{"id":61815,"date":"2017-06-22T07:51:19","date_gmt":"2017-06-22T11:51:19","guid":{"rendered":"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/mas-trm\/"},"modified":"2020-07-27T15:13:20","modified_gmt":"2020-07-27T19:13:20","slug":"mas-trm","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/es\/solutions\/audit-compliance\/mas-trm\/","title":{"rendered":"MAS TRM"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=\u00bbstretch_row\u00bb content_placement=\u00bbtop\u00bb css=\u00bb.vc_custom_1537365138136{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/aud-comp-hero.jpg?id=26743) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00bb el_class=\u00bbcyb-hero-section\u00bb][vc_column][vc_row_inner content_placement=\u00bbmiddle\u00bb el_class=\u00bbcyb-hero-header\u00bb][vc_column_inner el_class=\u00bbcyb-hero-header-text\u00bb][vc_custom_heading text=\u00bbMAS TRM\u00bb font_container=\u00bbtag:h1|text_align:left\u00bb use_theme_fonts=\u00bbyes\u00bb][vc_custom_heading text=\u00bbSecure, Manage and Monitor Privileged Accounts to Meet MAS-TRM Guidelines.\u00bb font_container=\u00bbtag:h3|text_align:left\u00bb use_theme_fonts=\u00bbyes\u00bb][vc_btn title=\u00bbDOWNLOAD WHITE PAPER\u00bb style=\u00bbcustom\u00bb custom_background=\u00bb\u00bb custom_text=\u00bb#ffffff\u00bb shape=\u00bbsquare\u00bb link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fresource%2Faddressing-monetary-authority-singapore-mas-technology-risk-management-trm-guidelines-cyberark-solutions%2F|||\u00bb el_class=\u00bbcyb-button xlarge event-click\u00bb el_id=\u00bbMAS TRM Page: Download Whitepaper\u00bb][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row][vc_column css=\u00bb.vc_custom_1537365220235{padding-top: 2.25rem !important;padding-bottom: 2.25rem !important;}\u00bb][vc_column_text css=\u00bb.vc_custom_1537370496322{padding-bottom: 1.875rem !important;}\u00bb]The Monetary Authority of Singapore (MAS) has adapted and expanded the Internet Banking Technology Risk Management (IBTRM) guidelines. The guidelines were first published in 2001 to provide banks with a risk management framework for internet banking. Due to the advancement of information technology and the rapidly changing threat landscape, MAS has revised, enhanced, and renamed the guidelines to the \u201cTechnology Risk Management\u201d (TRM) guidelines.<\/p>\n<p>MAS TRM updates include:<\/p>\n<ul>\n<li>Expansion to apply to all financial institutions, not just banks<\/li>\n<li>Application to all IT systems, expanding from IBTRM which controlled only systems that provide online services<\/li>\n<li>Application of a notice which includes legal requirements for financial institutions (FIs) related to technology risk management<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_custom_heading text=\u00bbMAS TRM AND PRIVILEGED ACCOUNT SECURITY.\u00bb font_container=\u00bbtag:h3|text_align:left\u00bb use_theme_fonts=\u00bbyes\u00bb el_class=\u00bbcyb-ltr-spc-6&#8243;][vc_column_text el_class=\u00bbcyb-ltr-spc-6&#8243; css=\u00bb.vc_custom_1538745140873{padding-bottom: 1.875rem !important;}\u00bb]Privileged accounts are prevalent in all IT systems and represent one of the largest security vulnerabilities an organization faces today. The MAS TRM guidelines include a dedicated section on Privileged Access Management which includes controls such as restricting the number of privileged users, maintaining an audit log of privileged user activities, and prohibiting sharing of privileged accounts.<\/p>\n<p><a href=\"https:\/\/www.cyberark.com\/es\/products\/privileged-account-security-solution\/privileged-session-manager\/\">CyberArk Solutions<\/a> address the MAS TRM guidelines related to privileged access management and enable FIs to implement strong privileged account security controls.[\/vc_column_text][vc_custom_heading text=\u00bbKEY BENEFITS OF OUR INTEGRATED SOLUTION.\u00bb font_container=\u00bbtag:h3|text_align:left\u00bb use_theme_fonts=\u00bbyes\u00bb el_class=\u00bbcyb-ltr-spc-6&#8243;][vc_column_text el_class=\u00bbcyb-ltr-spc-6&#8243;]<\/p>\n<ul>\n<li>Tamper proof audit logs and session monitoring for audit integrity<\/li>\n<li>Flexible password policy management including password aging, complexity, versioning policy and archiving<\/li>\n<li>Customizable \u201crequest workflows\u201d for credential access approval including dual controls, integration with helpdesk ticketing systems<\/li>\n<li>Automated privileged identity management including discovery and provisioning, policy-based password changes, and access controls<\/li>\n<li>Continuous monitoring for protection and compliance without impacting the business<\/li>\n<li>Isolated privileged sessions for a better security posture against cyber attacks<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb css=\u00bb.vc_custom_1537206690510{padding-top: 2rem !important;background-color: #f1f2f2 !important;}\u00bb][vc_column width=\u00bb1\/12&#8243;][\/vc_column][vc_column width=\u00bb5\/6&#8243; css=\u00bb.vc_custom_1534353344275{padding-bottom: 1.25rem !important;}\u00bb][vc_custom_heading text=\u00bbREQUEST A LIVE DEMO\u00bb font_container=\u00bbtag:h2|text_align:center|color:%23414042&#8243; use_theme_fonts=\u00bbyes\u00bb el_class=\u00bbcyb-ltr-spc-6&#8243;][\/vc_column][vc_column width=\u00bb1\/12&#8243;][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb css=\u00bb.vc_custom_1537206699923{padding-bottom: 