Product documentation Docs
    • English
    • Deutsch
    • 日本語
    • 한국어
    • Français
  • More Sites
    • Now Community
    • Developer Site
    • Knowledge Base
    • Product Information
    • ServiceNow.com
    • Training
    • Customer Success Center
    • ServiceNow Support Videos
  • Log in

Product documentation

  • Home
How search works:
  • Punctuation and capital letters are ignored
  • Special characters like underscores (_) are removed
  • Known synonyms are applied
  • The most relevant topics (based on weighting and matching to search terms) are listed first in search results
Topics are ranked in search results by how closely they match your search terms
  • A match on the entire phrase you typed
  • A match on part of the phrase you typed
  • A match on ALL of the terms in the phrase you typed
  • A match on ANY of the terms in the phrase you typed

Note: Matches in titles are always highly ranked.

  • Release version
    Table of Contents
    • Security Operations
Table of Contents
Choose your release version
    Home Paris Security Incident Management Security Operations Security Incident Response Understanding Security Incident Response

    Understanding Security Incident Response

    • Save as PDF Selected topic Topic & subtopics All topics in contents
    • Unsubscribe Log in to subscribe to topics and get notified when content changes.
    • Share this page

    Understanding Security Incident Response

    With Security Incident Response (SIR), manage the life cycle of your security incidents from initial analysis to containment, eradication, and recovery. Security Incident Response enables you to get a comprehensive understanding of incident response procedures performed by your analysts, and understand trends and bottlenecks in those procedures with analytic-driven dashboards and reporting.

    Built in integrations with third-party cyber security solutions and partner-developed integrations from the ServiceNow Store enable security automation and orchestration for efficient and accurate incident response.

    Watch this nine-minute video to learn about the SIR process, using Security Incident Response to thwart attacks and viewing security activity in the Security Incident Response Explorer.

    To protect your investigations and keep security incidents private, Security Incident Response provides the means to restrict access to the system to specific security-related roles and ACLs. Non-security administrators can be restricted from access, unless you expressly allow them entry.
    Note: IT System Administrators [admin] can impersonate ServiceNow users. However, when impersonating a user with an application admin role for Security Incident Response, an admin cannot access features granted by that role, including security incidents and profile information. Access to modules and applications in the navigation bar is also restricted. Also, admin cannot change the password of any user with an application admin role for Security Incident Response.

    SIR information flow

    Security Incident Response employs the following flow of information, from integration through investigation, and then on to resolution and review.

    Figure 1. Security Incident Response flow of information
    SIR flow of information

    Discovery

    Security incidents can be logged or created in the following ways.
    • From the Security Incident form
    • From events that are spawned internally, or created by external monitoring or vulnerability tracking systems via alert rules, or manually
    • From external monitoring or tracking systems
    • From the service catalog

    Analysis

    Depending on the selected view, you are using (default, Non-IT Security, Security ITIL, and so on), the Security Incident form can show any combination of vulnerabilities, incidents, changes, problems, tasks on the affected CI and affected CI groups. The system can identify malware, viruses, and other areas of vulnerability by cross-referencing the National Institute of Standards and Technology (NIST) database, or other third-party detection software. As security incidents are resolved, you can use any incident to create a security knowledge base article for future reference.

    Perform further analysis using a business service map to locate other affected systems or business services that can be infected.

    Containment, Eradication, and Recovery

    As you monitor and analyze vulnerabilities, you can create and assign tasks to other departments. You can use a business service map to create tasks, problems, or changes for all affected systems, documents, activities, SMS messages, bridge calls, and so forth.

