Info Security Memo
  • Blog
  • Sitemap
    • Categories
  • Contact
  • About
  • Resources
  • Tools
  • 51sec.org

Build Confidence

Focusing on Information Security 

Info Security Notes

PAM Solution Roadmap or Project Phases

5/2/2022

0 Comments

 
PAM Solution Roadmap or Project Phases

This post is to summarize a PAM project's designing process from Blueprint to a roadmap then to stages, phases, until to solid steps for each phases. 








Blueprint

Template



Example based on template:







Roadmap

A roadmap is typically broken down into phases of work, and can stem from multiple technologies and security controls. Phases can partially overlap as well. The example below illustrates an organization that has an audit finding around least privilege on workstation computers, which has been prioritized over other use cases. From there, this roadmap leverages the CyberArk Blueprint’s rapid risk mitigation approach and prioritizes securing the most risky credentials before expanding to other technology platforms in later phases.




Project Stages / Phases


PAM Blueprint five stages overview:


Five PAM Blueprint Stages


This section provides a high-level roadmap for deploying the CyberArk Privileged Access Security Solution in organizations, based on the extensive implementation experience of CyberArk Security Services. The five-phase overview discusses recommendations for risk assessment, identification of critical controls, program and scope planning, rapid risk mitigation, program execution, and program development.

Following these guidelines, organizations can build a successful and, ultimately, mature privileged account security program.


1 Phase 1 – Discovery and initiation

The first phase of the program is to discover business and security requirements, analyze the risks, define critical controls and map out the high- level timelines. It is generally challenging to define what the “keys to the kingdom” in an organization are; organizations typically say “we want to secure everything.” By engaging with the trusted experts in CyberArk Security Services or CyberArk certified service partners, organizations draw from the experiences of security professionals and technical specialists who have been on the front lines of breach remediation efforts.

2 Phase 2 – Definition and planning

The second phase of a privileged account security program is to define the scope of the project. CyberArk recommends starting with a narrow scope as trying to do too much will put the overall project success at risk. The key is to build a repeatable process using the privileged account SPRINT Framework, starting with the most critical privileged credentials, and use it iteratively. By mapping out use cases for each critical control, organizations can visualize how execution will occur.

3 Phase 3 – Launch and execution


4 Phase 4 – Rapid risk mitigation

In the fourth phase, organizations develop a roll-out plan, identify a small group of accounts that will be used as a “pilot,” identify (or create) a group of test accounts for each group and identify issues and update the roll-out plan as needed.

5 Phase 5 – Mature the Privileged Access Security program



Example of phases for one PAM project:






Steps in each phases



1 Phase 1 – Discovery and initiation

Step 1: Identify drivers and success criteria

What are business drivers for the project? To start, consider security goals in the areas of audit (SOX, PCI, etc.), compliance, breach, best practices or other drivers for the project. Consider initial use cases, objectives, and timelines that will drive the priority and order of privileged credentials to be managed, as well as control goals and audit requirements, including retention, credential rotation frequency, etc. Senior management should be included in defining the goals and objectives of the company with the tone and direction of the security program.

Step 2: Identify critical and high value assets

Identify the most critical assets and systems
Classify Tier 0 assets as a critical
Create a tactical process

Step 3: Discover the privileged accounts

CyberArk Discovery & Audit (CyberArk DNA®) is a simple executable that can scan systems based on either Active Directory or an input file. Following the scan, CyberArk DNA delivers a comprehensive report that shows the number of systems scanned and the percentage of systems that do not comply with your password policy, which can be defined in CyberArk DNA prior to scan. The management summary will give you an overview of your environment, including maps of Pass-the-Hash vulnerabilities in Windows environments and SSH key trusts in Unix environments. Details of the discovered accounts and credentials are provided in tables that contain all available information for each account.

Step 4: Identify and prioritize privileged accounts to be secured

There are multiple approaches to assessing risk and setting priorities using the CyberArk DNA report and map. Organizations can see which machines and accounts create the highest risk and which machines are exposed to the greatest lateral movement risks. Based on this Pass-the- Hash map, organizations can prioritize the security and management of privileged accounts on the most at-risk systems.

