Phase 3 – Launch and execution
Step 1: Project kick-off
Once the team, scope, project goals, product breakdown structure, use cases, high level schedule, and budget are prepared, a kick-off meeting should be scheduled to ensure all the stakeholders are informed and prepared to engage. This will set the expectations for all parties involved and define accountabilities for driving progress.
Step 2: Architecture design
The CyberArk Digital Vault will house the organization’s most sensitive credentials which provide access to the most sensitive data and business critical systems. The CyberArk Privileged Access Security Solution will sit between your privileged users and your highly sensitive systems, and it will enable users to securely carry out extremely important tasks. As such, the security of the CyberArk solution Privileged Access Security Solution and the stability of the platform are paramount.
To maximize the security of the CyberArk Privileged Access Security Solution, CyberArk has developed a security standard and hardening procedures for the CyberArk Digital Vault and its components. Be sure to review the following information prior to your implementation:
Review ... |
Overview |
---|---|
Review the CyberArk system requirements for the CyberArk Digital Vault servers and component servers. Ensure dedicated servers will be provisioned accordingly and identify the system capacity based on meet design requirements. |
|
CyberArk’s guidance on how to properly secure the CyberArk Digital Vault server. Note that third-party connections from the CyberArk Digital Vault server to outside software can increase the attack surface of the CyberArk Digital Vault server. As such, CyberArk provides built-in tools to enable secure backup and monitoring so that third-party software is unnecessary. |
|
Key recommendations for protecting your CyberArk deployment, and therefore your privileged accounts. |
|
How to harden the CyberArk Digital Vault components to reduce their attack surfaces, thereby further reducing the attack surface of the CyberArk Digital Vault. It is recommended that organizations strictly adhere to the guidance described here. Review this information prior to implementation. |
To maximize the reliability of the CyberArk Digital Vault and its components, as well as to help maximize uptime, prepare for unexpected outages and effectively troubleshoot potential issues, CyberArk recommends the following practices.
-
CyberArk Digital Vault servers should be resilient with at least one single, physical Disaster Recovery (DR) fault residing in a different location than the primary. The sizing of the vault will depend on the organization’s unique session recording retention requirements. A basic estimation is usually 250kb/min per recorded RDP session and 60kb/min per recorded SSH session.
-
Component servers (PVWA, CPM, PSM, PSM for SSH) should be highly resilient, scaled to suit the organization’s needs and contain no single points of failure. Highly utilized systems such as PVWA and PSM/PSM for SSH should sit behind hardware load balancers. Load balancing is integral to an enterprise deployment of the CyberArk Privileged Access Security Solution. Engagement with the relevant teams within the organization early on is key.
-
Break glass process design and procedures. Given the critical nature of system, a well-defined process should be in place in securing the master keys and credentials for the CyberArk Privileged Access Security Solution.
Considerations before deploying the Digital Vault and Component Servers:
Consideration |
Details |
---|---|
Monitoring |
It is highly recommended that organizations leverage the built-in SNMP and syslog tools to monitor the health of the CyberArk Digital Vault server as well as all activity on the server. |
Troubleshooting |
The CyberArk Digital Vault Server Security Standard dictates that no third-party software be installed on the CyberArk Digital Vault Server. To retrieve logs for troubleshooting while adhering to this standard, it is recommended that you use the PrivateArk Client to retrieve logs from the CyberArk Digital Vault Server and then use Notepad ++ on your desktop machine to view the logs. |
Load-balancing |
CyberArk recommends that organizations use a hardware-based load balancer of their choice. If the organization is unable to use an existing load balancer, they may also use Microsoft Network Load Balancing (NLB), which is included on each operating system. For those who choose this option, CyberArk documentation includes information on how to configure NLB for CyberArk solutions. |
Firewall traffic |
Organizations should determine in advance what ports will need to be open, and engage firewall teams to work through necessary rules. Due to the way CyberArk secures its Digital Vault server, communication between the vault server and the component servers occurs though a single port (TCP/1858). CyberArk components may require additional ports to be open based on where and how they are deployed. Organizations should review documentation to understand what ports may need to be open on component servers. Notable firewall considerations include:
|
Organizations should identify the secure zones, DMZs, data centers and assets in all geographical locations that will need to be considered, include on premise, cloud, and hybrid infrastructure:
-
Identify locations of the users and how they will access the CyberArk Privileged Access Security Solution;
-
Identify locations of the devices and accounts to be managed;
-
Identify locations of the CyberArk servers.
