Cyberark Pam Sentry
Cyberark Pam Sentry
Identify and describe the steps to migrate the server key to an HSM
- Best practice is to install HSM Software BEFORE installing CyberArk and test connectivity
- But HSM Software could be Installed even after CyberArk installation
o Install Vault as usual
o In DBparm.ini open FW port to HSM using “AllowNonStandardFWAddresses”
statement.
o In DBparm.ini configure HSM using “PKCS11ProviderPath”
▪ Insert Master CD
▪ Run ChangeServerKeys
There are four main steps listed in the file: "Hardening.ini" that can be found here by default: "<vault
installation path>\server\hardening\hardening.ini" and are explained in more detail in the sections below.
These can be set to 'No' if required/needed. (art: 000007835)
Hardening.ini
HardenNetworkDevice=Yes
HardenWindowsSecurity=Yes
HardenWindowsLocalSecurity=Yes
HardenWindowsFireWall=Yes
IPv6
- Disable 'Register this connection's addresses in DNS'
Identify and describe the components and steps to complete a Vault installation
Installation package
Installation Steps
If non clustered installation: uninstall/disable all protocols except the following TCP/IP protocols.
If a cluster is required complete these tasks on the host machines for both node A and node B before
continuing to the Vault installation:
- Run chkdsk to confirm that the drive where you will install the Digital Vault is healthy.
- Configure the network
o Allocate three IP addresses on your enterprise network for the Vault Cluster node’s
public addresses and the Virtual IP. The public IPs and the Virtual IP must be from the
same subnet.
o If using a Private Cluster Network, create the network and connect one NIC from each
Cluster Vault node to it. Otherwise, connect one NIC from each Cluster Vault node
directly using a cross-over cable.
- Configure the network cards
o Configure the public network card and private network card on each node (do not
configure VIP now)
o Save the network card name of the public network of each node for later use
o On the public network card for each node:
▪ Uncheck Client for Microsoft Networks and File and Printer Sharing for
Microsoft Networks on the Public Networking properties.
o recpub.key
o license.xml
1. If the installation completes successfully, the Vault server is up and running and you receive the
message:
-
Describe how to register a primary vault in Azure using the CyberArk image
o recpub.key
o license.xml
o Navigate to C:\Cyberark.
Identify and describe the steps to install the first and additional PVWAs
Note: You can have a maximum combined total of 60 PVWA and CPM instances in one environment.
- Pre-installation
o Review Requirements
o Close all other Applications and log on
o Run Prerequisites Scripts
- Installation
o Run the PVWA Installation Script
o Registration (connect to the Vault)
- Hardening
o Run the hardening script
o Perform manual hardening steps
o Apply post hardening congifurations
o Harden server in a domain environment (if required)
Evaluate and scope a customer environment to determine the appropriate number of
PVWAs and their placement within the network
You can harden the PVWA server automatically using a script file. The hardening script file performs the
following tasks:
If you have installed PSM on the same machine as PVWA before you run the hardening script, in the
PVWA\InstallationAutomation folder, locate and open the PVWA_Hardening_Config.xml file, and set the
IsPSMInstalled parameter to True
Perform the following hardening steps after you have run the hardening script:
Remove or disable any other protocols, services, or clients from your network
connection properties.
Also disable IPv6 unless it is specifically required for your PVWA server.
The load balancer must not alter page content, or it should include a mechanism to prevent pages
from being altered.
The load balancer must not alter the application path hierarchy (leave the default application path
as it is).
In the web.config file, for the LoadBalancerClientAddressHeader parameter, enter the HTTP Header
field name from which the PVWA reads the client IP.
This allows the Vault to log incoming requests as if their source is the the real client IP and not the
load balancer.
Prepare a Windows server for PVWA installation
Close applications and log on
If the PVWA and CPM are installed on the same machine, make sure to run the CPM hardening script after
you have run the PVWA hardening script.
You can harden the CPM server automatically using a script file. The hardening script file performs the
following tasks:
o Registry audits
o Registry permissions
o FileSystem permissions
o FileSystem audit
- Creates three local Windows users that run the CPM services
- Disables services
Before you run the hardening script, in the CPM\InstallationAutomation folder, locate and open the
CPM_Hardening_Config.xml file, and set the IsPSMInstalled parameter to True.
