SlideShare a Scribd company logo
1 of 14
FOR IDENTITY SECURITY SUCCESS
Why The
Toolkit?
Help your organization understand the
identity attack chain and map a prioritized
risk-based approach, assess your security
posture, identify security control gaps and
gain insight, and identify best practices to
drive adoption across your workforce.
• CyberArk Blueprint Introduction
• CyberArk Blueprint Stages Overview
• Building a Roadmap
• On-Demand Resources
• Next Steps
• Appendix
Table of
Contents
cyberark.com
4
WORKPLACES
Office WFH Temporary Location
USERS
3rd Party Vendors
DevOps Workforce
Apps / Robots
Admin
PC
Mac Mobile
WORKSPACES
IaaS / PaaS
Code
Cloud Native
Apps
Containers VM’s &
Storage
Serverless
SaaS
Code
OT/HMI
On-Prem / Hybrid / Cloud
Code
App Server Network Devices
Database
*NIX Server IT Ops Tools
IoT
cyberark.com
Simple Prescriptive Guidance
5
Identity Security
Program Framework
Measurably
Reduce Risk
Lessons Learned
in Battle
Full Scope of
Identities
cyberark.com
6
Understand the
Attack Chain
Assess Your Security Best Practice
Education
Build Your
Plan
Multi-use, Multi-purpose
cyberark.com
7
CREDENTIAL THEFT
Actors use techniques such as social engineering,
keystroke logging, credential repository scraping,
and more to harvest passwords, hashes, SSH
Keys, or hard coded credentials.
LATERAL & VERTICAL MOVEMENT
Actors will leverage that access to navigate across an organization’s
resources, whether it be laterally from within a risk tier (e.g.
workstation to workstation) or crossing vertically into another risk tier
or environment (e.g. workstation to cloud or workstation to DevOps
tool).
PRIVILEGE ESCALATION & ABUSE
Once a bad actor has discovered the access they
desire, they will elevate their privileges to then carry
out malicious actions against the organization.
MALICIOUS ACTORS
Bad actors can exist either internally or externally
to the organization. External actors use a wide
variety of techniques to gain entry, while internal
actors tend to leverage existing knowledge and
access.
ACTIONS ON OBJECTIVES
Those malicious actions are typically predefined
objectives such as data theft, ransomware
distribution, service disruption, supply chain
spread, brand damage and more.
cyberark.com
RISK REDUCTION
Critical
Major
Moderate
Prevent
Credential Theft
Stop Lateral &
Vertical Movement
Limit Privilege Escalation
& Abuse
STAGE 2: Core Security
Focus on locking down the most universal
technology platforms.
STAGE 3: Enterprise Program
Build identity security into the fabric of enterprise
strategy and application pipelines
STAGE 4: Mature the Program
Mature existing controls and expand into advanced
identity security.
STAGE 5: Advanced Security
Look for new opportunities to shore up identity security
across the enterprise.
STAGE 1: Rapid Risk Mitigation
Secure highest privilege identities that have the potential to control
an entire environment.
cyberark.com
cyberark.com
CP12
CP11
CP10
CP9
CP8
Legend
Strategy Refresh
Access Controls
PAM Controls
Least Privilege Controls
Secrets Management Controls
15
CP7 CP6 CP5 CP4
CP3
CP2
ACCESS
Lorem ipsum dolor sit amet, consectetur
adipiscing elit, sed do eiusmod tempor
incididunt ut labore et dolore magna
aliqua
PAM
Duis aute irure dolor in reprehenderit in
voluptate velit esse cillum dolore eu
fugiat nulla pariatur occaecat cupidatat
LEAST PRIVILEGE
Ut enim ad minim veniam, quis nostrud
