Protecting Organizations from Cyber Attacks: An Implemented Solution Based on CyberArk

  • Chapter
  • First Online:
Sustainable, Innovative and Intelligent Societies and Cities

Part of the book series: EAI/Springer Innovations in Communication and Computing ((EAISICC))

Abstract

This chapter details the impact of cyber security on an organization, alongside the consequences of a malicious actor gaining access to privileged accounts. These consequences are commonly categorized as data breaches, which have been on the rise due to the evolution of technology. Enterprises had to adopt technical controls, namely privileged account management tools to mitigate the risks of data breaches. One of those tools, and the one that is mentioned in this chapter, is CyberArk. CyberArk functions as a safe for these privileged accounts and allows employees to use these accounts for basic connections, such as RDP (Remote Desktop Protocol) and SSH (Secure Shell). To achieve greater isolation, companies want the connections to be specific to the applications the employees work with, which is what this report focuses on. Mentioned in this chapter is the work developed to achieve such isolation, creating means to use the CyberArk system to connect to applications that are not supported natively. The purpose of this report is to display the advantages of isolating these privileged accounts and the security benefits that come with applying these improvements. It is hoped that this chapter serves as a ground work for the improvements that can be made to cyber security and that it cultivates discussions that advance this topic.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
EUR 29.95
Price includes VAT (Germany)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR 149.79
Price includes VAT (Germany)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
EUR 192.59
Price includes VAT (Germany)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info
Hardcover Book
EUR 192.59
Price includes VAT (Germany)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Arcon, Pam vendor arcon. (2006). Retrieved from https://arconnet.com/products/privileged-access-management

  2. D.J. Barrett, R.E. Silverman, R.G. Byrnes, Ssh, the Secure Shell: The Definitive Guide, 2nd edn. (2005)

    Google Scholar 

  3. CyberArk, Pam vendor cyberark. (1999). Retrieved from https://www.cyberark.com/

  4. CyberArk-Connections, Psm hardening. (2019). Retrieved from https://docs.cyberark.com/productdoc/onlinehelp/pas/11.1/en/content/pasimp/psso-psmconnecpvwa.htm

  5. J. Gennick, Oracle Sql*plus: The Definitive Guide, 2nd edn. (2004)

    Google Scholar 

  6. D. Hotka, B. Scalzo, Toad for Oracle Unleashed. (2015)

    Google Scholar 

  7. Microsoft, Remote desktop services documentation. (2017). Retrieved from https://docs.microsoft.com/en-us/windows-server/remote/remote-desktopservices/welcome-to-rds

  8. OneIdentity, Pam vendor oneidentity. (2017). Retrieved from https://www.oneidentity.com/one-identity-safeguard/

  9. A. Peterson, ebay asks 145 million users to change passwords after data breach. (2014)

    Google Scholar 

  10. D. Swinhoe, The 14 biggest data breaches of the 21st century. (2020)

    Google Scholar 

  11. Trendmicro, Data Breaches 101: How They Happen, What Gets Stolen, and Where It All Goes. (2018)

    Google Scholar 

  12. H.F. Typton, Official (ISC)2 Guide to the CISSP CBK (2016)

    Google Scholar 

  13. BeyondTrust, BeyondTrust password safe administration. Retrieved from https://www.beyondtrust.com/docs/beyondinsight-password-safe/ps/admin/index.htm

  14. CyberArk, CyberArk Architecture. Retrieved from https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/11.1/en/Content/PASIMP/PSM-Architecture.htm

  15. A. Cobia, Privileged access management. Economic Crime Forensics Capstones 34 (2019) https://digitalcommons.lasalle.edu/ecf_capstones/34

  16. J. Garbis, J.W. Chapman, Privileged access management, in Zero Trust Security, (Apress, Berkeley, CA, 2021). https://doi.org/10.1007/978-1-4842-6702-8_12

    Chapter  Google Scholar 

  17. O. Romaniuk, P. Skladannyi, S. Shevchenko, Comparative analysis of solutions to provide control and management of privileged access in the it environment. Cybersecurity: Education, Science, Technique 16, 98–112 (2022). https://doi.org/10.28925/2663-4023.2022.16.98112

    Article  Google Scholar 

  18. D. Pesic, M. Veinović, Privileged Identities: Threat to Network and Data Security (2016). https://doi.org/10.15308/Sinteza-2016-154-160

    Book  Google Scholar 

  19. M. Haber, Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations. (2020). https://doi.org/10.1007/978-1-4842-5914-6

  20. A. Purba, M. Soetomo, Assessing Privileged Access Management (PAM) using ISO 27001:2013 control. ACMIT Proceedings 5, 65–76 (2019). https://doi.org/10.33555/acmit.v5i1.76

    Article  Google Scholar 

  21. E. Sindiren, B. Ciylan, Privileged account management approach for preventing insider attacks. Int. J. Comput. Sci. Netw. Secur 18, 33 (2018)

    Google Scholar 

  22. Cyberark, PSM Connectors. Retrieved from https://docs.cyberark.com/Product-Doc/Onlinehelp/PAS/latest/en/Content/PASIMP/PSM_connectors.htm?tocpath=Administrator%7CComponents%7CPrivileged%20Session%20Manager%7CPSM%20Connectors

  23. CyberArk, Privileged Session Manager. Retrieved from https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PAS%20SysReq/System%20Requirements%20-%20PSM.htm

  24. CyberArk, PVWA. Retrieved from https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PASIMP/PSMCyberArkAdmin-PVWA.htm

  25. CyberArk, Version 10 Interface. Retrieved from https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/Landing%20Pages/LPVersion10Interface.htm?tocpath=End%20user%7CPrivileged%20Accounts%7CVersion%2010%20Interface

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to P. Carvalho .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Pinheiro, J.M., Carvalho, P. (2023). Protecting Organizations from Cyber Attacks: An Implemented Solution Based on CyberArk. In: da Silva Portela, C.F. (eds) Sustainable, Innovative and Intelligent Societies and Cities. EAI/Springer Innovations in Communication and Computing. Springer, Cham. https://doi.org/10.1007/978-3-031-30514-6_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-30514-6_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-30513-9

  • Online ISBN: 978-3-031-30514-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics

Navigation