Introduction To Core PAS
Introduction To Core PAS
Introduction To Core PAS
CyberArk Training
1
LESSON OBJECTIVES
This lesson provides an introduction to the CyberArk Privileged Access Security (PAS) solution.
• A common attack method and how CyberArk PAS can minimize exposure
2
2
BASIC SYSTEM PRINCIPLES
3
PRIVILEGED ACCESS SECURITY
• Oracle DBA
4
4
PRIVILEGED ACCOUNTS CREATE A HUGE ATTACK SURFACE
3rd-Party &
System Service Select Social Networking
Administrators Providers Applications Business Users Account Managers
5
5
ATTACKERS NEED INSIDER CREDENTIALS
“…100% of breaches
involved stolen
credentials.” “APT intruders…prefer to leverage
privileged accounts where possible, such
as Domain Administrators, service
accounts with Domain privileges, local
Administrator accounts, and privileged
user accounts.”
6
6
PRIVILEGE IS AT THE CENTER OF THE ATTACK LIFECYCLE
Typical Lifecycle of a Cyber Attack
• Penetration
• Credential theft
• Reconnaissance
• Lateral movement
• Privilege escalation
• Repeat
7 7
CYBERARK BREAKS THE ATTACK CHAIN
• Penetration
• Credential theft
• Reconnaissance
• Lateral movement
• Privilege escalation
• Repeat
8 8
PROACTIVE PROTECTION, DETECTION, & RESPONSE
Proactive protection
• Secured credentials
Insider • Only authorized users
• Individual accountability
External Databases/
Hypervisors
Applications • Session isolation
• Limit scope of privilege
External
Targeted detection
Endpoints Network
Insider Devices • Continuous monitoring
• Malicious behavior
External • High risk behavior
Industrial
Insider Controls Social Media • Alerts
External
Real-time response
• Session suspension/termination
Privileged Accounts • Full forensics record of activity
9
9
CYBERARK DELIVERS A NEW CRITICAL SECURITY LAYER
PERIMETER SECURITY
10
10
A COMMON ATTACK METHOD
11
PASS-THE-HASH
• For Windows SSO, password hashes are loaded into the Local Security Authority Subsystem
(Lsass).
• Note: a Hash is an encrypted representation of password
• Widely available tools such as mimikatz can be used to expose the hashes and move laterally
through the network
12
12
CYBERARK PRIVILEGED ACCESS SECURITY
13
13
KEY FEATURES
14
• Discover and manage credentials
• Rotation frequency
Digital
• Etc. Vault
System User Pass
Unix root tops3cr3t
Oracle SYS tops3cr3t
Windows Administrator tops3cr3t
z/OS DB2ADMIN tops3cr3t
Cisco enable tops3cr3t
Enterprise IT Environment
16
ISOLATE CREDENTIALS AND SESSIONS
17
RECORD AND AUDIT SESSIONS
• Privileged sessions
recorded in video and/or
text format
18
MONITOR PRIVILEGED ACTIVITY
• CyberArk session
monitoring enables review
of recordings and live
sessions
19
REMEDIATE RISKY BEHAVIOR
20
21
KEY FEATURES: STANDARD CORE PAS
22
STANDARD CORE PAS COMPONENTS
Password Vault Web • The web interface for users to gain access to privileged account information
Access (PVWA) • Used by Vault administrators to configure policies
Privilege Threat
• Monitors and detects malicious privileged account behavior.
Analytics (PTA)
23
23
THE VAULT AND ITS COMPONENTS
24
THE VAULT AND ITS CLIENTS
Unmanaged
Target Account
and Servers
End Users:
IT Staff, Auditor, etc. Privileged Session
Manager
Password Vault
Web Access
Central Policy Managed
Manager Target Account
Custom Applications, and Servers
Reporting Tools, etc.
Vault
Unix/Windows
PrivateArk Client
Application
Vault Providers Target Databases
Administrators Privileged
Threat Analytics
Unix/Windows Users
25
THE VAULT: END-TO-END SECURITY
Stored
Vault User Credential
Discretionary Mandatory
Session File
Firewall Authentication Access Access Auditing
Encryption Encryption
Control Control
26
CYBERARK’S SCALABLE ARCHITECTURE
Auditors
PVWA
PTA CPM PSM
IT
Auditors/IT Auditors/IT
IT Environment IT Environment
27
• PVWA
INTERFACES • PACLI
• PVWA version 10
introduced the new user
interface, which focuses on
seamless workflows and
easy access.
• End users will use this
interface to retrieve
passwords or launch
privileged sessions.
• Auditors will use this
interface to monitor
privileged sessions.
• Some features still require
the version 9 interface,
which can be accessed by a
dedicated link
29
PVWA – CLASSIC INTERFACE
30
PRIVATEARK CLIENT
• Mostly used by
administrators for certain
tasks that are not
implemented in PVWA or
any tasks involving file
movements, which is more
convenient in PrivateArk
than PVWA.
31
LEGACY – PACLI
32
PAS WEB SERVICES
33
VAULT CENTRAL ADMINISTRATION STATION
34
REMOTE CONTROL CLIENT
Monitoring the Vault status using the Remote Client:
• Runs from a command line
interface PARCLIENT> status vault
Password: *********
Vault is running.
• Executes tasks on Vault
PARCLIENT> stop vault
server via Are you sure you want to stop the remote Vault (Y/N)? y
Remote Control Agent Vault was stopped successfully
PARCLIENT>
35
ONLINE HELP AND CUSTOMER COMMUNITY
36
CYBERARK CUSTOMER COMMUNITY
• Online documentation
• Knowledge base
• Training
• Enhancement Requests
• Marketplace
37
ON-LINE DOCUMENTATION
• Easily searchable
information
38
CYBERARK ACRONYMS
https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/CyberArk-Acronyms.htm
39
39
SUMMARY
40
SUMMARY
41
41
EXERCISES
• PVWA
• Log in as Administrator
• Activate the PSM
• Deactivate “Reason for Access”
• Connect using a stored account in the New UI
• Connect using a stored account in the Classic UI
• PrivateArk Client
• Remote Control Client
• PrivateArk Server
42
ADDITIONAL RESOURCES
eLearning
• DNA
• zBang
Videos
• DNA
43
THANK YOU
44