exercitation ullamco laboris nisi ut aliquip
ex ea commodo consequat
PAM
Nemo enim ipsam voluptatem quia
voluptas sit aspernatur aut odit aut fugit,
sed quia consequuntur magni dolores
eos
SECRETS MANAGEMENT
Sed ut perspiciatis unde omnis iste natus
error sit voluptatem accusantium
doloremque laudantium, totam rem
aperiam
LEAST PRIVILEGE
Excepteur sint occaecat cupidatat
non proident, sunt in culpa qui
officia deserunt mollit anim id est
laborum
SECRETS MANAGEMENT
Eaque ipsa quae ab illo inventore
veritatis et quasi architecto beatae vitae
dicta sunt explicabo
LEAST PRIVILEGE
Neque porro quisquam est, qui dolorem
ipsum quia dolor sit amet, consectetur,
adipisci velit, sed quia non numquam
PAM
Et harum quidem rerum facilis
est et expedita distinctio. Nam
libero tempore
SECRETS MGMT
Temporibus autem quibusdam et
aut officiis debitis aut rerum
necessitatibus saepe
ACCESS
Ut enim ad minima veniam, quis
nostrum exercitationem ullam
corporis suscipit
ACCESS
At vero eos et accusamus et
iusto odio dignissimos ducimus
qui blanditiis praesentium
voluptatum
CP1
cyberark.com
CP8
CP7
CP6
CP5 CP4
Legend
Strategy Refresh
Access Controls
PAM Controls
Least Privilege Controls
Secrets Management Controls
SECRETS MANAGEMENT
Secure non-human application, scripts and processes consuming Amazon Web Services or
Google Cloud Platform entities with administrator or shadow admin permissions with vaulting,
rotation and just-in-time credential retrieval or just-in-time role-assumption
CP3
CP2
CP1
ACCESS
Secure Admins and Shadow Admins on
Amazon Web Services and Google
Cloud Platform with SSO, MFA and SWS
PAM
Discover internal directory admin users in
AWS and GCP and secure with
credential vaulting, rotation and isolation
controls
PAM
Secure OS level admin access to Windows and *NIX virtual machines (EC2/Compute
Engine) with dynamic, just-in-time access policies, session isolation and audit controls
PAM
Secure built-in Local Administrator accounts for Windows Server OS (SID-
500) and *NIX Server OS (UID0) virtual machines with credential vaulting
and rotation, and session isolation and audit controls
LEAST PRIVILEGE
Implement Least Privilege for AWS and GCP
non-admin entities with excessive risky
permissions to ensure entities have just-enough-
access
SECRETS MANAGEMENT
Secure non-human application, scripts and processes AWS or
GCP entities with risky permissions with vaulting, rotation and
just-in-time credential retrieval or just-in-time role-assumption
LEAST PRIVILEGE
Implement Least Privilege for AWS and
GCP entities with admin permissions to
ensure entities have just-enough-access
cyberark.com
19
CyberArk Blueprint
Whitepapers
& eBooks
CyberArk Success
Blog Articles
(Technical Community)
CyberArk Blueprint
Self-Service
Toolkit
Getting The Most Out of Blueprint
cyberark.com
20
Visit the CyberArk.com/Blueprint webpage
Ask yourself, what am I looking to do?
Download our Blueprint Toolkit to begin designing your Identity Security Roadmap
Review our Success Blog for more people, process and technology guidance
Use the Blueprint Self-Assessment to assess your security posture
Learn more about how identities can be compromised
Use the appropriate resources that align to your needs
Explore self-service resources (examples below)
Understand the Attack Chain
Assess Your Security
Learn Best Practices
Build Your Plan
DIY-CyberArk-Blueprint-Roadmap-Template.pptx

