100% found this document useful (1 vote)
1K views92 pages

03ws Pas Install CPM and Pvwa

The document provides information on installing and configuring the CyberArk Password Vault Web Access (PVWA) and Central Policy Manager (CPM) components. It describes the main functionality of the PVWA and CPM, how to install each component, secure and harden the servers, and verify the component and vault environments. Key steps include using CyberArk scripts to automate installations, applying a group policy object to harden servers, and manually configuring settings like network protocols, services, log locations and vault users.

Uploaded by

Marcel Friesen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
1K views92 pages

03ws Pas Install CPM and Pvwa

The document provides information on installing and configuring the CyberArk Password Vault Web Access (PVWA) and Central Policy Manager (CPM) components. It describes the main functionality of the PVWA and CPM, how to install each component, secure and harden the servers, and verify the component and vault environments. Key steps include using CyberArk scripts to automate installations, applying a group policy object to harden servers, and manually configuring settings like network protocols, services, log locations and vault users.

Uploaded by

Marcel Friesen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
  • CyberArk University CPM and PVWA
  • Objectives
  • PVWA and CPM Functionality
  • Password Vault Web Access
  • Central Policy Manager
  • Component Communication – CPM and PVWA
  • PVWA Prerequisites Installation
  • Automatic Installation
  • PVWA Installation
  • PVWA Verify Server Environment
  • PVWA Verify Vault Environment
  • Hardening the PVWA
  • Multiple PVWAs
  • CPM Installation
  • CPM Verify Server Environment
  • CPM Safes
  • Hardening the CPM
  • Multiple CPMs
  • General Configuration and Recommendations
  • Summary
  • Quiz
  • Thank You

CYBERARK UNIVERSITY

CPM and PVWA

CyberArk Training
1
OBJECTIVES

By the end of this lesson you will be able to:

• Describe the main functionality of the CPM and PVWA

• How to Install the CPM and PVWA

• How to Secure and Harden the CPM and PVWA

2
PVWA AND CPM
FUNCTIONALITY

3
PASSWORD VAULT WEB ACCESS

• The Password Vault Web


Access (PVWA) must be
installed first after the Digital
Vault

• The PVWA enables both end


users and administrators to
access and manage
privileged accounts

• PAS Component
configurations are
accomplished via the PVWA

4
CENTRAL POLICY MANAGER

• The CPM is responsible for:


• Password Management Operations
• Changing and verifying all target account
password
• Enforces Password Policy
• The CPM Accounts Feed and Auto-
Detection Operations
• Discovery – Designed to quickly locate
critical accounts and credentials
• Analyze – Provides a view to assess
the risk of each account
• Provision – Accounts can be
provisioned in the Vault in a simple and
intuitive way

5
COMPONENT COMMUNICATION – CPM AND PVWA

Managed Target
Central Policy
Accounts and Servers Manager 1858

1858 Vault
HTTPS

End Users:
IT Staff, Auditor, etc. The CPM and the PVWA
Password Vault
exchange information.
Web Access However, all the communication
HTTPS is done through the Vault.
Vault Administrators

6
PVWA PREREQUISITES
INSTALLATION

7
AUTOMATIC INSTALLATION

• You can use the PAS deployment scripts


provided with the installation package to
automatically install and deploy the Core PAS
components on multiple servers, according to
your organizational requirements.

• What do the scripts do?


• Install the Internet Information Services
prerequisite software
• Optionally Install the PVWA component
• Implement hardening procedures on the
Component Servers
• For details about the hardening procedures, see
the Hardening the CyberArk CPM and PVWA
Servers guide

8
MANUAL INSTALL OF IIS PREREQUISITES
• The manual step by step
procedures to install the
prerequisite IIS roles and
features is found on
[Link]
• The Password Vault Web
Access component is a
Microsoft IIS web application
and so the Web Server role
must be installed first
• Note the Role Features listed
here. No other Roles or
Features should be installed

9
INSTALL IIS PREREQUISITES

• Launch the Installation


Automation PowerShell
script from an Administrator:
Windows PowerShell

• Allow the script to complete,


and review the [Link]
file located in a sub-
directory where the script is
located.

