SlideShare a Scribd company logo
1 of 12
Download to read offline
© 2018-19. All Rights Reserved. Option3
Deploying a Secure RPA Solution
© 2018-19. All Rights Reserved. Option3
AGENDA
RPA Security Architecture
Challenges in RPA Security
Vault Vs Credential Store
Benefits
Why CyberArk Integration
JiffyRPA – Intelligent
Automation © 2018-19. All Rights Reserved. Option3
Segregation of Duties
JiffyRPA
RPA Security
Platform Security Change Management and Audit
Securing Data Access &
Credentials
▪ Application configuration:
Bots can be designed
without application
credentials.
▪ Configurable role-based
access to applications
▪ Centralized control for
provisioning, tracking and
enforcement of bot duties
▪ Access control to bot/task
repository
▪ Bots can be implemented by
users with the least
privileges.
▪ AES-based encryption for
password data at rest
▪ TLS 1.2 for data in motion
▪ Masked passwords
▪ Communications between
Jiffy User, Jiffy Web Console
and Jiffy Service are
performed through
outbound WCF TLS
communications and inbound
SSL
▪ Bots work independently
and within their own
sandboxes.
▪ All actions are audit-trailed
and history maintained.
▪ Reusable bundled work
flows, expressions, UI
components are all version
controlled.
▪ Execution history and logs
can be enabled for:
• UI and back-end actions
• JDI events for user action
• DB level audits
▪ Secure Vault Stores, and
tightly controls access to:
▪ Tokens
▪ Passwords
▪ Certificates
▪ API keys, and other secrets.
▪ Stored data is encrypted.
Vault secrets will be
automatically revoked once
the lease period ends.
▪ Detailed activity audit logs
are maintained.
JiffyRPA – Intelligent
Automation © 2018-19. All Rights Reserved. Option3
• Jiffy is web-based and all access
to bots are centrally managed
through JiffyRPA console. No Jiffy
instance on individual user
desktops
• Best-in-class security with AES
256 for data at rest. TLS 1.2 for
data in motion
• Single factor authentication to Jiffy
console.
• Only the Jiffy Service runs outside
the core Jiffy Linux server and
communicates over http/https.
• All components are setup in-
premise and sandboxed. No
internet or communication with
cloud.
Jiffy Web Console
Jiffy core server
Jiffy bots on Windows desktop/Server
Desktop apps Web apps Mainframe Excel
TCP+TLS1.2
APIS (HTTP/HTTPS)
Browser on user desktop
JiffyRPA
Technical Security Architecture
© 2018-19. All Rights Reserved. Option3
CHALLENGES
Securing
Credentials
The Need to share
application credentials
with Bot designer.
Internal applications can
be secured with SSO and
Credential rotation etc.
How to secure external
application credentials?
Password
Resets
As part of security
protocols, passwords
have to be changed
frequently
What happens when
there are many accounts
accessed by bots which
have to be updated?
Managing Bot
credentials
How to ensure that the
credentials of the bot,
Windows login itself is
not accessible to anyone
not even the RPA
admins.
Ensuring that no human
can login on behalf of
the bot and execute
specific activities
Securing data
in logs
Ensuring that
credentials/secured data
do not appear in logs
Many RPA solutions hide
credentials in scripts, but
they appear in the logs
Storing other
secured info
Secured data is not
limited to credentials.
For example, bank
security questions for
login on bank portal.
Handling of sensitive
data like SSN, Credit
Cards etc.
© 2018-19. All Rights Reserved. Option3
SOLUTION
Solved using combination of technology and
business process study
Improvements in the development and
deployment process
A RPA Platform provided Secure Vault for storing
data at run time integrated with CyberArk.
© 2018-19. All Rights Reserved. Option3
SAMPLE PROCESS FLOW FOR INTEGRATED VAULT
•Business User stores
credentials and secure
data including login
questionnaire on vault
and shares key with
designer.
•Bot designer has
access to vault
•Designer will define
values for keys in the
vault
•Designer designs and
executes bots
•During execution, bots
extract values for keys
during run time
•Retrieves keys defined
by designer, not what
is defined by business
user
•Task moved to Staging
area of production
•Business walkthrough
of script
•Business User
approves the Bot
Design on Jiffy
•Bot scheduled to run
in production
•Bot is run under the
business user’s ID
•Bot picks up key
assigned by the
business user giving it
production access.
• A tight integration with RPA platform and Secure Vault is the basis of a secure
implementation.
© 2018-19. All Rights Reserved. Option3
SECURITY VAULT VS CREDENTIAL STORE
Jiffy Security Vault Standard Credential Store CYBERARK Integration
Ability to store non credential
information like Bank login questionnaire
YES NO YES
Security/encryption levels of storage High Medium High
Built in business review and approval of
task
Comprehensive Non existent Non existent
Ability to deactivate access to secure
data on modification of bot
Yes No No
Prevent sharing of credentials with Bot
Designer
Yes No Yes
Provides granular control for Business
users to change credentials
Yes No Yes
Credential rotation No No Yes (for internal apps only)
Audit log of access Yes Yes Yes
© 2018-19. All Rights Reserved. Option3
JIFFY - CYBERARK INTEGRATION
JIFFY’S SECURE VAULT
JIFFY SERVER
2 3
Operations
1 - Requests for Credentials
2 - Search for Secret(Internal
Vault/CyberArk)
3 - Get CyberArk Username
4 – Request CyberArk Password
5 - Get Cyberark Password
6 - Bot Receives Credentials
Secure
Processing
5
JIFFY BOT
1
4
6
© 2018-19. All Rights Reserved. Option3
CYBERARK INTEGRATION
• Bot Designer maps Jiffy
secure vault token to
CyberArk credentials
• Bot to be designed with
Cyber Ark credentials for
internal apps and Jiffy
Secure vault tokens for
external access.
• No storage of credential
information other than user
token in Jiffy
SECUREVAULT & CYBERARK
• Seamlessly use with
CyberArk credential or Jiffy
SecureVault credentials
• No change in user
interfaces
• Test runs will invoke the
secure processing engine
which will seamlessly
connect to CyberArk
DESIGNER INTERFACES
• Logs to reflect only user
tokens
• Request credentials in real-
time on need basis
• Identify and invoke
CyberArk credential at
runtime on need only basis.
BOT EXECUTIONS
© 2018-19. All Rights Reserved. Option3
BENEFITS
No sharing of passwords
Complete control of bot execution lies with the owner of the bot. If the bot is modified after approval, the
access is automatically revoked
JiffyRPA automatically ensures that the secure data is not appearing any logs
Best in class security with AES 256 for data at rest. TLS 1.2 for data in motion - ensuring that the no data can
be spied upon
Not just the credentials, any secure data can be managed through the vault like bank login security questions
etc.
Complete audit log of secure data
© 2018-19. All Rights Reserved. Option3
THANK YOU

