TechnicalReading time: 9 minutes

Complete Guide to N-1 Compliance in ServiceNow

Everything you need to know about maintaining N-1 version compliance and why it matters for your organization.

What Is N-1 Compliance?

ServiceNow releases two major platform versions every year, each named after a city. These releases follow an alphabetical naming convention: Paris, Quebec, Rome, San Diego, Tokyo, Utah, Vancouver, Washington DC, Xanadu, and so on. At any point in time, the most recently released version is called "N", and the version immediately before it is "N-1".

N-1 compliance means your ServiceNow instance is running either the current release (N) or the immediately previous release (N-1). If your instance is two or more versions behind the latest, you are considered "N-2" or worse, and you fall outside the N-1 compliance window.

Example: If ServiceNow's latest release is Xanadu (N), then Washington DC is N-1. An instance still running Vancouver would be N-2, and one on Utah would be N-3.

ServiceNow's release cadence is predictable. A new major version typically lands in the first half of the year (around March) and a second in the second half (around September). Each release includes new features, security patches, performance improvements, and platform enhancements. Staying within N-1 means your organization is never more than one version behind the innovation curve.

DesignationMeaningSupport Status
NCurrent (latest) releaseFull support
N-1One version behind currentFull support
N-2Two versions behind currentLimited support
N-3+Three or more versions behindEnd of life / no support

Why N-1 Compliance Matters

Staying N-1 compliant is not just a best practice. It is a strategic requirement that affects security, support, functionality, and your bottom line.

Security Patches

ServiceNow delivers critical security fixes through patches applied to supported versions. If your instance is outside the N-1 window, you stop receiving these patches. Known vulnerabilities in older versions remain unpatched, making your instance a target for exploitation.

Support Eligibility

ServiceNow's support team only provides full technical assistance for N and N-1 versions. If you open a case on an N-2 or older release, support may require you to upgrade before they will investigate your issue. This can turn a routine support request into a months-long upgrade project.

New Features and Capabilities

Each release introduces significant new capabilities: AI-driven features, improved user experience components, workflow enhancements, and platform performance improvements. Falling behind means your teams cannot leverage tools that competitors are already using.

Store App Compatibility

Many third-party applications on the ServiceNow Store are certified only for N and N-1 versions. Running an older release limits the ecosystem of plugins and integrations available to you, and existing store apps may stop receiving updates.

Contractual Obligations

Some ServiceNow contracts include clauses requiring N-1 compliance. Falling behind can put your organization in breach of its licensing agreement, potentially affecting renewal terms or triggering compliance reviews.

The Cost of Falling Behind

The difficulty of upgrading does not scale linearly. Each version you skip compounds the complexity, the number of breaking changes, and the testing effort required to get current.

Version GapUpgrade ComplexityTypical EffortRisk Level
N-1 to NLow2 to 4 weeksLow
N-2 to NModerate4 to 8 weeksMedium
N-3 to NHigh2 to 4 monthsHigh
N-4+ to NVery High4 to 8+ monthsCritical

Beyond the direct effort, falling behind creates cascading problems. Deprecated APIs accumulate, breaking changes stack up, and the number of skipped records after an upgrade grows significantly. Organizations that skip multiple versions often find themselves dedicating an entire team to the upgrade effort for months.

Real-world impact: An organization running an N-4 version may discover that hundreds of customizations reference deprecated APIs. Each one must be individually reviewed, refactored, and tested before the upgrade can proceed. What should have been a routine quarterly task becomes a major project with dedicated budget and staffing.

Common Upgrade Blockers

Understanding what typically blocks upgrades helps you avoid these pitfalls in the first place.

Customizations on Base Tables

Directly modifying out-of-the-box (OOB) records, such as Business Rules, Script Includes, or UI Policies on core tables, creates conflicts when ServiceNow updates those same records in a new release. The upgrade engine flags these as "skipped" records, requiring manual review and resolution.

Deprecated API Usage

ServiceNow deprecates APIs over time, providing replacements with better performance and security. Scripts that rely on deprecated methods, such as older GlideRecord patterns or legacy AJAX calls, may break entirely after an upgrade when those APIs are removed.

