Instance level keys in the Key Management Framework
-
- UpdatedJan 30, 2025
- 2 minutes to read
- Yokohama
- Now Platform Security
The Key Management Framework (KMF) architecture introduces a key structure built with security in mind. Using a Hardware Security Module (HSM), KMF uses envelope encryption to ensure that all platform keys under KMF management are protected through a chain of keys. Customer Data Encryption Keys (CDEKs) created by KMF are also included.
At the instance level, KMF defines several keys that are used internally for varying cryptographic purposes throughout the ServiceNow AI Platform.
Envelope encryption is the practice of encrypting a key with another key. The following figure provides an example of the envelope encryption. Here, CDEKs are envelope encrypted by the IKEK, which in turn is envelope encrypted by the IRK, which is finally envelope encrypted by the RK. Since the IRK can only be accessed by the HSM, the IKEK must be uploaded for decryption.
This table provides examples of a subset of available customer/app keys that are managed and protected by KMF.