• Always test the Web Server


installation by opening a
browser and connecting to
the default web site. This is
an important test prior to
installing the PVWA.

10
INSTALL A SIGNED SSL CERTIFICATE

• Replace the self-signed


certificate created by
Installation Automation
script with a web
certificate issued by a
trusted certificate authority
• The IIS server must be
configured to only accept
HTTPS connections. This
is a manual step

• The PVWA should be a


dedicated IIS server. No
other web applications
should be allowed

11
PVWA
INSTALLATION

12
PREREQUISITES

• Copy all necessary files to


the Windows Component
Server.

• Extract zip files before


launching Setup.

• Do not attempt to launch


the setup from a shared
network drive. Always
launch setup from a local
drive.

13
WEB APPLICATION DESTINATION

• Select the destination


folder for the web
application

• Because Microsoft installs


IIS on “C:\” accept the
default destination folder
for the PasswordVault
virtual directory

14
CONFIGURATION FILES DESTINATION

• Select the destination


folder for the PVWA
configuration files

• If needed, the
Configuration Files
destination folder can be
changed to an alternate
drive letter

15
SETUP TYPE

• Full Password Vault Web


Access option installs the
PVWA for desktop
browsers

• Mobile Password Vault


Web Access option installs
a PVWA interface that is
specifically designed for
mobile devices

• Select whether to install


the full PVWA server,
mobile version or both

16
WEB APPLICATION DETAILS

• Select the authentication


types that will be enabled
on the PVWA

• Choose a default
authentication method if
required

• If no authentication type is
selected a user will be
unable to authenticate to
the Vault using the PVWA

17
VAULT CONNECTION DETAILS

• Enter the IP Address of


your Vault server

• By default the Port


number is1858

• The PVWA URL is


automatically populated
and should not be
modified
• Accept the default URL

18
VAULT USERNAME AND PASSWORD DETAILS

• Enter the username and


password of the Vault user
that will be used to create
the CPM environment on
the Vault

• Typically the built-in


Administrator is used for
installing the components

19
FINISH

• Press the Finish button to


complete the installation

• There is no need for a


reboot

20
VERIFY INSTALLATION

• Review the
[Link] and
[Link] files
to make sure the
installation completed
successfully.
• The files are located in
C:\Users\Administrator\Ap
pData\Local\Temp

21
PVWA
VERIFY SERVER ENVIRONMENT

22
PVWA IIS APPLICATION

• IIS Virtual Folder -


PasswordVault

• Points to where the PVWA


application is installed

• By default, this is the


‘PasswordVault’ folder

23
PVWA SERVICE (IIS SERVICES)

• The PVWA should be a


dedicated server with no
other applications,
specifically web
applications installed
• PVWA services status can
be viewed or restarted
using the IISRESET
command at an
Administrative Command
prompt
• IISRESET with the /Status
option will display the
status for all relevant
services as shown

24
PVWA LOGS

• Log File Location –


• %windir%\temp\PVWA\
• or according to
parameter "LogFolder"
(located in [Link] in
the IIS PasswordVault
folder)

• Because the PVWA is a


Microsoft IIS Web
Application, the Windows
Event Viewer will also
contain relevant log
entries for the PVWA.

25
PVWA
VERIFY VAULT ENVIRONMENT

26
PVWA SAFES

During installation a set of predefined safes are


created for the PVWA

• The PVWAConfig safe contains all the


configuration settings for the Password Vault
Web Access.