More Related Content

What's hot

VoIP Wars: The Phreakers Awaken
VoIP Wars: The Phreakers AwakenVoIP Wars: The Phreakers Awaken
VoIP Wars: The Phreakers AwakenFatih Ozavci
 
Securing a Web App with Security Keys
Securing a Web App with Security KeysSecuring a Web App with Security Keys
Securing a Web App with Security KeysFIDO Alliance
 
HSBC - ForgeRock Identity Summit 2017 Dusseldorf
HSBC - ForgeRock Identity Summit 2017 DusseldorfHSBC - ForgeRock Identity Summit 2017 Dusseldorf
HSBC - ForgeRock Identity Summit 2017 DusseldorfForgeRock
 
Web authentication
Web authenticationWeb authentication
Web authenticationPradeep J V
 
Security 101: Multi-Factor Authentication for IBM i
Security 101: Multi-Factor Authentication for IBM iSecurity 101: Multi-Factor Authentication for IBM i
Security 101: Multi-Factor Authentication for IBM iPrecisely
 
Best Practices for Multi-Factor Authentication on IBM i
Best Practices for Multi-Factor Authentication on IBM iBest Practices for Multi-Factor Authentication on IBM i
Best Practices for Multi-Factor Authentication on IBM iPrecisely
 
Identity Management with the ForgeRock Identity Platform - So What’s New?
Identity Management with the ForgeRock Identity Platform - So What’s New?Identity Management with the ForgeRock Identity Platform - So What’s New?
Identity Management with the ForgeRock Identity Platform - So What’s New?ForgeRock
 
Best Practices for Multi-Factor Authentication on IBM i
Best Practices for Multi-Factor Authentication on IBM iBest Practices for Multi-Factor Authentication on IBM i
Best Practices for Multi-Factor Authentication on IBM iPrecisely
 
IDP Proxy Concept: Accessing Identity Data Sources Everywhere!
IDP Proxy Concept: Accessing Identity Data Sources Everywhere!IDP Proxy Concept: Accessing Identity Data Sources Everywhere!
IDP Proxy Concept: Accessing Identity Data Sources Everywhere!ForgeRock
 
MBFuzzer : MITM Fuzzing for Mobile Applications
MBFuzzer : MITM Fuzzing for Mobile ApplicationsMBFuzzer : MITM Fuzzing for Mobile Applications
MBFuzzer : MITM Fuzzing for Mobile ApplicationsFatih Ozavci
 
Verviam Identity Management as a Service
Verviam Identity Management as a Service Verviam Identity Management as a Service
Verviam Identity Management as a Service Nya
 
Hacking SIP Like a Boss!
Hacking SIP Like a Boss!Hacking SIP Like a Boss!
Hacking SIP Like a Boss!Fatih Ozavci
 
The New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityThe New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityPrecisely
 
OIDF Workshop at Verizon Media -- 9/30/2019 -- Browser Changes Impacting Iden...
OIDF Workshop at Verizon Media -- 9/30/2019 -- Browser Changes Impacting Iden...OIDF Workshop at Verizon Media -- 9/30/2019 -- Browser Changes Impacting Iden...
OIDF Workshop at Verizon Media -- 9/30/2019 -- Browser Changes Impacting Iden...OpenIDFoundation
 
Webinar: Three Steps to Transform Your Mobile App into a Security Factor
Webinar: Three Steps to Transform Your Mobile App into a Security FactorWebinar: Three Steps to Transform Your Mobile App into a Security Factor
Webinar: Three Steps to Transform Your Mobile App into a Security FactorPing Identity
 
OpenID Foundation Workshop at EIC 2018 - OpenID Enhanced Authentication Profi...
OpenID Foundation Workshop at EIC 2018 - OpenID Enhanced Authentication Profi...OpenID Foundation Workshop at EIC 2018 - OpenID Enhanced Authentication Profi...
OpenID Foundation Workshop at EIC 2018 - OpenID Enhanced Authentication Profi...MikeLeszcz
 
Webinar: OpenAM 12.0 - New Featurs
Webinar: OpenAM 12.0 - New FeatursWebinar: OpenAM 12.0 - New Featurs
Webinar: OpenAM 12.0 - New FeatursForgeRock
 

What's hot (20)

VoIP Wars: The Phreakers Awaken
VoIP Wars: The Phreakers AwakenVoIP Wars: The Phreakers Awaken
VoIP Wars: The Phreakers Awaken
 
Securing a Web App with Security Keys
Securing a Web App with Security KeysSecuring a Web App with Security Keys
Securing a Web App with Security Keys
 
HSBC - ForgeRock Identity Summit 2017 Dusseldorf
HSBC - ForgeRock Identity Summit 2017 DusseldorfHSBC - ForgeRock Identity Summit 2017 Dusseldorf
HSBC - ForgeRock Identity Summit 2017 Dusseldorf
 
Web authentication
Web authenticationWeb authentication
Web authentication
 
Security 101: Multi-Factor Authentication for IBM i
Security 101: Multi-Factor Authentication for IBM iSecurity 101: Multi-Factor Authentication for IBM i
Security 101: Multi-Factor Authentication for IBM i
 
IntellectLink
IntellectLinkIntellectLink
IntellectLink
 
Gateway deepdive
Gateway deepdiveGateway deepdive
Gateway deepdive
 
Best Practices for Multi-Factor Authentication on IBM i
Best Practices for Multi-Factor Authentication on IBM iBest Practices for Multi-Factor Authentication on IBM i
Best Practices for Multi-Factor Authentication on IBM i
 
Nikky:RPA
Nikky:RPANikky:RPA
Nikky:RPA
 
Identity Management with the ForgeRock Identity Platform - So What’s New?
Identity Management with the ForgeRock Identity Platform - So What’s New?Identity Management with the ForgeRock Identity Platform - So What’s New?
Identity Management with the ForgeRock Identity Platform - So What’s New?
 
Best Practices for Multi-Factor Authentication on IBM i
Best Practices for Multi-Factor Authentication on IBM iBest Practices for Multi-Factor Authentication on IBM i
Best Practices for Multi-Factor Authentication on IBM i
 
IDP Proxy Concept: Accessing Identity Data Sources Everywhere!
IDP Proxy Concept: Accessing Identity Data Sources Everywhere!IDP Proxy Concept: Accessing Identity Data Sources Everywhere!
IDP Proxy Concept: Accessing Identity Data Sources Everywhere!
 
MBFuzzer : MITM Fuzzing for Mobile Applications
MBFuzzer : MITM Fuzzing for Mobile ApplicationsMBFuzzer : MITM Fuzzing for Mobile Applications
MBFuzzer : MITM Fuzzing for Mobile Applications
 
Verviam Identity Management as a Service
Verviam Identity Management as a Service Verviam Identity Management as a Service
Verviam Identity Management as a Service
 
Hacking SIP Like a Boss!
Hacking SIP Like a Boss!Hacking SIP Like a Boss!
Hacking SIP Like a Boss!
 
The New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityThe New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and Security
 
OIDF Workshop at Verizon Media -- 9/30/2019 -- Browser Changes Impacting Iden...
OIDF Workshop at Verizon Media -- 9/30/2019 -- Browser Changes Impacting Iden...OIDF Workshop at Verizon Media -- 9/30/2019 -- Browser Changes Impacting Iden...
OIDF Workshop at Verizon Media -- 9/30/2019 -- Browser Changes Impacting Iden...
 
Webinar: Three Steps to Transform Your Mobile App into a Security Factor
Webinar: Three Steps to Transform Your Mobile App into a Security FactorWebinar: Three Steps to Transform Your Mobile App into a Security Factor
Webinar: Three Steps to Transform Your Mobile App into a Security Factor
 
OpenID Foundation Workshop at EIC 2018 - OpenID Enhanced Authentication Profi...
OpenID Foundation Workshop at EIC 2018 - OpenID Enhanced Authentication Profi...OpenID Foundation Workshop at EIC 2018 - OpenID Enhanced Authentication Profi...
OpenID Foundation Workshop at EIC 2018 - OpenID Enhanced Authentication Profi...
 
Webinar: OpenAM 12.0 - New Featurs
Webinar: OpenAM 12.0 - New FeatursWebinar: OpenAM 12.0 - New Featurs
Webinar: OpenAM 12.0 - New Featurs
 

Similar to The Whys and Hows of Deploying a Secure RPA Solution

APIConnect Security Best Practice
APIConnect Security Best PracticeAPIConnect Security Best Practice
APIConnect Security Best PracticeShiu-Fun Poon
 
Hitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and TechnologyHitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and TechnologyHitachi ID Systems, Inc.
 
Implementing security and availability requirements for banking API system us...
Implementing security and availability requirements for banking API system us...Implementing security and availability requirements for banking API system us...
Implementing security and availability requirements for banking API system us...Hitachi, Ltd. OSS Solution Center.
 
Implementing security requirements for banking API system using Open Source ...
 Implementing security requirements for banking API system using Open Source ... Implementing security requirements for banking API system using Open Source ...
Implementing security requirements for banking API system using Open Source ...Yuichi Nakamura
 
API, Integration, and SOA Convergence
API, Integration, and SOA ConvergenceAPI, Integration, and SOA Convergence
API, Integration, and SOA ConvergenceKasun Indrasiri
 
IBM API Connect Deployment `Good Practices - IBM Think 2018
IBM API Connect Deployment `Good Practices - IBM Think 2018IBM API Connect Deployment `Good Practices - IBM Think 2018
IBM API Connect Deployment `Good Practices - IBM Think 2018Chris Phillips
 
Fragments-Plug the vulnerabilities in your App
Fragments-Plug the vulnerabilities in your AppFragments-Plug the vulnerabilities in your App
Fragments-Plug the vulnerabilities in your AppAppsecco
 
Choosing the Best Business Intelligence Security Model for Your App
Choosing the Best Business Intelligence Security Model for Your AppChoosing the Best Business Intelligence Security Model for Your App
Choosing the Best Business Intelligence Security Model for Your AppLogi Analytics
 
2013.devcon3 liferay and google authenticator integration rafik_harabi
2013.devcon3 liferay and google authenticator integration rafik_harabi2013.devcon3 liferay and google authenticator integration rafik_harabi
2013.devcon3 liferay and google authenticator integration rafik_harabiRafik HARABI
 
The History and Status of Web Crypto API (2012)
The History and Status of Web Crypto API (2012)The History and Status of Web Crypto API (2012)
The History and Status of Web Crypto API (2012)Channy Yun
 
Securing Microservices in Hybrid Cloud
Securing Microservices in Hybrid CloudSecuring Microservices in Hybrid Cloud
Securing Microservices in Hybrid CloudVMware Tanzu
 
Webinar: ForgeRock Identity Platform Preview (Dec 2015)
Webinar: ForgeRock Identity Platform Preview (Dec 2015)Webinar: ForgeRock Identity Platform Preview (Dec 2015)
Webinar: ForgeRock Identity Platform Preview (Dec 2015)ForgeRock
 
2022 APIsecure_Why Assertion-based Access Token is preferred to Handle-based ...
2022 APIsecure_Why Assertion-based Access Token is preferred to Handle-based ...2022 APIsecure_Why Assertion-based Access Token is preferred to Handle-based ...
2022 APIsecure_Why Assertion-based Access Token is preferred to Handle-based ...APIsecure_ Official
 
Why Assertion-based Access Token is preferred to Handle-based one?
Why Assertion-based Access Token is preferred to Handle-based one?Why Assertion-based Access Token is preferred to Handle-based one?
Why Assertion-based Access Token is preferred to Handle-based one?Hitachi, Ltd. OSS Solution Center.
 
De la bonne utilisation de OAuth2
De la bonne utilisation de OAuth2 De la bonne utilisation de OAuth2
De la bonne utilisation de OAuth2 Leonard Moustacchis
 
FIWARE Tech Summit - Complete Framework for Identity, Access Control and API ...
FIWARE Tech Summit - Complete Framework for Identity, Access Control and API ...FIWARE Tech Summit - Complete Framework for Identity, Access Control and API ...
FIWARE Tech Summit - Complete Framework for Identity, Access Control and API ...FIWARE
 
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted SubjectsHow to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted SubjectsMaxim Salnikov
 

Similar to The Whys and Hows of Deploying a Secure RPA Solution (20)

APIConnect Security Best Practice
APIConnect Security Best PracticeAPIConnect Security Best Practice
APIConnect Security Best Practice
 
Hitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and TechnologyHitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and Technology
 
Implementing security and availability requirements for banking API system us...
Implementing security and availability requirements for banking API system us...Implementing security and availability requirements for banking API system us...
Implementing security and availability requirements for banking API system us...
 
FIDO2 and Microsoft
FIDO2 and MicrosoftFIDO2 and Microsoft
FIDO2 and Microsoft
 
Implementing security requirements for banking API system using Open Source ...
 Implementing security requirements for banking API system using Open Source ... Implementing security requirements for banking API system using Open Source ...
Implementing security requirements for banking API system using Open Source ...
 
API, Integration, and SOA Convergence
API, Integration, and SOA ConvergenceAPI, Integration, and SOA Convergence
API, Integration, and SOA Convergence
 
44CON Hacking Enterprises
44CON Hacking Enterprises44CON Hacking Enterprises
44CON Hacking Enterprises
 
IBM API Connect Deployment `Good Practices - IBM Think 2018
IBM API Connect Deployment `Good Practices - IBM Think 2018IBM API Connect Deployment `Good Practices - IBM Think 2018
IBM API Connect Deployment `Good Practices - IBM Think 2018
 
Serverless Spring
Serverless SpringServerless Spring
Serverless Spring
 
Fragments-Plug the vulnerabilities in your App
Fragments-Plug the vulnerabilities in your AppFragments-Plug the vulnerabilities in your App
Fragments-Plug the vulnerabilities in your App
 
Choosing the Best Business Intelligence Security Model for Your App
Choosing the Best Business Intelligence Security Model for Your AppChoosing the Best Business Intelligence Security Model for Your App
Choosing the Best Business Intelligence Security Model for Your App
 
2013.devcon3 liferay and google authenticator integration rafik_harabi
2013.devcon3 liferay and google authenticator integration rafik_harabi2013.devcon3 liferay and google authenticator integration rafik_harabi
2013.devcon3 liferay and google authenticator integration rafik_harabi
 
The History and Status of Web Crypto API (2012)
The History and Status of Web Crypto API (2012)The History and Status of Web Crypto API (2012)
The History and Status of Web Crypto API (2012)
 
Securing Microservices in Hybrid Cloud
Securing Microservices in Hybrid CloudSecuring Microservices in Hybrid Cloud
Securing Microservices in Hybrid Cloud
 
Webinar: ForgeRock Identity Platform Preview (Dec 2015)
Webinar: ForgeRock Identity Platform Preview (Dec 2015)Webinar: ForgeRock Identity Platform Preview (Dec 2015)
Webinar: ForgeRock Identity Platform Preview (Dec 2015)
 
2022 APIsecure_Why Assertion-based Access Token is preferred to Handle-based ...
2022 APIsecure_Why Assertion-based Access Token is preferred to Handle-based ...2022 APIsecure_Why Assertion-based Access Token is preferred to Handle-based ...
2022 APIsecure_Why Assertion-based Access Token is preferred to Handle-based ...
 
Why Assertion-based Access Token is preferred to Handle-based one?
Why Assertion-based Access Token is preferred to Handle-based one?Why Assertion-based Access Token is preferred to Handle-based one?
Why Assertion-based Access Token is preferred to Handle-based one?
 
De la bonne utilisation de OAuth2
De la bonne utilisation de OAuth2 De la bonne utilisation de OAuth2
De la bonne utilisation de OAuth2
 
FIWARE Tech Summit - Complete Framework for Identity, Access Control and API ...
FIWARE Tech Summit - Complete Framework for Identity, Access Control and API ...FIWARE Tech Summit - Complete Framework for Identity, Access Control and API ...
FIWARE Tech Summit - Complete Framework for Identity, Access Control and API ...
 
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted SubjectsHow to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
 

Recently uploaded

Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...aditisharan08
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 

Recently uploaded (20)

Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 

The Whys and Hows of Deploying a Secure RPA Solution

  • 1. © 2018-19. All Rights Reserved. Option3 Deploying a Secure RPA Solution
  • 2. © 2018-19. All Rights Reserved. Option3 AGENDA RPA Security Architecture Challenges in RPA Security Vault Vs Credential Store Benefits Why CyberArk Integration
  • 3. JiffyRPA – Intelligent Automation © 2018-19. All Rights Reserved. Option3 Segregation of Duties JiffyRPA RPA Security Platform Security Change Management and Audit Securing Data Access & Credentials ▪ Application configuration: Bots can be designed without application credentials. ▪ Configurable role-based access to applications ▪ Centralized control for provisioning, tracking and enforcement of bot duties ▪ Access control to bot/task repository ▪ Bots can be implemented by users with the least privileges. ▪ AES-based encryption for password data at rest ▪ TLS 1.2 for data in motion ▪ Masked passwords ▪ Communications between Jiffy User, Jiffy Web Console and Jiffy Service are performed through outbound WCF TLS communications and inbound SSL ▪ Bots work independently and within their own sandboxes. ▪ All actions are audit-trailed and history maintained. ▪ Reusable bundled work flows, expressions, UI components are all version controlled. ▪ Execution history and logs can be enabled for: • UI and back-end actions • JDI events for user action • DB level audits ▪ Secure Vault Stores, and tightly controls access to: ▪ Tokens ▪ Passwords ▪ Certificates ▪ API keys, and other secrets. ▪ Stored data is encrypted. Vault secrets will be automatically revoked once the lease period ends. ▪ Detailed activity audit logs are maintained.
  • 4. JiffyRPA – Intelligent Automation © 2018-19. All Rights Reserved. Option3 • Jiffy is web-based and all access to bots are centrally managed through JiffyRPA console. No Jiffy instance on individual user desktops • Best-in-class security with AES 256 for data at rest. TLS 1.2 for data in motion • Single factor authentication to Jiffy console. • Only the Jiffy Service runs outside the core Jiffy Linux server and communicates over http/https. • All components are setup in- premise and sandboxed. No internet or communication with cloud. Jiffy Web Console Jiffy core server Jiffy bots on Windows desktop/Server Desktop apps Web apps Mainframe Excel TCP+TLS1.2 APIS (HTTP/HTTPS) Browser on user desktop JiffyRPA Technical Security Architecture
  • 5. © 2018-19. All Rights Reserved. Option3 CHALLENGES Securing Credentials The Need to share application credentials with Bot designer. Internal applications can be secured with SSO and Credential rotation etc. How to secure external application credentials? Password Resets As part of security protocols, passwords have to be changed frequently What happens when there are many accounts accessed by bots which have to be updated? Managing Bot credentials How to ensure that the credentials of the bot, Windows login itself is not accessible to anyone not even the RPA admins. Ensuring that no human can login on behalf of the bot and execute specific activities Securing data in logs Ensuring that credentials/secured data do not appear in logs Many RPA solutions hide credentials in scripts, but they appear in the logs Storing other secured info Secured data is not limited to credentials. For example, bank security questions for login on bank portal. Handling of sensitive data like SSN, Credit Cards etc.
  • 6. © 2018-19. All Rights Reserved. Option3 SOLUTION Solved using combination of technology and business process study Improvements in the development and deployment process A RPA Platform provided Secure Vault for storing data at run time integrated with CyberArk.
  • 7. © 2018-19. All Rights Reserved. Option3 SAMPLE PROCESS FLOW FOR INTEGRATED VAULT •Business User stores credentials and secure data including login questionnaire on vault and shares key with designer. •Bot designer has access to vault •Designer will define values for keys in the vault •Designer designs and executes bots •During execution, bots extract values for keys during run time •Retrieves keys defined by designer, not what is defined by business user •Task moved to Staging area of production •Business walkthrough of script •Business User approves the Bot Design on Jiffy •Bot scheduled to run in production •Bot is run under the business user’s ID •Bot picks up key assigned by the business user giving it production access. • A tight integration with RPA platform and Secure Vault is the basis of a secure implementation.
  • 8. © 2018-19. All Rights Reserved. Option3 SECURITY VAULT VS CREDENTIAL STORE Jiffy Security Vault Standard Credential Store CYBERARK Integration Ability to store non credential information like Bank login questionnaire YES NO YES Security/encryption levels of storage High Medium High Built in business review and approval of task Comprehensive Non existent Non existent Ability to deactivate access to secure data on modification of bot Yes No No Prevent sharing of credentials with Bot Designer Yes No Yes Provides granular control for Business users to change credentials Yes No Yes Credential rotation No No Yes (for internal apps only) Audit log of access Yes Yes Yes
  • 9. © 2018-19. All Rights Reserved. Option3 JIFFY - CYBERARK INTEGRATION JIFFY’S SECURE VAULT JIFFY SERVER 2 3 Operations 1 - Requests for Credentials 2 - Search for Secret(Internal Vault/CyberArk) 3 - Get CyberArk Username 4 – Request CyberArk Password 5 - Get Cyberark Password 6 - Bot Receives Credentials Secure Processing 5 JIFFY BOT 1 4 6
  • 10. © 2018-19. All Rights Reserved. Option3 CYBERARK INTEGRATION • Bot Designer maps Jiffy secure vault token to CyberArk credentials • Bot to be designed with Cyber Ark credentials for internal apps and Jiffy Secure vault tokens for external access. • No storage of credential information other than user token in Jiffy SECUREVAULT & CYBERARK • Seamlessly use with CyberArk credential or Jiffy SecureVault credentials • No change in user interfaces • Test runs will invoke the secure processing engine which will seamlessly connect to CyberArk DESIGNER INTERFACES • Logs to reflect only user tokens • Request credentials in real- time on need basis • Identify and invoke CyberArk credential at runtime on need only basis. BOT EXECUTIONS
  • 11. © 2018-19. All Rights Reserved. Option3 BENEFITS No sharing of passwords Complete control of bot execution lies with the owner of the bot. If the bot is modified after approval, the access is automatically revoked JiffyRPA automatically ensures that the secure data is not appearing any logs Best in class security with AES 256 for data at rest. TLS 1.2 for data in motion - ensuring that the no data can be spied upon Not just the credentials, any secure data can be managed through the vault like bank login security questions etc. Complete audit log of secure data
  • 12. © 2018-19. All Rights Reserved. Option3 THANK YOU