If you want to automatically enable FIPS cryptography during hardening, before you run the hardening
script, in the CPM\InstallationAutomation folder, locate and open the CPM_Hardening_Config.xml file. Set
the EnableFIPSCryptography parameter to Yes.
When CPM servers are part of a domain, you must back up the existing Group Policy Object (GPO), and
create a new one importing the one provided in the installation folder.
Identify and describe the steps required to prepare a Windows server for CPM installation
If PVWA is configured to communicate through a secure channel (HTTPS), the CPM machine needs to trust
the PVWA SSL certificate.
Import the CA certificate from the CA that issued the PVWA's SSL certificate to the CPM server.
Make sure that the CPM server can access the CRL Distribution Points referenced in the PVWA's certificate.
Identify and describe the steps to install the first and additional CPMs
- Pre-installation
o Review Requirements
▪ CPMInstall.log
o Check the CPM services (These services are started automatically after installation)
▪ CyberArk Password Manager
▪ CyberArk Central Policy Manager Scanner
o Add restrictions to credentials file
- Hardening
o Run the hardening script (apply GPO policy if needed)
o Apply post hardening configurations
The following steps need to be completed using PAClient;
2) Rename the <ExistingCPMUser>_* safes to the new names except the three shared safes:
PasswordManger_Pending, PasswordMangerShared, PasswordMangerTemp
6) Update <ExistingCPM> to the new CPM user name in PVWA (Options > CPM Names).
7) Restart CPM services.
Evaluate and scope a customer environment to determine the number of CPMs required
and their placement within the network
A CPM should be installed on the network with the fewest network hops in relation to the target systems
the CPM is intended to manage privileged accounts. This will likely result in CPM network traffic traversing
one or more network firewalls and routers when communicating with the Vault server.
The CPM will effectively communicate to the Vault over the secure CyberArk VPN, tcp_1858 (preferred) or
can be configured to use port 443 if preferred by the customer.
This recommendation reduces network traffic across WAN links and enables the CPM to operate at peak
efficiency.
Identify and describe Fault Tolerant Architecture components
In order to prevent a scenario where the CPM is unavailable, you can set up a Disaster Recovery (DR)
"active-passive" cluster by installing and configuring a second CPM instance.
If the primary CPM is down, you can manually switch over to the second instance, the DR CPM.
Only one instance of the CPM can be active at a given time, a manual procedure is required to transfer the
license.
Determine the quantities and locations of components needed to provide a fault tolerant
architecture to meet customer needs
Identify and describe the steps to install the first and additional PSMs
- From the installation CD, copy the PSM folder to the component server and unzip.
- Open CMD and run
- Restart- The tool runs the PSM installation stages. When a restart is required, the user is
prompted to press Enter, restarting the machine. When the user logs in to the machine again,
the tool continues from the relevant step.
- Vault user credentials - If you are using a Vault username and password, after the last restart
you are prompted to enter a password. Enter the password and click Enter. You can use the cred
file to avoid entering the password interactively.
Evaluate and scope a customer environment to calculate the amount of storage that should
be available to the PSMs for PSM recordings
Evaluate and scope a customer environment to calculate the amount of storage that should
be available to the Vault and PAReplicate for PSM recordings
3 info required:
Example
Evaluate and scope a customer environment to determine the appropriate number of PSMs
and their placement within the network
The number of required PSM severs depends on load-balancing, high availability and network topology
considerations.
PSM server can be installed in each network segment to communicate with the remote machines using
native protocols and without the need to open the enterprise firewall, as shown in the following diagram.
PSM can also be installed on the same machine as the CPM or the PVWA, reducing the number of machines
to maintain.
Identify and describe the steps to prepare a Windows server for PSM installation
This section describes how to install the PSM HTML5 Gateway as a docker.
Copy the HTML5 Gateway\PSMGWDocker directory located in the CD image to the Linux host.
Go to that directory.
Run the following command to grant execution rights to the setup script.
chmod +x html5_installation.sh
Identify and describe the steps to prepare a UNIX server for HTML5 Gateway installation
Describe various PSM load-balancing options
Installing multiple PSMs in a load balancing configuration offers you enhanced availability, improved
performance and better utilization of hardware resources compared to an active-passive cluster.
The load balancing architecture relies on an external tool that reflects multiple PSM servers as a single IP or
DNS address. PSM load balancing supports off-the-shelf load balancers.
