ServiceNow Integration
The Infracast ServiceNow integration connects to your ServiceNow instance to:
- Sync discovered assets to the ServiceNow CMDB as Configuration Items (CIs)
- Create incidents from Infracast findings
- Sync POA&M items to ServiceNow GRC (Build 34+)
Prerequisites
- ServiceNow instance (Tokyo release or later recommended)
- A ServiceNow service account with the following roles:
cmdb_adminorasset— for CMDB CI creation/updateincident_manageroritil— for incident creationsn_grc_analyst— for GRC/POA&M sync (optional)
- Network connectivity from Infracast to your ServiceNow instance (HTTPS/443)
Creating a ServiceNow Service Account
- Log into ServiceNow as an administrator
- Navigate to User Administration → Users → New
- Fill in: First name, Last name, User ID (e.g.,
infracast-svc), Email - Set a strong password and uncheck Password needs reset
- Go to the Roles tab and add:
asset(for CMDB)itil(for incidents)sn_grc_analyst(for GRC, if applicable)
- Submit
Use a non-interactive service account for Infracast. This ensures the account's password doesn't expire under your standard user password policy. Set the account's Password expiration policy to Never or use OAuth token authentication.
Configuring the Integration
Navigate to Settings → Integrations → Add Integration → ServiceNow:
| Field | Description |
|---|---|
| Instance URL | Your ServiceNow instance URL, e.g., https://yourcompany.service-now.com |
| Username | ServiceNow service account username |
| Password | Service account password |
| CMDB Sync Enabled | Toggle to push discovered assets as CIs |
| CI Class Mapping | Map Infracast asset types to ServiceNow CI classes (see below) |
| Incident Creation Enabled | Toggle to auto-create incidents from findings |
| Incident Assignment Group | ServiceNow group to assign new incidents to |
| Minimum Severity | Minimum finding severity to create an incident (e.g., High) |
| POA&M Sync Enabled | Toggle for GRC POA&M sync (requires Build 34+) |
CMDB Sync
When CMDB sync is enabled, Infracast pushes discovered assets to ServiceNow's CMDB on each discovery run. The default CI class mappings are:
| Infracast Asset Type | ServiceNow CI Class |
|---|---|
aws.ec2.instance | cmdb_ci_vm_instance |
azure.vm | cmdb_ci_vm_instance |
kubernetes node | cmdb_ci_kubernetes_node |
windows.server | cmdb_ci_win_server |
cisco.device | cmdb_ci_netgear |
vmware.vm | cmdb_ci_vmware_instance |
Custom mappings can be added in the integration configuration UI.
CMDB CI fields populated:
- Name, IP address, MAC address
- Operating system and version
- Manufacturer, model
- Last discovered date (updated on each sync)
- Infracast node ID (stored in the
correlation_idfield for deduplication)
Incident Creation
When finding-based incident creation is enabled, Infracast creates a ServiceNow incident for each new finding that meets the configured severity threshold.
Incident fields populated:
- Short description:
[Infracast] {Finding title} on {Asset name} - Description: Full finding details, affected asset, remediation guidance
- Category:
Security - Impact / Urgency: Derived from finding severity (Critical → Impact 1, High → Impact 2, etc.)
- Assignment group: As configured
- CMDB CI: Linked to the affected CI if it exists in the CMDB
Infracast tracks the ServiceNow incident number to avoid creating duplicates for the same finding.
GRC / POA&M Sync (Build 34+)
GRC integration requires Infracast Build 34 or later and the ServiceNow GRC module (sn_grc).
POA&M items created in Infracast are synced to ServiceNow GRC as Risk Statements or Issues (configurable). The sync is bidirectional — status updates made in ServiceNow are reflected in Infracast.
Synced fields:
- Title, description, due date
- Assigned user/team
- Status (Open → In Progress → Resolved mapping)
- Linked findings
Troubleshooting
401 Unauthorized or 403 Forbidden
Symptom: Test connection fails with auth error
Checks:
- Verify username/password are correct
- Confirm the user account is active and not locked out: User Administration → Users → [account]
- Verify the account has the required roles
CMDB CIs not appearing after sync
Symptom: Sync completes but CIs are not visible in ServiceNow
Checks:
- Check the sync logs in Settings → Integrations → [integration] → Logs
- Verify the service account has
cmdb_adminorassetrole - Check if a ServiceNow transform map or Discovery source restriction is filtering out the CIs
Duplicate incidents being created
Symptom: Multiple ServiceNow incidents exist for the same Infracast finding
Cause: This can occur if the Infracast database was reset or the integration was re-created.
Fix: The integration uses the finding's unique ID as a correlation key. Re-link existing incidents by setting the correlation_id field on them to the Infracast finding ID. Contact support if the issue persists.
POA&M sync not working (Build 34)
Symptom: POA&M items are not appearing in ServiceNow GRC
Checks:
- Confirm you are running Infracast Build 34 or later: Settings → About
- Verify the GRC module is installed in ServiceNow:
sn_grcplugin - Confirm the service account has the
sn_grc_analystrole