Access to the CyberArk Privileged Access Security Solution
Give precedence to the riskiest accounts
Be realistic about addressing the volume of account
Leverage the CyberArk Privileged Access Security Hygiene Program

Step 5: Define critical controls and timelines

Once the privileged account security risks are assessed, the next step is to define the critical controls and high-level timeline. As described in the Rapid Risk Reduction: A 30-Day Sprint to Protect Privileged Credentials White Paper, attackers frequently exploit vulnerabilities with Windows Administrator credentials and use a privileged pathway to get to critical assets.

Recommended practices
Recommended critical controls
Best practice controls

2 Phase 2 – Definition and planning

Step 1: Engage leadership and technology teams for managing rapid organizational changes

Set the right tone
Cross-functional support

Engage with the technology teams

Consider the corporate culture

Step 2: Scope definition

Determine the product breakdown structure
Identify enterprise technologies to be integrated

Step 3: Define roles and responsibilities

A small team can put controls around the most important privileged accounts quite quickly. In one case, in the aftermath of a breach, a team of just eight members working with a security consultant vaulted the administrator accounts for 20 domains and 6,500 servers in four weeks. Compared with implementing controls in a hostile, post-breach environment, doing the work proactively is likely to proceed relatively smoothly.

Identify core team members
Build a ‘program’

Dedicated CyberArk internal resources

Dedicated CyberArk internal resources can be the organization’s champions for the privileged account security program, managing organizational changes, and engaging with technology teams who need to be aware of what CyberArk solution does and how it will change their daily lives.

Role 1: CyberArk Subject Matter Expert (SME)
Role 2: CyberArk Vault Administrator
Role 3: IT Operations Team
Role 4: CyberArk Data Administrator
Role 5: CyberArk Project Manager

Stakeholders

Identify internal stakeholders of the CyberArk solution. It is important to identify the consumers and stakeholders of the CyberArk solution. It’s recommended that organizations agree upon which users will fall into what roles prior to an implementation. Organizations should also consider establishing a process for how new users can be added to each of these respective roles following the initial rollout.

Role 1: End Users

Role 2: Auditors

Role 3: Safe Owners

Trusted experts

Define scope of work with trusted experts.

3 Phase 3 – Launch and execution

Step 1: Project kick-off

Once the team, scope, project goals, product breakdown structure, use cases, high level schedule, and budget are prepared, a kick-off meeting should be scheduled to ensure all the stakeholders are informed and prepared to engage. This will set the expectations for all parties involved and define accountabilities for driving progress.

Step 2: Architecture design

The CyberArk Digital Vault will house the organization’s most sensitive credentials which provide access to the most sensitive data and business critical systems. The CyberArk Privileged Access Security Solution will sit between your privileged users and your highly sensitive systems, and it will enable users to securely carry out extremely important tasks. As such, the security of the CyberArk solution Privileged Access Security Solution and the stability of the platform are paramount.

Systems requirements and secured platforms
Business continuity and high availability
Considerations before deployment
Environment and network review
Enterprise integrations

Step 3: Solution design

Design access control list for user management
Design Safe structure and naming convention
Design control sets and master policy
Design high-level access workflows based on use cases of accounts access
Review options for accounts onboarding process
Auditing and reporting best practices
Considerations for CyberArk Privileged Session Manager
Secure application accounts
Secure endpoints with CyberArk Endpoint Privilege Manager

Step 4: Solution implementation

CyberArk Security Services will provide organizations with a pre-requisites checklist so that they can be prepared for your deployment. With the guidance of certified CyberArk experts/SMEs, the Technical Leads will be ready to proceed with the installation, configuration, and/or upgrade of the CyberArk Privileged Access Security Solution.

Develop an implementation plan
More information

4 Phase 4 – Rapid risk mitigation



Step 1: Load and Verify

Onboard Tier 0 accounts
Connect button
Account access workflows
Roll-out the pilot group

Step 2a: Rotate Credentials

Ad-Hoc Changes via the Central Policy Manager (CPM)
Fully Automated Credential Management
Reconciliation

Step 2b: Isolate & Monitor

This should be done in conjunction with Step 2a. The Rotate Credentials process is not dependent on the Isolation & Monitor process, since they are separate modules. While accounts are being managed, organizations can include high value asset credentials that will benefit from CyberArk Privileged Session Manager and CyberArk Privileged Threat Analytics, further expanding the credential boundary.

