CyberArk Delivers Blueprint for Privileged Access Management Success
February 13, 2020

CyberArk announced the CyberArk Blueprint for Privileged Access Management Success, designed to help customers take a future-proof, phased and measurable approach to reducing privilege-related risk.

Based on the experience of the CyberArk Labs, Red Team and incident response engagements, nearly every targeted attack follows a similar pattern of privileged credential compromise. Those patterns influenced CyberArk Blueprint’s three guiding principles, which are foundational to the program: prevent credential theft; stop lateral and vertical movement; and limit privilege escalation and abuse.

The CyberArk Blueprint uses a simple, prescriptive approach based on these guiding principles to reduce risk across five stages of privileged access management maturity. Customers adopting cloud, migrating to SaaS, leveraging DevOps and automating with RPA benefit from being able to prioritize quick wins, progressively address advanced use cases, and align security controls to digital transformation efforts across hybrid environments. For example:

- Prevent credential theft: To mitigate internal and external risks, organizations must first prevent theft of critical credentials—such as IaaS admins, domain admins or API Keys—that could be used to conduct network takeover attacks or compromise key infrastructure accounts. By implementing session isolation, hard coded credential removal, and theft detection and blocking strategies, organizations can protect privileged access by humans, applications and across CI/CD pipelines.

- Stop lateral and vertical movement: To stop threat actors from pivoting from non-trusted devices to high-value cloud consoles or domain controllers, this principle focuses on enforcing credential boundaries, just-in-time access and credential randomization to break the cyber attack chain.

- Limit privilege escalation and abuse: To stop adversaries from abusing privileges and to reduce the overall attack surface, it’s important to implement strong least privilege controls, behavioral analytics and adaptive response.

CyberArk Blueprint offers templates and custom roadmap design sessions so organizations of all sizes, including those in both regulated and non-regulated industries, can progressively expand privileged access controls and strategy.

“Simple, yet comprehensive, CyberArk Blueprint offers vendor-neutral guidance that closely aligns privileged access management initiatives with potential risk reduction, helping organizations address their greatest liabilities as quickly as possible,” said Nir Gertner,Chief Security Strategist, CyberArk. “Regardless of an organization’s privileged access management maturity, CyberArk Blueprint enables organizations to future-proof new technology investments while improving security, reducing the attack surface and driving operational efficiencies.”

Share this

Industry News

April 02, 2020

VMware announced the general availability of VMware vSphere 7, the biggest evolution of vSphere in over a decade.

April 02, 2020

Grafana Labs announced that Cortex v1.0 is generally available for production use.

April 02, 2020

IT Revolution announced new dates, extended pricing and its first round of confirmed speakers for DevOps Enterprise Summit Las Vegas 2020. Hosted at The Cosmopolitan of Las Vegas, DevOps Enterprise Summit will now take place November 9-11, 2020.

April 01, 2020

Compuware Corporation announced new capabilities that enable application development teams to automate performance tests early in the development lifecycle, helping large enterprises speed time to market and improve application performance—while decreasing the significant and unnecessary cost of wasted time.

April 01, 2020

PlanetScale released the newest version of PlanetScaleDB, a multi-cloud database.

April 01, 2020

Datawire announced the newest release of Ambassador Edge Stack that is designed to speed up the inner development loop.

March 31, 2020

Push Technology will provide Diffusion Cloud, Push Technology’s Real-Time API Management Cloud Platform, free for all existing customers and new customers developing systems in the cloud during these challenging times.

March 31, 2020

Rancher Labs announced the general availability of Rancher 2.4.

March 31, 2020

Kasten announced the general availability of Kasten K10 v2.5.

March 30, 2020

DevOps Institute, a global member-based association for advancing the human elements of DevOps, announced a new Open Testing program that removes the prerequisite of leveraging formal courseware to achieve certifications from DevOps Institute's extensive portfolio.

March 30, 2020

Oracle announced the general availability of Java 14 (Oracle JDK 14).

March 30, 2020

Akamai announced March 2020 updates to the Akamai Intelligent Edge Platform.

March 26, 2020

Redgate’s new SQL Monitor now ensures that DevOps teams can monitor and track deployments at all times.

March 26, 2020

Split Software announced a two-way data integration with Google Analytics that can instantly detect performance issues caused by new features.

March 26, 2020

Cloudreach earned the Kubernetes on Microsoft Azure advanced specialization.