01-PAM-ADMIN-Introduction to-CyberArk-PAM
01-PAM-ADMIN-Introduction to-CyberArk-PAM
In today’s environment
almost any identity can be privileged under certain conditions
STOP LATERAL
LATERAL&&VERTICAL
VERTICALMOVEMENT
MOVEMENT
PREVENT CREDENTIAL
CREDENTIAL THEFT
THEFT
Remote Vendor
Internal
Attacker
IT Admin
Business
User
External
Attacker Developer
Robot
Internal Application
Attacker
EXISTING
• Privilege escalation
ACCESS
Move Laterally Perform
• Repeat
Internal Threats Reconnaissance
Escalate
Privileges
External Threats
Disrupt Business
Network Perimeter
Exfiltrate Data
PERIMETER
COMPROMISE
EXISTING
• Privilege escalation
ACCESS
Move Laterally Perform
• Repeat
Internal Threats Reconnaissance
Escalate
Escalate
Privileges
Privileges
External Threats
Disrupt Business
Network Perimeter
Exfiltrate Data
PERIMETER
COMPROMISE
Network
Targeted detection
Endpoints
Insider Devices • Continuous monitoring
• Malicious behavior
External • High risk behavior
Industrial
Insider Controls Social Media
• Alerts
External
Real-time response
• Session suspension/termination
Privileged Accounts • Full forensics record of activity
and length
⎼ Rotation frequency Digital
Vault
⎼ Etc. System User Pass
Unix root tops3cr3t
Enterprise IT Environment
Direct RDP
Connection
CyberArk can
automatically
rotate credentials
in the event of
risky behavior such
as credential theft,
bypassing the Additionally, administrators can
Digital Vault establish policies to either automatically
suspend or terminate privileged
sessions based on risk assignment
• Secure and manage • Secure jump-server • Record privileged • View privileged activity • Suspend and/or
privileged passwords, to control credentials sessions and store in by going directly to terminate privileged
SSH keys and other in an isolated centralized specified activities, sessions automatically
secrets instance repository keystrokes, etc. based on risk score
and activity
• Continually scan the • Connect via secure • Audit logs of video • Send automatic alerts
environment to detect jump server using a recording stored to SOC and IT admins • Initiate automatic
privileged accounts variety of native automatically based on risky credential rotation
and credentials workflows activities based on risk in case
• Automatically start
of compromise/theft
• Add accounts to • Prevent malware viewing riskiest • Reduce the number of
pending to validate attacks and control sessions first, at the accounts that can be
privilege or privileged access point of most used to circumvent
automatically suspicious activities privileged controls
onboard and rotate
Automation with Rest APIs and policies enhances Core PAS functionality
Password Vault Web Access • The web interface for users to gain access to privileged account information
(PVWA) • Used by Vault administrators to configure policies
Password Vault
Web Access
Central Policy
Manager Managed
Custom Applications, Target Account
Reporting Tools, etc. and Servers
Vault
PrivateArk Client
Unix/Windows
Vault Application Target Databases
Administrators Providers
Privileged Threat
Analytics
Unix/Windows Users
Discretionary Mandatory
Session File
Firewall Authentication Access Access Auditing
Encryption Encryption
Control Control
Auditors
PVWA
PTA CPM PSM
IT
Auditors/IT Auditors/IT
IT Environment IT Environment
• Mostly used by
administrators for certain
tasks that are not
implemented in PVWA
HTTP CyberArk
• The PAM Web Services is a LOGON Authenticate user
RESTful API that enables HTTP Response code: 200 Success
users to create, list, modify,
CyberArkLogonResult=
and delete entities in PAM AAEAAAD/////AQAAAA
using programs and scripts. AAAAAMAgAAAFhDe
WJlckFyay5TZXJ2aWN
lcy5XZWIsIFZlcnNpb24
• The main purpose of the PAM 9OC4w
• Online documentation
• Knowledge base
• Training
• Enhancement
Requests
• Marketplace
• Published online
Introduction to Privileged
Additional
DNA zBang DNA
Access Management