PSM provides a service to determine the PSM service availability (health) and reports it, upon request, to
the load balancer.
Describe how to correctly harden a PSM server
After using hardening scripts the followings additional steps are needed:
The load balancing architecture relies on an external tool that reflects multiple PSM servers as a single IP or
DNS address. PSM load balancing supports off-the-shelf load balancers.
PSM provides a service to determine the PSM service availability (health) and reports it, upon request, to
the load balancer.
A pre-requisite for this step is that PSM servers must have a virtual IP/DNS address.
- Install the first PSM on the first PSM server, then install the second PSM on the second and
any additional PSM servers.
- Log onto the PVWA as an administrator user and define the new PSM server. Reference the
RDS farm DNS record as follows:
o Click ADMINISTRATION to display the System Configuration page, then click Options to
display the Web Access Options parameters.
o Display the Privileged Session Management parameters, then expand Configured PSM
Servers
o Copy an existing configured PSM Server and paste it in Configured PSM Servers to
create an additional configured server that you can change.
It is important to copy an existing PSM server and modify it, and not use the Add
PSMServer option, so that you retain the same PSMProtocolVersion property for the
PSM Farm and for the configured servers
o Change the following properties
▪ ID – The RDS farm name.
▪ Name – The name of the PSM group server
o Expand Connection Details, then select Server and specify the following properties
▪ Address – Specify the virtual IP address of the cluster.
▪ Safe - The Safe where the account for the logon account for the PSM Server is
stored.
▪ Folder - The folder where the account for the logon account for the PSM Server
is stored
▪ Object - The name of the account that is used by the logon account for the PSM
Server.
▪ AdminObject – An internal account used to facilitate live session monitoring.
This account is created and managed automatically by the CPM and must not
be managed manually.
- In the PVWA, enable the PSM cluster with the relevant platform. For example, WindowsLocal
o Click ADMINISTRATION to display the System Configuration page, then click Platform
Management to display a list of supported target account platforms.
o Select the platform to configure for the PSM cluster, then click Edit.
o Expand UI & Workflows, then select Privileged Session Management; the PSM
parameters for this platform are displayed with their default values.
o In the Properties list, specify the following property:
o ID – The unique ID of the PSM cluster server. This ID is taken from the list of PSM
Servers configured in Options.
o Click Apply to save the new configurations.
Identify and describe the steps to install the first and additional PSMs for SSH
The user who will create the environment for PSM for SSH in the Vault during the installation process must
have the following permissions in the Vault:
■ Add Safes
■ Audit Users
■ Add/Update Users
If you are using PSM for SSH with AD Bridge, from the installation's Prerequisites folder run the following:
rpm –i libssh-<version>-<build_number>.<arch>.rpm
rpm –i <rpm-file-name>
proxymng
proxymng<number>
Additional users that are specified in the PSMP_MaintenanceUsers parameter in the sshd_config
configuration file.
Create an extra maintenance user, in addition to the built-in root user, so that a maintenance user can
always connect to the PSM for SSH server to perform maintenance, even when remote access is forbidden
to the root user.
You can configure more maintenance user names by adding the PSMP_MaintenanceUsers parameter to the
sshd_config configuration file.
The PSM hardening procedure on the PSM for SSH server machine enhances PSM for SSH security.
Describe how to prepare a UNIX server for PSM for SSH installation
Make sure the operating system installed on your server is supported by PSM for SSH
Describe the steps required to combine a Vault and a PVWA authentication method to
create two-factor authentication
- In the System Configuration page, click Options, then expand Authentication Methods; a list of
the supported configuration methods is displayed.
- Select an authentication method to display its configuration.
- Set any of the following parameters to modify the authentication method for users.
o Id – The identifier of the authentication module. This parameter is configured
automatically during installation.
o DisplayName – The display name of the authentication method that will be displayed in
PVWA.
o Enabled – Whether or not the authentication module can be used. This is configured
during installation, depending on whether or not the authentication method is
selected.
o LogoffUrl– A URL to redirect to on logoff. This cannot be set during installation and
must be set manually afterwards. Specify the whole URL, including HTTP/HTTPS. For
example, https://www.company.com.
- Click Apply to save the new configurations and apply them immediately.
- LDAP Authentication
- RADIUS Authentication
- CyberArk Authentication
Secondary authentication is configured in the authentication parameters for each authentication method.
