ServiceNow Security What you need to know secure your instances
hi folks thank you um for taking the time out of your schedule to join us today for our presentation on security best practices for the now platform securing your instance my name is Joseph pizo and I'm a product analyst on the service now customer security and Trust team so here on the customer security and Trust team we provide applicate applications guidance and services to assist our customers with securing their instances our goal is to partner with you to deliver confidence when it comes to the security of your service now instances and the data that you store and use to make work flow so for to kick things off let's talk about our Safe Harbor notice right the nice part of this presentation today is that nearly all of the ideas and information I'll be sharing are current so I won't be talking about the future of products but with that being said don't make purchases um and purchasing decisions based upon forward-looking statements so I just want to clear that up and get that out of the way in case we do make some forward-looking statements so when we think about what we're going to get out of this why am I putting my time and investing my time into learning about this you've embarked on a journey with service now and we want to make sure that you understand the resources that are available for you to secure your instances and you understand that there are things that we can do to help you can reach out to us there are resources that are available in video format or document format and you know where to find some of these and you'll see throughout the presentation that we've included a couple of little QR codes that I encourage you to click on follow those links and gather the data that we put out there because they're going to be important as you move through your journey so let's start off with what is a service now instance and you know this can be kind of confusing to some people especially if we've been buying software for years traditionally where I take that software and I install it but we're talking about today are Cloud resources specifically um SAS and pass resources so the definition of a service now instance is a copy of the service now platform in the cloud that's given to each customer it's a collection of applications databases libraries and virtual machines that work together to provide specific services to businesses and each instance is independent configural config able and not shared with other customers so your slice is private no one else can access this so when you first log into your instance you're going to be logging in using TLS so there's already some Security based um security built in on that communication of logging in and getting into these systems but when it when we break it down it breaks down to a couple of really simple ideas and these are our app nodes that really do the work for those applications that you're installing within your platform or within your instance um there's a database on the back end that's dedicated to that production environment hence your instance and then there's all of your workflow and applications that sit on top of that now when we think about this we have all of this data so I mean we have the stuff that's there we have a user account that we have to log in with and we have you know that we're putting in we want to make sure that that's secure but we we also want to consider the physical security and when it comes down to the physical security a lot of times we'll sit back and scratch our heads and think well what do we do well these are service now locations where we have these paired around the world and we're going to talk about that in a second but these instances sit inside of a cage in a collocation facility and there are specific controls in place to make sure that the cage can't be entered by people who don't have access that there's monitoring that's going on that the collocation data center any visitors are escorted we vet our the employees that work there to make sure that everything's happening um with people who are trusted and then we're also auditing any access controls on top of this and when we think about this we want to think about what's going on with this so we deliver this worldwide through 18 paired data centers and these are running 247365 days a year and we guarantee a 99.995 up time so when we think about this we want to think about what are we getting out of this and where are we putting our instances and how are we managing these and what we're really bringing breaking down is that we have that fault tolerance so when we say paired we have all of our data centers are set up in pairs so you can see here that we'll have Toronto and Calgary Baltimore and as Ashburn C pepper and Miami so this is where we have all of this information set out across all of these systems and they're set up to be redundant and this is really cool because when we think about this we have a single data model with controls that cover for everything so whether you install itm itsm Pro itam um SEC Ops customer service HR you're going to receive that same level of security for your platform and there's some functionality that's out there where we can go out and we can assist with some things in your environment so we talk about a little bit about authentication and identity and understanding how we can log into this and how we can take control of authenticating against our systems and we're going to talk about that a little bit later on we have auditing and monitoring and this could include some logging information that can give you some data so you can track back what's going on we also have encryption and Key Management platform security controls secure and compliant infrastructure that matches specific regulations and requirements based on individual rules that are being adopted around the world and then partners that we integrate with as well so let's jump into a quick poll question and this question is what is your level of confidence in securing a service now instance all right we're getting some great answers that you know we have a a great audience today a nice number of people and this is fantastic to see people jumping in and I see some people who are extremely confident a small number somewhat confident neutral not very confident and I have no idea where to begin and I want to focus a little bit on the neutral not very confident and I have no idea to begin because we want to make it easy for you so let's end this poll and move on to the next slide so each customer is on their own path their own Journey with service now and security as it applies to your instance there's going to be times when certain security methods tools protocols or configurations will be subjective to your organization and its policies right so we're all on our own Journey we all have our own