Info Security Memo
  • Blog
  • Sitemap
    • Categories
  • Contact
  • About
  • Resources
  • Tools
  • 51sec.org

Build Confidence

Focusing on Information Security 

Info Security Notes

Thycotic Secret Server Advanced Knowledges

6/28/2021

0 Comments

 
Thycotic Secret Server Advanced Knowledges

 

 This post summarizes some Thycotic SS knowledges which considered as advanced level. 





    Distributed Engine


    Distributed Engines provide scalability for large or distributed organizations

    • Leverage Secret Server for Privileged Account Management at remote offices & locations
    • Large environments (50k+ endpoints) require more processing power from Secret Server
    • Organization wants to manage remote networks (private cloud or DMZ)

    Distributed Engine supports:

    • Discovery
    • Active password rotation (on-demand & scheduled)
    • Active Directory Integration
    • Heartbeat
    • Proxying






    Unix Protection

    SSH Key management



    SS Unix Protection - Allowed Command Menus

    • Restrict!ßommands per user or group

    • On the Secret or by Policy

    • Launched Sessions only have access to the menu

    • Format

    name = command variables

    • Name

    The name the user will type to execute the menu option

    May not contain white space characters . 

    • Command
      • Command sent through SSH to the remote server
    • Must be a command that is accessible by the user

    Variables

    • Variables that are passed into the command run on the remote server
    • Names are to help what is expected.

    Secret Server: SSH Endpoint

    • Allows access to secrets through an SSH session

    • • Find existing secrets
    • • View existing secrets
    • • Launch an SSH æoxy session using a secret

    • Uses a Linux like commands

    • Eases access to secret server from Unix/Linux machine





    SSH Key Dependencies




    API's and Scripting

    SECRET SERVER REST API

    REST API documentation for Thycotic Secret Server 

    • Documentation for REST API using tkarer token authentication
    • Documentation tor token authentication
    • Documentation for REST API using Windows integrated authentication



    REGULAR EXPRESSION ARE USED THROUGHOUT THYCOTIC PRODUCTS

    Secret Server

    • • Remote Password Changing
    • • Creating Rules in Discovery
    • • Ticket Integration
    • • Dependencies
    • • Web Password Filler

    Privilege Manager

    • . Filters
    • . Policies




    Software Development Kit (SDK)

    SDK Client Command-Line Tool

    • Retrieve Secret values from Secret Server programmatically
    • Integrate with scripts and build tools
    • Fine-grained access control
    • Secure configuration storage
    • Available in Secret Server 10.4
    • Supports Windows, Linux, MacOS

    SDK Client Example Scenarios

    • Accessing authenticated resources from within a script

    • Deploying build artifacts from a CI/CD process

    • Deploying credentials to client machines using a configuration management tool

    • Building containers with credentials baked in




    SS and Service Now Integration







    Troubleshooting Basic Configurations in SS

    This module will cover: Users, Groups, Roles, and Role Permissions Best Practices

    User - Named account used to login to Secret Server.

    Groups — Organize users to efficiently assign privileges in Secret Server

    Role — Controls what a user can do within the Secret Server application.

    Role Permissions — Individual permissions assigned to a Role. Without permission a role is powerless.


    Troubleshooting Summary

    Basic Configuration

    • Roles, Groups, and Users should be reviewed regularly
    • Use Event Subscriptions to alert on any changes made to Basic Configurations
    • Always review default settings and confirm if they can be customized
    • Using the Hybrid approach will minimize consequences if users are incorrectly synced to Secret Server



    Troubleshooting Secrets and Secret Template


    Troubleshooting Summary

    Secrets and Secret Templates

    • Secrets are created from Secret Templates
    • Templates can be configured by Administrators or Template Owners
    • Changes to Templates effect all Secrets leveraging the Template
    • Setup event subscriptions for changes made to Templates



    Troubleshooting Auditing and Reporting

    Reports are on Demand or Scheduled:

    • Dozens of Out-Of-The-Box Reportb

    • Create Custom Reports with SQL

    Reports answer a specific question — What Secrets or Folders can a user see..etc


    Troubleshooting Summary

    Auditing and Reporting

    • By default, Secret Server does not delete any audit data
    • Data deletion occurs automatically at 2:00 am EST every Sunday
    • Do not configure automatic record deletion for compliance or other important data
    • Unlimited Admin role doesn't include audit data retention management




