CyberArk delivers Blueprint for privileged access management success
Organisations gain proven tools and prescriptive advice for advancing cyber security programmes and enabling digital business priorities.
by CyberArkCyberArk (NASDAQ: CYBR), the global leader in privileged access management, today announced the CyberArk Blueprint for privileged access management success. The most comprehensive programme of its kind, CyberArk Blueprint is designed to help customers take a future-proof, phased and measurable approach to reducing privilege-related risk.
Based on the experience of the CyberArk Labs, Red Team and incident response engagements, nearly every targeted attack follows a similar pattern of privileged credential compromise. Those patterns influenced CyberArk Blueprint’s three guiding principles, which are foundational to the programme: prevent credential theft; stop lateral and vertical movement; and limit privilege escalation and abuse.
The CyberArk Blueprint uses a simple, prescriptive approach based on these guiding principles to reduce risk across five stages of privileged access management maturity. Customers adopting cloud, migrating to SaaS, leveraging DevOps and automating with RPA benefit from being able to prioritise quick wins, progressively address advanced use cases, and align security controls to digital transformation efforts across hybrid environments. For example:
- Prevent credential theft: To mitigate internal and external risks, organisations must first prevent theft of critical credentials – such as IaaS admins, domain admins or API keys – that could be used to conduct network takeover attacks or compromise key infrastructure accounts. By implementing session isolation, hard-coded credential removal, and theft detection and blocking strategies, organisations can protect privileged access by humans, applications and across CI/CD pipelines.
- Stop lateral and vertical movement: To stop threat actors from pivoting from non-trusted devices to high-value cloud consoles or domain controllers, this principle focuses on enforcing credential boundaries, just-in-time access and credential randomisation to break the cyber attack chain.
- Limit privilege escalation and abuse: To stop adversaries from abusing privileges and to reduce the overall attack surface, it’s important to implement strong least privilege controls, behavioural analytics and adaptive response.
CyberArk Blueprint offers templates and custom roadmap design sessions so organisations of all sizes, including those in both regulated and non-regulated industries, can progressively expand privileged access controls and strategy.
“Simple, yet comprehensive, CyberArk Blueprint offers vendor-neutral guidance that closely aligns privileged access management initiatives with potential risk reduction, helping organisations address their greatest liabilities as quickly as possible,” said Nir Gertner, chief security strategist, CyberArk. “Regardless of an organisation’s privileged access management maturity, CyberArk Blueprint enables organisations to future-proof new technology investments while improving security, reducing the attack surface and driving operational efficiencies.”
To learn more about the CyberArk Blueprint for Privileged Access Management Success, visit: https://www.cyberark.com/Blueprint.
Visit CyberArk at RSA Conference (North Expo, Booth #6353) to learn more about building your blueprint for privileged access management programme success.