Supergood | ServiceNow GRC API

Supergood | ServiceNow GRC API

Programmatically access ServiceNow GRC risk registers, controls, policies, assessments, audit engagements, findings, and vendor risk workflows with a stable REST API. Supergood builds and operates production-grade, unofficial ServiceNow GRC integrations so your team can automate compliance, risk, and audit processes without heavy custom engineering.

Plain English: ServiceNow GRC is governance, risk, and compliance software that centralizes policies, controls, risks, audits, and third‑party risk management. An unofficial API lets you programmatically pull risks, controls, policy obligations, assessments and attestations, audit engagements and findings, remediation tasks, vendor questionnaires, risk indicators (KRIs), and evidence—and push new records or updates back into ServiceNow.

For a regtech or audit startup integrating with ServiceNow GRC, this means you can ingest real‑time risk and control data to power dashboards, automate control testing and assessments from your application, sync audit findings and remediation tasks to issue trackers (e.g., Jira), execute vendor risk questionnaires with reminders and evidence collection, and enrich your platform with policy mappings and KRIs. You can also trigger attestations, attach evidence, update statuses and owners, and keep stakeholder systems (BI/analytics, ERP, ticketing, identity/SSO) in lockstep.

What is ServiceNow GRC?

ServiceNow GRC (https://www.servicenow.com/products/governance-risk-and-compliance.html) is a cloud platform for governance, risk, and compliance management that unifies policy, control, risk, audit, and third‑party workflows. Teams use ServiceNow GRC to document policies and obligations, define and map controls to frameworks (e.g., ISO 27001, NIST, SOC 2), assess risks and KRIs, run audits and manage findings, coordinate remediation tasks, and evaluate vendor risk using standardized questionnaires and tiering.

Core product areas include:

  • Policy & Compliance Management (Policies, Obligations/Requirements, Controls, Control Testing, Continuous Monitoring)
  • Risk Management (Risk Register, Analysis & Scoring, KRIs/Indicators, Mitigation Plans, Exceptions)
  • Audit Management (Audit Plans, Engagements, Workpapers, Evidence, Findings, Remediation)
  • Vendor Risk Management (Third‑Party/Vendor Profiles, Tiering, Questionnaires, Assessments, Risk Scores)
  • Integrated Risk Management (Cross‑domain reporting, automated workflows, issue management)

Common data entities:

  • Users, Groups, Roles/Permissions (Risk Owners, Control Owners, Auditors, Respondents)
  • Policies & Requirements (Sources/regulatory obligations, mappings)
  • Controls (metadata, status, owners, frameworks, testing cadence)
  • Risks (statements, categories, likelihood/impact, inherent/residual scores, KRIs)
  • Assessments & Attestations (questionnaires, respondents, evidence)
  • Audit Plans & Engagements (scopes, schedules, workpapers, findings)
  • Findings & Remediation Tasks (severity, owners, due dates, actions)
  • Vendors/Third Parties (profiles, tiering, assessments, risk ratings)
  • Evidence & Attachments (files, links, provenance)

The ServiceNow GRC Integration Challenge

GRC and audit teams rely on ServiceNow daily, but turning portal‑based workflows into API‑driven automation is non‑trivial:

  • Complex relationships: Controls map to multiple frameworks, obligations, and policies; risks link to controls, KRIs, issues, and mitigations
  • Role‑aware data: Risk owners, control owners, auditors, and vendor respondents see different fields, states, and actions
  • Workflow rigor: Assessments, attestations, approvals, and audit evidence require careful state handling and audit trails
  • Authentication complexity: SSO/MFA and domain separation complicate headless automation across instances/tenants
  • Evidence management: Large file uploads, checksums, and time‑limited URLs must be handled reliably

How Supergood Creates ServiceNow GRC APIs

Supergood reverse‑engineers authenticated browser flows and network interactions to deliver a resilient API endpoint layer for your ServiceNow GRC instance.

  • Handles username/password, SSO/OAuth, and MFA (SMS, email, TOTP) securely
  • Maintains session continuity with automated refresh and change detection
  • Normalizes responses so you can integrate once and rely on consistent objects across GRC modules
  • Aligns with customer entitlements, roles, and domain separation to ensure compliant access
  • Implements evidence upload/download with signed URLs and checksum validation

Use Cases

Risk & Control Data Sync

  • Mirror risks, controls, policies, and KRIs into your internal systems
  • Keep risk scores, owners, and mitigation statuses current for analytics and reporting
  • Normalize framework mappings (ISO, NIST, SOC 2) for multi‑tenant operations

Assessments & Attestations Automation

  • Generate control design/operating effectiveness assessments from your product
  • Trigger attestations with reminders, capture evidence, and update completion status
  • Model responses and exceptions, then push results back to ServiceNow

Audit Management & Findings

  • Pull audit engagements, workpapers, and findings into your audit pipeline
  • Push remediation tasks, owners, due dates, and status changes
  • Attach evidence, track acceptance/closure, and drive SLA alerts