More Related Content

Similar to DIY-CyberArk-Blueprint-Roadmap-Template.pptx

CyberArk Interview Questions and Answers for 2022.pdf
CyberArk Interview Questions and Answers for 2022.pdfCyberArk Interview Questions and Answers for 2022.pdf
CyberArk Interview Questions and Answers for 2022.pdfInfosec Train
 
CyberArk Interview Questions and Answers for 2023.pdf
CyberArk Interview Questions and Answers for 2023.pdfCyberArk Interview Questions and Answers for 2023.pdf
CyberArk Interview Questions and Answers for 2023.pdfinfosec train
 
CyberArk Interview Questions and Answers for 2022.pdf
CyberArk Interview Questions and Answers for 2022.pdfCyberArk Interview Questions and Answers for 2022.pdf
CyberArk Interview Questions and Answers for 2022.pdfinfosec train
 
ISACA-presentation-Aug-18-2016- Onion ID
ISACA-presentation-Aug-18-2016- Onion IDISACA-presentation-Aug-18-2016- Onion ID
ISACA-presentation-Aug-18-2016- Onion IDbanerjeea
 
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...Amazon Web Services Korea
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewCamilo Fandiño Gómez
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewCamilo Fandiño Gómez
 
Multi cloud governance best practices - AWS, Azure, GCP
Multi cloud governance best practices - AWS, Azure, GCPMulti cloud governance best practices - AWS, Azure, GCP
Multi cloud governance best practices - AWS, Azure, GCPFaiza Mehar
 
CyberArk Interview.pdf
CyberArk Interview.pdfCyberArk Interview.pdf
CyberArk Interview.pdfInfosec Train
 
Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro Amazon Web Services
 
CyberArk Interview Questions and Answers for 2022.pptx
CyberArk Interview Questions and Answers for 2022.pptxCyberArk Interview Questions and Answers for 2022.pptx
CyberArk Interview Questions and Answers for 2022.pptxInfosectrain3
 
AWS Frederick Meetup 07192016
AWS Frederick Meetup 07192016AWS Frederick Meetup 07192016
AWS Frederick Meetup 07192016Gaurav "GP" Pal
 
Serverless functions or microservices
Serverless functions or microservicesServerless functions or microservices
Serverless functions or microservicesRadu Vunvulea
 
Představení Oracle SPARC Miniclusteru
Představení Oracle SPARC MiniclusteruPředstavení Oracle SPARC Miniclusteru
Představení Oracle SPARC MiniclusteruMarketingArrowECS_CZ
 
Introduction to DevSecOps
Introduction to DevSecOpsIntroduction to DevSecOps
Introduction to DevSecOpsSetu Parimi
 
A Fresh, New Look for CMD+CTRL Cyber Range
A Fresh, New Look for CMD+CTRL Cyber RangeA Fresh, New Look for CMD+CTRL Cyber Range
A Fresh, New Look for CMD+CTRL Cyber RangeSecurity Innovation
 
System Hardening Using Ansible
System Hardening Using AnsibleSystem Hardening Using Ansible
System Hardening Using AnsibleSonatype
 
How to Migrate to Cloud with Complete Confidence and Trust
How to Migrate to Cloud with Complete Confidence and TrustHow to Migrate to Cloud with Complete Confidence and Trust
How to Migrate to Cloud with Complete Confidence and TrustApcera
 
AWS Summit Singapore - Next Generation Security
AWS Summit Singapore - Next Generation SecurityAWS Summit Singapore - Next Generation Security
AWS Summit Singapore - Next Generation SecurityAmazon Web Services
 
5 step plan to securing your APIs
5 step plan to securing your APIs5 step plan to securing your APIs
5 step plan to securing your APIs💻 Javier Garza
 

Similar to DIY-CyberArk-Blueprint-Roadmap-Template.pptx (20)

CyberArk Interview Questions and Answers for 2022.pdf
CyberArk Interview Questions and Answers for 2022.pdfCyberArk Interview Questions and Answers for 2022.pdf
CyberArk Interview Questions and Answers for 2022.pdf
 
CyberArk Interview Questions and Answers for 2023.pdf
CyberArk Interview Questions and Answers for 2023.pdfCyberArk Interview Questions and Answers for 2023.pdf
CyberArk Interview Questions and Answers for 2023.pdf
 
CyberArk Interview Questions and Answers for 2022.pdf
CyberArk Interview Questions and Answers for 2022.pdfCyberArk Interview Questions and Answers for 2022.pdf
CyberArk Interview Questions and Answers for 2022.pdf
 
ISACA-presentation-Aug-18-2016- Onion ID
ISACA-presentation-Aug-18-2016- Onion IDISACA-presentation-Aug-18-2016- Onion ID
ISACA-presentation-Aug-18-2016- Onion ID
 
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
 
Multi cloud governance best practices - AWS, Azure, GCP
Multi cloud governance best practices - AWS, Azure, GCPMulti cloud governance best practices - AWS, Azure, GCP
Multi cloud governance best practices - AWS, Azure, GCP
 
CyberArk Interview.pdf
CyberArk Interview.pdfCyberArk Interview.pdf
CyberArk Interview.pdf
 
Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro
 
CyberArk Interview Questions and Answers for 2022.pptx
CyberArk Interview Questions and Answers for 2022.pptxCyberArk Interview Questions and Answers for 2022.pptx
CyberArk Interview Questions and Answers for 2022.pptx
 
AWS Frederick Meetup 07192016
AWS Frederick Meetup 07192016AWS Frederick Meetup 07192016
AWS Frederick Meetup 07192016
 
Serverless functions or microservices
Serverless functions or microservicesServerless functions or microservices
Serverless functions or microservices
 
Představení Oracle SPARC Miniclusteru
Představení Oracle SPARC MiniclusteruPředstavení Oracle SPARC Miniclusteru
Představení Oracle SPARC Miniclusteru
 
Introduction to DevSecOps
Introduction to DevSecOpsIntroduction to DevSecOps
Introduction to DevSecOps
 
A Fresh, New Look for CMD+CTRL Cyber Range
A Fresh, New Look for CMD+CTRL Cyber RangeA Fresh, New Look for CMD+CTRL Cyber Range
A Fresh, New Look for CMD+CTRL Cyber Range
 
System Hardening Using Ansible
System Hardening Using AnsibleSystem Hardening Using Ansible
System Hardening Using Ansible
 
How to Migrate to Cloud with Complete Confidence and Trust
How to Migrate to Cloud with Complete Confidence and TrustHow to Migrate to Cloud with Complete Confidence and Trust
How to Migrate to Cloud with Complete Confidence and Trust
 
AWS Summit Singapore - Next Generation Security
AWS Summit Singapore - Next Generation SecurityAWS Summit Singapore - Next Generation Security
AWS Summit Singapore - Next Generation Security
 
5 step plan to securing your APIs
5 step plan to securing your APIs5 step plan to securing your APIs
5 step plan to securing your APIs
 

Recently uploaded

APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 

Recently uploaded (20)

