CyberArk

cyber arc

Zero Standing Privilege (ZSP): Minimize identity-based attack vectors

ID = “attack route” for the attacker

  • “Infringement of ID” is a shortcut for attackers to expand the breach and carry out their objectives
ID = “attack route” for the attacker

What is Zero Standing Privilege (ZSP)?

  • Approaches to minimizing “ID”-based attack vectors
What is Zero Standing Privilege (ZSP)?

Advantages of ZSP introduction ① Security measures

  • Prevent identity-based compromise by attackers
  • By focusing on protecting important servers, even partial implementation is highly effective.
Advantages of ZSP introduction ① Security measures

Advantages of ZSP introduction ② Preventing complexity of ID management

  • Operation without ID prevents complexity of management
Advantages of ZSP introduction ② Preventing complexity of ID management

ZSP realization solution by CyberArk

  • Providing solutions for server OS/DB and public cloud
ZSP realization solution by CyberArk

Dynamic Privilege Access (DPA) - Product Overview -

  • Provides ZSP access to server OS/DB
    • Grant temporary access to target systems according to predefined policies
    • No privileged ID remains on the target system after access ends
Dynamic Privilege Access (DPA) - Product Overview -

DPA use cases

DPA use cases

Secure Cloud Access (SCA) - Product Overview -

  • Provides ZSP access to public cloud users
    • Grant temporary access to target clouds according to predefined policies
    • No user remains in the target cloud after access ends
Secure Cloud Access (SCA) - Product Overview -

SCA use cases

SCA use cases

Integration with Cloud Entitlements Manager (CEM) and Secure Web Sessions (SWS)

  • Enhance SCA functionality by integrating with other CyberArk products
Integration with Cloud Entitlements Manager (CEM) and Secure Web Sessions (SWS)

Inquiry/Document request

Macnica CyberArk

Mon-Fri 8:45-17:30