Book Image

ServiceNow: Building Powerful Workflows

By : Tim Woodruff, Martin Wood, Ashish Rudra Srivastava
Book Image

ServiceNow: Building Powerful Workflows

By: Tim Woodruff, Martin Wood, Ashish Rudra Srivastava

Overview of this book

ServiceNow is a SaaS application that provides workflow form-based applications. It is an ideal platform for creating enterprise-level applications, giving requesters and fulfillers improved visibility and access to a process. ServiceNow-based applications often replace email by providing a better way to get work done. This course will show you how to put important ServiceNow features to work in the real world. We will introduce key concepts and examples on managing and automating IT services, and help you build a solid foundation towards this new approach. You will then learn more about the power of tasks, events, and notifications. We’ll then focus on using web services and other mechanisms to integrate ServiceNow with other systems. Further on, you’ll learn how to secure applications and data, and understand how ServiceNow performs logging and error reporting. At the end of this course, you will acquire immediately applicable skills to rectify everyday problems encountered on the ServiceNow platform. The course provides you with highly practical content explaining ServiceNow from the following Packt books: 1. Learning ServiceNow 2. ServiceNow Cookbook 3. Mastering ServiceNow, Second Edition
Table of Contents (39 chapters)
Title Page
Credits
Preface
Free Chapter
1
Module 1
36
Bibliography

Encrypting data


ServiceNow provides support for three types of encryption. Two occur within the server, and the data is decrypted before it leaves the instance, whereas Edge Encryption ensures data is always protected outside of the customer's network. The three types of encryption are as follows:

  • Full disc encryption protects a disk if it is physically stolen from the ServiceNow data center. The instance itself is unaware of any differences to a normal operating environment.
  • Field and attachment encryption stores encrypted data in the database. This provides a level of protection against a malicious database administrator. It is decrypted using an encryption key stored on and controlled by the instance.

Note

These two methods are different forms of protecting data at rest. All communication with the instance occurs over HTTPS. This means that all the data is also secured in transit, but in both cases, the instance can work with the unencrypted data.

  • Edge Encryption uses a gateway sitting in...