- In the System Configuration page, click Options, then expand Authentication Methods; a list of
the supported configuration methods is displayed.
- Select an authentication method to set secondary authentication.
- Set any of the following parameters:
- Using Notepad (not Notepad++), open the IIS configuration file. By default, this is
%WinDir%\System32\Inetsrv\Config\applicationHost.config.
the Vault enables users to log on via Remote Authentication Dial-In User Service (RADIUS) authentication,
using logon credentials that are stored in the RADIUS server. The Vault also supports RADIUS
challenge-response authentication, where the server sends back a challenge prompting the user for more
logon information, such as additional authentication information contained on external tokens.
Requirements
In order to enable users to authenticate using RADIUS authentication, you need the following:
■ RADIUS Server
■ Certificate – A Vault certificate to create an initial secured session prior to the RADIUS
authentication. This certificate is optional, but recommended.
■ RADIUS Secret – A password known to only the RADIUS server and the CyberArk Vault. This
password can contain up to 255 characters.
Preparation
You can specify the full path of the file that will contain the encrypted secret, and the
secret itself. This file may be in DAT, INI, or TXT format.
o Navigate to /Server/Conf and open DBParm.ini
o Set the RadiusServersInfo parameter.
For RADIUS high availability: You can specify more than one RADIUS server by separating
the details of each server with a comma.
RadiusServersInfo=radius1.mycompany.com;1812;vaulthostname;RadiusSecret_Radiu
s1.dat,radius2.mycompany.com;1812;vaulthostname;RadiusSecret_Radius2.dat
- Start the Vault server.
After you configure SAML authentication, all users can use this authentication method. Whether they have
been provisioned using LDAP integration or were created manually as CyberArk users.
To configure SAML in PAM - Self-Hosted, you need to configure the PVWA and the PasswordVault
web.config file.
If your IdP does not have a logoff URL, clear this field. Users will remain
authenticated to the PVWA as long as they are authenticated to the IdP.
- In the Options pane, right-click Access Restriction, and then select Add AllowedReferrer.
- In the Properties pane, in BaseURL, specify the URL of your IdP.
- Click Apply to save the new configurations.
<LocalCertificates>
<Certificate FileName="<local certificate path>" Password="<the password you set for the certificate>" />
</LocalCertificates>
SignAuthnRequest="true"
<LocalCertificates>
<Certificate FileName="<the exported certificate path>" Password="<the password you set for the
certificate>" />
</LocalCertificates>
Supply the certificate's public key to the IdP to encrypt the assertion.
ForceAuthn="true"
Identify and describe the components that work with each authentication method
CyberArk Vault
- LDAP Authentication
- RADIUS Authentication
- CyberArk Authentication
- Password
- Windows
- Radius
- PKI
- LDAP
- Oracle SSO
- SAML
- Additional third-party authentication servers can be easily customized.
PrivateArk Client
- Password
- Radius
- LDAP
CPM
- Password
- Password with a certificate on a hardware token
- Radius
- PKI on Windows
PACLI
- Password
- Radius
- Password
- Radius
- SAML
- PSM for SSH with SSH keys
Perform integration tasks, including integrating with NTP, SMTP, SNMP, LDAP, and
Syslog/SIEM
SMTP
The Event Notification Engine (ENE) automatically sends email notifications about PAM - Self-Hosted
activities to predefined users. It is installed automatically as part of the Vault server installation as a service.
After installing the Vault, the ENE must be enabled so that you will be able to receive email notifications
about the Vault activities.
The ENE is installed as part of the Vault server installation as a service called Cyber-Ark Event Notification
Engine.
After the ENE has been configured, the ENE setup wizard will only be enabled if the SMTP address is set to
1.1.1.1. To rerun the ENE setup wizard, in the Notification Settings page, set the SMTP address to 1.1.1.1
then re-invoke the ENE setup wizard.
Before you begin:
- On the Vault setup page, select Email notifications, and then click Next.
- On the Configuration page, enter the following
o SMTP address
o Sender Email
o Sender Display Name
o SMTP Port
o Recipients Domain
o CA-PVWABaseURL (The URL of the machine where the PVWA is installed. For
example, https://www.myserver.com.)
- Click Finish.
After you have configured encryption for email notifications, you can add an additional level of security by
configuring authentication too.