CyberArk Privileged Access Security Solution will most likely become a Tier 1 application within the organization and, as such, will require extensive integration with other enterprise tools. Integrating the following tools with the CyberArk Privileged Access Security Solution is highly recommended:
Tool |
Goal |
---|---|
MFA |
To validate user identities before allowing access to PVWA. Review list of supported authentication options (RADIUS, SAML, RSA, etc.) in the document Privileged Access Security System Requirements |
HSMs |
To securely store the CyberArk Digital Vault server key |
SNMP |
To monitor and alert on the health of the CyberArk Digital Vault and components |
SIEM or SYSLOG solutions |
To monitor activity on the CyberArk Digital Vault Server, on the component servers and within the CyberArk Privileged Access Security Solution itself. Alerts on privileged accounts (whether they are sent to a SIEM from CyberArk Privileged Threat Analytics, or generated from a SIEM directly) should be closely monitored to help ensure the security of both the CyberArk Privileged Access Security Solution and your privileged accounts |
Ticketing systems |
To leverage existing processes for controlled change requests on target systems |
SMTP |
To enable email notifications for reports and Event Notification Engine integration |
NTP |
To enable time synchronization on the Vault and DR Vault servers |
Digital certifications |
To secure communications for all PVWAs |
Once organizations have determined which integrations are preferred or required, it’s important to engage the respective technology teams early and ensure that the firewall ACLs in the network allow for communication from the CyberArk servers using these protocols to communicate with the target enterprise server. The earlier the organization works with these counterparts, the more likely that integration processes can be planned and completed in a timely manner.
Step 3: Solution design
It is recommended that CyberArk Digital Vault user groups be defined and managed based on user role.
Role |
Definition |
---|---|
Vault Administrators |
Vault Administrators should be native CyberArk users, meaning they should have individual accounts that are managed within the CyberArk Privileged Access Security Solution directly. |
End Users, Auditors and Safe Owners |
End Users, Auditors and Safe Owners should be managed using an external directory (AD, LDAP, etc.). This division allows for large scale user management via external directories while maintaining additional security for high-privileged users such as Vault Administrators. Vault Administrator credentials can be stored within the CyberArk Enterprise Password Vault so that organizations can audit Vault Admin account usage as well as secure administrative access to PVWA and PrivateArk client sessions using via CyberArk Privileged Session Manager. |
Transparent User and Group Mapping |
Users and groups from an attached directory service will be used to grant safe access. Each group will be configured as a “safe member” with the appropriate access rights. As users are added to defined groups in the directory, they will automatically gain access to the configured safes. Similarly, users who are removed from defined groups will automatically be removed from the CyberArk Digital Vault. |
Local User Management |
The CyberArk Privileged Access Security Solution offers comprehensive management of internal users. If there is no directory service available or an organization prefers to not rely on it, they can create local users and groups in the CyberArk Digital Vault. This can either be done manually or automatically using one of the many APIs CyberArk offers (i.e. REST API, Command Line Interface, etc.). When managing users locally, CyberArk can support local authentication as well as any external authentication service that is configurable (LDAP, RADIUS, SAML, etc.). |
External directory users |
When integrating CyberArk solutions with an external directory, it’s important to consider which directory administrators can add users to user groups that have access to the CyberArk Digital Vault. If an unauthorized user was added to a CyberArk user group, that user could gain access to privileged accounts secured within the CyberArk Digital Vault. Organizations should work with directory administrators to establish a trusted approval process before a new user may be added to a CyberArk user group. SSL connection from the CyberArk Digital Vault to the directory is highly recommended, and it will require a Root Certificate for the CA that issued the certificate on the directory server(s). |
Safes are the logical structures through which organizations control access to the sensitive data (credentials, audit logs, recordings) stored within the CyberArk Digital Vault. Poor safe design can lead to either too many people having access to sensitive data (increasing the risk of malicious or accidental errors) or too few (resulting in significant management overhead due to constant one-off access requests and approvals).
-
Two basic approaches to safe design and naming conventions are 1) by platform (Windows, Unix, etc.) or 2) by region (AMER, EMEA, etc.). There is no single best approach, but CyberArk Security Services can provide guidelines.
-
More information on safe naming convention design can be found in the document Safe Naming Convention Creation Procedure. Safe permissions should be designed based on roles, LDAP groups, etc. while incorporating technical and business requirements.
