100% found this document useful (1 vote)
415 views21 pages

CyberArk Cookbook Lesson 2c

The document discusses how to define a safe model in CyberArk that separates password objects into different safes based on factors like organizational structure, data security levels, and access requirements. It provides examples of questions to consider when defining a safe model and shows how to use sets and access mappings to logically separate passwords into safes for different user groups like Windows, Unix, and Oracle administrators. The example then walks through applying these concepts to sample requirements to demonstrate a potential safe model with multiple safes for different password types and access levels.

Uploaded by

Gary Fung
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
415 views21 pages

CyberArk Cookbook Lesson 2c

The document discusses how to define a safe model in CyberArk that separates password objects into different safes based on factors like organizational structure, data security levels, and access requirements. It provides examples of questions to consider when defining a safe model and shows how to use sets and access mappings to logically separate passwords into safes for different user groups like Windows, Unix, and Oracle administrators. The example then walks through applying these concepts to sample requirements to demonstrate a potential safe model with multiple safes for different password types and access levels.

Uploaded by

Gary Fung
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 21

SAFE DESIGN

Basic Safe Concepts

! Access to passwords are controlled through Safe


Authorizations

! Only Users that are authorized for a specific Safe (i.e.


Safe Members) can access safe data

! If a User has “retrieve permissions” in a Safe, all objects


inside the can be accessed by this user
Defining a Safe Model

How should Password Objects be split and stored in


several safes in order to implement a custom
authorization and access model that fits for an
organization?

! Generally, there is no common, generic “Safe Model” that


fits for all Cyber-Ark implementations!

! Defining a Safe Model is an individual, implementation


specific process during implementation planning.
Questions to answer in defining safe model
! Who needs access to which data stored in the
Vault?
! Internal (e.g. Employees) or External Users (e.g. Partners, Contractors, etc.)

! What is the security level of data stored in the Vault?


! Secret, Informational, etc.

! Who must not see a specific type of data?


! Is there any type of data that needs to be especially protected in front of others?

! Should additional access limitations apply to


(specific) objects?
! Dual Control, Exclusive access
! …
! Write down the relevant questions and corresponding answers in natural language
first!
Example Criteria for Deriving a Safe Model
! Organizational Structure of the Enterprise
! e.g. Each Organization Unit has a set of dedicated safes, like OPS team Web
Servers or Database team, etc.
! Functional Structure
! e.g. group Passwords of a certain platform type in a safe, like Windows, Linux,
Oracle, etc.
! e.g. group types of passwords like all passwords of local administrator accounts
of Windows Workstations on place them in one safe
! Geographic Structure of the Enterprise
! e.g. Group Data in Safes based on the geographic locations of the users access
this data
! Security Level or Classification of Data
! e.g. group Passwords in Safes based on Security Classification
! Some other, individual criteria for separating password
objects
! A Combination of several aspects and criteria mentioned
above
! Note: These are examples! Start understanding the local requirements and
business processes first!
Theory of Sets

! Start defining sets of entities, e.g. like:


! Sets of Users (Groups) that need access to Data
! Sets of Password Objects that need to be managed

! Define access restrictions that should apply


! e.g. “Only Windows Administrators must see passwords of Windows
Systems”

! Apply defined restrictions to Sets of Passwords by


building subsets resulting in a new set presentation

! Map Groups and Access requirements to the


password objects sets by identifying intersections

! Each “Mapping” will result in a dedicated safe


Using Theory of Sets

! Ok, we really need a few very basic ideas of the


Theory of Sets for this purpose, but …

! Using Set of Objects and Entities will be help


you to draw a picture of the situation.

! Using this picture will help to identify the number


and the structure of Safes easily.
Example Requirements
! “EPV will be used by Windows, Unix and Oracle
Teams”.
! “EPV will store password of Windows Systems,
Unix Servers and Oracle Database Users (built-
in and shared passwords).”
! “Password objects of a specific platform should
be used by team members only.”
! “Unix Admins need to authenticate to PVWA
using RSA SecurID!”
! “Windows Team has a second team of external
Administrators that takes care of Windows
Workstations only.”
Sample Requirement Continued

! “Workstation Admins must not have access to


Server passwords, but Server Admins have to
have access to Workstation passwords.”

! “Passwords of Domain Administrator Users must


only be accessible after confirmation by IT
Managers!”

