WP Data Encryption With Servicenow
WP Data Encryption With Servicenow
Data Encryption
Technologies for data protection
on the Now Platform
WHITE PAPER
Table of contents
Introduction............................................................................................ 3
Default protection.................................................................................. 3
Secure communication with the instance..........................................................3
Email in-transit encryption.......................................................................................4
File transfer integration.............................................................................................4
Customer-configurable protection......................................................4
Direct database query..............................................................................................4
Web services integration..........................................................................................4
Single sign-on integrations......................................................................................5
ServiceNow MID Server.............................................................................................5
Premium protection options................................................................. 6
Cloud encryption.........................................................................................................6
Database Encryption.................................................................................................6
Three-level hierarchy: Cloud and database encryption..............................6
Premium encryption at rest and in use solutions............................... 7
Platform Encryption.................................................................................................... 7
Column Level Encryption Enterprise (CLEE)........................................................ 7
CLEE cryptographic module....................................................................................8
CLEE access control...................................................................................................8
Usage and restrictions...............................................................................................9
Edge Encryption......................................................................................................... 10
Types of edge encryption.......................................................................................12
Edge Encryption vs Column Level Encryption Enterprise.............................12
Full Disk Encryption...............................................................................13
FDE usage and restrictions.................................................................................... 13
Managing encryption keys................................................................. 14
Encryption keys in the ServiceNow cloud infrastructure.............................. 14
Tokenization................................................................................................................. 15
Tokenization examples............................................................................................ 15
Three-level key hierarchy: Cloud and database encryption..................... 16
Further reading........................................................................................................... 16
Appendices............................................................................................17
© 2022 ServiceNow, Inc. All rights reserved. ServiceNow, the ServiceNow logo, Now, Now Platform, and other ServiceNow marks are trademarks and/or registered trademarks of ServiceNow, Inc. in the
United States and/or other countries. Other company names, product names, and logos may be trademarks of the respective companies with which they are associated.
servicenow.com 2
WHITE PAPER
Introduction
At ServiceNow, protecting customer data is a top priority. Different customers have different use cases, so we provide a range
of encryption options for maximum security and flexibility. This document provides an overview of these options and is broken
into three sections:
Default protection: Features built into the Now Platform that work automatically without any configuration requirements.
Customer-configurable protection: Features available in the Now Platform that can be configured to meet Customer-specific
requirements.
Premium protection options: Features available at additional cost that provide enhanced protection and security to meet
customer needs.
Please note that references to TLS 1.2 include proposed TLS 1.3 suites, i.e., ECDHE-ECDSA (perfect forward secrecy)
Default protection
The following encryption features are built into the Now Platform and work automatically, without additional configuration. See
the table in Appendix A titled ‘Summary of data in transit features’ for additional information.
© 2022 ServiceNow, Inc. All rights reserved. ServiceNow, the ServiceNow logo, Now, Now Platform, and other ServiceNow marks are trademarks and/or registered trademarks of ServiceNow, Inc. in the
United States and/or other countries. Other company names, product names, and logos may be trademarks of the respective companies with which they are associated.
servicenow.com 3
WHITE PAPER
Customer-configurable protection
Direct database query
Now Platform instances support direct Java Database Connectivity (JDBC) queries
out to external systems. JDBC connections are not encrypted but can be securely
proxied via a customer management, instrumentation, and discovery (MID) Server.
The communication to the MID Server in the customer environment is secured, as
described in the ServiceNow MID Server section below.
© 2022 ServiceNow, Inc. All rights reserved. ServiceNow, the ServiceNow logo, Now, Now Platform, and other ServiceNow marks are trademarks and/or registered trademarks of ServiceNow, Inc. in the
United States and/or other countries. Other company names, product names, and logos may be trademarks of the respective companies with which they are associated.
servicenow.com 4
WHITE PAPER
Mutual web services authentication is only possible for outbound HTTPS connections, such as SOAP, REST, or direct HTTPS calls. A
ServiceNow instance does not support mutual authentication for inbound requests or for outbound requests sent through a MID
Server.
Secure signing of SOAP requests for message integrity purposes is also available.
