www.adaptive-shield.com
Open in
urlscan Pro
34.249.200.254
Public Scan
Submitted URL: https://info.adaptive-shield.com/e3t/Ctc/OQ+113/cYqwz04/VX35jw7nhckzW5t3rmK73GRfJW2dmkKk554TkNN3_3-Js3lYMRW8wLKSR6lZ3pnN9l6VQ8JSK...
Effective URL: https://www.adaptive-shield.com/blog/breach-debrief-series-servicenow-data-exposure?utm_medium=email&_hsmi=279972416&_hsenc=p2AN...
Submission: On October 26 via api from ES — Scanned from ES
Effective URL: https://www.adaptive-shield.com/blog/breach-debrief-series-servicenow-data-exposure?utm_medium=email&_hsmi=279972416&_hsenc=p2AN...
Submission: On October 26 via api from ES — Scanned from ES
Form analysis
0 forms found in the DOMText Content
By clicking "accept all cookies" you agree to storing cookies on your device to enhance navigation, analyze site usage and assist in our marketing efforts. This website uses cookies to ensure you get the best experience. Get more info Cookies settings Accept all cookies Decline request a demo Platform PLATFORM FEATURES AND FUNCTIONALITIES * All Features * Saas Posture by Domain * SaaS Posture by Application * SaaS Compliance Frameworks * SaaS Security Checks * Alerts * Remediation * User Inventory * 3rd Party App Inventory * Device Inventory * Resource Inventory * Activity Monitoring * Posture Over Time * Role Based Access Control * Threat Center INTEGRATIONS * All Supported Applications * R&D * BI & Analytics * Collaboration & Communication * HR, Finance & Legal * IT & Security * Sales & Marketing * Unified Endpoint Management Integrations GET IN TOUCH * See a Demo Download the Solution Brief: SaaS Security Posture Management Get Solution Brief Use Cases USE CASES CAPABILITIES * All Use Cases * SaaS Misconfiguration Management * Identity & Access Governance * SaaS-to-Saas Access and Discovery * Device-to-SaaS Risk Management * Identity Threat Detection & Response BY CATEGORY * What is SSPM? * SSPM vs. CSPM * SSPM vs. Manual Checks * SSPM vs. CASB TOP 10 APPS * Microsoft 365 * Google Workspace * Salesforce * GitHub * Okta * Zoom * Teams * Slack * ServiceNow * Workday Kickstarting Your SaaS Security Program Download Resources RESOURCES LIBRARY * All Resources * Whitepapers & Reports * Webinars & Videos * Analyst Reports * Solution Briefs / Datasheets BLOG * All Blogs * SaaS Security * Compliance * Research * Company News * Recaps & Spotlights * Use Cases * Benchmarks for SaaS Apps * SaaS in the real world * Breach Debrief The Ultimate SaaS Security Posture Management Checklist 2023 Download The Ultimate SaaS Security Posture Management Checklist 2023 Download Partners PARTNERS PARTNERS * Business Partners * Tech Partners * Partner Portal Partners Partner with Adaptive Shield and become part of our partner ecosystem Partner with Us Company COMPANY COMPANY * About Us * News * Events * Careers Company Learn all about life at Adaptive Shield Explore Our Opportunities Sign in Follow Us Sign in request a demo SERVICENOW DATA EXPOSURE Adaptive Shield Team October 25, 2023 share: Earlier this week, ServiceNow announced on its support site that misconfigurations within the platform could result in “unintended access” to sensitive data. For organizations that use ServiceNow, this security exposure is a critical concern that can result in a major data leakage of sensitive corporate data. ServiceNow is a cloud-based platform used for automating IT service management, IT operations management, and IT business management for customer service, as well as HR, security operations, and a wide variety of additional domains. This SaaS application is considered to be one of the top business-critical applications due to its infrastructural nature, extensibility as a development platform, and access to confidential and proprietary data throughout the organization. Simple List is an interface widget that pulls data that is stored in tables and uses them in dashboards. The default configuration for Simple List allows the data in the tables to be accessed remotely by unauthenticated users. These tables include sensitive data, including content from IT tickets, internal classified knowledge bases, employee details, and more. These misconfigurations have actually been in place since the introduction of Access Control Lists in 2015. To date, there were no reported incidents as a result. However, considering the recent publication of the data leakage research, leaving