• The PVWAPrivateUserPrefs safe contains the


user preference settings for the Password
Vault Web Access interface.
• The PVWAConfig and PVWAPrivateUserPrefs
safes should not be accessed directly
• The PVWAReports safe is used for internal
processes related to generating reports

27
PVWACONFIG SAFE - [Link]

• The [Link] contains


the “UI & Workflow”
settings for all platforms

• The PlatformBaseID, ties


the platforms listed in the
[Link] with the
platforms contained in the
PasswordManagerShared
safe

28
PVWA VAULT USERS AND GROUPS

• PVWAAppUser is used by
the Password Vault Web
Access for internal
Processing

• PVWAGWUser
impersonates the logged-
on user to the Vault

29
HARDENING THE PVWA

Security hardening operations on CyberArk PAS


component servers is an emphasized area of study for all
CyberArk certifications!

30
• PVWA hardening is accomplished in 3 phases
1. Executing a CyberArk provided ‘Installation Automation’
PowerShell script
2. Applying a CyberArk provided Group Policy Object to the
component server
3. Manual procedures
PVWA
INSTALLATION • Detailed procedures can be found on [Link].
Search for
AUTOMATION -
• Harden the CyberArk CPM and PVWA Servers
HARDENING
• Configure PVWA and CPM Servers in 'In Domain' Deployments

• CyberArk certification candidates must be able to audit


CyberArk component servers and identify missing or
misconfigured parameters and resolve them

31
PVWA INSTALLATION AUTOMATION – MANUAL HARDENING

Only the following network


protocols, services or clients
are required for a CPM and
or PVWA Component
Server:
• Client for Microsoft
Network
• File and Printer Sharing
for Microsoft Network
• Internet Protocol Version
4 (TCP/IPv4)

Disable all other default


protocols, services and
clients

32
PVWA INSTALLATION AUTOMATION – SCRIPTED HARDENING

• PVWA Installation
Automation PS script
accomplishes the following
• Validates roles and
services, and sets file
system permissions
• Creates local users to
run CyberArk services
• An update to the
CyberArk hardening
Group Policy object is
required to grant the
users the “Logon as a
service” right

33
PVWA INSTALLATION AUTOMATION - HARDENING

• PVWA Installation
Automation PS script
accomplishes the following
• Validates roles and
services, and sets file
system permissions
• Creates local users to
run CyberArk services.
• Removes unneeded IIS
MimeTypes

34
PVWA INSTALLATION AUTOMATION - HARDENING

• PVWA Installation
Automation PS script
accomplishes the following
• Validates roles and
services, and sets file
system permissions
• Creates local users to
run CyberArk services.
• Removes unneeded IIS
MimeTypes
• Disables SSL and
enables TLS 1.2, sets
Advanced Audit policy
and other Registry
settings

35
PVWA INSTALLATION AUTOMATION - HARDENING

• PVWA Installation
Automation PS script
accomplishes the following
• Validates roles and
services, and sets file
system permissions
• Creates local users to
run CyberArk services.
• Removes unneeded IIS
MimeTypes
• Disables SSL and
enables TLS 1.2, sets
Advanced Audit policy
and other Registry
settings
• Redirects HTTP to
HTTPS
36
PVWA INSTALLATION AUTOMATION - HARDENING

• PVWA Installation
Automation PS [Link]
can be found in a
subfolder of
\InstallationAutomation\
Date_Time
• The [Link] file provides
detail on the status of the
changes.

37
MULTIPLE PVWAS

38
• Fault Tolerance and Disaster Recovery in the Web Interface

• Additional capacity for heavy end user traffic


USE CASES • Reduction of web traffic over WAN lines for remote site users

• To provide a second less privileged web interface for external


users (vendors or contractors).

39
ARCHITECTURE

• A naming convention is
usually irrelevant since
PVWAs are all active and
User
all serve the same role

• PVWAs can be load


balanced with an external
Load Balancer
hardware load balancer

• In a load balanced
configuration, each
component server must be PVWA1 PVWA2 PVWA3 PVWA4
identically configured, e.g.,
operating system,
CyberArk PAS version and
Vault
installation directories

40
INSTALL MULTIPLE PVWA SERVERS

• Install each PVWA


normally. No special
configuration required.