SNMP
Optional External Network Devices
Credential Storage
PowerShell
Windows Servers
SSH
Job Queue HTTPS:443 Linix Server
API
Hypervisor
MID Server
© 2022 ServiceNow, Inc. All rights reserved. ServiceNow, the ServiceNow logo, Now, Now Platform, and other ServiceNow marks are trademarks and/or registered trademarks of ServiceNow, Inc. in the
United States and/or other countries. Other company names, product names, and logos may be trademarks of the respective companies with which they are associated.
servicenow.com 5
WHITE PAPER
Cloud encryption
Cloud Encryption provides block encryption of the full database host with industry-
standard, customer-controlled, key lifecycle management built into the ServiceNow
user interface. It encrypts data at rest in the database using symmetric AES 256-bit
encryption with no impact to functionality. Any new or changed data as it is entered
into a table and associated activity log files (e.g., bin, redo, undo, and error) are also
encrypted.
When this feature is used, all related instances are encrypted, together with
associated replication traffic and backups, and instance cloning is still possible.
Both new and existing instances on supported releases of the Now Platform can
take advantage of Cloud Encryption.
ServiceNow Cloud Encryption also gives customers the option to use a ServiceNow-
generated key, or a key created and supplied by the customer (Customer Managed
Key). Key rotation operations are completely managed by customers from within
their ServiceNow instance, providing flexibility and autonomy, as well as avoiding
the need to involve ServiceNow Customer Support.
Database Encryption
Database Encryption enables data to be protected with symmetric AES 256-
bit encryption. It mitigates the same risk as Cloud Encryption, but without the
additional customer-controlled key management built into the ServiceNow user
interface. It encrypts data at rest in the database with no impact to functionality.
Any new or changed data is encrypted as it is entered into a table, and associated
activity log files (e.g., bin, redo, undo, and error) are also encrypted.
When this feature is used, all related instances are encrypted together with
associated replication traffic and backups, and instance cloning is still possible.
Both new and existing instances on supported releases of the Now Platform can
take advantage of Database Encryption, however, there is a minor performance
impact of up to 5% when using Database Encryption
For customers who require hosting and management of their encryption key while
using Database Encryption, please see the Appendix E.
© 2022 ServiceNow, Inc. All rights reserved. ServiceNow, the ServiceNow logo, Now, Now Platform, and other ServiceNow marks are trademarks and/or registered trademarks of ServiceNow, Inc. in the
United States and/or other countries. Other company names, product names, and logos may be trademarks of the respective companies with which they are associated.
6
servicenow.com
WHITE PAPER
Platform Encryption
Platform Encryption is a comprehensive encryption offering that provides a balance between advanced data protection and
platform usability for data in use and at rest; it includes Column Level Encryption Enterprise (CLEE), Cloud Encryption, and
Database Encryption
© 2022 ServiceNow, Inc. All rights reserved. ServiceNow, the ServiceNow logo, Now, Now Platform, and other ServiceNow marks are trademarks and/or registered trademarks of ServiceNow, Inc.
in the United States and/or other countries. Other company names, product names, and logos may be trademarks of the respective companies with which they are associated.
servicenow.com 7
WHITE PAPER
* * * * *
Mitigating the risk of exposing sensitive data Enabling customers to comply with Limiting access to sensitive data based on defined
as either the result of a direct attack or of governmental and industry certification roles, defined script assignments, application
compromised data stored in the cloud requirements and regulations scope, and domain membership
© 2022 ServiceNow, Inc. All rights reserved. ServiceNow, the ServiceNow logo, Now, Now Platform, and other ServiceNow marks are trademarks and/or registered trademarks of ServiceNow, Inc. in the
United States and/or other countries. Other company names, product names, and logos may be trademarks of the respective companies with which they are associated.
servicenow.com 8
WHITE PAPER
CRYPTOGRAPHIC
MODULE 1
FIELD B
© 2022 ServiceNow, Inc. All rights reserved. ServiceNow, the ServiceNow logo, Now, Now Platform, and other ServiceNow marks are trademarks and/or registered trademarks of ServiceNow, Inc. in the
United States and/or other countries. Other company names, product names, and logos may be trademarks of the respective companies with which they are associated.
servicenow.com 9
WHITE PAPER
Controlling access to sensitive data often means limiting access in a controlled fashion or granting it on an as-needed basis.