2.5rem !important;background-color: #f1f2f2 !important;}\u00bb][vc_column][vc_raw_html]JTVCcmVxdWVzdF9kZW1vJTVE[\/vc_raw_html][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=\u00bbstretch_row\u00bb content_placement=\u00bbtop\u00bb css=\u00bb.vc_custom_1537365138136{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/aud-comp-hero.jpg?id=26743) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00bb el_class=\u00bbcyb-hero-section\u00bb][vc_column][vc_row_inner content_placement=\u00bbmiddle\u00bb el_class=\u00bbcyb-hero-header\u00bb][vc_column_inner el_class=\u00bbcyb-hero-header-text\u00bb][vc_custom_heading text=\u00bbMAS TRM\u00bb font_container=\u00bbtag:h1|text_align:left\u00bb use_theme_fonts=\u00bbyes\u00bb][vc_custom_heading text=\u00bbSecure, Manage and Monitor Privileged Accounts to Meet MAS-TRM Guidelines.\u00bb font_container=\u00bbtag:h3|text_align:left\u00bb use_theme_fonts=\u00bbyes\u00bb][vc_btn title=\u00bbDOWNLOAD WHITE PAPER\u00bb&#8230;<\/p>\n","protected":false},"author":17,"featured_media":0,"parent":53032,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-61815","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>MAS-TRM: Privileged Access Management and Security<\/title>\n<meta name=\"description\" content=\"CyberArk solutions provide financial institutions address the MAS TRM requirements guidelines related to privileged access management.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/mas-trm\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"MAS TRM\" \/>\n<meta property=\"og:description\" content=\"CyberArk solutions provide financial institutions address the MAS TRM requirements guidelines related to privileged access management.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/mas-trm\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2020-07-27T19:13:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/CYBR-gradient-bg-og-120x627-01-1024x535.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"535\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/mas-trm\/\",\"url\":\"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/mas-trm\/\",\"name\":\"MAS-TRM: Privileged Access Management and Security\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"datePublished\":\"2017-06-22T11:51:19+00:00\",\"dateModified\":\"2020-07-27T19:13:20+00:00\",\"description\":\"CyberArk solutions provide financial institutions address the MAS TRM requirements guidelines related to privileged access management.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/mas-trm\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/mas-trm\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/mas-trm\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Soluciones de Seguridad de la Identidad\",\"item\":\"https:\/\/www.cyberark.com\/solutions\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Auditor\u00eda y conformidad normativa\",\"item\":\"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"MAS TRM\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"MAS-TRM: Privileged Access Management and Security","description":"CyberArk solutions provide financial institutions address the MAS TRM requirements guidelines related to privileged access management.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/mas-trm\/","og_locale":"es_ES","og_type":"article","og_title":"MAS TRM","og_description":"CyberArk solutions provide financial institutions address the MAS TRM requirements guidelines related to privileged access management.","og_url":"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/mas-trm\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2020-07-27T19:13:20+00:00","og_image":[{"width":1024,"height":535,"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/CYBR-gradient-bg-og-120x627-01-1024x535.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Tiempo de lectura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/mas-trm\/","url":"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/mas-trm\/","name":"MAS-TRM: Privileged Access Management and Security","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"datePublished":"2017-06-22T11:51:19+00:00","dateModified":"2020-07-27T19:13:20+00:00","description":"CyberArk solutions provide financial institutions address the MAS TRM requirements guidelines related to privileged access management.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/mas-trm\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/solutions\/audit-compliance\/mas-trm\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/mas-trm\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"Soluciones de Seguridad de la Identidad","item":"https:\/\/www.cyberark.com\/solutions\/"},{"@type":"ListItem","position":3,"name":"Auditor\u00eda y conformidad normativa","item":"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/"},{"@type":"ListItem","position":4,"name":"MAS TRM"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/pages\/61815","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/comments?post=61815"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/pages\/61815\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/pages\/53032"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/media?parent=61815"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/product_category?post=61815"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}