things that we need to be concerned with our organizations have their own policies um but the neat thing about a journey is that you can always change direction some directions may lead you to a to rough terrain right so Rocky uphill and can be really tiring and some will lead you to lead you and your organization to a flat calm Breezy walking path so our goal at service now is to assist our customiz customers with simplifying some of that Journey so that's why we've put this together and some of the things we're going to talk about and let's talk about that first phase right we want to think about on that Journey we have the crawl walk run approach so service now instant security is an important responsibility that requires careful attention security isn't a one-size fits all right we we understand that through the Journey we understand that everyone's journey is going to be different one key factor in maintaining a secure instance is having access to Reliable and upto-date information about best practices guidelines and tools and that's where we come in here on the um the CST team to help stay informed and make the most of service now security features we've compiled a list of resources that you can access um and it includes official documentation from service now as well as external resources and communities where you can connect with other service now users and experts around the world we know that security isn't one siiz fits-all and what might apply to another product could very well apply to service now and vice versa and we want you to take advantage of some of this we also understand that our customers may have varying EXP experience with security some may just be rolling over um some may be crawling some may be toddling around holding on while they move around part of our goal is to meet you where you need us so think about that when we're talking about that crawl phase some of us are still you know fresh out of the womb some of us have a little bit more experience some of us are running already so we want to take advantage of that and meet you where you where your needs are so no matter where you are we're here to help and here are some um some resources that are available so for our potential and new customers there's the trust site go and hit the trust site at servicenow.com there's also the security Center site that's available up there that you can go and hit there's also the trust Center on now support so when you go and open up a case there's the ability to go and hit that hit that hit hit that that area of our support to gather more information about what you can gain out of us and then finally for partners um there's the service now partner portal and if you're working with a partner which I think you should be most of our customers do you want to at least have it have a a connection into that through your partner so this puts you in a great place and it depends on you know your current situation and what you need to learn from us so let's talk a little bit about our core compliance so the core compliance portal enables service now customers to self-serve documentation to help support internal audit and assessment requirements prepare for on-site Audits and address regulatory requirements which is pretty cool because a lot of us operate in different roles and different areas among different Industries so we might have to you know think about things like how do we respond to a CFR for a you know for a pharmaceutical company or what regulations do I have to abide by for a financial or if I'm over in Europe and I have an a business operating there what do I need to be concerned with so core includes service now certifications and attestations service now sock one and sock one type two and sock 2 type two reports internal policies and standard operating procedures a data center certifications the shared assessment Sig and Cloud security Alliance ciq pre-filled vendor risk questionnaires core access for customers and partners is provisioned by now support account holders by the customer's primary customer administrator who manages the company's service now instance so this is where you get to choose who's running that instance and who's going to be representing you one of the things that cesos have top of Mind these days is the supply chain chain attacks or third party breaches so here this is where we're helping our customers make proper due diligence on the service now security processes this is where you can gather all of that information to meet the needs of any of the compliance that you might have out there so we can go and you can hit this site download the document download customized information and go and grab this and this is pretty important stuff and this is in that this is still remember we're in that crawl phase so this is the stuff that you're going to hand over when security asks you for attestation or your internal Auditors ask you for this information or anyone who's involved with making sure that um risk tolerances are AC are acceptable you can hand this over to those organizations it's actually a pretty cool feature um next let's go into the basics now I'm going to pause for a second I want everyone to pull out your phones and hit that QR code now I'm a security guy typically if someone told me to hit a QR Cod QR code I probably would ignore it um you can also just go on to Google and search for service now security best practices God so this is where you can start that Journey from the beginning that crawl phase and get you into that walking or even running phase if you desire to get there it's a guide that's built to provide the best considerations for service now so this was created specifically for customers prospects partners and service now support staff um this best practices guide is an easyto follow guide um and it provides information on the main security features by service now for platform and how best to use them to secure an instance this guide is specifically aimed at those who are tasked with the responsibility of keeping a service now instant secure this is going to be part of your first steps in the Journey of security with service now now service now instances undergo regular patching to maintain security and performance service now patching program helps you ensure your platform software is kept up toate you can take advantage of our automated patching service to assist you with this typically there are also two major versions um of updates per year you will see for other products though there are update patches um that pop up occasionally and we recommend you stay on top of those um when we think about this we want to think about making sure that we also maintain our version We suggest to our customers to be n minus one so as of today n would be Washington that would be the family version minus one would be Vancouver now we do have customers that are