ServiceNow accomplishes this through a just-in-time process where an ephemeral java object displays a decrypted copy of the
encrypted value only for as long as the user or process with the correct access level acts on the data (e.g., viewing within the UI
or using the value in an automation step). Once the user or process finishes, the ephemeral copy is then flushed in accordance
with the platform’s normal garbage collection features.
CLEE-encrypted data is maintained throughout the backup process.
Edge Encryption
Edge Encryption gives customers the ability to control the end-to-end encryption of their data and key management. Edge
Encryption uses a proxy application provided by ServiceNow and installed by customers within their own network. This tokenizes
specified data patterns or encrypts string fields and attachment data before it is sent from a customers’ environment to their
ServiceNow instance. It also decrypts the same data again only within the customer’s own network, using keys stored only within
the customer’s own network.
© 2022 ServiceNow, Inc. All rights reserved. ServiceNow, the ServiceNow logo, Now, Now Platform, and other ServiceNow marks are trademarks and/or registered trademarks of ServiceNow, Inc. in the
United States and/or other countries. Other company names, product names, and logos may be trademarks of the respective companies with which they are associated.
servicenow.com 10
WHITE PAPER
The following diagram illustrates the Edge Encryption process – a field storing social security numbers (SSNs) being encrypted
within a customer’s network by an Edge Encryption proxy. As shown below, the data in the SSN field is converted from plaintext
to ciphertext.
CUSTOMER PREMISES
Target table
SSN: [...]QUVTXE2X2J[...]
In addition to the Edge Encryption proxy configuration and management of rules, customers are responsible for the usual
requirements of operating a server within their environment (including hosting, routing, backup, DNS configuration) to enable
and support their Edge proxies.
Edge Encryption is rule-based; specific fields are identified for encryption or tokenization based on a customer’s business
requirements. Data in fields encrypted by the Edge Encryption proxy will be accessible to any end user whose roles or other
access rights allow them to read or write to that field.
Access to Edge-encrypted data must be made through the proxy application, which functions as a web application with a
unique customer-defined URL. Attempting to access Edge-encrypted data directly from an Edge Encryption enabled instance
without first passing through the relevant proxy will result in only the encrypted version of the data being visible. Edge Encryption
proxies are hosted by customers at their own preferred URL, such as edgeproxy.customerdomain.com.
The following example shows an incident record which has Edge Encryption applied to the Short Description field. This illustrates
how it would appear to an appropriately credentialed user accessing that record via the customer’s Edge Encryption proxy (i.e.
in plaintext).
Below is the same record and field when it is accessed directly at the customer’s instance. Because this form of access bypasses
the customer’s Edge Encryption proxy, the data is inaccessible to any user, including administrators.
© 2022 ServiceNow, Inc. All rights reserved. ServiceNow, the ServiceNow logo, Now, Now Platform, and other ServiceNow marks are trademarks and/or registered trademarks of ServiceNow, Inc. in the
United States and/or other countries. Other company names, product names, and logos may be trademarks of the respective companies with which they are associated.
servicenow.com 11
WHITE PAPER
The relevant encryption keys and configuration exist only on the Edge Encryption
proxy within the customer’s network and are not visible to ServiceNow. The
data is encrypted from the moment it leaves the customer environment and is
only decrypted upon retrieval. At no point is the data accessible in plaintext by
ServiceNow systems or personnel.
© 2022 ServiceNow, Inc. All rights reserved. ServiceNow, the ServiceNow logo, Now, Now Platform, and other ServiceNow marks are trademarks and/or registered trademarks of ServiceNow, Inc. in the
United States and/or other countries. Other company names, product names, and logos may be trademarks of the respective companies with which they are associated.
servicenow.com 12
WHITE PAPER
© 2022 ServiceNow, Inc. All rights reserved. ServiceNow, the ServiceNow logo, Now, Now Platform, and other ServiceNow marks are trademarks and/or registered trademarks of ServiceNow, Inc. in the
United States and/or other countries. Other company names, product names, and logos may be trademarks of the respective companies with which they are associated.
servicenow.com 13
WHITE PAPER
system. The hard drive models used by ServiceNow comply with the Trusted Computing Group (TCG) enterprise specifications
and are secured using a passphrase generated from a key stored in our SafeNet key management appliance.
