Info Security Memo
  • Blog
  • Sitemap
    • Categories
  • Contact
  • About
  • Resources
  • Tools
  • 51sec.org

Build Confidence

Focusing on Information Security 

Info Security Notes

Thycotic Secret Server Cloud

6/24/2021

0 Comments

 
Thycotic Secret Server Cloud

All Secret Server Cloud customers benefit from an infrastructure and platform built to meet the requirements of the most security-sensitive organizations. Here is the list for the featuers of Thycotic Secret Server Cloud :

  • 100% isolation and encryption of all customer data both in-transit and at rest, using the AES-256 standard encryption algorithm and PBKDF2-HMAC-SHA256 hashing algorithm.
  • Private encryption keys for each customer, with third-party key management support (AWS KMS).
  • All Secrets are systematically “salted” before being hashed, and encrypted with their own unique Initialization Vector and Key.
  • All connections to Secret Server Cloud are protected via Transport Layer Security (TLS). Distributed Engine communications are also secured with an additional encryption key unique to the tenant.
  • All customer databases are continuously backed up every hour, with a transaction log backup performed every five minutes.
  • Thycotic undergoes an annual, comprehensive SOC 2 audit and adheres to NIST-based security response policies to score, resolve, and communicate any necessary security advisories in response to reported vulnerabilities or bugs.
  • Secret Server Cloud is delivered from the hardened Microsoft Azure US-EAST, Canada, SEA (Singapore), Germany-Central and Australia datacenters.
  • Secret Server Cloud takes advantage of Microsoft Azure’s auto-scaling and built-in geo-redundancy, which generates three copies of each customer’s database, maintained across fault tolerant nodes to ensure continuous availability and facilitate swift disaster failover and recovery.
  • Secret Server Cloud leverages Microsoft’s latest threat management and mitigation protocols, including intrusion detection, denial-of-service (DDoS) attack prevention, anti-malware, penetration testing, and analytics and machine learning tools to help mitigate threats.
  • Azure architecture meets a broad set of international and industry-specific compliance standards, including General Data Protection Regulation (GDPR), ISO 27001, HIPAA, FedRAMP, SOC 1 and SOC 2.



Cloud Architecture




Get an Trial for Thycotic Secret Server in the Cloud

Start trial on PRIVILEGED ACCESS MANAGEMENT SOFTWARE Thycotic Secret Server :
  • https://thycotic.com/products/secret-server-vdo/

Three DCs Available:

  • Germany Central
  • East US
  • Australia Central


Why PAM in the cloud

  • Deploy instantly. PAM should not be complex.
  • Configure rapidly
  • Stop wasting infosec resources spending time on software upgrades and configuration hardware
  • Avoid financial and logistical nightmare of relying upon expensive professional service and consulting engagement.





Thycotic and Azure Best Practice Industry Standards

1. Using standard Microsoft .NET cryptographic algorithms
2. 100% isolation and encryption of all customer data both in-transit and at rest
3. Private encryption keys for each customer, with third-party key management support (AWS KMS).
4. All Secrets are systematically "salted" before being hashed, and encrypted with their own unique Initialization Vector and Key.
5. All connections to Secret Server Cloud are protected via Transport Layer Security (TLS).
6. All customer databases are continuously backed up every hour, with a transaction log backup performed every five minutes
7. Thycotic undergoes an annual, comprehensive SOC 2 audit and adheres to NIST-based security response policies
8. Secret Server Cloud is delivered from the hardened Microsoft Azure US-EAST, Germany-Central and Australia datacenters
9. Secret Server Cloud takes advantage of Microsoft Azure's auto-scaling and built-in geo-redundancy
10. Azure architecture meets a broad set of international ana lnåüstry- specific compliance standards




Thycotic Certification Secret Server Cloud Tutorials


















via Blogger https://ift.tt/3xVkiPJ
June 24, 2021 at 04:21PM Thycotic
0 Comments



Leave a Reply.

    Categories

    All
    Architecture
    Blog
    Checkpoint
    Cisco
    Cloud
    CyberArk
    F5
    Fortigate
    Guardium
    Juniper
    Linux
    Network
    Others
    Palo Alto
    Qualys
    Raspberry Pi
    Security
    SIEM
    Software
    Vmware
    VPN
    Wireless

    Archives

    March 2024
    February 2024
    January 2024
    December 2023
    November 2023
    October 2023
    September 2023
    August 2023
    July 2023
    June 2023
    May 2023
    April 2023
    March 2023
    February 2023
    January 2023
    December 2022
    November 2022
    October 2022
    September 2022
    August 2022
    July 2022
    June 2022
    May 2022
    April 2022
    March 2022
    February 2022
    January 2022
    December 2021
    November 2021
    October 2021
    September 2021
    August 2021
    July 2021
    June 2021
    May 2021
    April 2021
    March 2021
    February 2021
    January 2021
    December 2020
    November 2020
    October 2020
    September 2020
    August 2020
    July 2020
    October 2019
    September 2019
    June 2019
    July 2018
    May 2018
    December 2017
    August 2017
    April 2017
    March 2017
    January 2017
    December 2016
    November 2016
    October 2016
    September 2016
    August 2016
    July 2016
    June 2016
    May 2016
    April 2016
    March 2016
    February 2016
    January 2016
    December 2015
    November 2015
    October 2015
    September 2015
    August 2015
    July 2015
    June 2015
    May 2015
    April 2015
    March 2015

    Print Page:

    RSS Feed

    Email Subscribe
Powered by Create your own unique website with customizable templates.
  • Blog
  • Sitemap
    • Categories
  • Contact
  • About
  • Resources
  • Tools
  • 51sec.org