Abstract
This chapter details the impact of cyber security on an organization, alongside the consequences of a malicious actor gaining access to privileged accounts. These consequences are commonly categorized as data breaches, which have been on the rise due to the evolution of technology. Enterprises had to adopt technical controls, namely privileged account management tools to mitigate the risks of data breaches. One of those tools, and the one that is mentioned in this chapter, is CyberArk. CyberArk functions as a safe for these privileged accounts and allows employees to use these accounts for basic connections, such as RDP (Remote Desktop Protocol) and SSH (Secure Shell). To achieve greater isolation, companies want the connections to be specific to the applications the employees work with, which is what this report focuses on. Mentioned in this chapter is the work developed to achieve such isolation, creating means to use the CyberArk system to connect to applications that are not supported natively. The purpose of this report is to display the advantages of isolating these privileged accounts and the security benefits that come with applying these improvements. It is hoped that this chapter serves as a ground work for the improvements that can be made to cyber security and that it cultivates discussions that advance this topic.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Arcon, Pam vendor arcon. (2006). Retrieved from https://arconnet.com/products/privileged-access-management
D.J. Barrett, R.E. Silverman, R.G. Byrnes, Ssh, the Secure Shell: The Definitive Guide, 2nd edn. (2005)
CyberArk, Pam vendor cyberark. (1999). Retrieved from https://www.cyberark.com/
CyberArk-Connections, Psm hardening. (2019). Retrieved from https://docs.cyberark.com/productdoc/onlinehelp/pas/11.1/en/content/pasimp/psso-psmconnecpvwa.htm
J. Gennick, Oracle Sql*plus: The Definitive Guide, 2nd edn. (2004)
D. Hotka, B. Scalzo, Toad for Oracle Unleashed. (2015)
Microsoft, Remote desktop services documentation. (2017). Retrieved from https://docs.microsoft.com/en-us/windows-server/remote/remote-desktopservices/welcome-to-rds
OneIdentity, Pam vendor oneidentity. (2017). Retrieved from https://www.oneidentity.com/one-identity-safeguard/
A. Peterson, ebay asks 145 million users to change passwords after data breach. (2014)
D. Swinhoe, The 14 biggest data breaches of the 21st century. (2020)
Trendmicro, Data Breaches 101: How They Happen, What Gets Stolen, and Where It All Goes. (2018)
H.F. Typton, Official (ISC)2 Guide to the CISSP CBK (2016)
BeyondTrust, BeyondTrust password safe administration. Retrieved from https://www.beyondtrust.com/docs/beyondinsight-password-safe/ps/admin/index.htm
CyberArk, CyberArk Architecture. Retrieved from https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/11.1/en/Content/PASIMP/PSM-Architecture.htm
A. Cobia, Privileged access management. Economic Crime Forensics Capstones 34 (2019) https://digitalcommons.lasalle.edu/ecf_capstones/34
J. Garbis, J.W. Chapman, Privileged access management, in Zero Trust Security, (Apress, Berkeley, CA, 2021). https://doi.org/10.1007/978-1-4842-6702-8_12
O. Romaniuk, P. Skladannyi, S. Shevchenko, Comparative analysis of solutions to provide control and management of privileged access in the it environment. Cybersecurity: Education, Science, Technique 16, 98–112 (2022). https://doi.org/10.28925/2663-4023.2022.16.98112
D. Pesic, M. Veinović, Privileged Identities: Threat to Network and Data Security (2016). https://doi.org/10.15308/Sinteza-2016-154-160
M. Haber, Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations. (2020). https://doi.org/10.1007/978-1-4842-5914-6
A. Purba, M. Soetomo, Assessing Privileged Access Management (PAM) using ISO 27001:2013 control. ACMIT Proceedings 5, 65–76 (2019). https://doi.org/10.33555/acmit.v5i1.76
E. Sindiren, B. Ciylan, Privileged account management approach for preventing insider attacks. Int. J. Comput. Sci. Netw. Secur 18, 33 (2018)
Cyberark, PSM Connectors. Retrieved from https://docs.cyberark.com/Product-Doc/Onlinehelp/PAS/latest/en/Content/PASIMP/PSM_connectors.htm?tocpath=Administrator%7CComponents%7CPrivileged%20Session%20Manager%7CPSM%20Connectors
CyberArk, Privileged Session Manager. Retrieved from https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PAS%20SysReq/System%20Requirements%20-%20PSM.htm
CyberArk, PVWA. Retrieved from https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PASIMP/PSMCyberArkAdmin-PVWA.htm
CyberArk, Version 10 Interface. Retrieved from https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/Landing%20Pages/LPVersion10Interface.htm?tocpath=End%20user%7CPrivileged%20Accounts%7CVersion%2010%20Interface
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Pinheiro, J.M., Carvalho, P. (2023). Protecting Organizations from Cyber Attacks: An Implemented Solution Based on CyberArk. In: da Silva Portela, C.F. (eds) Sustainable, Innovative and Intelligent Societies and Cities. EAI/Springer Innovations in Communication and Computing. Springer, Cham. https://doi.org/10.1007/978-3-031-30514-6_11
Download citation
DOI: https://doi.org/10.1007/978-3-031-30514-6_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-30513-9
Online ISBN: 978-3-031-30514-6
eBook Packages: EngineeringEngineering (R0)