0% found this document useful (0 votes)
116 views33 pages

02 PAS Essentials Vault and Security Layers

The CyberArk Digital Vault is designed with seven layers of security to protect sensitive credentials, files, and audit logs, including layered encryption, a built-in firewall, and strong authentication methods. The installation process involves hardening the system by removing unnecessary Windows services and implementing strict access controls, while all traffic to the vault is encrypted. Additionally, the vault features a PrivateArk database that is secured and inaccessible even to support personnel.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
116 views33 pages

02 PAS Essentials Vault and Security Layers

The CyberArk Digital Vault is designed with seven layers of security to protect sensitive credentials, files, and audit logs, including layered encryption, a built-in firewall, and strong authentication methods. The installation process involves hardening the system by removing unnecessary Windows services and implementing strict access controls, while all traffic to the vault is encrypted. Additionally, the vault features a PrivateArk database that is secured and inaccessible even to support personnel.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 33

The CyberArk Digital Vault was built from the ground up with security in mind.

The Digital Vault


include seven layers of security to ensure the highest levels of protection of your most sensitive
credentials, files, and audit logs.
The vault includes:
- Layered encryption to protect data in storage and at rest
- A built in firewall to ensure that only authorized traffic is able to access the vault. CyberArk
commandeers Win FW and changes rules.
- Integration with a variety of strong authentication methods to assure the identity of your users
- Segregation of duties to ensure that ensure privileged credentials can only be accessed by
authorized users for approved business reasons
- Comprehensive monitoring to rapidly detect system issues and security events
- Encryption.
- AES 256 encryption, AES 128, RSA 2048 RSA 1024 3DES, SHA1,
- Encryption keys can be swapped, or stored on HSM.
- Every object in vault has it’s own encryption key, encryption at vault, safe and object level.
User not aware of it. No need to update it.
- When a user is removed from the system they no longer have their key, so no access.

5 safe and contents. Removes


- Segregation of duties. Only safe owners can view the
administrator from having all god power.
All traffic going to the Vault is encrypted.
As part of the hardening process, the rules used by the Windows Firewall will be
completely removed and replaced by a far more limited set of rules. This is an example
of the firewall configuration on an unmodified server. After the installation, we will review
new firewall rules to note the changes.
The SRP protocol (Secure Remote Password protocol) creates a large private key shared between
the two parties based on the client side having the user password and the server side having a
cryptographic verifier derived from the password. The shared public key is derived from two
random numbers, one generated by the client, and the other generated by the server, which are
unique to the login attempt.
 Geographical Control (Network Area)
 IP addresses of approved CyberArk components/clients
that need to connect to the Vault such as the PVWA,
CPM, PrivateARK client, and certain Administrators.
 Protects against rouge clients connecting to the Vault
 Manual Controls
 Delay
 Time Limitations
As part of the installation a hardening process will remove or disable most of the standard
Windows service. On the machine in which this screen shot was take, 46 services were
started at boot up (either because they were set to Automatic or they were stared by
another service).

After the EPV installation is complete, we will review the services again to demonstrate
the difference.
The hardening process disabled half of the previously enabled servers (46 were running prior to
the hardening process and 23 were disabled). In many cases, this server will no longer appear as
a Windows server in vulnerability assessment scans (it might me marked as unknown or even
Unix).

The installation process added six new services:


• CyberArk Event Notification Engine
• CyberArk Hardened Windows Firewall
• PrivateArk Database
• A MYSQL database that is hardened and locked down
• Has pointers to the files (metadata)
• You can not run queries against the database
• Even our Support group does not have access to the database
• PrivateArk Remote Control Agent
• PrivateArk Server
• The Server Service is what controls the communication between the Vault and
the other components
• The Server Service is dependent upon the Database
The service Private Ark Remote Control Agent (PARAgent) is
responsible for the remote control
Should be configured through the PARAgent.ini (same place as
Remote Monitoring)
The service is configured during installation
Can define up to 3 machines that can run remote control commands
Remote Client Commands:
• Stop Vault, Start Vault
• Get Log Records, Get CPU Usage
Executed from a remote machine (no need to open RDP Port)
Used to monitor DR Vault and Service
Communicates through the CyberArk protocol
30

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy