Cyberark Privilege Cloud Security Overview
Cyberark Privilege Cloud Security Overview
Introduction
CyberArk is the leading Identity Security provider, helping organizations secure access to critical business data and
infrastructure, protect a distributed workforce and accelerate business the cloud. This includes the SaaS-based
CyberArk Privilege Cloud which enables organizations to quickly achieve their privileged access management goals,
delivered as a Service. While CyberArk Privilege Cloud is architected to simplify the task of protecting privileged
access without having to manage additional on-premises infrastructure, CyberArk is also committed to delivering the
most secure SaaS privileged access management offering, so that customers can trust their credentials remain well
protected. This paper reviews the stringent security measures CyberArk takes to protect the data and privacy within
CyberArk Privilege Cloud.
www.cyberark.com
Support for Authentication Technologies
CyberArk Privilege Cloud supports multi-factor authentication (MFA) for improved security including out of the box
capabilities with CyberArk Workforce Identity and Customer Identity. CyberArk strongly recommends customers use
MFA for advanced protection. Privilege Cloud supports SAML MFA, LDAP and CyberArk Authentication.
Multi-factor authentication safeguards access to the sensitive information stored within CyberArk Privilege Cloud. In
addition, customers can centrally extend multi-factor authentication to all other privileged accounts (on- premises, in
the cloud or in DevOps environments) by storing and managing their credentials in Privilege Cloud.
Physical Security X X
* Customers should follow the provided CyberArk best practice recommendations to maintain the highest levels of security. An example of this would be to utilize
multi-factor authentication when connecting to the CyberArk Web Interface.
www.cyberark.com
Privilege Cloud also has committed Service Maintenance, meaning (i) routine weekly maintenance performed by
CyberArk during a pre- scheduled window; (ii) other system upgrades, enhancements or routine maintenance which
is announced via email at least two days in advance; or (iii) emergency maintenance of the Services outside of the
foregoing routine or pre- scheduled maintenance window that is reasonably required to complete the application
of patches or fixes, or to undertake other urgent maintenance activities. CyberArk shall strive to limit the Service
Maintenance window to the minimum possible to avoid service disruption. Please note that the Maintenance Window
for upgrades typically occurs once every 4 months, and requires up to 15 minutes of downtime. Security patches
typically occur on a monthly basis which occasionally results in a downtime due to restart that can take up to 4 minutes.
In most cases, the Recovery Time Objective (RTO), is near zero to within 20 minutes. Note that in rare disaster
recovery scenarios, where data has to be completely restored from backups, RTO can be between 4-24 hours. For
Recovery Point Objective (RPO), for system data, such as privileged accounts stored in the database, the RPO is just
seconds from the time of failure, and up to 12 hours for recordings and configuration changes from the last working point.
How is it done?
CyberArk Privilege Cloud is deployed on an AWS platform and resides on three different Availability Zones (AZ), in a
case of outages in one of the AZ data-centers. Each AZ includes the application and all the supported entities that
are required for the proper functionality of the solution, monitoring and automatic triggered mitigations.
The monitoring systems collect all the service elements (OS metrics, system and applications log, network data, audit
and components heartbeat), analyzes them and alerts in case of availability issues or other suspicious indications.
A watchdog service is responsible for triggering automatic procedures based on alerts generated by the monitoring
system. The watchdog eliminates the need for human intervention in mitigating issues with the service (e.g. spin up a
new application server in one or more AZs and terminate the old one without any manual steps.)
Note: Achieving 99.95% availability is calculated by excluding scheduled maintenance of the service.
* All uptime and availability commitments will be set forth in the applicable agreement between CyberArk and the customer.
Conclusion
CyberArk is first and foremost a security company. As such, all CyberArk products and services—including CyberArk
Privilege Cloud—are designed with a security-first mindset based on our expertise in privileged access management.
CyberArk uses advanced encryption algorithms to protect data at rest and data in transit, hardens all CyberArk
Privilege Cloud components to reduce attacks surfaces and supports multi-factor authentication and policy-based
access controls to help avoid unauthorized access and data disclosure.
In addition, CyberArk Privilege Cloud core technology is submitted to external organizations for independent testing
and security validation and has achieved SOC 2 Type 2 compliance. Through this process, the CyberArk Privileged
Account Security Solution has achieved ISO 9001, Common Criteria and United States Department of Defense UC
APL certifications.
To learn more about these certifications or CyberArk Privilege Cloud, please contact your CyberArk sales
representative or contact us at sales@cyberark.com.
©Copyright 2023 CyberArk Software. All rights reserved. No portion of this publication may be reproduced in any form or by any means without the express written consent of CyberArk
Software. CyberArk ®, the CyberArk logo and other trade or service names appearing above are registered trademarks (or trademarks) of CyberArk Software in the U.S. and other jurisdictions.
Any other trade and service names are the property of their respective owners. U.S., 03.23. Doc. TSK-3499 (TSK-2511 (367087481))
CyberArk believes the information in this document is accurate as of its publication date. The information is provided without any express, statutory, or implied warranties and is subject to
change without notice.
www.cyberark.com