<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question I have several questions regarding the encryption module. in Community Central forum</title>
    <link>https://www.servicenow.com/community/community-central-forum/i-have-several-questions-regarding-the-encryption-module/m-p/3402381#M5044</link>
    <description>&lt;P&gt;I have several questions regarding the encryption module.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. Considering that the selected encryption algorithm or key length may become compromised in the future, is it possible to configure ServiceNow to allow for the replacement of cryptographic modules?&lt;BR /&gt;Additionally, is it possible to standardize the application interfaces for cryptographic modules in advance?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2.Can we switch to another secure cipher immediately when the current one becomes unusable?&lt;BR /&gt;Also, since vulnerabilities can arise depending on how the cipher is used (e.g., operating mode), is it possible to select a secure combination (e.g., algorithm + mode + key length)?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;3.Is the ServiceNow cryptographic module certified based on ISO/IEC 19790?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;4.The critical private keys used for decrypting encrypted data and performing digital signatures must be stored in tamper-resistant cryptographic modules to protect them from unauthorized tampering or access.&lt;BR /&gt;To what extent is ServiceNow's tamper resistance guaranteed?&lt;/P&gt;</description>
    <pubDate>Fri, 10 Oct 2025 02:45:21 GMT</pubDate>
    <dc:creator>SotaT</dc:creator>
    <dc:date>2025-10-10T02:45:21Z</dc:date>
    <item>
      <title>I have several questions regarding the encryption module.</title>
      <link>https://www.servicenow.com/community/community-central-forum/i-have-several-questions-regarding-the-encryption-module/m-p/3402381#M5044</link>
      <description>&lt;P&gt;I have several questions regarding the encryption module.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. Considering that the selected encryption algorithm or key length may become compromised in the future, is it possible to configure ServiceNow to allow for the replacement of cryptographic modules?&lt;BR /&gt;Additionally, is it possible to standardize the application interfaces for cryptographic modules in advance?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2.Can we switch to another secure cipher immediately when the current one becomes unusable?&lt;BR /&gt;Also, since vulnerabilities can arise depending on how the cipher is used (e.g., operating mode), is it possible to select a secure combination (e.g., algorithm + mode + key length)?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;3.Is the ServiceNow cryptographic module certified based on ISO/IEC 19790?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;4.The critical private keys used for decrypting encrypted data and performing digital signatures must be stored in tamper-resistant cryptographic modules to protect them from unauthorized tampering or access.&lt;BR /&gt;To what extent is ServiceNow's tamper resistance guaranteed?&lt;/P&gt;</description>
      <pubDate>Fri, 10 Oct 2025 02:45:21 GMT</pubDate>
      <guid>https://www.servicenow.com/community/community-central-forum/i-have-several-questions-regarding-the-encryption-module/m-p/3402381#M5044</guid>
      <dc:creator>SotaT</dc:creator>
      <dc:date>2025-10-10T02:45:21Z</dc:date>
    </item>
    <item>
      <title>Re: I have several questions regarding the encryption module.</title>
      <link>https://www.servicenow.com/community/community-central-forum/i-have-several-questions-regarding-the-encryption-module/m-p/3409742#M5161</link>
      <description>&lt;P&gt;Great questions—this boils down to algorithm agility, certified, and key custody. In practice I’d aim for: AES-256 with AEAD (GCM), strict mode/config baselines, short rotation windows, and re-encryption workflows to swap ciphers. Keep private keys in an HSM or external KMS (KMIP/PKCS#11), and audit via the ServiceNow Trust site. For ISO/IEC 19790/FIPS 140-3 specifics, open a Now Support ticket with Security/Edge Encryption.&lt;/P&gt;</description>
      <pubDate>Tue, 21 Oct 2025 21:00:35 GMT</pubDate>
      <guid>https://www.servicenow.com/community/community-central-forum/i-have-several-questions-regarding-the-encryption-module/m-p/3409742#M5161</guid>
      <dc:creator>stevemarkovick</dc:creator>
      <dc:date>2025-10-21T21:00:35Z</dc:date>
    </item>
  </channel>
</rss>