on older versions like Utah Tokyo San Diego but in order to take advantage of some of the patches that are available and some of the functionality and even some of the products that you've bought into for new and updated features you have to stay on top of your patching and your update update uh Cycles so jump right into that get to know this start learning a little bit about this the next phase in that crawl cycle is security contacts now we recommend we strongly recommend that this this is not the same as the customer admin so if you have in your support portal hey it's Jim Jim's our service now admin you know maybe Mary would be the best person to put in here because Mary is on the security team and she's responsible for cloud security and Mary might be a great contact to reach out to in the event that there is something that's discovered that requires the security team's attention so we've put this in place so that we have a way for not just Jim to own all the responsibility we want to make Jim a security hero but we also want Mary to have that awareness so when we break this down we recommend that the name security contacts include at least um two security Personnel authorized by the organization to discuss security um they have the ability to quickly reach out to business owners and Leadership um they have a familiarity and understanding of the service now service and how their organization is utilizing service now so there's just some basic stuff that we have out there that we really want to focus on now the next part I get really excited about because a lot of my customers and there was a number of you that came back that you know didn't feel that that confident with securing their instance but one thing that we've built to assist our customers with some of the heavy lifting is service now security Center and service now security Center is a One-Stop shop to really help guide security and make sure that you're in a better place when it comes to security Now this isn't going to be everything as we go through this you're going to see that there are areas that you need to consider but when it comes to security hardening so you want to harden the platform there are 217 different hardening settings and configurations that can be set there's the security scanner where you can scan for any user modified functionality so think columns that have been created you think of scripts that have been written and these can also be you can create new checks for individual things there's best practices customer Action Security metrics and learning capabilities and when we break this down we want to make sure that we're thinking about do we want to fall into that 99% of cloud breaches that can be traced back to preventable misconfigurations and this is where we can get ahead of that now this is something that's free it is already available in your instances when you turn them on you just go into your filter Navigator and search for security Center this is part of platform and we encourage everyone to use it um so and to get started just open up your filter Navigator and search on it now if you're on Utah if you're installing Utah or anything prior um you there's there's going to be a little bit of work to do there is the instant security Center for anything pre Utah and that's different from this um and in Utah there's uh you need to go out to the store. servicenow.com site to get this so this puts us in a place where we really need to like jump in and get this and we're trying to make this as you know as open as possible to all of our customers so that they can avoid any potential pitfalls now this may not prevent you from getting hacked but it's going to help you reduce any any potential of exploit and that leads me to our security Center specifically best practices best practices are these are the first steps in the crawl where you can go in and you can start doing things that will that you can configure your instance to make sure that you're protected now in the news recently there's been some news about attacks and how weak passwords have um allowed access to you know different resources so here you can go and you can follow a workflow for creating great password hygiene so this was built on one of the key components being um our security learning page and system admins will find a large variety of resources here to be able to uh to to map to this and track this and stay on top of everything that's here we're going to talk a little bit more about this in the future but let's start talking about walk so in the cross step of the security J Journey we talked a little bit about patching and upgrading familiarity with some of the resources like the best practices guide and security Center um but here we're going to build on that step by going just a little bit deeper as we start walking down the security Journey Journey path to understand who is responsible for what and we'll highlight some of the newer options so I also have another QR code in here and I'm G to encourage everyone to go and and hit that because that's going to take you to some more details about this slide now what we're looking at is a grid and this is pretty cool right this is the shared security responsibility model and these are all things if we look at all these green dots under customer the red dots under service now now and then these gray dotts under collocation these are all the areas where we're responsible and you'll see some overlap there but there's some stuff that we really need to think about here and as a customer of any product especially technology we want to know that you know it's secure and secure by default but we also want to know if there if there's any type of responsibility that I have and we all have responsibilities when it comes to this so first we want to think about what do we need to do to secure configuration authentication authorization data management data encryption and so on this is where we have these responsibilities and this QR code is going to take you to a document that specifically defines each of these areas and what your responsibility is and I think that's pretty cool to get us moving and uh get our customers really working and getting more secure so when we think about securing your instance we want to think about three specific areas the Invisibles and configurables plus the enhansa bles so when we think about this we want to think about the business continuity physical security environmental controls infrastructure management vulnerability and Patch management secure uh software development life cycles various certification and attestation and this is where we have these capabilities to perform to keep you secure and always working the configurables are where we have those standard capabilities for customers um to maintain their configurations and your instant security so this is where we want to