System security Security is built into all levels of functionality. Implement the security features that are most appropriate for your organization, from managing failed logins and encrypted password protection, to roles and access control rules, to audit logs of user interactions. An overview of the ServiceNow platform architecture, explaining the concepts of single system of record, enterprise cloud, multi-instance architecture, availability, redundancy, backups, and security. General security settings propertiesSecurity settings provide several properties to control the level of security on your instance.Elevated privilege rolesElevated privilege roles require a user to manually accept the responsibility of using the role before the user can access the features of the role.High Security SettingsHigh Security Settings refer to several security options available in your instance. Access control rulesAccess control rules, also known as access control lists (ACL) or access controls, restrict access to data by requiring users to pass a set of requirements before they can interact with it.Login and authentication securityConfigure login security options to control access to your instance.ServiceNow access controlThis SNC Access Control plugin (com.snc.snc_access_control) enables customers to control which ServiceNow employees may access their instance, and when. CertificatesYour instance requires certificates to establish secure connections and validate signatures.Web service securityEnforce security using basic authentication, mutual authentication, or WS-Security.HTML sanitizerRemove unwanted code and protect against security concerns such as cross-site scripting attacks by sanitizing HTML markup in HTML fields and translated HTML fields. AuditingTrack record changes on auditing-enabled tables. By default, the system only tracks changes to the incident, change, and problem tables.Domain separationDomain separation (also known as multi-tenancy) is a way to separate data into logically-defined domains.View the log of failed login attemptsEach time a user attempts to log in, the action is recorded in an event log. You can view a log of failed login attempts.Virtual Private Network (VPN)Use a virtual private network (VPN to integrate your instance with external data sources over the Internet.Encryption supportEncryption is a process that scrambles information into a format that unauthorized parties cannot decode or use.System logsThe System Logs module provides a variety of logs that you can use to troubleshoot and debug transactions and events that take place within the instance.General platform securityGeneral security refers to the properties, settings, and options that you can use to better secure your instance.