    Review

    After the incident is resolved, other steps can take place before closure. You can perform a post incident review. Creating knowledge base articles can help with future similar incidents. Significant incidents may require a post-incident resolution review. This review can take several forms. For example:
    • Conduct a meeting to discuss the incident and gather responses.
    • Write and distribute to those teams who worked on an incident a list of resolution review questions designed for each category or priority of incident.
    • Incident managers can write the report and gather information on their own.
    An incident resolution review report can be automatically generated that includes:
    • a summary of what was done
    • the time line
    • the type of security incident encountered
    • all related incidents, changes, problems, tasks, CI groups
    • the details of the resolution
    In addition, an automated security incident resolution review survey system is available. It gathers the names of all users assigned to a security incident, and sends out a customized survey to gather data about the handling of the incident. This data can then be made available in a generated security incident review report, which you can edit into a final draft. Similar data can be added to a knowledge base article to contain lessons learned and the steps to take to resolve similar issues in the future.

    Request apps on the Store

    Visit the ServiceNow Store website to view all the available apps and for information about submitting requests to the store. For cumulative release notes information for all released apps, see the ServiceNow Store version history release notes.

    Security Incident Response Terminology

    The following terms are used in Security Incident Response.
    Term Definition
    Active Any security incident not in the closed or cancelled state.
    Administrator lockdown The ability to restrict Security Incident Response access to personnel with security-related roles and ACLs.
    Inbound security requests Requests submitted for low-impact security demands, such as requesting a new electronic badge.
    Manage post incident activities A review of the origins and handling of a security incident. The final product is a post incident report, which documents all actions performed and the reasons for doing them.
    Response tasks Tasks assigned to a security incident for tracking actions in response to the threat.
    Understanding security incident calculators Calculators used to update record values when pre-configured conditions are met.
    Security incident treemaps Chart type that hierarchically shows security incident data in the form of nested rectangles.
    Threat lookup A request submitted from the security incident catalog for scanning files, URLs, and IP addresses for malware.
    Vulnerability scan A request initiated from the Security Incident form for scanning affected resources (servers, computers, and other configuration items) for vulnerabilities.

    Tags:

    Feedback
    On this page

    Previous topic

    Next topic

    • Contact Us
    • Careers
    • Terms of Use
    • Privacy Statement
    • Sitemap
    • © ServiceNow. All rights reserved.

    Release version
    Choose your release version

      Understanding Security Incident Response

      • Save as PDF Selected topic Topic & subtopics All topics in contents
      • Unsubscribe Log in to subscribe to topics and get notified when content changes.
      • Share this page

      Understanding Security Incident Response

      With Security Incident Response (SIR), manage the life cycle of your security incidents from initial analysis to containment, eradication, and recovery. Security Incident Response enables you to get a comprehensive understanding of incident response procedures performed by your analysts, and understand trends and bottlenecks in those procedures with analytic-driven dashboards and reporting.

      Built in integrations with third-party cyber security solutions and partner-developed integrations from the ServiceNow Store enable security automation and orchestration for efficient and accurate incident response.

      Watch this nine-minute video to learn about the SIR process, using Security Incident Response to thwart attacks and viewing security activity in the Security Incident Response Explorer.

      To protect your investigations and keep security incidents private, Security Incident Response provides the means to restrict access to the system to specific security-related roles and ACLs. Non-security administrators can be restricted from access, unless you expressly allow them entry.
      Note: IT System Administrators [admin] can impersonate ServiceNow users. However, when impersonating a user with an application admin role for Security Incident Response, an admin cannot access features granted by that role, including security incidents and profile information. Access to modules and applications in the navigation bar is also restricted. Also, admin cannot change the password of any user with an application admin role for Security Incident Response.

      SIR information flow

      Security Incident Response employs the following flow of information, from integration through investigation, and then on to resolution and review.

      Figure 1. Security Incident Response flow of information
      SIR flow of information

      Discovery

      Security incidents can be logged or created in the following ways.
      • From the Security Incident form
      • From events that are spawned internally, or created by external monitoring or vulnerability tracking systems via alert rules, or manually
      • From external monitoring or tracking systems
      • From the service catalog

      Analysis

      Depending on the selected view, you are using (default, Non-IT Security, Security ITIL, and so on), the Security Incident form can show any combination of vulnerabilities, incidents, changes, problems, tasks on the affected CI and affected CI groups. The system can identify malware, viruses, and other areas of vulnerability by cross-referencing the National Institute of Standards and Technology (NIST) database, or other third-party detection software. As security incidents are resolved, you can use any incident to create a security knowledge base article for future reference.

