality that no longer exists.
The Shift to Continuous Asset Intelligence
What is needed instead is an asset and entity intelligence capability that is operationalized directly into the security data platform, not maintained in a separate system and queried through API calls when needed. Every asset and entity needs to be a native, continuously updated participant in the unified data model, discovered from the signals the environment itself generates rather than from manual processes that cannot keep pace.
At Netenrich, this is precisely how we built the asset intelligence layer of the Resolution Intelligence Cloud. Asset discovery is continuous. New assets are identified from telemetry signals, not from change requests. The asset record is enriched automatically with criticality, ownership, control coverage, and behavioral baseline context. The entity is a live participant in the analytics and inference pipeline, not a static reference in a separate database.
The CMDB is not the enemy. It is a useful system for the purpose it was designed for. The mistake is treating it as the foundation of security intelligence. That foundation requires something fundamentally different - a living asset model that reflects the enterprise as it actually is, right now, not as it was documented last quarter.
*Part of my ongoing series on data science and the future of security operations.*
About the Author
Raju Chekuri
A serial Silicon Valley entrepreneur and technology leader, Raju founded Netenrich and leads the company as chairman, president and CEO. Previously, he founded Velio Communications, Inc., and led its acquisition by LSI Logic and Rambus. He also served as chairman of the board at OpsRamp before it was acquired by HPE. He currently serves as an investor and advisor at early-stage startups Two Brothers Organic Farms and the Department of Lore. Raju earned an MBA at St. Mary’s College of California and a Bachelor of Technology at Kakatiya University.
Follow Raju on LinkedIn
Related Articles
Subscribe for updates
The best source of information for Security, Networks, Cloud, and ITOps best practices. Join us.