KMF CRYPTOGRAPHIC
MODULE
KMF supports encryption on the Now Platform in the creation and management of cryptographic modules specific to each
type of encryption. Encryption keys within the cryptographic modules can be created, rotated, revoked, and configured for
automated lifecycle settings (e.g. automated deactivation or automated rotation).
Starting in the Quebec release, KMF is available out of the box on the Now Platform. In addition to the core functionality
described above, KMF also supports other functionalities and features within the Now Platform
© 2022 ServiceNow, Inc. All rights reserved. ServiceNow, the ServiceNow logo, Now, Now Platform, and other ServiceNow marks are trademarks and/or registered trademarks of ServiceNow, Inc. in the
United States and/or other countries. Other company names, product names, and logos may be trademarks of the respective companies with which they are associated.
servicenow.com 14
WHITE PAPER
Standard operating procedures are used for the procurement, generation, and configuration of key appliances. Work
instructions are used for configuration and backup with logs from these forwarded to the ServiceNow internal SIEM infrastructure.
As illustrated below, the External Key (Level 3) is the key being managed by operations provided in Cloud Encryption. The
External Key is stored in a ServiceNow HSM while the Service and Master keys persisted deeper in infrastructure.
Tokenization
Another layer of data protection that Edge Encryption provides is tokenization. During this process, Edge Encryption uses a
randomly generated token to mask a predefined pattern of characters within a data field when the pattern is matched.
While encrypting specific fields or tokenizing embedded strings of data is beneficial from a data security perspective, having
ciphertext in place of actual data can lead to functionality impact or operational challenges within an instance of the Now
Platform. To avoid these challenges, follow the implementation considerations and suggested capability and configuration
approaches provided in detail in Appendix C.
Tokenization examples
The examples below illustrate tokenization from the user experience perspective.
In the first example, the patterns for a credit card and Social Security number were configured for tokenization. When the
user connects through the Edge Encryption proxy, the content for those two values is displayed in plaintext but the data is
tokenized in the instance.
© 2022 ServiceNow, Inc. All rights reserved. ServiceNow, the ServiceNow logo, Now, Now Platform, and other ServiceNow marks are trademarks and/or registered trademarks of ServiceNow, Inc. in the
United States and/or other countries. Other company names, product names, and logos may be trademarks of the respective companies with which they are associated.
servicenow.com 15
WHITE PAPER
However, if the user were to bypass the Edge Encryption proxy and access the same incidents directly, the corresponding
values within the short description field would be represented as a token as shown below.
Resources
Encryption-specific resources:
• Product Documentation
© 2022 ServiceNow, Inc. All rights reserved. ServiceNow, the ServiceNow logo, Now, Now Platform, and other ServiceNow marks are trademarks and/or registered trademarks of ServiceNow, Inc. in the
United States and/or other countries. Other company names, product names, and logos may be trademarks of the respective companies with which they are associated.
servicenow.com 16
WHITE PAPER
Appendices
Appendix A – Summary of encryption in transit features
Default encryption in transit features
© 2022 ServiceNow, Inc. All rights reserved. ServiceNow, the ServiceNow logo, Now, Now Platform, and other ServiceNow marks are trademarks and/or registered trademarks of ServiceNow, Inc. in the
United States and/or other countries. Other company names, product names, and logos may be trademarks of the respective companies with which they are associated.
servicenow.com 17
WHITE PAPER
Group by X X
Is empty X X
Is not empty X X
Equal X X
Is not X X
Sort by X
Is greater than X
Is less than X
Contains
Starts with
Ends with
Text search
*MySQL is required for order-preserving encryption.