In the NotificationEngine Safe, create an account that will authenticate to your mail server. Make sure this
account has permission to send from the mailbox specified in the Mail parameter.
SMTPAccountName The name of the account you created in step 1 and stored in the NotificationEngine
Safe.
- In the SMTP server, export the trusted root certificate that issued the SMTP server’s TLS
certificate in Base-64 encoded X.509 format.
- Copy the exported certificate to the ENE server (also the Vault server).
- In Administration > Notification Settings, expand EventNotificationEngineSendMethod >
SendMethod > Security and set the following parameters:
o EnableTLS Yes
o TLSRootCertificatePath the location of the certificate you stored on the
ENE/Vault server in step 2
- In Administration > Notification Settings, expand EventNotificationEngineSendMethod >
SendMethod > Servers > Server and set the following parameters:
o CertificateAlias The value that appears in the “Issued to:” field in the SMTP
server’s TLS certificate.
SNMP
The Remote Monitoring uses SNMP to send Vault traps to a remote terminal. This enables users to receive
both Operating System and Vault information, as follows:
CyberArk provides two MIB files (for SNMP v1 and SNMPv2) that describe the SNMP notifications that are
sent by the Vault. These files can be uploaded and integrated into the enterprise monitoring software.
These MIB files are included in the PAM - Self-Hosted installation package:
Configuration
- In the remote control agent configuration file, PARAgent.ini, specify the following parameters:
o AllowedMonitoredServices The name of the system services that can be monitored from
a remote location. In the Service Properties window, specify the name of the service exactly
as it appears in the Service Name field.
o MonitoredEventLogNames The names of the event logs of activities that have taken
place since the Server started, such as Application, Security, and System.
o SNMPHostIP The IP address of the remote computer where SNMP traps will be sent.
Separate multiple IP addresses with a comma.
o SNMPTrapPort The port through which SNMP traps will be sent to the remote computer.
You can specify either port 161 or 162. The default port is 162.
o SNMPTrapInterval The number of seconds that pass between notifications. The default
value is 30.
o SNMPCommunity The name of location where the SNMP traps originated.
o SNMPVersion The SNMP version that will be used to send SNMP notifications. Specify
any of the following values:
▪ v1 – The Vault will support SNMPv1 with a unique OID for each trap.
▪ v2 – The Vault will support SNMPv2. This is the default value.
▪ Compatibility – The Vault will send SNMP notifications using the format used in
Vault versions prior to version 5.0
- Specify the following parameters to enable users to receive SNMP notifications.
These values comprise interval in seconds between checks and the percentage in usage that
would initiate a notification, as shown in the following example:
SNMPTrapsThresholdCPU=30,80
o SNMPTrapsThresholdCPU
o SNMPTrapsThresholdPhysicalMemory
o SNMPTrapsThresholdSwapMemory
o SNMPTrapsThresholdDiskUsage
o SNMPTrapsThresholdServiceStatus
- From the Control Panel, display the available services, and restart the PrivateArk Remote
Control Agent service
LDAP
The LDAP integration parameters specify information required by the CyberArk Vault to recognize external
directories and create User accounts and Groups. A different set of directory configurations define each
external directory that the Vault will work with.
After each LDAP directory has been configured in the PVWA, these parameters are stored in the
LDAPConf.xml in the VaultInternal Safe. Do not modify the parameters directly in these files.
https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PASREF/LDAP%20Integration%
20-%20Introduction.htm?Highlight=LDAP%20integration#LDAP
SIEM
CyberArk can integrate with SIEM to send audit logs through the syslog protocol, and create a complete
audit picture of privileged account activities in the enterprise SIEM solution. These audit logs include user
and Safe activities in the Vault, which are transferred by the Vault to various SIEM applications.
- HP ArcSight
- RSA enVision
- IBM QRadar
- McAfee ESM
You can also use the sample XSL translator file or create a custom file, as described in Create a Custom XSL
Translator File.
The configuration is built as a list of values. Each set of parameter values must be specified in correlation
with the other parameter values in the configuration. This allows the system to determine the settings for
each target server.
The Vault can use any of the following protocols to send messages:
Type Protocol
UDP
https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PASIMP/DV-Integrating-with-SI
EM-Applications.htm
NTP
Note: Time synchronization is critically important in CyberArk PAS architecture. Even more so when
implementing the CyberArk Cluster Vault Management solution. In the following exercise we will integrate
both nodes of the cluster vault with an external time source.