Vendor Risk Intake & Monitoring

  • Initiate vendor questionnaires programmatically and collect responses
  • Sync vendor tiering, inherent/residual risk, and ratings to your platforms
  • Trigger follow‑ups, manage documents, and unify third‑party risk insights

KRI & Continuous Monitoring

  • Feed KRIs from external telemetry (e.g., security posture, identity events)
  • Evaluate thresholds and trigger control testing or risk escalation workflows
  • Maintain indicator history for trend analysis

Available Endpoints

Authentication

POST /sessions: Establish a session using instance credentials. Supergood manages MFA (SMS, email, TOTP) and SSO/OAuth when enabled. Returns a short‑lived auth token maintained by the platform.

curl --request POST \
  --url https://api.supergood.ai/integrations/<integration_id>/sessions \
  --header 'Authorization: Basic <Base64 encoded token>' \
  --header 'Content-Type: application/json' \
  --data '{
    "instanceUrl": "https://acme.service-now.com",
    "username": "[email protected]",
    "password": "<password>",
    "mfa": { "type": "totp", "code": "123456" }
  }'

Example response

{
  "authToken": "eyJhbGciOi...",
  "expiresIn": 3600,
  "user": {
    "id": "u_snow_3f91c0",
    "name": "GRC Admin",
    "email": "[email protected]",
    "entitlements": ["policy_compliance", "risk_management", "audit_management", "vendor_risk"]
  }
}

POST /sessions/refresh: Refresh an existing token to keep sessions uninterrupted.

Risks

GET /risks: List risks with filters, scores, and related controls/KRIs.

Query parameters

  • ownerId: string
  • status: open | mitigated | accepted | closed
  • category: operational | information_security | privacy | financial | compliance
  • framework: string (e.g., "ISO 27001")
  • updatedFrom, updatedTo: ISO 8601 timestamps
  • page, pageSize: integers for pagination

Example response

{
  "items": [
    {
      "riskId": "risk_b3e91a",
      "title": "Unauthorized Access to Sensitive Data",
      "riskStatement": "If privileged access is mismanaged, sensitive data may be exposed, leading to regulatory penalties and reputational damage.",
      "category": "information_security",
      "status": "open",
      "inherentLikelihood": 4,
      "inherentImpact": 5,
      "residualLikelihood": 2,
      "residualImpact": 3,
      "calculationMethod": "matrix",
      "owner": { "id": "u_snow_9af210", "name": "Risk Owner", "email": "[email protected]" },
      "relatedControls": [
        { "controlId": "ctl_iam_001", "name": "Privileged Access Review", "status": "active" },
        { "controlId": "ctl_mfa_002", "name": "MFA for Admin Accounts", "status": "active" }
      ],
      "kris": [
        { "kriId": "kri_login_anomalies", "name": "Anomalous Admin Logins", "value": 7, "threshold": 5, "status": "breached" }
      ],
      "mitigationDueDate": "2026-03-31",
      "tags": ["SOX", "ISO-27001"],
      "updatedAt": "2026-01-20T13:45:00Z"
    }
  ],
  "page": 1,
  "pageSize": 50,
  "total": 1
}

Controls

POST /controls: Create a control with framework mappings, testing cadence, and ownership.

curl --request POST \
  --url https://api.supergood.ai/integrations/<integration_id>/controls \
  --header 'Authorization: Bearer <authToken>' \
  --header 'Content-Type: application/json' \
  --data '{
    "name": "Privileged Access Review",
    "description": "Quarterly review of privileged accounts and entitlements.",
    "controlType": "detective",
    "status": "active",
    "ownerId": "u_snow_9af210",
    "frameworkMappings": [
      { "framework": "ISO 27001", "requirementId": "A.9.2.6" },
      { "framework": "SOC 2", "requirementId": "CC6.1" }
    ],
    "testingCadence": "quarterly",
    "testingMethod": ["design", "operating"],
    "relatedPolicyIds": ["pol_access_mgmt"],
    "evidenceRequirements": {
      "samplesPerTest": 10,
      "attachmentTypes": ["csv", "pdf"]
    },
    "attachments": [
      { "fileName": "procedure_priv_access_review.pdf", "uploadToken": "upl_08ab73" }
    ]
  }'

Example response

{
  "controlId": "ctl_iam_001",
  "status": "active",
  "mappedRequirementsCount": 2,
  "createdAt": "2026-01-21T10:03:11Z"
}

Assessments

POST /assessments: Create an assessment or attestation for a control, policy, or vendor.

curl --request POST \
  --url https://api.supergood.ai/integrations/<integration_id>/assessments \
  --header 'Authorization: Bearer <authToken>' \
  --header 'Content-Type: application/json' \
  --data '{
    "title": "Operating Effectiveness - Privileged Access Review",
    "type": "control_operating",
    "scope": { "controlId": "ctl_iam_001" },
    "dueDate": "2026-02-10",
    "assignees": [
      { "userId": "u_snow_qa_7741" },
      { "userId": "u_snow_ctrl_0920" }
    ],
    "questions": [
      { "code": "Q1", "text": "Provide evidence of Q4 privileged access review.", "responseType": "file", "required": true },
      { "code": "Q2", "text": "Were exceptions identified?", "responseType": "yes_no", "required": true },
      { "code": "Q3", "text": "Describe remediation actions.", "responseType": "text", "required": false }
    ],
    "notifyParticipants": true,
    "attachments": [
      { "fileName": "assessment_template.pdf", "uploadToken": "upl_7fa223" }
    ],
    "referenceId": "audit-eng-2026-PRV-01"
  }'

Example response

{
  "assessmentId": "asm_90e412",
  "status": "open",
  "dueDate": "2026-02-10",
  "recipientsCount": 2,
  "createdAt": "2026-01-21T11:20:44Z"
}

Audit Findings

PATCH /audits/{engagementId}/findings/{findingId}: Update a finding’s status, severity, remediation plan, and evidence.

curl --request PATCH \
  --url https://api.supergood.ai/integrations/<integration_id>/audits/eng_24Q1_iam/findings/fnd_7c3d21 \
  --header 'Authorization: Bearer <authToken>' \
  --header 'Content-Type: application/json' \
  --data '{
    "status": "in_progress",
    "severity": "high",
    "rootCause": "Lack of timely review due to manual process.",
    "remediationPlan": "Implement automated entitlement review with approval workflow.",
    "ownerId": "u_snow_ctrl_0920",
    "dueDate": "2026-02-28",
    "references": { "controlId": "ctl_iam_001" },
    "attachments": [
      { "fileName": "remediation_plan.docx", "uploadToken": "upl_2ab441" }
    ]
  }'

Example response

{
  "findingId": "fnd_7c3d21",
  "status": "in_progress",
  "severity": "high",
  "updatedAt": "2026-01-22T08:15:12Z"
}

Get full API Specs →


Technical Specifications

  • Authentication: Username/password with MFA (SMS, email, TOTP) and SSO/OAuth where enabled; supports service accounts or customer‑managed credentials
  • Response format: JSON with consistent resource schemas and pagination across GRC modules
  • Rate limits: Tuned for enterprise throughput while honoring customer entitlements and usage controls
  • Session management: Automatic reauth and cookie/session rotation with health checks
  • Data freshness: Near real‑time retrieval of risks, controls, assessments, audits, and vendor risk objects
  • Security: Encrypted transport, scoped tokens, audit logging; respects ServiceNow role‑based permissions and domain separation
  • Webhooks: Optional asynchronous delivery for long‑running workflows (e.g., attestations, audit finding updates, vendor assessments)

Performance Characteristics

  • Latency: Sub‑second responses for list/detail queries under normal load
  • Throughput: Designed for high‑volume risk/control sync and assessment/audit processing
  • Reliability: Retry logic, backoff, and idempotency keys minimize duplicate actions
  • Adaptation: Continuous monitoring for UI/API changes with rapid adapter updates

Getting Started

  1. Schedule Integration Assessment

Book a 30‑minute session to confirm your modules, licensing, and authentication model.

  1. Supergood Builds and Validates Your API

We deliver a hardened ServiceNow GRC adapter tailored to your workflows and entitlements.

  1. Deploy with Monitoring

Go live with continuous monitoring and automatic adjustments as ServiceNow evolves.

Schedule Integration Call →


Frequently Asked Questions

Q: Which ServiceNow GRC modules can this integration cover?

Supergood supports workflows across commonly used modules such as Policy & Compliance (Policies, Controls, Testing), Risk Management (Risk Register, KRIs, Mitigation), Audit Management (Engagements, Findings, Evidence), and Vendor Risk Management (Questionnaires, Tiering, Ratings), subject to your licensing and entitlements. We scope coverage during integration assessment.

Q: How are MFA and SSO handled for automation?

We support username/password + MFA (SMS, email, TOTP) and can operate behind SSO/OAuth when enabled. Sessions are refreshed automatically with secure challenge handling.

Q: Can you map controls to frameworks and obligations programmatically?

Yes. We can normalize framework/requirement identifiers (e.g., ISO 27001, NIST, SOC 2), enforce valid mappings, and update control metadata while complying with permission and workflow constraints. We also preserve audit trails for changes.

Q: Do you support vendor questionnaires and evidence attachments?

Yes. We can initiate and track vendor assessments, collect responses and evidence via signed uploads, validate checksums, and update statuses and risk ratings with webhooks or polling.



Ready to automate your ServiceNow GRC workflows?

Supergood can have your ServiceNow GRC integration live in days with no ongoing engineering maintenance.

Get Started →

Read more