Privileged Session Management pt1
Privileged Session Management pt1
Privileged Session Management pt1
Separate endpoints from Detect and track suspicious Support forensic analysis
critical target systems to activities in privileged and audit with detailed
prevent lateral movement sessions and events in real records of privileged activity
time
Direct Connection
Databases
PVWA
HTTPS
Windows Servers
1
PSM
2 RDP over SSL
*Nix Servers
3 6
SIEM/PTA
Components/
RDP
Connectors
Connection Components
(aka Connectors) define the
configuration settings for using
a given third-party client to
connect to a target platform.
A few common ones are: Putty WinSCP
• SQLPlus
• RDP
• Putty
• WinSCP
5
1 Windows/UNIX
Gateway Servers
2 WebSocket 3 RDP
PSM
Web Sites
1. Logon through PVWA and click on 4 7
Connect
2. Connect to HTML5 GW using
Routers and Switches
WebSocket
3. Connect to PSM using RDP
Vault
4. Fetch credential from Vault
ESX\vCenters
5. Connect using native protocols
6. Logs forwarded to SIEM and PTA 6
7. Store session recording SIEM/PTA
• Users can launch the RDP client and sign in into CyberArk
using single- or multi-factor authentication (for example, LDAP with RADIUS).
⎼ The RDP client application must include the ability to configure run “Start Program”
for the RDP connections.
⎼ Connections can be made from Unix / Linux / Mac / Windows end user machines.
3
Windows/UNIX
Servers
PSM
1 RDP over SSL
2 5
Web Sites
SIEM/PTA
• PSM IP
• Vault user
• Activate Start Program
• Program path:
⎼ Privileged Account name
⎼ Target address
⎼ Connection Component
mike@logon01@10.0.0.20@10.0.30.1
• The connection settings for
PSM for SSH resemble
those of PSM for Windows.
• Connections are not
launched via the PVWA,
but through a special
connection string.
1 3
SSH PSM SSH with privileged account
SSH
UNIX/Linux
2 5 Servers
Vault SIEM/PTA