Cyber Ark
Cyber Ark
Cyber Ark
By identifying and accessing privileged accounts, an unscrupulous insider can easily roam far and
wide inside an organization's network. Such accounts function, in effect, as master keys to the
deepest, most sensitive parts of an organization's digital assets.
The Privilege ID Dilemma
Your Risks
Your Challenges
Administrators end-point
Periodic
Passwords
Change
Servers
Periodic
Passwords
Periodic Change
passwords
Change
Once inside the network, the attacker Databases
employs various attack-vectors to
Periodic
achieve his target. Passwords
Change
Virtual Machines
Trying to use default
privileged passwords Periodic
Passwords
Change
Malicious Code
Application Servers
Privilege Attack Vectors: Then Hijack the Administrator!
Administrators end-point
Databases
Malware sees
Privileged Session Manager
pixels and cannot Secure Proxy Control-Point
access the assets
Application Servers
Privileged Identity
Management Solution
Vulnerable Privileged Account Types
Shared Predefined: Shared: Owned by the system:
UNIX root Help Desk Not owned by any
Operations person or identity
Administrative
Administrative Cisco enable
Accounts
Accounts DBA accounts Emergency
Windows domain Legacy applications
Developer accounts
Etc.
11
Protecting Administrative Accounts
System User Pass
tops3cr3t
tops3cr3t password1
Unix A root
Unix B root tops3cr3t
orac1e psw4adm
Unix C root tops3cr3t
Oracle A SYS orac1e T&y3p0L
O8=p<zZ
Qom$3#a
nc7Sd3R
mN85p:a
j7t5QdC
l+zM6t1
O9^aziA
Iu~1@r
P9i$b%
0in7$&x
cqg8@fz
lm7yT5w
iaX3f#!
Log5%t
gvIna9%
o70X#jJ
R73#m-
yOb2@1
x8wF$2
iIt$8sa PSM O8=p<zZ
Oracle B SYS orac1e Servers
O8=p<zZ
Person
al ID
13
Major Local Bank in Hong Kong
- Working with HKMA to implement effective PIM Solution
Business Challenges
Determine the extent to feedback to HKMA on their PIM guidelines
18
QUESTIONS?
19
THANK YOU
20
How Can I Ensure Only Trusted Applications Get The Password?
My Server
Cyber-Ark API
UserName = GetUsername()
Central Policy
Password = GetPassword() Manager
Host = GetAddress()
Ongoing password
ConnectDatabasechanges are transparent
Database to applications
(Host,UserName,Password)
Hard Coded Passwords A Major Vulnerability
Point
Web Config Files
Configuration Files & Websphere
Databases
Weblogic
Application Servers
JBoss
Clear-text
Windows service
INI/Text Files
UserName = app passwords
Scheduled intasks
Service Accounts Apache
Password = y7qeF$1 connection strings
IIS application pool
Tomcat
Host = 10.10.3.56 found in
ConnectDatabase(Host, UserName, Password)Security
IIS Directory
J2EE Application Serversdatasource
COM+
(Java)
Hard-Coded,
Application Databases and webconfig (IIS)
Registry
Embedded Credentials files create serious
security risks
Third Party
Applications IIS for Windows Server
Also in registry, FTP credentials and more
Eliminate Hard Coded Password
UserName = app
Password = y7qeF$1
Host = 10.10.3.56
ConnectDatabase(Host, Vault
UserName, Password)
Cyber-Ark API
UserName = GetUsername()
Password = GetPassword()
Host = GetAddress()
ConnectDatabase
(Host,UserName,Password)
Supported APIs: CLI, Java, .Net, COM, C/C++
on Windows, RHEL, SUSE Linux/zLinux, Solaris, AIX, HP-UX