restrict access to apps restrict access within an app data and privacy logging and monitoring instance hardening and encryption now some of this is stuff that we do already and we've already talked about so instance hard can fall into security Center um encryption can fall into our vault product which we'll talk about later logging and monitoring of things that are available out of the box but there's also features and security Center to help with that privacy um restrict access within an app some apps some apps come as a scoped application so if you purchase that application data won't spill from another area from one area to another in the platform but we also want to consider what we have to do we want to make sure that um if we have a new app that is a scoped app we might want to provide an admin access to that app or provide an admin for that app admin rights so we want to be very careful with this and we want to trust our team members and Trust what's going on then when we look around at enhance bles this is where we have um thirdparty um or where we have a purchasable product and we can talk about that later on this is where we have the zero trust the log export code signing encryption and privacy and secrets set up so that you can take advantage of those but those are going to be subjective to your your organization so why are we looking at these items right um we want to reduce common security risks we want to understand roles in meeting compliance uh to Industry standard right legal regulations and privacy concerns and one of the best things about this is a good security hygiene also helps with keeping your instance available and that leads us into stability so if we're practicing good security hygiene we're going to be operating in a more stable environment which is pretty cool we don't want anything to become compromised or risky where we have to worry about you know are we tracking outages around the world for our data centers uh as a customer and we're tracking them in service now and we have workflow that's built but you know we fail to you know practice good password hygiene so we want to be able to take advantage of that and go through the steps to get there so let's kick off another poll so this poll what is your experience with service now security Center never heard of it I've heard of it but I've never used it or I use it regularly we're getting some great results here all right very cool very cool I'm GNA end the poll and move on to the next slide but what I'm seeing is that there's a lot of uh a lot of organizations that haven't heard of it or a lot of people on the call haven't heard of it some have heard of it but ever used it and two people have used it regularly and I commend you for that um if you are using it or you've heard of it you need to go in and update it we released a pretty cool update last week so take advantage of that update go in go to your all application select security Center hit the refresh button and sync that up and you'll get that new update and you'll be able to update and and run some of the latest features and fix any potential problems that have been found um so this is all really really cool stuff um but we want to make sure that you're using security Center because security Center is going to be one of the first steps on your journey very cool so let's go into security Center a little bit we talked about this before we just kind of briefly covered it now security Center is replacing um what was once called instance security center now when we break this down right now there are six distinct feature groups this provides for a way for our customers um to not let their guard down and see improvements security Center has six feature groups as I mentioned and this is an increase of the overall posture um for security of your organization it's pretty exciting I'm going to tell you why at the time of release there were about 170 different settings that could be configured in the hardening setting um there were also only four major feature groups and if you're familiar and those of you that are you know that we strive to improve platform and deliver value to our customers so what we've done is we've gone beyond just the initial four of hardening scanning metrics and learning and we've added critical updates which will be renamed to customer actions so if you update from your August 1 release you'll see it uh be renamed customer actions and um our best practices and our best practices is really to help get those customers started on that Journey it's really really cool stuff and you could take advantage of things like metrics which is going to pull in some logging and monitoring stuff that you can go and watch and you could take advantage of and that's where this comes us comes into for logging and monitoring in other areas where we can go and identify API CIS log probes and mid server and even Kafka monitor where we can uh we have in we can track infrastructure OS Network C centralized monitoring Cloud availability capacity if we look at customer managed stuff we start looking at transaction and event logs where you can go in and see all of this stuff and take advantage of that and start tracking problems that you may encounter and get to them before they become uh catastrophes next is we have our managed access control so identification and authentication and then authorization so when we think about this we want to be able to authenticate using single sign on ldap saml digest open ID SCM um local database authentication which kind of we uh we kind of stay we kind of hope that our customers are going to use multiactor a single sign on and this puts us in a position where we can steer our customers down there I suggest multiactor and single sign on and um just allowing local login you can find out more information in the documents that we've shared but then there's the authorization stuff we have full role-based access control role inheritance Access Control engine for multi-level ACL rule set we want to make sure that we're on top of this stuff and we're auditing consistently we also want to think about adaptive authentication which is pretty cool this puts us in a place where we can you know have our organization either allow or deny only our corporate environment or if we're Global we can set up IP restrictions we have the mobile app um that started with Utah for registering mobile devices where someone can go and register their device and then they'll be able to log in we can go and we can um you know hit things like uh uh inbound rest apis to only allow oo from specific IP and we can take advantage of this stuff um so this puts us in a place where we're really you know set to be powerful with this email security is incredibly important it's one of the most common ways for attackers to try to compromise systems um and we need to reduce that attack service so