[NTP]
AllowNonStandardFWAddresses=[10.0.0.2],Yes,123:outbound/udp,123:inbound/udp
- Enable the Windows Time service using the Windows Services applet .
- Double click “Windows Time” to display the service properties.
- Update the Startup type to Automatic (Delayed Start) and click OK.
- Start the Windows Time service.
- If needed repeat the above procedures on the active node of the cluster before proceeding.
- To commit the changes made to the DBParm.ini file, we must restart the PrivateArk Server
service.
Identify and describe the steps to convert a platform from PMTerminal to TPC
This section contains information about migrating plugins and platforms from PMTerminal to TPC, and
describes the differences between PMTerminal and TPC.
PMTerminal was an engine used to develop plugins for terminal cases over SSH or Telnet, or when running a
script. TPC is a newer engine that provides enhanced capabilities and was developed to replace
PMTerminal.
CyberArk strongly recommends that you migrate your plugins and platforms from PMTerminal to TPC.
PMTerminal reached its end of support date on December 31, 2021.
When you migrate a plugin, you need to migrate both the plugin and the platforms that use the plugin.
During the migration, the plugin is modified to run over TPC instead of PMTerminal, and the platform's
configuration is modified to use the TPC EXE file instead of the PMTerminal EXE file.
TPC supports all functionality that exists in PMTerminal, with a few exceptions. There are also cases where
TPC implements features differently from PMTerminal in a plugin.
You can migrate platforms using the Platform Migration tool, which automatically migrates multiple
platforms at one time. Or you can migrate platforms manually, one-by-one, using the PVWA.
Perform the following steps for each platform that you want to migrate.
Using Platform Migration tool (The user running the tool must be a member of the Vault Admin group)
Option 2 - Scan and review existing platforms, and migrate platforms from PMTerminal to TPC
- Step 1: Scan and review existing platforms
o Download the tool from the marketplace.
o Unzip the tool file.
o Update the Vault.ini file with the address of the Vault.
o Scan for platforms with PMTerminal. In a Command window, enter
.\PMTerminalToTPCTool.exe Vault.ini RunScan <username> <password>.
o A CSV file is created that contains a list of all platforms with PMTerminal
- Step 2: Migrate platforms from PMTerminal to TPC
o Select the platforms that you want to migrate. In the CSV file created by the scan in Step 1
above, enter Yes in the Convert column for each platform that you want to migrate to TPC.
o Migrate the platforms. On every CPM machine, in a Command window, enter
.\PMTerminalToTPCTool.exe Vault.ini UpdatePlatforms <username> <password> <Updated
CSV filename>.
A new results CSV file is created with an additional column that indicates the migration
status of each platform
o Review the CSV file, and resolve any errors that occurred during the migration process.
o Test the migrated platforms to make sure the plugins run as expected with TPC by triggering
a password change and/or password verify using each plugin.
Manual Migration
Identify and describe how to correctly configure Interval and concurrent settings
The following parameters, in Server Settings, configure PSM server activities:
Identify and describe how to correctly configure the Allowed Safes parameter
Target account platforms can be restricted to accounts stored in specific Safes. This feature is especially
relevant if you implement the reconciliation functionality to prevent automatic reconciliation being
performed on every Safe and giving unauthorized users access to passwords.
In large-scale environments, it is very important to enable the CPM to focus its search operations on specific
Safes, instead of scanning all Safes it is allowed to see in the Vault.
Limit a platform to a specific safe
- In the list of supported target account platforms, select the platform that you want to modify,
and then click Edit.
- The Target Account platform settings page appears.
- Expand Automatic Password Management, and then select General.
- The list of General properties is displayed.
- In the AllowedSafes parameter, specify the name(s) of the Safe(s) where this platform is used.
The default value is .*, which allows the platform to be applied in all Safes. (up to 700 char)
- Apply or Save
Evaluate and scope a customer environment to correctly size the servers to meet customer
needs
AWS
All-in-the-Cloud deployment
Hybrid deployment
AZURE
All-in-the-Cloud deployment
Hybrid deployment
As the Vault configuration files are not backed up during Vault replications, copy the configuration files and
store them in the Vault for safekeeping and possible future reference.
Identify and describe various cost reduction strategies when deploying into a public cloud