! “Oracle Administrators need Access to Servers


(Windows and Unix) hosting Oracle Databases.”
A Sample Solution Approach
! Define sets that need Access, i.e. identify Users
and Groups of Users that need to be handled:
! Windows Server Admins
! Windows Workstation Admins
! Unix Administrators
! Oracle Administrators
! IT Managers
! Split set of all password objects in 3 major sub
sets:
! Windows,
! Unix
! Oracle
! Start splitting Passwords Sets and start defining
sub sets to meet requirements now!
Define user groups and sets of passwords

Windows Server
Admins Windows
Passwords

IT Managers

Oracle
Windows Passwords
Workstation
Admins

Unix
Passwords
Oracle Admins

à A Minimum of 3 Safes is required (“Password objects of a


specific platform must be used by team members only.”)
Unix Admins
Drilling down the safe model
1.  Basic Safe Model will need at least 3 Safes!
! “Password objects of a specific platform must be used by
team members only .”
2.  Split Windows Passwords into Server and
Workstations Sets
! “Workstation Admins must not have access to Server
passwords, but Server Admins have to have access to
Workstation passwords” à Reflected by 2 Safes
3.  Separate Windows Domain Admin Passwords
! “Passwords of Domain Administrator Users must only be
accessible after confirmation by IT Managers!” à 1
additional Safe
4.  Separate Passwords of Unix and Windows Servers
that need to be accessed by Oracle team(s)
! “Oracle Administrators need Access to Servers (Windows and
Unix) hosting Oracle Databases.” à 2 additional Safes
5.  Grant Access to resulting Safes
! Privileges will depend on your authorization model/
definitions
Basic Safe Model

Windows
Passwords
“Password objects of a
specific platform must be
used by team members only.”

Oracle
Passwords

Unix
Passwords
Split Windows Passwords

Windows
Passwords
“Workstation Admins must “Password objects of a
not have access to Server specific platform must be
passwords, but Server Windows used by team members only.”
Admins have to have Workstation
access to Workstation
passwords.” Passwords

Oracle
Windows
Passwords
Server
Passwords
Unix
Passwords
Separate Windows Domain Admin Passwords

Windows
Passwords
“Workstation Admins must
not have access to Server
“Password objects of a
passwords, but Server Windows specific platform must be
Admins have to have Workstation
access to Workstation used by team members only.”
passwords.” Passwords

Windows
Oracle
Server
Passwords
Passwords

Unix
Domain Passwords
Admin
Passwords

“Passwords of Domain
Administrator Users must only be
accessible after confirmation by
IT Managers!”
Separate Passwords for Oracle Team

Windows “Password objects of a


Passwords specific platform must be
“Workstation Admins must used by team members only.”
not have access to Server
passwords, but Server Windows
Admins have to have Workstation
access to Workstation
passwords.” Passwords Oracle
Passwords

Windows
Server Unix
Passwords Passwords
Servers
Domain Servers
running
Admin running
Oracle
Passwords Oracle
Passwords
Passwords

“Passwords of Domain “Oracle Administrators need


Administrator Users must only be Access to Servers (Windows and
accessible after confirmation by Unix) hosting Oracle Databases.”
IT Managers!”
The Resulting Safe Model 1/2

Windows
Passwords
Oracle
Passwords
Windows
Workstation
Passwords

Windows
Server Unix
Passwords Passwords
Servers
Domain Servers
running
Admin running
Oracle
Oracle
Passwords Passwords
Passwords
The Resulting Safe Model 2/2
! Result: 7 Safes
1.  Safe for Windows Server Passwords
2.  Safe for Windows Workstation Passwords
3.  Safe for Windows Domain Admin Passwords
that need Approval (Dual Control)
4.  Safe for Unix Passwords
5.  Safe for Oracle Passwords (Windows Servers)
6.  Safe for Oracle Passwords (Unix Servers)
7.  Safe for Oracle Passwords (Databases)
A Sample Safe Naming Convention
1.  Safe Win-SRV
! Safe for Windows Server Passwords
2.  Safe Win-WKS
! Safe for Windows Workstation Passwords
3.  Safe Win-DomAdm
! Safe for Windows Domain Admin Passwords that need
Approval (Dual Control)
4.  Safe Unix-SRV
! Safe for Unix Passwords
5.  Safe Win-SRV-Ora
! Safe for Oracle Passwords (Windows Servers)
6.  Safe Unix-SRV-Ora
! Safe for Oracle Passwords (Unix Servers)
7.  Safe Ora-DBs
! Safe for Oracle Passwords (Databases)
Grant Access to Resulting Safes 1/2

Windows
Passwords
Windows Unix Admins
Windows
Workstation
Workstation
Admins
Passwords
Unix
Passwords
Windows Servers
Server running
Passwords Windows
Oracle
Domain Server Admins
Passwords
Admin Servers
Passwords running
Oracle
Passwords

Oracle Oracle Admins


Passwords

IT Managers
Grant Access to Resulting Safes 2/2
! In general Access Permissions to safes are assigned
to single users or users groups
! Monitor, Retrieve, Store, Delete, …

! Authentication Settings are defined for users and


groups, not on a safe level!

! Some restrictions apply to safes only, i.e. have to be


configured on a Safe level!
! Exclusive Passwords, Dual Control, Access Reasons, …

! In order to restrict access to safes, additional features


like locations and network areas could be used
! Note: Be careful and think twice before making use of this!

You might also like