© 2022 ServiceNow, Inc. All rights reserved. ServiceNow, the ServiceNow logo, Now, Now Platform, and other ServiceNow marks are trademarks and/or registered trademarks of ServiceNow, Inc. in the
United States and/or other countries. Other company names, product names, and logos may be trademarks of the respective companies with which they are associated.
servicenow.com 18
WHITE PAPER
© 2022 ServiceNow, Inc. All rights reserved. ServiceNow, the ServiceNow logo, Now, Now Platform, and other ServiceNow marks are trademarks and/or registered trademarks of ServiceNow, Inc. in the
United States and/or other countries. Other company names, product names, and logos may be trademarks of the respective companies with which they are associated.
servicenow.com 19
WHITE PAPER
© 2022 ServiceNow, Inc. All rights reserved. ServiceNow, the ServiceNow logo, Now, Now Platform, and other ServiceNow marks are trademarks and/or registered trademarks of ServiceNow, Inc. in the
United States and/or other countries. Other company names, product names, and logos may be trademarks of the respective companies with which they are associated.
servicenow.com 20
WHITE PAPER
Reference fields Reference fields are not supported by Edge Use a secondary field, encrypt it, and hide the
Encryption because the sysid that is being used to reference from the form. The actual source field must
make the link between your form and the actual be a string type and will need to be
field needs to be in the clear.
Web services integrations ServiceNow can integrate with outside data sources Configure all automated processes to send or
using industry-standard web service protocols like receive data from the ServiceNow instance using
REST and SOAP. A third-party integration, which encryption rules so the Edge Encryption proxy
is usually software running on a computer inside can identify the columns in the payload with the
your network, can retrieve and insert data into encrypted instances.
ServiceNow automatically, but
Legacy data ServiceNow customers may have amassed large You can run a mass encryption job on a per- column
amounts of data within their ServiceNow instances and attachment basis. Plan when you want to run
within various columns. The amount of data these this type of operation carefully
customers need to encrypt could contain millions of
so you can accommodate for the volume of columns
records. Because encryption keys and algorithms
and attachments you plan to encrypt.
cannot be held within ServiceNow, encrypting large
amounts of data using Edge Encryption can take a
long time.
© 2022 ServiceNow, Inc. All rights reserved. ServiceNow, the ServiceNow logo, Now, Now Platform, and other ServiceNow marks are trademarks and/or registered trademarks of ServiceNow, Inc. in the
United States and/or other countries. Other company names, product names, and logos may be trademarks of the respective companies with which they are associated.
servicenow.com 21
WHITE PAPER
© 2022 ServiceNow, Inc. All rights reserved. ServiceNow, the ServiceNow logo, Now, Now Platform, and other ServiceNow marks are trademarks and/or registered trademarks of ServiceNow, Inc. in the
United States and/or other countries. Other company names, product names, and logos may be trademarks of the respective companies with which they are associated.
servicenow.com 22
WHITE PAPER
How long does it take to activate Cloud Encryption will be provisioned Need two maintenance windows, each
product? within 60-days of an accepted order with 14-day advanced notice for a total
(maximum infrastructure provisioning of 28 days) and time to implement CCS
time) endpoint
How can you tell when encryption is in Cloud Encryption navigation for Key ServiceNow Support will have access
use? Management Operations and Key to check if an instance is encrypted but
Management Transactions to see customers does not
information about keys
How does key rotation work? Use the Key Management Key rotation available for DBE by
Operations sub-module to initiate a contacting support; no support for key
key rotation rotation with CCS
Can the key be stored separate from the Yes, CMK stored in ServiceNow HSM Yes for CCS
DB instance?
HSM integrations for key management? Customer choice; need to provide Yes; partners Fortanix and Llave.io
wrapped key to ServiceNow
Any downtime risk compared with If withdraw key and unable If withdraw key and unable to resupply it,
ServiceNow managed key? to resupply it, instance will be instance will be inaccessible.
inaccessible.
© 2022 ServiceNow, Inc. All rights reserved. ServiceNow, the ServiceNow logo, Now, Now Platform, and other ServiceNow marks are trademarks and/or registered trademarks of ServiceNow, Inc. in the
United States and/or other countries. Other company names, product names, and logos may be trademarks of the respective companies with which they are associated.
servicenow.com 23