Skipped Plugins

Plugins that were activated in earlier versions may have dependencies or structural changes in newer releases. If a plugin upgrade fails, it can block the entire platform upgrade process.

Third-Party Integrations

Integrations with external systems often depend on specific ServiceNow APIs, table structures, or behaviors that may change between versions. Without a thorough integration inventory, upgrades can silently break data flows between systems.

Insufficient Testing

Organizations that lack automated test suites or dedicated QA resources often delay upgrades because they cannot confidently validate that everything still works. Without a repeatable testing process, every upgrade becomes a high-risk event.

Planning Your Upgrade Path

A successful upgrade requires structured planning across four phases.

Phase 1: Assessment

Before touching any instance, conduct a thorough assessment:

  • Inventory all customizations on OOB records
  • Identify deprecated API usage across all scripts
  • Catalog third-party integrations and their version dependencies
  • Review plugin activation status and compatibility
  • Document current performance baselines for comparison

Phase 2: Sandbox Testing

Upgrade a sub-production instance first:

  • Clone production to a sandbox or development instance
  • Run the upgrade preview to identify potential conflicts
  • Execute the upgrade and review all skipped records
  • Run automated tests (ATF) and manual regression testing
  • Validate integrations against the upgraded instance

Phase 3: Staged Rollout

Promote the upgrade through your instance hierarchy:

  • Upgrade development instances first
  • Move to test or staging instances
  • Validate with UAT (user acceptance testing)
  • Schedule production upgrade during a low-traffic window

Phase 4: Go-Live Checklist

Before and after the production upgrade:

  • Notify stakeholders and set up a war room
  • Confirm rollback plan and backup availability
  • Monitor system health dashboards during and after upgrade
  • Execute smoke tests on critical business processes
  • Review and resolve any post-upgrade skipped records

Pre-Upgrade Checklist

Use this checklist before initiating any upgrade. Missing even one of these items can lead to unexpected downtime or data issues.

Instance Readiness

  • ☐ Review the ServiceNow release notes and known issues for the target version
  • ☐ Run the upgrade preview and export the results
  • ☐ Identify and document all skipped records from the preview
  • ☐ Check for customization conflicts on OOB records
  • ☐ Verify all active plugins are compatible with the target version
  • ☐ Confirm sufficient instance storage and performance capacity

Code and Configuration

  • ☐ Scan all scripts for deprecated API calls
  • ☐ Review Business Rules that reference OOB script includes
  • ☐ Check Client Scripts for compatibility with new UI frameworks
  • ☐ Validate all REST and SOAP integrations against the target version
  • ☐ Ensure all update sets are committed or backed out (no open sets)
  • ☐ Verify scoped app compatibility with the target release

Testing and Rollback

  • ☐ Prepare and validate ATF test suites for critical processes
  • ☐ Define smoke test scripts for post-upgrade validation
  • ☐ Document rollback procedures and assign owners
  • ☐ Confirm backup instance is current and accessible
  • ☐ Schedule UAT sessions with business stakeholders

Managing Customizations for Upgradability

The way you build customizations today determines how painful your next upgrade will be. Following these principles dramatically reduces upgrade friction.

Use Update Sets Properly

Group related changes into logically named update sets. Avoid the default update set for any production-bound changes. Each update set should represent a single feature or fix, making it easy to promote, back out, or review during upgrades.

Avoid Direct OOB Modifications

Never modify out-of-the-box records directly. Instead:

  • Create new Business Rules instead of editing OOB ones
  • Use "insert and stay" to create copies of OOB UI Policies
  • Extend OOB Script Includes rather than modifying them
  • Use UI Macros or custom widgets instead of editing base layouts

Every OOB modification creates a potential skipped record during upgrades. The fewer you have, the smoother your upgrades will be.

Scoped Apps vs. Global Scope

Build new functionality in scoped applications whenever possible. Scoped apps are isolated from the global namespace, reducing the chance of conflicts during upgrades. They also make it easier to identify, export, and manage your custom code as a discrete unit. Global scope should be reserved for changes that truly need platform-wide access.

Rule of thumb: If you can build it in a scoped app, build it in a scoped app. If you must modify global scope, document the reason and create a plan for reviewing it during upgrades.

Testing Strategies

Comprehensive testing is the single most important factor in a successful upgrade. Without it, you are flying blind.