• Each PVWA server should


be installed and
configured exactly the
same for Load Balanced
configurations.
• Provide the list of PVWA
host names to Admin of
your External Load
Balancer and request a
Virtual IP.

41
CPM
INSTALLATION

42
INSTALL CPM PREREQUISITES

• If installing the CPM on a


dedicated Windows Server, run
the CPM_PreInstallation.ps1
script to enable TLS 1.2
• Launch the Installation
Automation PowerShell script
from an Administrator: Windows
PowerShell

• Allow the script to complete and


review the [Link] file
located in a sub-directory where
the script is located

43
CPM PREREQUISITES
• At least one PVWA server
must be installed prior to
installing the CPM
• Press Install to install the
required Microsoft
Redistributable Package(s), if
applicable

44
CHOOSE DESTINATION FOLDER

• Select the destination


folder for the CPM files

45
SETUP TYPE

• When installing a new


CPM select No Policy
Manager was previously
installed and press Next

• Select Yes only in case of


re-installing CPM
software, that will use the
license of a previously
installed CPM.

46
VAULT CONNECTION DETAILS

• Enter the IP Address of


your Vault server

• By default the Port


number is1858

47
VAULT USERNAME AND PASSWORD DETAILS

• Enter the username and


password of the Vault user
that will be used to create
the CPM environment on
the Vault

• Typically the built-in


Administrator is used for
installing the components

48
FINISH

• Press the Finish button to


complete the installation

• There is no need for a


reboot

49
VERIFY INSTALLATION

• Review the [Link]


to make sure the
installation completed
successfully.

• Errors during the


installation process will
show in this file

• The file is located in


C:\Users\Administrator\Ap
pData\Local\Temp

• Capture the log and move


it to a different folder if an
auditor intends to review it.

50
CPM
VERIFY SERVER ENVIRONMENT

51
CPM DIRECTORY STRUCTURE
• The bin directory– contains all
the files required to run the
CPM and the Change
Password processes on remote
machines:
• The Logs directory contains the
CPM activity log files.
• The Samples directory contains
samples of all the default policy
files.
• The tmp directory contains files
that are used by the CPM for
internal processing.
• The Vault directory contains the
[Link] parameter file

52
THE CPM SERVICES

• CyberArk Password
Manager executes all
password management
operations.

• CyberArk Central Policy


Manager Scanner is
associated with the
Accounts Discovery utility
• Note that the CPM
Services before hardening
are running under “Local
System”

53
CPM LOGS

• [Link] – contains all the log messages, including general and informative messages,
Activity Logs (Logs
errors, and warnings.
folder)
• pm_error.log – contains only warning and error messages.

• Generated by the Central Password Manager built-in password generation plug-ins


Third party log files when an error occurs
(Logs\ThirdParty • Name of the log file:
folder) <type of password>-<Safe>-<folder>-<name of password object>.log
Operating System-UnixSSH-[Link]-[Link]:

• After a log file has been uploaded into the Safe, it is renamed and moved into the History
History log files subfolder.
(Logs\History folder) • The file is marked with a time stamp and renamed as follows: <filename> (<date>-
<time>).log

54
CPM
VERIFY VAULT ENVIRONMENT

55
CPM SAFES
• Verify that the following safes
were created for the CPM
• PasswordManager
• PasswordManager_ADInternal
• PasswordManager_info
• PasswordManager_Pending
• PasswordManager_workspace
• PasswordManagerShared
• PasswordManager_Temp

56
PASSWORDMANAGER SAFE

• The PasswordManager
safe stores the CPM
configuration file

• Customization of CPM
settings that are written to
this file is accomplished
via the System
Configuration page in the
PVWA.

