Product documentation Docs
    • English
    • Deutsch
    • 日本語
    • 한국어
    • Français
  • More Sites
    • Now Community
    • Developer Site
    • Knowledge Base
    • Product Information
    • ServiceNow.com
    • Training
    • Customer Success Center
    • ServiceNow Support Videos
  • Log in

Product documentation

  • Home
How search works:
  • Punctuation and capital letters are ignored
  • Special characters like underscores (_) are removed
  • Known synonyms are applied
  • The most relevant topics (based on weighting and matching to search terms) are listed first in search results
Topics are ranked in search results by how closely they match your search terms
  • A match on the entire phrase you typed
  • A match on part of the phrase you typed
  • A match on ALL of the terms in the phrase you typed
  • A match on ANY of the terms in the phrase you typed

Note: Matches in titles are always highly ranked.

  • Release version
    Table of Contents
    • Governance, Risk, and Compliance
Table of Contents
Choose your release version
    Home Orlando Governance, Risk, and Compliance Governance, Risk, and Compliance Continuous Authorization and Monitoring Assess, authorize, monitor, and generate reports

    Assess, authorize, monitor, and generate reports

    • Save as PDF Selected topic Topic & subtopics All topics in contents
    • Unsubscribe Log in to subscribe to topics and get notified when content changes.
    • Share this page

    Assess, authorize, monitor, and generate reports

    After you have completed the implementation process, you can assess internal and external controls, generate Plans of Action and Milestones, and manage change requests and vulnerable items.

    Before you begin

    Role required: sn_irm_cont_auth.system_owner or sn_irm_cont_auth.info_system_sec_officer

    About this task

    The Assess process is generally performed by a user other than the system owner or the personnel who implemented the controls.
    The Assess state adds Control Assessments and Risk Summary related lists, as well as POA&M, Change Requests, Security Incidents, and Vulnerable Items tabs to the Authorization Package form.
    Note: Performance issues have been observed in the Continuous Authorization & Monitoring application when a high volume of Change Request and/or Incident records are related to a single Authorization Package. If you experience long transaction response times, consider performing the workarounds detailed in KB0861865.

    Procedure

    1. For an Authorization Package in the Implement state, click Assess.
      Transition to the Assess state
      Note: An Audit Engagement is automatically created.
    2. Click the Control Assessments related list to view the Audit engagement.
      Control Assessments
      Note: The Audit Engagement is automatically assigned to the SCA.
    3. Click the engagement number to open it. Notice that the Entities tab is displaying the authorization boundary for the package.
      Tabs for assessment
    4. Click the Controls tab to view all of the controls your team implemented.
      Controls
    5. Next, click the Audit Tasks tab to view tasks you can use for assessing the controls.
    6. Click an audit task and perform the Design Test and Operation Test to judge the control's effectiveness. For details on this process, see Manage engagements.
      Note: Any issues that arise during the Assess phase appear in the POA&M tab. Additionally, any open Change Requests or Vulnerable Items targeting the system elements in the package appear under those tabs.
    7. The system owner must review and document any Plan of Action and Milestones (POA&M) issues, change requests, and vulnerable items that potentially threaten your systems.
    8. When this is complete, click Authorize. The package transitions to the Authorize state. When you are satisfied that all is in order, click Request Approval. An approval request is sent to the Authorizing Official, who will access My Approvals from the navigation pane and review the information in the package. When the approval is received, the package transitions to the Monitor state.
      Note: In the Monitor state, continuous monitoring is achievable if you have indicators. If not, you can manually review the controls. For more information, see Manage control indicators.

    Tags:

    Feedback
    On this page

    Previous topic

    Next topic

    • Contact Us
    • Careers
    • Terms of Use
    • Privacy Statement
    • Sitemap
    • © ServiceNow. All rights reserved.