      Perform further analysis using a business service map to locate other affected systems or business services that can be infected.

      Containment, Eradication, and Recovery

      As you monitor and analyze vulnerabilities, you can create and assign tasks to other departments. You can use a business service map to create tasks, problems, or changes for all affected systems, documents, activities, SMS messages, bridge calls, and so forth.

      Review

      After the incident is resolved, other steps can take place before closure. You can perform a post incident review. Creating knowledge base articles can help with future similar incidents. Significant incidents may require a post-incident resolution review. This review can take several forms. For example:
      • Conduct a meeting to discuss the incident and gather responses.
      • Write and distribute to those teams who worked on an incident a list of resolution review questions designed for each category or priority of incident.
      • Incident managers can write the report and gather information on their own.
      An incident resolution review report can be automatically generated that includes:
      • a summary of what was done
      • the time line
      • the type of security incident encountered
      • all related incidents, changes, problems, tasks, CI groups
      • the details of the resolution
      In addition, an automated security incident resolution review survey system is available. It gathers the names of all users assigned to a security incident, and sends out a customized survey to gather data about the handling of the incident. This data can then be made available in a generated security incident review report, which you can edit into a final draft. Similar data can be added to a knowledge base article to contain lessons learned and the steps to take to resolve similar issues in the future.

      Request apps on the Store

      Visit the ServiceNow Store website to view all the available apps and for information about submitting requests to the store. For cumulative release notes information for all released apps, see the ServiceNow Store version history release notes.

      Security Incident Response Terminology

      The following terms are used in Security Incident Response.
      Term Definition
      Active Any security incident not in the closed or cancelled state.
      Administrator lockdown The ability to restrict Security Incident Response access to personnel with security-related roles and ACLs.
      Inbound security requests Requests submitted for low-impact security demands, such as requesting a new electronic badge.
      Manage post incident activities A review of the origins and handling of a security incident. The final product is a post incident report, which documents all actions performed and the reasons for doing them.
      Response tasks Tasks assigned to a security incident for tracking actions in response to the threat.
      Understanding security incident calculators Calculators used to update record values when pre-configured conditions are met.
      Security incident treemaps Chart type that hierarchically shows security incident data in the form of nested rectangles.
      Threat lookup A request submitted from the security incident catalog for scanning files, URLs, and IP addresses for malware.
      Vulnerability scan A request initiated from the Security Incident form for scanning affected resources (servers, computers, and other configuration items) for vulnerabilities.

      Tags:

      Feedback

          Share this page

          Got it! Feel free to add a comment
          To share your product suggestions, visit the Idea Portal.
          Please let us know how to improve this content

          Check any that apply

          To share your product suggestions, visit the Idea Portal.
          Confirm

          We were unable to find "Coaching" in Jakarta. Would you like to search instead?

          No Yes
          • Contact Us
          • Careers
          • Terms of Use
          • Privacy Statement
          • Sitemap
          • © ServiceNow. All rights reserved.

          Subscribe Subscribed Unsubscribe Last updated: Tags: January February March April May June July August September October November December No Results Found Versions Search preferences successfully updated My release version successfully updated My release version successfully deleted An error has occurred. Please try again later. You have been unsubscribed from all topics. You are now subscribed to and will receive notifications if any changes are made to this page. You have been unsubscribed from this content Thank you for your feedback. Form temporarily unavailable. Please try again or contact  docfeedback@servicenow.com  to submit your comments. The topic you requested does not exist in the release. You were redirected to a related topic instead. The available release versions for this topic are listed There is no specific version for this documentation. Explore products Click to go to the page. Release notes and upgrades Click to open the dropdown menu. Delete Remove No selected version Reset This field is required You are already subscribed to this topic Attach screenshot The file you uploaded exceeds the allowed file size of 20MB. Please try again with a smaller file. Please complete the reCAPTCHA step to attach a screenshot
          Log in to personalize your search results and subscribe to topics
          No, thanks Login