there's a couple options so your own email environment or service now's email environment you can take advantage of using dkim um customers can Implement using your own custom domain such as an acme.com or or whatever whatever domain you're using um there's platform support for a Microsoft graph API to read Microsoft Exchange online and then you know for reference points uh we want to help protect against spoofing um we want to control outbound email using sender policy framework of SPF and dken dkim um and DNS records must be added um for the for the or origin domain so dekm keys are assigned per email domain per so this puts us in a place where we can go and and really stay on top of this stuff to restrict file types restrict domains email filters and then take advantage of DCM and DeMark and then on top of that when we have things that come in with attachments um we also have our um our virus protection that's in there so we have antivirus that's built into the platform so if you upload something or if something's sent attached to an email he that will automatically be quarantined or check to make sure if it needs to be quarantined so now we're getting to the final stages and we're in that fun stage so in the walk step we reviewed the basic location of information um in you know we started looking at the security Journey understand who is responsible for what you get to you get to understand where to find things in the Run step it it put us in a position to review some of the capabilities you can Leverage to meet stringent or rigorous compliance requirements for your industry and gain more control over your data access so this is where we're going to go and start taking that control so when we think about this we want to think about um privacy requirements privacy requirements becoming the focus for all sectors and all of you here here um an outof the-box free feature to help is data classification so you're going to hear a lot about security features in here and other presentations from our team and in our CST both um but I'd like to emphasize on the new capabilities to privacy which is an essential aspect of data security and it's become increasingly important in recent years as the amount of data we generate and share online continues to grow so when we think about this a data classification is going to be incredibly uh important in the context of service now privacy features a critical role in ensuring the that sensitive information is kept secure and used appropriately these features enable organizations to comply with privacy regulation regulations protect against data breaches and build trust with your stakeholders so when we go into Data Discovery this puts us in a place where we can go in and identify things under system security through data classification and data classes and we can make those Associates iations and then we can map out exactly where we are with these when we when it comes down to encryption this is going to be where you start thinking about your journey and what are your requirements for your organization so encryption of data at rest is it's not set by default at service now um we do offer a few options depending on the risks you'd like to mitigate or your own requirements um so for example if you acquire full disc encryption um this is where we need to worry about things like theft of hard drones so everything's being stored in cages in a cola facilities that are protected so short of um Tom Cruz diving into our data centers I would say that those hard drives are pretty safe when we start talking about Edge encryption the use case for Edge encryption is unauthorized access to sensitive data um by service now so we want to be able to identify if we need to have that edge encryption in place to be able to maintain what's going in and what's going out and where it's being viewed when we start looking at column level encryption this is going to be unauthorized access to sensitive data on the customer side um risk uh the risk managed on cloud encryption is going to be the theft of hard drives like we mentioned before and full dis encryption is going to be mention is going to be uh managed through the theft of hard drive so there's a lot that goes in here and there's a lot to consider so I'll tell you that most of our customers don't require enhanced encryption for the data that they're storing because they have compensating controls to mitigate access to this and they're staying on top of things like ACLS users rights roles responsibilities um and role-based access control and then having good password h Gene and having um using multiactor authentication so this that will reduce some of the need to see this but there are things that you can do to protect this stuff so let's talk a little bit about Cloud encryption so when we think about Cloud encryption we want to think about you know the customer controlling their data in the cloud and this is where you can use your keys to control your own data so this is something that you're going to be able to you know uh you want insurance is that you have absolute control over things you want to make sure that you can pull this data out um and it's yours and you know that it is you know it's authentic you know that it's it's been protected and you can audit that data and we want to make our customers more comfortable with what's going on so let's talk a little bit how do you get this well this is service now Vault and Vault increases trust using a set of Premium privacy and security controls to protect sensitive data enable privacy and monitor for appropriate use so when we think about this there are a bunch of different features and functions involved here um from code signing to Secrets management to zero trust data privacy platform encryption and log services so when we think about this we want to think about how we're you know how comprehensive we need to be with this now this is an available application that's sold separate service now sec Center is free um accessing all of the configurations that you need to follow in the best practices guide that's part of platform that's also free but you have to do the work this is where you can go and take advantage of more enhanced features so that you can go and you can make sure that if you need to follow zero trust 100% this is where you get this for your platform if you need to focus on platform encryption and the security that you've enabled already isn't enough this is where you can go and grab that if you need to go and start tracking code signing and secrets management this is where you can go and enable that now we have resources available to this um through our website um and there are online demos of Vault by itself and I encourage you to go out and take a look at those and learn a little bit about them and see if that fits your journey and your subjective needs for your organization