    Release version
    Choose your release version

      Assess, authorize, monitor, and generate reports

      • Save as PDF Selected topic Topic & subtopics All topics in contents
      • Unsubscribe Log in to subscribe to topics and get notified when content changes.
      • Share this page

      Assess, authorize, monitor, and generate reports

      After you have completed the implementation process, you can assess internal and external controls, generate Plans of Action and Milestones, and manage change requests and vulnerable items.

      Before you begin

      Role required: sn_irm_cont_auth.system_owner or sn_irm_cont_auth.info_system_sec_officer

      About this task

      The Assess process is generally performed by a user other than the system owner or the personnel who implemented the controls.
      The Assess state adds Control Assessments and Risk Summary related lists, as well as POA&M, Change Requests, Security Incidents, and Vulnerable Items tabs to the Authorization Package form.
      Note: Performance issues have been observed in the Continuous Authorization & Monitoring application when a high volume of Change Request and/or Incident records are related to a single Authorization Package. If you experience long transaction response times, consider performing the workarounds detailed in KB0861865.

      Procedure

      1. For an Authorization Package in the Implement state, click Assess.
        Transition to the Assess state
        Note: An Audit Engagement is automatically created.
      2. Click the Control Assessments related list to view the Audit engagement.
        Control Assessments
        Note: The Audit Engagement is automatically assigned to the SCA.
      3. Click the engagement number to open it. Notice that the Entities tab is displaying the authorization boundary for the package.
        Tabs for assessment
      4. Click the Controls tab to view all of the controls your team implemented.
        Controls
      5. Next, click the Audit Tasks tab to view tasks you can use for assessing the controls.
      6. Click an audit task and perform the Design Test and Operation Test to judge the control's effectiveness. For details on this process, see Manage engagements.
        Note: Any issues that arise during the Assess phase appear in the POA&M tab. Additionally, any open Change Requests or Vulnerable Items targeting the system elements in the package appear under those tabs.
      7. The system owner must review and document any Plan of Action and Milestones (POA&M) issues, change requests, and vulnerable items that potentially threaten your systems.
      8. When this is complete, click Authorize. The package transitions to the Authorize state. When you are satisfied that all is in order, click Request Approval. An approval request is sent to the Authorizing Official, who will access My Approvals from the navigation pane and review the information in the package. When the approval is received, the package transitions to the Monitor state.
        Note: In the Monitor state, continuous monitoring is achievable if you have indicators. If not, you can manually review the controls. For more information, see Manage control indicators.

      Tags:

      Feedback

          Share this page

          Got it! Feel free to add a comment
          To share your product suggestions, visit the Idea Portal.
          Please let us know how to improve this content

          Check any that apply

          To share your product suggestions, visit the Idea Portal.
          Confirm

          We were unable to find "Coaching" in Jakarta. Would you like to search instead?

          No Yes
          • Contact Us
          • Careers
          • Terms of Use
          • Privacy Statement
          • Sitemap
          • © ServiceNow. All rights reserved.

          Subscribe Subscribed Unsubscribe Last updated: Tags: January February March April May June July August September October November December No Results Found Versions Search preferences successfully updated My release version successfully updated My release version successfully deleted An error has occurred. Please try again later. You have been unsubscribed from all topics. You are now subscribed to and will receive notifications if any changes are made to this page. You have been unsubscribed from this content Thank you for your feedback. Form temporarily unavailable. Please try again or contact  docfeedback@servicenow.com  to submit your comments. The topic you requested does not exist in the release. You were redirected to a related topic instead. The available release versions for this topic are listed There is no specific version for this documentation. Explore products Click to go to the page. Release notes and upgrades Click to open the dropdown menu. Delete Remove No selected version Reset This field is required You are already subscribed to this topic Attach screenshot The file you uploaded exceeds the allowed file size of 20MB. Please try again with a smaller file. Please complete the reCAPTCHA step to attach a screenshot
          Log in to personalize your search results and subscribe to topics
          No, thanks Login