PRIVILEGED ACCESS SECURITY
What You Need to Know.
DISRUPTION STARTS WITH PRIVILEGED ACCESS
The most disruptive attacks center on controlling your most valued assets with privileged access. It’s clear; privileged accounts, credentials and secrets deliver an unobstructed pathway to critical on-premises and cloud-based infrastructure and applications.
of security breaches involve privileged credentials.
The Forrester Wave™: Privileged Identity Management, Q4 2018
The average time
after initial access, attackers can obtain domain-level admin credentials.
WHAT IS PRIVILEGED ACCESS?
Privileged access exists in many forms (i.e. Local Administrative Accounts, Domain Administrative Accounts, Service Accounts, Application Credentials, SSH Keys) across the enterprise environment. Privileged accounts, credentials and secrets are found in devices, applications and operating systems. They allow organizations to secure the infrastructure and applications, run business efficiently and maintain the confidentiality of sensitive data.
In the wrong hands, privileged credentials can be used to cause catastrophic damage to a business. This is why they must be protected, managed and monitored.
PRIVILEGE IS EVERYWHERE
Privileged accounts, credentials and secrets are everywhere. And attackers are after them. Right now.
EXAMPLES OF PRIVILEGED ACCESS
Cloud Admin Console | Database Admin | Local Admin | SaaS Admin Console Application Accounts | API Keys / Access Tokens | Local Admin | Service Accounts SSH Keys | Other Hard-Coded Certificates | Privilege Business User
Applications | Databases | Servers | Workstations/Endpoints | Network Devices Security Tools | It Operations Tools | Cloud Mgmt. Console | Infrastructure API’s DevOps Tools | Cloud-Native Apps | SaaS Admin Consoles
LEARN MORE ABOUT PRIVILEGED ACCESS
Become a CyberArk Trustee.
CyberArk offers a variety of training courses and certification tracks. Level 1-Trustee Certification is publicly and freely available to anyone who would like to deepen their understanding of privileged access security and how CyberArk can be deployed to reduce privileged security risk.
Take the self-paced introductory training course and complete an online test that includes 18 questions across 5 subject areas.