CyberArk Digital Vault Security Standards
CyberArk Digital Vault Security Standards
CyberArk Digital Vault Security Standards
Security Standard
March 2016
The Digital Vault Server shall be built from the original Microsoft installation
media, and no third-party software, such as anti-virus or remote
management solutions, shall be installed.
To avoid the potential for untrusted operating system components or the
inadvertent introduction of third-party software, it is important that the Digital Vault
Server be built from trusted original media. Any third-party software installed on
the Digital Vault Server introduces risks not present in a standard, secure
configuration. Such risks include:
The opening of firewall ports, which introduce additional external attack
vectors.
Security vulnerabilities, potentially present in any third-party software, can
create pivot points and introduce new attack vectors.
Operational risks, including an impact to server availability, stemming from
conflict between internal components of the Digital Vault and third-party
software. Such conflicts often delay troubleshooting, which impacts
CyberArk’s support SLAs and increase the time to resolution.
The following are potential security risks associated with running a virtualized
Digital Vault Server and CyberArk’s recommendations to mitigate these risks
An attacker can potentially initiate multiple, simultaneous “brute force”
password attacks against existing CyberArk user accounts. This risk arises
because an attacker can create unlimited copies of the virtual machine, and
with an unlimited number of machines, account lockout mechanisms can be
bypassed.
There is no mitigating control for the risk of brute force attacks. Customers
who run the Digital Vault Server in a virtualized environment assume this
risk.
This risk of an attacker successfully reverse-engineering the encryption of the
Digital Vault data is increased in virtual environments. To start the Digital
Vault software, the virtual machine must have access to the Server Key.
Because of this, implementation practices in virtualized environments require
the Server Key to be placed on the Digital Vault Server OS file system. In a
secure physical environment, such as an enterprise datacenter, the risk of
storing the Server Key on the file system can be mitigated by implementing
physical security controls. If an attacker takes possession of a virtual
machine, the attacker could have access to the operating system, Server Key
and encrypted data, making it possible to reverse-engineer the encryption
and gain access to the Digital Vault data.
There are two mitigating controls available for this risk:
Use a Hardware Security Module to securely store the Server Key
separately from the Digital Vault Server OS file system.
Manually mount the Server Key each time it is required. This approach will
improve security, but it will cause the DR Vault instance to not be
available automatically during a disaster.
Domain Membership
As mentioned above, installing the Digital Vault on a domain member server can
result in the following:
Added risk of domain level attacks, such as pass-the-hash or golden ticket
attacks
Malicious or accidental changes in domain GPO
Vulnerability to external attack vectors due to opened firewall ports
Vulnerability to internal attack vectors and increased operational risk due to the
enablement of unnecessary services
Increased risk of inside attacks due to access by Domain, Enterprise and
Schema Administrators
Third-Party Software
As mentioned above, the installation of third-party software on the Digital Vault
Server introduces the following risks:
Vulnerability to external attack vectors due to opened firewall ports.
Exposure of the Digital Vault Server to all vulnerabilities and attack vectors
present in third-party software
Impacted Digital Vault availability due to conflict between internal components
and third-party software
Impacted support resolution due to the need for non-standard troubleshooting
Support Implications
CyberArk will provide best-effort support for Digital Vault Servers running in a non-
standard configuration.
However, running the Digital Vault application on a server that deviates from the
CyberArk Digital Vault Security Standard significantly reduces the security of the
solution. We strongly advise our customers to conform to the CyberArk Digital Vault
Security Standard so that our solution is able to operate in accordance with its
specifications.