57
PASSWORDMANAGERSHARED SAFE

• The ‘.ini’ files in the


PasswordManagerShared
safe contain the
“Automatic Password
Management” section for
each platform.
• Customization of platform
settings that are written to
this file is accomplished
via editing the specific
Target Account Platform in
the PVWA.

58 58
CPM VAULT USER

• The first CPM user created


by the CPM installer is
named PasswordManager

• When creating a safe using


the PVWA, a CPM must be
assigned providing the
PasswordManager access
to the privileged accounts.

• Once assigned the


PasswordManager user
will be added as an Owner
of assigned safes to enable
password management
operations.

59
HARDENING THE CPM

Security hardening operations on CyberArk PAS


component servers is an emphasized area of study for all
CyberArk certifications!

60
HARDENING THE CYBERARK CPM AND PVWA SERVERS

• The Hardening the CyberArk CPM and PVWA


Servers online documentation provides prescriptive
guidance to help you secure and harden the
CyberArk Component servers
• CPM or PVWA hardening is accomplished via a
combination of PowerShell scripts and GPO
policy enforcement
• Instructions are provided for GPO deployment
for in-Domain environments and a manual
procedure for out-of-domain environments
• PowerShell scripts are provided to compliment
the deployment of the hardened configuration
• Both procedures must be completed to consider
the hardening complete

61
HARDENING OVERVIEW – GPO/INF
• In-Domain Automatic Hardening via GPO
• When the CPM and / or the PVWA server environments
are part of Active Directory domain ('InDomain’), a
Group Policy Object can be applied to enforce security
policies.

• Out of Domain Hardening via INF Import


• When the CPM and PVWA server environments are not
a part of Active Directory domain ('Out of Domain'), the
hardening procedure is applied via an INF file.

• The CyberArk CPM and PVWA Servers guide


provides a complete list of all GPO settings.
• Search CyberArk Docs for “Harden the CyberArk CPM
and PVWA Servers” for automatic and manual
procedures for hardening CyberArk's CPM and PVWA
servers

62
HARDENING OVERVIEW – PS SCRIPTS

• CPM Installation
Automation PowerShell
script accomplishes the
following
• Validates roles and
services, and sets file
system permissions
• A log file is created
detailing the operation

63
PVWA INSTALLATION AUTOMATION – SCRIPTED HARDENING

• CPM Installation
Automation PowerShell
script accomplishes the
following
• Validates roles and
services, and sets file
system permissions
• Creates local users to
run CyberArk services

64
PVWA INSTALLATION AUTOMATION – SCRIPTED HARDENING

• PVWA Installation
Automation PS script
accomplishes the following
• Validates roles and
services, and sets file
system permissions
• Creates local users to
run CyberArk services
• An update to the
CyberArk hardening
Group Policy object is
necessary to grant
and enforce the
required “Logon as a
service” right

65
HARDENING OVERVIEW – PS SCRIPTS

• CPM Installation Automation PowerShell script


accomplishes the following
• Creates a local user to run CPM services
using an alternate credential
• Set directory and file permissions
• Validates server roles and features
• Sets screen saver parameters
• Set’s advanced auditing policy
• Configures RDP settings
• Sets EventLog size and retention
• Set’s permissions to registry settings
• Other settings

66
HARDENING OVERVIEW – PS SCRIPTS

• Open an Administrators: PowerShell


Window to launch the CPM_Hardening.ps1
script from the \Installation Automation folder

• Review the [Link] file located in a sub-


directory where the script is located

67
MULTIPLE CPMS

68
USE CASES

1858 or 443
Vault
[Link] [Link]

1858
Target Target
Systems Systems
[Link] Central Policy Central Policy [Link]
Manager 1858 Manager

[Link] [Link]
Password Vault
Web Access
• A single CPM cannot
accommodate the total number
of accounts managed.
End Users: • Accounts are managed in
IT Staff, Auditor, etc.
End Users: multiple sites or VLANs protected
IT Staff, Auditor, etc.
by firewall

