Summary
In this chapter, we have discussed the need for security in a ServiceNow implementation and helped you understand how you can build a case to allocate the limited resources of your project to ensure the systems and data under your control are protected.
We’ve covered the tools at your disposal to secure your instances through the Instance Security Center as well as the various data encryption options available on ServiceNow. Finally, we addressed the considerations for secure integrations within ServiceNow.
As discussed in this chapter, the concepts of security must be applied to all ServiceNow instances under your control. The next chapter will cover the management of multiple ServiceNow instances and provide you with tools to assess how to use your ServiceNow instances.