so another area is penetration testing so this is part of a comprehensive security strategy so when you conduct regular penetration test you're going to gain information about where your weaknesses are penetration tests involve simulating a Cyber attack on your service now instance to identify those vulnerabilities and weaknesses in your security defenses so we can uh conduct these tests and you can even do some things to kind of give you a mini idea of what you're doing that's where the scanner functionality in service now security Center comes in where you can go and start scanning things for any type of user changes that have been made but Additionally you can bring those third parties in annually um you can bring in uh an inde independent assessor and it's acceptable in service now core and then if you initiate your own um these are permitted once a per calendar year it's got a follow our testing policies for an instance hardening you have to be on the latest patch you have to schedule it 4 to8 weeks before your go live inform service now through the support portal and include mobile app and un unauthenticated scans as well so this is something that's really out there to really help you and maintain um what you're doing for other resources with security so here's another poll question um where do you feel you are in your security Journey with service now crawl walk or run all right looking good looking good all right I'm gonna end poll right now we're going to talk about this for a second I see a majority of of respondents are in the crawl phase and the walk phase I actually love hearing that because the way I see this as a journey um I'm a big guy you know when I'm when if I'm running I'm breathing heavy and I'm sweating a lot but I can walk for a really really long time and and and if I'm walking I may have to occasionally run for a little bit but walking and walking is a great place to Target if you're in that crawl phase that means that there's probably a couple of things that you really need to do to get to that walk phase ultimately I want you right at the edge of walk in the edge of run because I want you to be able to comfortably Trot comfortably move through this maybe a brisk walk that you can gain a little bit of uh exercise but you can also start learning things you can maintain and you can stay on top of stuff so let's think about this Security in your hands basically comes down to all of these different areas so one key resource that I'd like to highlight again is the instant security I'm sorry is um is service now security Center go to your filter Navigator in your instances if you have a developer instance or a subr instance go there and hit security Center go to your filter Navigator search for security Center start looking around even put this into your subr environments and start making changes to see how it impacts you this is a powerful tool that allows you to view realtime information about your instances security status and with hardening you're going to see things like you know what how hardened are you how are you compared um where uh based on the hardening configurations where do you stand are you at 60% which is pretty low but that might be okay for your organization or are you at 95% which is pretty high but it might be restrictive for your organization you want to test these features and set them up um you know it's something that you really need to go and look at the available resources for what's going on our vision is to make it easy for you to expose the right data for the right reasons so being able to take advantage of this and expose the data that you need while maintaining that security is really important let's go into um I believe um our second to last poll question after this presentation what is the likelihood that you will use the security Center application moving forward I love these responses I'm gon to share these in a second oh this is fantastic so there's a couple of an answers here possibly I need to understand more our demo Center if you search for um service Now demo Center there are recordings available that go through a full demonstration of security Center so if you need to gather more information about that or security we have our office of the ciso which we have a full team that's ready to um answer your questions but you also have those video resources those video resources are going to provide you a step-by-step guide uh to walk through those that specific application so you can gain so much out of it it's actually really cool so let's think about our call for Action identify where you are in your journey and a large number of you have already identified where you are you've you've responded you know are you at that crawl do you understand where to find the security documents do you understand basic out-of-the-box security features like security Center to be able to stay on top of that um are you running do you have advanced security requirements and I'm really happy to see that not many people are running at this point like I said I want you at the edge of walk I really want a slow Trot um are you taking action to secure your instance um have you reviewed the shared security model have you reviewed the security Center videos um those are all up online and available for you to go and take advantage of have you installed and utilized security Center have you maintained any patches and what version are you on and then a leverage available resources so there's the product documentation there's platform uh security there's Community uh community. servicenow.com is a fantastic resource there are trainings up there there are videos up there there's people who are always ready to respond to questions there's the security best practices guide and then there's also your partners so realistically I want you to engage your partners so that you understand exactly what's going on now we're uh hitting time we have one last poll and then we're going to open this up to some questions so let's go back to the question we asked at the beginning um what is your level of confidence in securing a service now instance has it improved all right we're seeing some some really good good responses where previously we had some I have no idea where to begin those of you that are falling into neutral not very confident somewhat confident please reach out to your account team and you know get get some uh time with some of our field security people the office of the ceso they know how to do this and that's what we're here for we want to answer your questions and walk you through the things that you need to know we want to be able to deliver to you a more confident and not such a heavy lift un security security doesn't have to be intimidated so I'm gonna open this up to questions and see if there are any questions that are out there
https://www.youtube.com/watch?v=_JiwGKoimVc