    Troubleshooting Discovery

    Troubleshooting Summary

    Discovery

    • Always review Secret Server Discovery logs for reoccurring errors
    • Be aware of logs that exist outside of Secret Server such as Engine Logs
    • Schedule Reports accounts that failed b or are pending an import so you can resolve issues as soon as possible
    • Always review most up-to date permissions needed to perform Discovery with Secret Server




    Troubleshooting Remote Password Changing


    Secret Server has the ability to automatically change passwords

    • Bulk on demand — When an employee is leaving the organization or a breach is detected
    • On a schedule — TO meet compliance mandates or enforce security best practices




    Troubleshooting Launchers

    Troubleshooting Summary

    Launchers

    • Launchers can be customized to work with any command-line-started application
    • Always confirm applications are mapped properly for all client machines that will be leveraging Custom Launchers
    • Don't forget to add the program folder in the PATH environment variable
    • Each custom Launcher will have unique requirements — Review the support portal for most up to date configuration steps




    Troubleshooting Session Recording

    Recording and Monitoring Sessions initiated within Secret Server or from the Target System:

    • Produces a screen capture (pic) every second, rolls it up into video
    • Allows for real-time monitoring and creates a video audit trail
    • Allows for Live messaging & session termination


    Troubleshooting Summary

    Session Recording and Monitoring

    • Schedule Reports Session Recording Errors so you can resolve issues as soon as possible
    • Always review most up-to date system requirements needed to record sessions with Secret Server
    • Understand unique configuration options that can be configured within Secret Server's configuration files
    • Remember to restart IIS after making changes to Secret Server architecture components


    Troubleshooting Distributed Engine


    Troubleshooting Summary

    Distributed Engine

    • Always review Secret Server logs for reoccurring errors
    • Beoware of logs that exist outside of Secret Server such as Engine Logs
    • Schedule Reports that show engine status in your environment
    • Always review most up-to date Roles/Features needed to use Distributed Engine in Secret Server



    Troubleshooting SS Upgrading


    Troubleshooting Summary

    Distributed Engine

    • Always review Secret Server logs for reoccurring errors
    • Beaware of logs that exist outside of Secret Server such as Engine Logs
    • Schedule Reports that show engine status in your environment
    • Always review most up-to date Roles/Features needed to use Distributed Engine in Secret Server




    References










    via Blogger https://ift.tt/3jigYtP
    June 28, 2021 at 07:46AM Thycotic
    0 Comments



    Leave a Reply.

      Categories

      All
      Architecture
      Blog
      Checkpoint
      Cisco
      Cloud
      CyberArk
      F5
      Fortigate
      Guardium
      Juniper
      Linux
      Network
      Others
      Palo Alto
      Qualys
      Raspberry Pi
      Security
      SIEM
      Software
      Vmware
      VPN
      Wireless

      Archives

      March 2024
      February 2024
      January 2024
      December 2023
      November 2023
      October 2023
      September 2023
      August 2023
      July 2023
      June 2023
      May 2023
      April 2023
      March 2023
      February 2023
      January 2023
      December 2022
      November 2022
      October 2022
      September 2022
      August 2022
      July 2022
      June 2022
      May 2022
      April 2022
      March 2022
      February 2022
      January 2022
      December 2021
      November 2021
      October 2021
      September 2021
      August 2021
      July 2021
      June 2021
      May 2021
      April 2021
      March 2021
      February 2021
      January 2021
      December 2020
      November 2020
      October 2020
      September 2020
      August 2020
      July 2020
      October 2019
      September 2019
      June 2019
      July 2018
      May 2018
      December 2017
      August 2017
      April 2017
      March 2017
      January 2017
      December 2016
      November 2016
      October 2016
      September 2016
      August 2016
      July 2016
      June 2016
      May 2016
      April 2016
      March 2016
      February 2016
      January 2016
      December 2015
      November 2015
      October 2015
      September 2015
      August 2015
      July 2015
      June 2015
      May 2015
      April 2015
      March 2015

      Print Page:

      RSS Feed

      Email Subscribe
    Powered by Create your own unique website with customizable templates.
    • Blog
    • Sitemap
      • Categories
    • Contact
    • About
    • Resources
    • Tools
    • 51sec.org