Security Fundamentals

Compromising privileged accounts is a central objective for any attacker, and CyberArk’s Privileged Access Security Solution is designed to help improve your organization’s ability to control and monitor privileged activity. As with any security solution, it is essential to deploy the CyberArk Privileged Access Security Solution in a secure manner and ensure the controls you have implemented are not circumvented by an attacker.

The eight controls described in this document are all key recommendations for protecting your CyberArk deployment, and therefore your privileged accounts. Consolidated by our team, these controls reflect our experience in implementing industry best practices when supporting our customers in installing and operating our products. The recommendations are also based upon analysis of various reports made by companies that experienced a security incident and other research data generally available in the industry. Details are included in Digital Vault Security Standard.

It is imperative that you follow as many of these steps as practicable in your environment, recognizing there may be other methods that you may wish to use based on your organization’s expertise. Please review your CyberArk deployment on a regular basis to ensure it complies with industry best practices, including those outlined in this document. For questions or assistance with designing and implementing these controls or support in reviewing your deployment, contact your CyberArk or partner representative.

Recommendations for Protecting your CyberArk Deployment

TruePrivileged Access Security11.1