chapter 17 Flashcards
vault security
isolating the server
1 no (blank) or trusts
2 no DNS or WINS - uses a manually configured host file
hardening the server
1 remove unnecessary (blank)
2 secure configurations for remaining (blank)
3 only vault server and privateark client are installed
4 no additional applications
domain membership
services
documentation resources
there are several documents that are key to successfully protecting your implementation
security fundamentals
digital vault security standard
[none]
Security fundamentals
details 8 controls to protect your cyberark deployment and therefore, your privileged account
- isolate and harden the digital vault server
- use (blank) authentication
- restrict access to component servers
- limits privileges and points of administration
- protect sensitive accounts and encryption keys
- use (blank) protocols
- monitor logs for irregularities
- create and periodically test a cyberark disaster recovery plan
two-factor
secure
cyberark digital vault security standards
securing your cyberark implementation is critical
the cyberark digital vault security standard describes how to securely configure and maintain the digital vault. it details:
the vault security layers
the digital vault secure platform and enterprise management tools, including
backup/HA/DR
monitoring the vault
remote administration
external storage
virtualization of the vault
vault domain membership
anti-virus
in almost all cases, installing third party applications, virtualization and external storage will result in a (blank) of security
all customers and partners should carefully read the secure platform documeny
relaxation
the vault - end to end security
the steps
- vault user
- session encryption uses a proprietary protocol, and openSSL encryption
- firewall - uses the hardened built-in windows firewall
- authentication - single or two factor authentication, (two is recommended)
- discretionary access control - granular permissions, role-based access control
- mandatory access control - subnet based access control, time limits and delays
- auditing - tamperproof audit trail, event-based alerts
- file encryption - hierarchical encryption model, every object has unique key
- stored credential
[none]
vault encryption and key management
encryption keys
there are 3 files that form the cornerstone of the cyberark pam solution encryption methodology. These encryption key files are required to install and operate cyberark pam.
- (blank)
- (blank)
- (blank)
server key
recovery public key
recovery private key
vault object encryption - day to day operations
each credential is stored as an encrypted file on the vault
the password uses a File Key with AES-256, which is a unique symmetric key generated for each file, the file key is then encrypted with the Safe Key, which is a symmetric key unique to the safe, the safe key is then encrypted with the symmetric Server Key which is unique to the vault
the Server Key is loaded into memory when the vault starts
the RecPub key is a copy of the relevant safe key which is encrypted with the RecPub key and stored with the safe
[none]
how encryption key are distributed
previosuly, the encyptionkeys required to install and operate the cyberark pam solution were physically devlivered in the form of CDs containing the files
as of march 2022, cyberark now deliveres these encryptionfiles via a secure email service
more info: https://cyberark-customers.force.com/s/article/Digitized-Encryption-Keys-Delivery-End-User-Guide
[none]
Recovery private key storage strategies
the recovery private key, aka the master key, must be copied to physical media and stored in at least (blank) separate and secure locations: one on the primary site and one on the disaster recovery site
2
server key storage strategies
strong - copy the key to external medium, usb, cd, and store it in a physical safe
insert the medium whenever starting the vault
key in RAM
convenient - copy the key to directly attached storage of the vault server and secure with NTFS permissions or by encrypting they key with a 3rd party tool
always available
key in RAM
strong and convenient- store the server key in a hardware security module HSM
always available
key not in RAM
[none]