PAS-ADMIN Access Control
PAS-ADMIN Access Control
Access Control
CyberArk Training
1
OBJECTIVES
2
OBJECT MODEL
We use the metaphor of a
bank when talking about the
Vault.
Encryption, Firewall, Audit,
Vault and Authentication
• First you authenticate
yourself to the bank teller.
Passwords Policy
3
BASIC ACCESS CONTROL CONCEPTS
4
DEFINING A SAFE MODEL
5
QUESTIONS TO ANSWER WHEN DEFINING SAFE MODEL
6
EXAMPLE CRITERIA FOR DERIVING A SAFE MODEL
7
SAFE NAMING CONVENTION
8
SAFE NAMING CONVENTION CREATION – STEP 1
For example:
Line of business Geographical location
Compliance Data Center ID
Technology platform Account Type
Application association Environment, etc
• List them in order of importance
• Discuss and agree on the resulting layered structure
• Eliminate any layers that are redundant or not needed
This will be the basis for your Safe Naming Convention base.
9
SAFE NAMING CONVENTION CREATION – STEP 2
• List out as many examples of each designation as possible and define 2-4 letter translations for
each. For example:
• ORA for Oracle Database
• LADM for Local Administrative Account
• Create 7-10 examples of safe names to ensure the structure is sufficiently robust to account for any
future need
10
SAFE NAMING CONVENTION CREATION – EXAMPLE STEP 1
• Category 1 - Environment:
• Production (P), Development (D), Testing (T), Q/A (Q), etc
11
SAFE NAMING CONVENTION CREATION – EXAMPLE STEP 2
• Category 4 - Technology:
• Server (SVR), Workstation (WKS), Network Device (NET), Database (DB), Mainframe (MF), Domain
(DOM) etc
12
SAFE NAMING CONVENTION CREATION – EXAMPLES
• P-BOS-SRV-WIN-LADM represents:
• Production (P) environment
• Boston data center (BOS)
• Servers (SRV)
• Windows (WIN)
• Local Administrative Accounts (LADM) for
• D-NYC-DB-ORA-LSVC-HR represents:
• Development environment (D)
• New York City data center (NYC)
• Database (DB)
• Oracle (ORA)
• Local Service Accounts (LSVC)
• HR application (HR)
13
SAMPLE SAFE DESIGN
14
FOUR DATA CENTERS
BOSTON
ORLANDO PORTLAND
15
SUPPORT RESPONSIBILITIES
• Corporate IT is responsible for • The site support team monitors servers and provides after
building and maintaining severs. hours support.
16
SARBANES-OXLEY
17
DESIGN CRITERIA
Domain Windows SEA
regardless of platform.
• Site support teams require management approval PDX
MCO
PDX
18
SAFE DESIGN
Vault
SOX Compliance SOX Non-SOX SOX Non-SOX SOX Non-SOX SOX Non-SOX
19
SAFE NAMING CONVENTION
Safes
• Flatten the hierarchy but preserve all the Platform Site SOX Safe Name
information in it. Win SEA NS Win-SEA-NS
• Level 1 – Platform Win SEA SOX Win-SEA-SOX
• Level 2 – Site Win MKE NS Win-MKE-NS
• Level 3 – SOX Compliance Win MKE SOX Win-MKE-SOX
Win MCO NS Win-MCO-NS
• Use a short code for each level. Win MCO SOX Win-MCO-SOX
Safes
Platform Site SOX Safe Name
Win MKE NS Win-MKE-NS
Win MKE SOX Win-MKE-SOX
NIX MKE NS NIX-MKE-NS
NIX MKE SOX NIX-MKE-SOX
21
CORPORATE IT PERMISSIONS
Grant access to Safes with matching Platform Code
Different Permissions for SOX and Non-SOX safes.
Safes
Platform Site SOX Safe Name
Win SEA NS Win-SEA-NS
Win MKE NS Win-MKE-NS
Win MCO NS Win-MCO-NS
Win PDX NS Win-PDX-NS
Safes
Platform Site SOX Safe Name
Win SEA SOX Win-SEA-SOX
Win MKE SOX Win-MKE-SOX
Win MCO SOX Win-MCO-SOX
Win PDX SOX Win-PDX-SOX
22
MANAGER PERMISSIONS
Safes
23
ROLE BASED ACCESS CONTROL AND SEPARATION OF DUTIES
Safes Access
Platform Site SOX Safe Name Corporate IT Site Support Managers
Win SEA NS Win-SEA-NS g_Win-SEA-NS-IT g_Win-SEA-NS-SUP g_Win-SEA-NS-MGR
Win SEA SOX Win-SEA-SOX g_Win-SEA-SOX-IT g_Win-SEA-SOX-SUP g_Win-SEA-SOX-MGR
Win MKE NS Win-MKE-NS g_Win-MKE-NS-IT g_Win-MKE-NS-SUP g_Win-MKE-NS-MGR
Win MKE SOX Win-MKE-SOX g_Win-MKE-SOX-IT g_Win-MKE-SOX-SUP g_Win-MKE-SOX-MGR
Win MCO NS Win-MCO-NS g_Win-MCO-NS-IT g_Win-MCO-NS-SUP g_Win-MCO-NS-MGR
Win MCO SOX Win-MCO-SOX g_Win-MCO-SOX-IT g_Win-MCO-SOX-SUP g_Win-MCO-SOX-MGR
Win PDX NS Win-PDX-NS g_Win-PDX-NS-IT g_Win-PDX-NS-SUP g_Win-PDX-NS-MGR
Win PDX SOX Win-PDX-SOX g_Win-PDX-SOX-IT g_Win-PDX-SOX-SUP g_Win-PDX-SOX-MGR
NIX SEA NS NIX-SEA-NS g_NIX-SEA-NS-IT g_NIX-SEA-NS-SUP g_NIX-SEA-NS-MGR
NIX SEA SOX NIX-SEA-SOX g_NIX-SEA-SOX-IT g_NIX-SEA-SOX-SUP g_NIX-SEA-SOX-MGR
NIX MKE NS NIX-MKE-NS g_NIX-MKE-NS-IT g_NIX-MKE-NS-SUP g_NIX-MKE-NS-MGR
NIX MKE SOX NIX-MKE-SOX g_NIX-MKE-SOX-IT g_NIX-MKE-SOX-SUP g_NIX-MKE-SOX-MGR
NIX MCO NS NIX-MCO-NS g_NIX-MCO-NS-IT g_NIX-MCO-NS-SUP g_NIX-MCO-NS-MGR
NIX MCO SOX NIX-MCO-SOX g_NIX-MCO-SOX-IT g_NIX-MCO-SOX-SUP g_NIX-MCO-SOX-MGR
NIX PDX NS NIX-PDX-NS g_NIX-PDX-NS-IT g_NIX-PDX-NS-SUP g_NIX-PDX-NS-MGR
NIX PDX SOX NIX-PDX-SOX g_NIX-PDX-SOX-IT g_NIX-PDX-SOX-SUP g_NIX-PDX-SOX-MGR
24
SUMMARY
25
SUMMARY
26
ADDITIONAL RESOURCES
Videos
27
THANK YOU
CyberArk Training
28