Once the safe structure is designed and agreed upon, the next step is to design the Master Policy. The Master Policy should usually reflect an organization’s IT Security and/or Password Policy. The names of policy settings are built to match what is typically found in an IT security policy, helping to more easily craft requirements. Common policies include:
-
Password age set between 30 and 60 days;
-
Check-Out/Check-In of privileged credentials;
-
Dual Control for manual access to the credentials.
For consistency and ease of management, organizations should consider designing additional control sets such as data and application classification, platform settings, and platform naming convention for managed privileged credentials. Workshops may be scheduled with application and/or platform owners and users to map out their use cases and address any questions that may arise with regard to impacts and changes.
Workflows may include:
Workflow |
Description |
---|---|
Dual control |
Require users to submit a request to management whenever an account is needed |
Ticketing integration |
Require users to specify a ticket number for informational purposes or for verification |
Exclusive accounts |
Force accounts to be checked in and out and only one user can be in possession at a time |
One-time passwords |
Credentials automatically change after every use |
Email alerts |
Any time an account is used an alert email will be sent to subscribers |
There are several ways to onboard accounts into the CyberArk Enterprise Password Vault but the most common are through the Accounts Feed or Bulk Upload:
Onboarding process |
Description |
---|---|
Accounts Feed |
The Accounts Feed scans the Active Directory for machines and then reaches out to all machines to scan for accounts. The Accounts Feed can also scan a defined list of UNIX systems to discover accounts and credentials. Following the scan and discovery, privileged accounts and credentials are placed into a “Pending Accounts” page, from which one can select specific accounts to onboard into specific safes. The Accounts Feed continually scan OUs and machines to automatically onboard privileged accounts from newly created servers. The Accounts Feed allows for a more flexible discovery of the following accounts and retains the ability to analyze and provision them with service account dependencies:
|
Bulk Upload |
Password Upload Utility takes a .csv file of accounts and places them into safes as defined within the file itself. This is the most common approach when the CyberArk Privileged Access Security Solution is displacing another password vaulting solution. |
Auto-Detection |
This process enables automatic provisioning via:
|
Automate account creation, onboarding, etc. |
|
Once the solution and processes are in place and the initial privileged accounts onboarded, expansion of the CyberArk Privileged Access Security Solution is highly recommended. As mentioned above, account onboarding is typically prioritized by risk and ease of onboarding. As such, common scenarios include the security of credentials and SSH keys used to access databases, network devices and applications-- but these are not set in stone. Each organization will have different priorities, and there are no “wrong” approaches. It’s recommended that organizations select an approach that best suits their needs.
Organizations should consider compliance and audit requirements and identify out-of-the-box reports that can be generated in meeting those requirements. Workflows and roles of the auditors who will be generating the reports should be mapped. If customized reports are required, organizations can engage CyberArk certified experts to assist with the customization.
CyberArk PSM and PSM for SSH require additional considerations prior to implementation. Prior to an implementation, organizations should check the following:
Task |
Details |
---|---|
Verify licenses |
Verify and/or acquire Terminal Server Licenses and RDP Services CAL licenses. CyberArk Privileged Session Manager is based on Microsoft Terminal Server Technology and thus requires the appropriate Microsoft licenses. It’s important to ensure there are sufficient CAL licenses and a licensing server available. |
Review PSM for SSH OS requirements |
Review the PSM for SSH OS requirements to ensure the ability to run and operate a supported OS. PSM for SSH is a Linux-based system supported on several – but not all – versions of RHEL, SUSE and CentOS. Note that PSM for SSH operates similarly to an appliance after installation. As such, default management processes and tools may require certain exceptions (such as OpenSSH) in order to remotely support the PSM for SSH server. |
Ensure sufficient storage capacity |
Organizations should ensure sufficient storage capacity for session recordings on the CyberArk Digital Vault Server and CyberArk Privileged Session Manager servers. A basic estimation of required storage is usually 250kb/min per recorded RDP session and 60kb/min per recorded SSH session. Most storage will be required on the CyberArk Digital Vault server. However, depending on the Master Policy and the number of sessions chosen for recording, a large amount of storage on CyberArk PSM/PSM for SSH servers may be required. |
Group policy settings |
Group policy settings should be configured to allow the CyberArk Privileged Session Manager to work securely. Since these servers are usually domain members, an organization’s GPOs will apply to them. Be aware of common GPO settings that can stop the CyberArk Privileged Session Manager from functioning. For example, “AllowLogonLocally” should include the local CyberArk Privileged Session Manager group. CyberArk can supply GPO files to set all necessary policies so that CyberArk Privileged Session Manager is able to work properly. Additional information can be obtained from CyberArk Security Services engineers. |
Load balancing |
Load balancing should be configured to handle peaks in access. CyberArk Privileged Session Manager will most likely become the only way for administrators to remotely access target systems. Load balanced farms can help handle load peaks and avoid system outages. |
Review the PSM hardening procedure |
Review the CyberArk Privileged Session Manager hardening procedure included in the install pack to understand the hardening configurations. |
Secure application accounts with CyberArk Application Access Manager (both Credential Providers and Dynamic Access Provider) (AAM).
