Privileged account security solutions contain organizations’ most sensitive assets, and as such, it’s critical that these solutions be purposefully designed with security in mind. The paper documents security controls that are built directly into the CyberArk Digital Vault to help organizations protect their highly sensitive privileged account information.
Industrial Control Systems Security and Compliance
The NERC CIP standards were introduced to protect the electric utilities generation and transmission systems of the electric grid. The standards contain cyber, physical and organizational measures that must be implemented by the electric utilities in order to protect the electric grid in North America.
With CyberArk, electric utilities can put the solutions in place to meet the NERC CIP requirements for privileged access control, remote access management and access revocation. Read this white paper to learn how CyberArk solutions map to these specific NERC CIP requirements:
- CIP-007-6 R5 – Systems Security Management – Access Control
- CIP-007-6 R3 – Malicious Code Prevention
- CIP-005-5 R2 – Electronic Security Perimeter(s) – Interactive Remote Access Management
- CIP-004-6 R5 – Personnel & Training – Access Revocation
Recommendations on how to address common risks associated with the convergence of IT and OT environments and the misuse of privileged credentials in industrial control systems.
Jump servers have emerged in recent years as a security best practice to create a separation between networks with different security requirements. Creating separation is strongly recommended to minimize the risk of a potential attacker accessing critical systems, but does the typical homegrown jump server really create a single, isolated control point? Does it really keep the attackers out? Learn how you can go the extra mile to enhance security with a next generation jump server, which closes the vulnerability holes that exist in the traditional jump server solution.
CyberArk’s Privileged Account Security Solution is a comprehensive solution for password management, continuous activity monitoring and compliance of privileged access to the OT/ICS environment. Using a common infrastructure, organizations can isolate, control and monitor all privileged sessions whether on servers, databases or virtual machines, providing both ease of management and unified reports for times of audit. This allows you to control and secure all privileged activity in a single solution.
The NERC advisory provides details on the best practice and recommended ways to secure interactive remote access into critical networks, and in this paper we demonstrated how CyberArk Privileged Account Security Solution provides a solution for implementing the NERC recommendations.