CyberArk
cyber arc
Zero Standing Privilege (ZSP): Minimize identity-based attack vectors
ID = “attack route” for the attacker
- “Infringement of ID” is a shortcut for attackers to expand the breach and carry out their objectives
What is Zero Standing Privilege (ZSP)?
- Approaches to minimizing “ID”-based attack vectors
Advantages of ZSP introduction ① Security measures
- Prevent identity-based compromise by attackers
- By focusing on protecting important servers, even partial implementation is highly effective.
Advantages of ZSP introduction ② Preventing complexity of ID management
- Operation without ID prevents complexity of management
ZSP realization solution by CyberArk
- Providing solutions for server OS/DB and public cloud
Dynamic Privilege Access (DPA) - Product Overview -
- Provides ZSP access to server OS/DB
- Grant temporary access to target systems according to predefined policies
- No privileged ID remains on the target system after access ends
DPA use cases
Secure Cloud Access (SCA) - Product Overview -
- Provides ZSP access to public cloud users
- Grant temporary access to target clouds according to predefined policies
- No user remains in the target cloud after access ends
SCA use cases
Integration with Cloud Entitlements Manager (CEM) and Secure Web Sessions (SWS)
- Enhance SCA functionality by integrating with other CyberArk products
Inquiry/Document request
Macnica CyberArk
- TEL:045-476-2010
- E-mail:macnica-cyberark-sales@macnica.co.jp
Mon-Fri 8:45-17:30