Isolate sessions to Tier 0 assets with CyberArk Privileged Session Manager
Monitor behavior on Vault and Tier 0 assets with CyberArk Privileged Threat Analytics
Protect Tier0 assets with CyberArk Endpoint Privilege Manager
Remove local admin rights on IT Windows workstations with CyberArk Endpoint Privilege Manager

Step 3: Standardize for production roll-out

During this phase, additional primary groups will be rolled out per the updated roll-out plan. Management functionality, workflows, and permissions should be confirmed along with the solution design—and analysis performed on the use cases/requirements for the next phases based on organization’s roadmap. Organizations will receive review and advice on resolving gaps in the architectural design, solution design, and implementation phases of the project.

Minimize administrative accounts
Expand session isolation & monitoring to Tier 1 assets
Remove domain administrator privileges for applications

 

5 Phase 5 – Mature the Privileged Access Security program

Step 1: Going “wide” with basic controls and “deep” with advanced controls

After the initial implementation of the CyberArk Privileged Access Security Solution, organizations will continue their privileged account security program throughout the enterprise using the same processes – moving to functional accounts, onboarding the new accounts created, vaulting the built-in accounts, rotating them, and then using CyberArk Privileged Session Manager and CyberArk Privileged Threat Analytics for isolation and monitoring.

Expansion

Details

Go “wide”

  • Expand session isolation to Tier 1 Assets;

  • Monitor Tier 1 Assets;

  • Establish additional credential boundaries to restrict lateral movement.

Go “deep”

  • Manage further devices: network devices, web applications, out of band access, etc.;

  • As mentioned above – this may include custom CPM plugins and CyberArk Privileged Session Manager custom connection components;

  • Begin management of service accounts and application IDs;

  • Remove of hard coded credentials;

  • Explore least privilege and application whitelisting.

Repeat phased approach for new systems (go “wider”)
Begin management of service and application IDs (go “deeper”)
Continue to refactor applications (go “deeper”)
Enhance least privilege and application whitelisting (go “deeper”)

Step 2: Formalizing the program with metrics for success

By locking down the credentials, isolating and controlling sessions, and then monitoring behavior, the security posture of an organization is increased in an efficient, and controlled manner, with limited impact to production processes.

Track program success
Concrete metrics
Establish processes for maintenance and support
Define metrics to measure success




Others


PAM Baseline : Safe Access Roles


Privileged Access Control Matrix:






PAM lifecycle:






References

  • Implementation Program










via Blogger http://blog.51sec.org/2022/05/pam-solution-roadmap-or-project-phases.html
May 02, 2022 at 01:02PM CyberArk
0 Comments



Leave a Reply.

    Categories

    All
    Architecture
    Blog
    Checkpoint
    Cisco
    Cloud
    CyberArk
    F5
    Fortigate
    Guardium
    Juniper
    Linux
    Network
    Others
    Palo Alto
    Qualys
    Raspberry Pi
    Security
    SIEM
    Software
    Vmware
    VPN
    Wireless

    Archives

    March 2024
    February 2024
    January 2024
    December 2023
    November 2023
    October 2023
    September 2023
    August 2023
    July 2023
    June 2023
    May 2023
    April 2023
    March 2023
    February 2023
    January 2023
    December 2022
    November 2022
    October 2022
    September 2022
    August 2022
    July 2022
    June 2022
    May 2022
    April 2022
    March 2022
    February 2022
    January 2022
    December 2021
    November 2021
    October 2021
    September 2021
    August 2021
    July 2021
    June 2021
    May 2021
    April 2021
    March 2021
    February 2021
    January 2021
    December 2020
    November 2020
    October 2020
    September 2020
    August 2020
    July 2020
    October 2019
    September 2019
    June 2019
    July 2018
    May 2018
    December 2017
    August 2017
    April 2017
    March 2017
    January 2017
    December 2016
    November 2016
    October 2016
    September 2016
    August 2016
    July 2016
    June 2016
    May 2016
    April 2016
    March 2016
    February 2016
    January 2016
    December 2015
    November 2015
    October 2015
    September 2015
    August 2015
    July 2015
    June 2015
    May 2015
    April 2015
    March 2015

    Print Page:

    RSS Feed

    Email Subscribe
Powered by Create your own unique website with customizable templates.
  • Blog
  • Sitemap
    • Categories
  • Contact
  • About
  • Resources
  • Tools
  • 51sec.org