Book Image

ServiceNow for Architects and Project Leaders

By : Roy Justus, David Zhao
Book Image

ServiceNow for Architects and Project Leaders

By: Roy Justus, David Zhao

Overview of this book

ServiceNow is the leading enterprise service management platform that enables the effective management of services in a modern enterprise. In this book, you’ll learn how to avoid pitfalls that can challenge value realization, where to focus, how to balance tradeoffs, and how to get buy-in for complex decisions. You’ll understand the key drivers of value in ServiceNow implementation and how to structure your program for successful delivery. Moving ahead, you’ll get practical guidance on the methods and considerations in securely using ServiceNow. You’ll also learn how to set up a multi-instance environment including best practices, patterns and alternatives in the use and maintenance of a multi-instance pipeline. Later chapters cover methods and approaches to design processes that deliver optimal ROI. Further, you’ll receive tips for designing technical standards, designing for scale, ensuring maintainability, and building a supportable instance. Finally, you’ll focus on the innovative possibilities that can be unlocked in a ServiceNow journey which will help you to manage uncertainty and claim the value of being an early adopter. By the end of this book, you’ll be prepared to lead or support a ServiceNow implementation with confidence that you’re bringing not only a solution but also making an impact in your organization.
Table of Contents (17 chapters)
Part 1 – Pursuit of Value
Part 2 – The Checklist
Part 3 – From Success to Innovation

Integration security

ServiceNow makes it incredibly easy to connect multiple production systems together, typically with web services that allow the real-time exchange of data between two applications on a network or on the internet. This ability for one system to remotely access and manipulate another introduces yet another place where security must be considered.

The security of an integration relies on the security of the source and target systems, the communication channel, and the authentication and authorization systems used. Each integration should be assessed for security on each of these elements, although special attention should be placed on authentication and authorization.

Source and target system security

When data is being transmitted in an integration, it is subject to the assumption that both sender and receiver endpoints of the integration can be trusted to handle that data securely. If either system is compromised, the data could be exposed. Data stored...