69
PORT REQUIREMENTS

• Reference “Privileged
Account Security System CPM TO VAULT CPM TO TARGETS
[Link]”,
Standard CPM Ports and Windows
135,445 and more
Protocols for more
information. UNIX
22,23 and more

• This document should be Mainframe


22,23,449,8476 and more
provided to the customer
Database
early in the planning stages TCP/1858 139,445,1433,1521,3306,5000, and more
of the CyberArk deployment
Directories
project. 389,636 and more

Appliances
22,23,18190, and more

Many, many others

70
MULTIPLE CPM SERVERS – ACTIVE-PASSIVE

• CPM is installed at
multiple locations, but only
enabled at one TARGET MACHINES
ROOT
• Activating and deactivating
CPMs is a manual process

• Inactive CPMs will need to


assume a license from the
active CPM. This is
commonly seen in DR
implementations. <inactive>
CPM_WIN
CPM_WIN

VAULT

71
MULTIPLE CPM SERVERS

• Multiple CPMs are active


simultaneously
TARGET MACHINES TARGET MACHINES
• Individual safes are
ROOT ROOT
assigned to individual
CPMs

• Provides distributed
architecture

• Each CPM must be


licensed separately
CPM_WIN CPM_UNIX

VAULT

72
NAMING CONVENTION

Create a naming convention to name each CPM according to the safes it will manage.

BY REGION BY SITE BY ENVIRONMENT

CPM_APAC CPM_BOS CPM_PROD

CPM_EMEA CPM_SFO CPM_DEV

CPM_NA CPM_ORD CPM_DMZ

73
INSTALLING ADDITIONAL CPMS

To install multiple CPMs:

• Install the first CPM according to the


normal process
• Install additional CPMs

• Rename the first CPM to match your


desired naming convention

74
INSTALLING ADDITIONAL CPMS

• The installer will


automatically name the
first CPM
PasswordManager.

• Each subsequent installer


will prompt you to provide
a CPM name since
PasswordManager is
already in use.

• Name each new CPM


according to your naming
convention.

75
RENAME THE SAFES FOR THE FIRST CPM

• First step is to STOP ALL CPM


Services

• Next rename the


PasswordManager_* safes to
the new name, however…
Do NOT rename the following
safes:
• PasswordManager_Pending
• PasswordManagerShared
• PasswordManagerTemp

76
RENAME THE COMPONENT USER FOR THE FIRST CPM

• First step is to STOP


BOTH CPM Services

• Rename the
PasswordManager_*
safes to the new name

• Rename the
PasswordManager user
and reset its password

77
RESET THE CREDENTIAL FILE

• Rename the
PasswordManager_*
safes to the new name

• Rename the
PasswordManager user
and reset its password.

• Update the Credential File


on the first CPM server so
that the CPM can
authenticate to the vault.

78
RENAME THE CPM IN THE PVWA

• Rename the
PasswordManager_*
safes to the new name

• Rename the
PasswordManager user
and reset its password.

• Update the Credential File


on the first CPM server.
• Change the name of the
CPM in the PVWA (under
Options) so that it displays
correctly in all PVWA
options.

79
RESTART THE CPM SERVICES

• Rename the
PasswordManager_*
safes to the new name

• Rename the
PasswordManager user
and reset its password.

• Update the Credential File


on the first CPM server.
• Change the name of the
CPM in the PVWA (under
Options).
• Restart the CPM services
and check the [Link].

80
CPM ASSIGNMENTS

• Once the CPMs have


been named correctly, SAFE ASSIGNED CPM
assign CPMs to safes MSSQL_NA CPM_NA
according to design.
MSSQL_APAC CPM_APAC

SrvAcc_NA CPM_NA

SrvAcc_APAC CPM_APAC

Recon_NA CPM_NA

Recon_APAC CPM_APAC

Cybr_NA CPM_APAC

Cybr_APAC CPM_NA

81
GENERAL CONFIGURATION AND
RECOMMENDATIONS

82
GENERAL CONFIGURATION FOR ALL DEPLOYMENTS

• Component servers
should participate in an
organizations Vulnerability
Management Program.