Most application accounts are complex to manage and end up being static for very long periods of time. AAM can solve both problems by integrating with your applications, and then managing the credentials, even for extremely high availability applications. Instead of a hard- coded credential, a call is added to the vault to dynamically authenticate, and then pull, the required password.
Goal |
Details |
---|---|
Quick wins |
Over time, application security becomes increasingly important. While application integration can be a big project, there are some quick wins that can be easily achieved:
|
Application teams |
When considering application security, one of the most important steps in each of these processes is to work with the application teams (managers, developers, owners, etc.) as early as possible, showing them the benefits of application security, understanding their existing processes, and getting their buy-in before making any changes. |
Certified CyberArk experts |
When deploying AAM, it is beneficial to engage certified CyberArk experts in conducting a workshop to prepare for integration of the solutions into organization’s development life-cycle. Organizations should consider having technical overview that includes:
|
CyberArk Application Access Manager (AAM) |
AAM processes will work in much the same way as those for non-application accounts. The main difference will be the developers building processes (through a wrapper script) to handle password changes. CyberArk’s Security Services offers a workshop that presents best practices, knowledge, and processes in rolling out AAM. Common steps for deployment include:
|
To ease the transition from full local administrator rights to limited rights, use the CyberArk Endpoint Privilege Manager console to track those commands and applications most frequently used with escalated privileges.
Goal |
Description |
---|---|
Restrict privileges |
Organizations should learn what is legitimately needed within their environments, and start by restricting privileges that are not needed. Rules can become more restrictive over time while still allowing for seamless privilege elevation as needed, based on policy. An immediate revocation of all administrator privileges at once can result in user frustration and an overwhelming influx of calls to the help desk, as many users may legitimately need administrator privileges to complete day-to-day business tasks. |
Privilege management and application control |
When deploying CyberArk Endpoint Privilege Manager, organizations should consider the best practices for privilege management and application control. One can begin with solution architecture, inbox settings, and policy creation along with the deployment and rollout methodology. CyberArk Endpoint Privilege Manager Quick Start Guide, CyberArk Endpoint Privilege Manager Solution Guide, and CyberArk Endpoint Privilege Manager Installation Guide are good references to review. CyberArk’s recommended control is to remove workstation administrator privileges from end users and provide temporary elevation of privilege when required. |
Detect advanced threats |
|
User privileges in UNIX |
Control user privileges in UNIX using CyberArk On-Demand Privileges Manager. When managing privileges with CyberArk On-Demand Privileges Manager, it’s recommended to start by restricting the most “destructive” commands first (i.e. “rm –rf /*” or “visudo”, etc.). If an organization is already using sudo, they can simply re-build the existing sudo rules in CyberArk On-Demand Privileges Manager. |
|
|
Step 4: Solution implementation
CyberArk Security Services will provide organizations with a pre-requisites checklist so that they can be prepared for your deployment. With the guidance of certified CyberArk experts/SMEs, the Technical Leads will be ready to proceed with the installation, configuration, and/or upgrade of the CyberArk Privileged Access Security Solution.
Organizations should develop an implementation plan to include provisioning of pre-requisites (servers, systems and resources) and scheduling of CyberArk Security Services or certified CyberArk Channel Partners to assist with implementation. Coordination with Change Management boards will ensure work can proceed on schedule. This step includes deploying the CyberArk environment based on architectural design, solution design, and pre-requisites from previous phases.
Review the following documents and resources for more information:
-
Privileged Access Security System Requirements
-
Pre-Implementation Checklists
-
Privileged Access Security Installation Guide
-
Privileged Access Security Implementation Guide
-
SSH Key Manager Implementation Guide
-
CyberArk Endpoint Privilege Manager Installation Guide
-
CyberArk Endpoint Privilege Manager Migration Guide
-
Central Credential Provider Implementation Guide