The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 

DIY-CyberArk-Blueprint-Roadmap-Template.pptx

  • 2. Why The Toolkit? Help your organization understand the identity attack chain and map a prioritized risk-based approach, assess your security posture, identify security control gaps and gain insight, and identify best practices to drive adoption across your workforce.
  • 3. • CyberArk Blueprint Introduction • CyberArk Blueprint Stages Overview • Building a Roadmap • On-Demand Resources • Next Steps • Appendix Table of Contents
  • 4. cyberark.com 4 WORKPLACES Office WFH Temporary Location USERS 3rd Party Vendors DevOps Workforce Apps / Robots Admin PC Mac Mobile WORKSPACES IaaS / PaaS Code Cloud Native Apps Containers VM’s & Storage Serverless SaaS Code OT/HMI On-Prem / Hybrid / Cloud Code App Server Network Devices Database *NIX Server IT Ops Tools IoT
  • 5. cyberark.com Simple Prescriptive Guidance 5 Identity Security Program Framework Measurably Reduce Risk Lessons Learned in Battle Full Scope of Identities
  • 6. cyberark.com 6 Understand the Attack Chain Assess Your Security Best Practice Education Build Your Plan Multi-use, Multi-purpose
  • 7. cyberark.com 7 CREDENTIAL THEFT Actors use techniques such as social engineering, keystroke logging, credential repository scraping, and more to harvest passwords, hashes, SSH Keys, or hard coded credentials. LATERAL & VERTICAL MOVEMENT Actors will leverage that access to navigate across an organization’s resources, whether it be laterally from within a risk tier (e.g. workstation to workstation) or crossing vertically into another risk tier or environment (e.g. workstation to cloud or workstation to DevOps tool). PRIVILEGE ESCALATION & ABUSE Once a bad actor has discovered the access they desire, they will elevate their privileges to then carry out malicious actions against the organization. MALICIOUS ACTORS Bad actors can exist either internally or externally to the organization. External actors use a wide variety of techniques to gain entry, while internal actors tend to leverage existing knowledge and access. ACTIONS ON OBJECTIVES Those malicious actions are typically predefined objectives such as data theft, ransomware distribution, service disruption, supply chain spread, brand damage and more.
  • 8. cyberark.com RISK REDUCTION Critical Major Moderate Prevent Credential Theft Stop Lateral & Vertical Movement Limit Privilege Escalation & Abuse STAGE 2: Core Security Focus on locking down the most universal technology platforms. STAGE 3: Enterprise Program Build identity security into the fabric of enterprise strategy and application pipelines STAGE 4: Mature the Program Mature existing controls and expand into advanced identity security. STAGE 5: Advanced Security Look for new opportunities to shore up identity security across the enterprise. STAGE 1: Rapid Risk Mitigation Secure highest privilege identities that have the potential to control an entire environment.
  • 10. cyberark.com CP12 CP11 CP10 CP9 CP8 Legend Strategy Refresh Access Controls PAM Controls Least Privilege Controls Secrets Management Controls 15 CP7 CP6 CP5 CP4 CP3 CP2 ACCESS Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua PAM Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur occaecat cupidatat LEAST PRIVILEGE Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat PAM Nemo enim ipsam voluptatem quia voluptas sit aspernatur aut odit aut fugit, sed quia consequuntur magni dolores eos SECRETS MANAGEMENT Sed ut perspiciatis unde omnis iste natus error sit voluptatem accusantium doloremque laudantium, totam rem aperiam LEAST PRIVILEGE Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum SECRETS MANAGEMENT Eaque ipsa quae ab illo inventore veritatis et quasi architecto beatae vitae dicta sunt explicabo LEAST PRIVILEGE Neque porro quisquam est, qui dolorem ipsum quia dolor sit amet, consectetur, adipisci velit, sed quia non numquam PAM Et harum quidem rerum facilis est et expedita distinctio. Nam libero tempore SECRETS MGMT Temporibus autem quibusdam et aut officiis debitis aut rerum necessitatibus saepe ACCESS Ut enim ad minima veniam, quis nostrum exercitationem ullam corporis suscipit ACCESS At vero eos et accusamus et iusto odio dignissimos ducimus qui blanditiis praesentium voluptatum CP1
  • 11. cyberark.com CP8 CP7 CP6 CP5 CP4 Legend Strategy Refresh Access Controls PAM Controls Least Privilege Controls Secrets Management Controls SECRETS MANAGEMENT Secure non-human application, scripts and processes consuming Amazon Web Services or Google Cloud Platform entities with administrator or shadow admin permissions with vaulting, rotation and just-in-time credential retrieval or just-in-time role-assumption CP3 CP2 CP1 ACCESS Secure Admins and Shadow Admins on Amazon Web Services and Google Cloud Platform with SSO, MFA and SWS PAM Discover internal directory admin users in AWS and GCP and secure with credential vaulting, rotation and isolation controls PAM Secure OS level admin access to Windows and *NIX virtual machines (EC2/Compute Engine) with dynamic, just-in-time access policies, session isolation and audit controls PAM Secure built-in Local Administrator accounts for Windows Server OS (SID- 500) and *NIX Server OS (UID0) virtual machines with credential vaulting and rotation, and session isolation and audit controls LEAST PRIVILEGE Implement Least Privilege for AWS and GCP non-admin entities with excessive risky permissions to ensure entities have just-enough- access SECRETS MANAGEMENT Secure non-human application, scripts and processes AWS or GCP entities with risky permissions with vaulting, rotation and just-in-time credential retrieval or just-in-time role-assumption LEAST PRIVILEGE Implement Least Privilege for AWS and GCP entities with admin permissions to ensure entities have just-enough-access
  • 12. cyberark.com 19 CyberArk Blueprint Whitepapers & eBooks CyberArk Success Blog Articles (Technical Community) CyberArk Blueprint Self-Service Toolkit Getting The Most Out of Blueprint
  • 13. cyberark.com 20 Visit the CyberArk.com/Blueprint webpage Ask yourself, what am I looking to do? Download our Blueprint Toolkit to begin designing your Identity Security Roadmap Review our Success Blog for more people, process and technology guidance Use the Blueprint Self-Assessment to assess your security posture Learn more about how identities can be compromised Use the appropriate resources that align to your needs Explore self-service resources (examples below) Understand the Attack Chain Assess Your Security Learn Best Practices Build Your Plan