• There are a number of


additional steps that
should be performed in 'In
Domain' deployments as
well as in 'Out of Domain'
deployments including:
• Update your Operating
System
• Install an Anti-Virus
Solution

83
GENERAL CONFIGURATION FOR ALL DEPLOYMENTS CONT.

• Restrict Network Protocols


• Install only the required protocols and remove unnecessary ones. For example, only TCP/IP are necessary,
and ensure that no additional protocols such as IPX or NetBEUI are allowed.

• Rename Default Accounts


• It is recommended to change the names of both the Administrator and the guest to names that will not
testify about their permissions.

• Validate Proper Server Roles


• To minimize your attack surface, as a best practice, make sure that only the minimum roles and features
that are required are defined on the CPM and PVWA server(s).
• Remove all unnecessary roles and features.

• IIS Hardening (PVWA Only)

84
SECURE AND ISOLATE COMPONENT SERVERS

• Follow Best Practices to


Mitigate Credential Theft
on Servers

• Treat all CyberArk


Components as Tier 0
applications and
infrastructure

• Ensure any credentials


that are authorized to log
into CyberArk Component
servers do not have
Domain Administrator
permissions.

85
SECURE AND ISOLATE COMPONENT SERVERS

• Limit the number of domain credentials that are


able to access the component servers

• Consider using host-based firewalls and IPsec


to restrict, encrypt and authenticate inbound
administrative traffic.

• Consider using CyberArk Privileged Session


Manager and the local administrator account to
access component servers providing Isolation,
Control via Policy and Monitored access.

• Deploy application whitelisting and limit


execution to authorized applications

86
REDUCE APPLICATION ATTACK SURFACE

• Eliminate unnecessary
CyberArk administrative
accounts

• Reduce privileges of
CyberArk administrative
accounts

• Apply the concept of Least


Permissions when
accessing CyberArk
component servers.
Restrict personal accounts
to business-as-usual
permissions justified for
their role.

87
REDUCE APPLICATION ATTACK SURFACE

• Consider requiring
privilege elevation for
system configuration
changes.

• Use the CyberArk


Privileged Session
Manager to isolate and
monitor CyberArk
administration

• Require two-factor
authentication for all
avenues of administrative
access

88
SUMMARY

89
SUMMARY

This session covered:

• Installing the CPM and PVWA

• Configuring the CPM and PVWA

• The CPM and PVWA Server Environment


• The CPM and PVWA Vault Environment

• Securing the CPM and PVWA

90
QUIZ
1. During the CPM installation, what does this option mean? “No Policy Manager was previously
installed”
• If you are installing a new CPM and intend to consume a new license, this is the option to choose. If you
are installing only the software but re-using a license, i.e. PasswordManager user, select “Yes. This is an
update from a previous version of Policy Manager.”

2. True or False: Beginning with PAS v10.6, Installation Automation PowerShell scripts must be used
to install PVWA pre-requisite software and to harden the PVWA and CPM Servers.
• False. Using the provided PowerShell scripts is a choice. All configurations are documented in the PAS
Installation Guide or the “Hardening the CyberArk CPM and PVWA Servers” documents.

3. Why does the PVWA installer create 2 Vault users, and what is their purpose?
• The PVWAAppUser is used for internal processing and consumes a license.
• The PVWAGWUser is the internal user that impersonates the logged on user to the vault.