it unresolved can now expose companies more than ever. INSIDE THE SERVICENOW MISCONFIGURATIONS It’s important to point out that this issue was not caused by a vulnerability in ServiceNow’s code but by a combination of configurations that exist throughout the platform. This issue stems from security controls in a ServiceNow Access Control List (ACL) widget called Simple List, which puts records into easily readable tables. These tables organize information from multiple sources and have configurations with a default setting of Public Access. Because these tables are the core of ServiceNow, the issue isn’t contained within a single setting that can be fixed. Potentially, this needs to be remediated in multiple locations within the application in combination with the usage of the UI widget, and throughout all tenants. To further complicate the issue, changing a single setting could break existing workflows connected to the Simple List tables, causing severe disruption of existing processes. On the other hand, leaving these tables and applications exposed could have major security implications now that this issue has received so much attention. REMEDIATION STEPS We encourage all ServiceNow customers to review the recent guidance published by ServiceNow in their knowledge base article – General Information | Potential Public List Widget Misconfiguration. To summarize, exposure assessment and remediation measures shall include: * Review Access Control Lists (ACLs) that either are entirely empty or, alternately, contain the role “Public” * Review public widgets and set the “Public” flag to false where it is not aligned with their use cases * Consider using stricter access control measures using built-in controls offered by ServiceNow, such as IP Address Access Control or Adaptive Authentication * Consider installing ServiceNow Explicit Roles Plugin. ServiceNow states that the plugin prevents external users from accessing internal data and instances using this plugin are not affected by this issue (the plugin ensures that every ACL declares at least one role requirement) AUTOMATE DATA LEAKAGE PREVENTION FOR SERVICENOW Organizations that use a SaaS Security Posture Management (SSPM) solution are able to gain visibility into ServiceNow’s configurations and remediate the issue based on the recommendations. Image 1: Adaptive Shield dashboard with the compliance framework: ServiceNow KB1553688 - Public List Widget Misconfiguration COMPLIMENTARY ASSESSMENT TO QUANTIFY EXPOSURE To help organizations secure ServiceNow, Adaptive Shield is offering a free ServiceNow assessment for this issue. After a quick validation of your org, our Security research team will send you a report detailing any exposure your portals may have from this misconfiguration. Click here to request the complimentary assessment. ABOUT THE WRITER Adaptive Shield Team Businesses today run nearly every facet of their operations using a wide array of interconnected SaaS apps. Adaptive Shield’s team is here to keep you informed as well as help you secure your SaaS estate. SERVICENOW DATA EXPOSURE Earlier this week, ServiceNow acknowledged a misconfiguration that could expose sensitive corporate information to the public. In this blog, we analyze the issue, explaining why this critical application misconfiguration could have serious consequences for businesses, and offer remediation guidance. Read more Adaptive Shield Team ● June 9, 2021 ENSURING BUSINESS CONTINUITY IN TIMES OF WAR At Adaptive Shield, our commitment to our team as well as to our customer’s business continuity are unwavering. This blog aims to shed light on the measures we are taking to ensure business continuity during these uncertain times. Read more Maor Bin ● June 9, 2021 RIGHT SIZING PERMISSIONS ACROSS THE SAAS STACK Customizing permission sets that match the needs of employees is not always easy, but right-sizing permissions across the SaaS stack is crucial in keeping data protected. Read more Arye Zacks ● December 28, 2022 request a demo Solution By Use CaseWhat is SSPMGet in touch Platform Sign inFeatures & FunctionalitiesIntegrations Resources LibraryBlog Partners Business PartnersTech Partners Company AboutNewsEventsCareers 2023 Adaptive Shield All rights reserved Trust Center ›Privacy Policy ›Terms › GDPR Compliant ISO 27001 Certified ISO 27701 Certified SOC 2 Compliant Cyber GRX