01-PAM-ADMIN Introduction To CyberArk PAM
01-PAM-ADMIN Introduction To CyberArk PAM
In today’s environment
almost any identity can be privileged under certain conditions
7
STOP LATERAL
LATERAL&&VERTICAL
VERTICALMOVEMENT
MOVEMENT
PREVENT CREDENTIAL
CREDENTIALTHEFT
THEFT
Remote Vendor
Internal
Attacker
IT Admin
Business
User
External
Attacker Developer
Robot
10
Internal Application
Attacker
11
12
13
14
Network
Targeted detection
Endpoints
Insider Devices • Continuous monitoring
̶ Malicious behavior
External ̶ High risk behavior
Industrial
Insider Controls Social Media
• Alerts
External
Real-time response
• Session suspension/termination
Privileged Accounts • Full forensics record of activity 15
16
17
length
Digital
– Rotation frequency Vault
System User Pass
– Etc. Unix root tops3cr3t
Enterprise IT Environment 18
isolated, privileged
credentials are not exposed
to end users or their
applications or devices.
• Target systems are configured RDP
Target
not to accept direct connection Server
PSM
Direct RDP
Connection
19
20
21
• Secure and manage • Secure jump-server • Record privileged • View privileged activity • Suspend and/or
privileged passwords, to control credentials sessions and store in by going directly to terminate privileged
SSH keys and other in an isolated centralized specified activities, sessions automatically
secrets instance repository keystrokes, etc. based on risk score
and activity
• Continually scan the • Connect via secure • Audit logs of video • Send automatic alerts
environment to detect jump server using a recording stored to SOC and IT admins • Initiate automatic
privileged accounts variety of native automatically based on risky credential rotation
and credentials workflows activities based on risk in case
• Automatically start
of compromise/theft
• Add accounts to • Prevent malware viewing riskiest • Reduce the number of
pending to validate attacks and control sessions first, at the accounts that can be
privilege or privileged access point of most used to circumvent
automatically suspicious activities privileged controls
onboard and rotate
23
Automation with Rest APIs and policies enhances Core PAS functionality
Copyright © 2021 CyberArk Software Ltd. All rights reserved. CLICK “NEXT” TO CONTINUE cyberark.com
System Architecture
24
Password Vault Web • The web interface for users to gain access to privileged account information
Access (PVWA) • Used by Vault administrators to configure policies
Privilege Threat
• Monitors and detects malicious privileged account behavior.
Analytics (PTA)
End Users:
IT Staff, Auditor, etc. Privileged Session
Manager
Password Vault
Web Access
Central Policy Managed
Manager Target Account
Custom Applications, and Servers
Reporting Tools, etc.
Vault
Unix/Windows
PrivateArk Client
Application
Providers
Vault Target Databases
Administrators Privileged
Threat Analytics
26
Unix/Windows Users
Copyright © 2021 CyberArk Software Ltd. All rights reserved. cyberark.com
Stored
Vault User Credential
Discretionary Mandatory
Session File
Firewall Authentication Access Access Auditing
Encryption Encryption
Control Control
27
IT
Auditors/IT Auditors/IT
IT Environment IT Environment
28
London Hong Kong
DR Site
Copyright © 2021 CyberArk Software Ltd. All rights reserved. cyberark.com
System Interfaces • PVWA
and Utilities • PrivateArk Client
• PACLI
• PAM Web Services (REST API)
• Vault Central Administration Station
• Remote Control Client
29
31
• Mostly used by
administrators for certain
tasks that are not
implemented in PVWA
32
33
35
Vault PARCLIENT>
36
37
38
• Published online
• Easily searchable
information
39
40
41
Introduction to Privileged Access Management • Getting to Know the Acme Corp Environment
̶ Acme Servers
(login required)
• Getting to Know CyberArk PAS
• PrivateArk Client
̶ Connecting
Videos ̶ Accessing a File in a Safe
̶ Modifying the View