Upgrade Preview

ServiceNow provides an upgrade preview tool that simulates the upgrade process without making changes. It generates a report of expected skipped records, plugin conflicts, and potential issues. Always run the preview first and review the results with your development team before proceeding.

Automated Test Framework (ATF)

ATF is ServiceNow's built-in testing tool. Use it to create automated tests for:

  • Critical business processes (incident creation, change approval workflows)
  • Custom Business Rules and Script Includes
  • Form behavior and field validations
  • Integration endpoints and data flows
  • Role-based access control scenarios

Maintaining a robust ATF suite means you can validate your entire platform in minutes after an upgrade rather than spending weeks on manual testing.

Regression Testing

Beyond automated tests, conduct manual regression testing on high-impact workflows. Engage business stakeholders to validate that end-to-end processes work as expected. Document test cases, assign ownership, and track pass/fail results in a structured format. Pay special attention to areas where customizations interact with OOB functionality.

Maintaining Compliance Long-Term

Getting to N-1 is only half the battle. Staying there requires ongoing discipline and governance.

Establish Governance Policies

Create formal policies that define:

  • Maximum acceptable version lag (e.g., never beyond N-1)
  • Upgrade cadence (e.g., within 6 months of each new release)
  • Roles and responsibilities for upgrade planning and execution
  • Approval process for OOB modifications
  • Mandatory use of scoped apps for new development

Maintain an Upgrade Cadence

Treat upgrades as a recurring operational activity, not a one-time project. Block time on your team's calendar for upgrade preparation, testing, and execution every release cycle. The more routine upgrades become, the less disruptive they are. Teams that upgrade every cycle spend far less total effort than teams that skip releases and then scramble to catch up.

Continuous Monitoring

Set up ongoing monitoring to catch compliance risks early:

  • Track OOB modification count and trend over time
  • Monitor deprecated API usage in new code submissions
  • Alert when new ServiceNow releases are announced
  • Review plugin update availability quarterly
  • Audit scoped app compatibility with each new release

Pro tip: Assign an "upgrade champion" on your team who monitors the ServiceNow release calendar, tracks your customization footprint, and owns the upgrade readiness process. Having a single point of accountability prevents upgrades from slipping through the cracks.

How AI Can Help

The most time-consuming part of upgrade preparation is the manual audit: reviewing hundreds of scripts, identifying deprecated patterns, and cataloging customization conflicts. This is exactly where AI excels.

snowcoder can accelerate your N-1 compliance efforts in several ways:

  • Deprecated API Detection: snowcoder scans your scripts and flags usage of deprecated methods, providing recommended replacements that are compatible with the target release.
  • Customization Impact Analysis: Quickly identify which of your customizations touch OOB records and assess the likelihood of upgrade conflicts.
  • Code Refactoring: snowcoder can refactor scripts that use legacy patterns into modern, upgrade-safe alternatives, reducing your manual remediation effort.
  • Test Generation: Automatically generate ATF test cases for your critical business processes, helping you build the testing coverage needed for confident upgrades.
  • Upgrade Readiness Reports: Get a comprehensive view of your instance's upgrade readiness, including a prioritized list of blockers and recommended remediation steps.

Instead of spending weeks manually auditing your instance before each upgrade, snowcoder can surface the critical issues in minutes, letting your team focus on resolution rather than discovery.

Conclusion

N-1 compliance is not a bureaucratic checkbox. It is a fundamental practice that keeps your ServiceNow instance secure, supported, and competitive. Organizations that treat upgrades as a routine operational cadence rather than a dreaded project consistently spend less time, less money, and face fewer risks than those that fall behind.

The keys to sustainable N-1 compliance are straightforward: minimize OOB modifications, build in scoped apps, maintain automated test coverage, and establish a governance framework that keeps your team accountable. When you combine these practices with AI-powered tooling that automates the tedious audit and remediation work, staying current becomes far less painful.

Start by assessing where you stand today. Run an upgrade preview, inventory your customizations, and identify your biggest blockers. The sooner you begin, the easier the path to compliance will be.

Ready to assess your N-1 compliance?

snowcoder can audit your instance and identify upgrade blockers automatically.

Try Now for Free

No credit card required.