91
THANK YOU

92

Common questions

Powered by AI

When installing multiple CPM or PVWA servers, considerations for redundancy and scalability include the need for load balancing and ensuring identical configurations across all servers. Each server should be installed with the same operating system version, CyberArk PAS version, and installation directories. In a load-balanced configuration, this uniformity allows any server to handle requests efficiently, providing redundancy and enabling the system to scale dynamically based on demand. For distributed architecture, ensure appropriate licensing and assignment of safes to CPMs, accommodating load and geographical distribution needs .

Securing and isolating component servers align them with Tier 0 applications by applying stringent security measures to protect the sensitive and critical operations that these systems perform. CyberArk component servers should be treated as Tier 0 applications by ensuring only authorized credentials without domain administrator permissions can access them. This involves employing access controls, encrypting administrative traffic, and applying session management solutions to isolate and monitor privileged sessions. Such stringent measures prevent unauthorized access that could compromise vital infrastructure .

The PVWA Installation Automation PowerShell script is comprehensive in contributing to server hardening by validating roles and services, setting file system permissions, creating local users for CyberArk services, removing unnecessary IIS MimeTypes, and modifying security settings such as disabling SSL and enabling TLS 1.2. Additionally, it redirects HTTP traffic to HTTPS and logs these operations in a script.log file for transparency and auditing .

To maintain a secure PVWA server environment, it is recommended to engage in hardening procedures which include executing CyberArk-hardened PowerShell scripts, applying Group Policy Objects (GPOs), and following a detailed manual procedure for security enhancement. Only essential network protocols and services should be permitted, unnecessary roles and features should be removed, and operating systems should be regularly updated. Anti-Virus solutions must be installed, and default accounts should be renamed to obfuscate their elevated permissions .

The implementation of host-based firewalls and IPsec on CyberArk component servers enhances security by restricting and controlling the flow of traffic to and from the servers. Host-based firewalls can limit access to essential services, while IPsec provides encryption and authentication for incoming administrative traffic. This dual approach reduces the attack surface and ensures only authenticated and encrypted communication is conducted, thus strengthening the overall security posture of CyberArk's infrastructure .

Reducing the application attack surface on CyberArk component servers is important to minimize vulnerabilities that could be exploited by attackers. This can be achieved by eliminating unnecessary administrative accounts, reducing the privileges of existing accounts, and adhering to the principle of least privilege, where users are granted only the permissions necessary for their role. Additionally, privilege elevation should be required for significant system configuration changes to maintain control and monitoring over administrative actions .

Renaming CPM safes and components involves several critical operations. First, all CPM services must be stopped. The PasswordManager_* safes should be renamed, except for PasswordManager_Pending, PasswordManagerShared, and PasswordManagerTemp, which should remain unchanged. Next, the PasswordManager user should be renamed and its password reset. Afterwards, the Credential File on the first CPM server must be updated to ensure proper authentication with the vault. Finally, the CPM name in the PVWA should be updated, and all CPM services restarted, verifying the changes through the PM.LOG .

Implementing multiple PVWA instances enhances system reliability by providing fault tolerance and disaster recovery capabilities. It offers additional capacity for handling heavy end-user traffic, reduces web traffic over WAN lines for remote site users, and can provide less privileged web interfaces for external users such as vendors or contractors. This approach ensures continuity and maintains optimal performance under increased demand .

During the installation of the Password Vault Web Access (PVWA), a set of predefined safes are created. The PVWAConfig safe contains all the configuration settings vital for the PVWA, and the PVWAPrivateUserPrefs safe holds user preference settings for the interface. It is advised not to access the PVWAConfig and PVWAPrivateUserPrefs safes directly to prevent unauthorized modifications that could disrupt the system's configuration and user settings .

In an 'In-Domain' deployment, the Group Policy Object (GPO) plays a crucial role by enforcing security policies automatically across CPM and PVWA environments. This enforcement aids in reducing manual errors and ensures compliance with security standards by automatically applying the necessary configurations and security settings through the network's Active Directory infrastructure. GPO deployment streamlines the hardening process, ensuring consistent and secure configurations across all systems .

You might also like