Cyberark Secrects Management

Cyberark Secrects Management

Simplify securing non-human identities for all applications, DevOps pipelines and cloud workloads.

 

CyberArk Secrets Management is designed to centrally manage, and
secure secrets used by the broadest range of application identities
in cloud-native and hybrid environments. The solution helps security
teams offer developers solutions “that meet them where they are” for
example by offering APIs for cloud portability, dynamic or rotated secrets,
or for teams that have embraced a specific technology, transparent
integrations with the Cloud Service Provider’s built-in secrets manager.
Additionally, the platform helps security teams discover unmanaged
secrets and gain visibility to secrets across the entire enterprise, apply
consistent policies, simplify audit and reduce vault sprawl.

For cloud-native applications built using DevOps methodologies – Several solutions are offered, each of
which solve a unique set of uses cases.
° For multi-cloud, cloud portability and DevOps environments – Conjur Cloud (SaaS) and Conjur
Secrets Manager Enterprise (Self-Hosted) provide secrets management solutions designed for the
unique requirements of multi-cloud and multi-vendor DevOps environments. Conjur offers REST
APIs and integrates with a wide range of DevOps tools, container platforms, and supports hybrid
and multi-cloud environments.

° For teams that have embraced the CSP’s built-in (native) secrets stores – Secrets Hub enables
security teams to discover, centrally manage and rotate secrets in built-in (native) secrets stores
without changing the developers experience. The SaaS solution provides security teams with visibly,
helps reduce vault sprawl across multiple AWS and Azure project teams and simplifies securing
hybrid environments.
Conjur Cloud and Secrets Hub are part of the CyberArk Identity Security Platform which provides
a comprehensive enterprise-wide platform for securing human and machine identities across the
entire organization.

For securing commercial off-the-shelf solutions – Credential Providers can rotate and manage
the credentials that third-party tools and solutions such as security tools, RPA, automation tools, IT
management, etc. need to complete their jobs. For example, a vulnerability scanner typically needs high
levels of privilege to scan systems across the enterprise’s infrastructure. Now, instead of storing privilege
credentials in COTS solutions, they are managed by CyberArk. And to simplify how enterprises allow third
party solutions to access privileged credentials, CyberArk offers the most validated COTS integrations
for solving identity security challenges.

For internally-developed traditional applications – Credential Providers can protect businesssystem data and simplify operations by eliminating hard-coded credentials from internally developed
applications. The solution provides a comprehensive set of features for managing application passwords
and SSH keys, and supports a broad range of application environments, including application servers,
Java, .Net, and scripting running on a variety of platforms and operating systems including Unix/Linux,
Windows and zOS.

CyberArk Identity Security Platform

Secrets Management is part of the CyberArk Identity Security Platform which helps organizations secure
access to critical business data and infrastructure, protect a distributed workforce, and accelerate business
in the cloud. The integrated solution helps organizations reduce the attack surface by applying consistent
policies to human and machine identities across the enterprise.

Information


Benefit

For Security Teams

  • Protect against breaches
    by managing credentials
    used by machine identities.
  • Reduce vault sprawl by
    centrally managing secrets
    across multiple project
    teams and environments.
  • Prevent credential theft
    by eliminating hardcoded secrets.
  • Discover and gain insights
    on unmanaged secrets.
  • Simplify securing identities
    with secrets management
    that’s part of the most
    complete and extensible
    Identity Security Platform

For Operations

  • Improve efficiency with
    automated rotation, APIs
    and automation tools.
  • Secure mission critical
    applications running
    at scale.

For Developers

  • Offer flexible solutions
    which do not require
    changes to dev workflows
    and provide option of
    rotated or dynamic secrets
  • Enable developers to use
    the CSP’s built-in (native)
    secrets managers.
  • Simplify how third party
    apps securely access
    resources by leveraging
    APIs and hundreds of
    certified out-of-thebox integrations.

For Compliance and Audit

  • Leverage a unified security
    solution to simplify
    meeting compliance and
    regulatory requirements.


Features

Cloud Native and DevOps
Integrations:

  • Tools/Toolchains: Ansible, Jenkins,
    Puppet, Terraform
  • • Public Clouds: AWS, Azure, GCP
    • CSP Built-in Secrets Stores: AWS
    Secrets Manager, Azure Key Vault,
    Google Secret Manager
  • • PaaS/Container Orchestration:
    Kubernetes, Red Hat OpenShift,
    Rancher, VMware Tanzu
  • • Container Security:
  • • Aqua, Twistlock

 

  • Native Authenticators:
  • Kubernetes
  • Red Hat OpenShift
  •  AWS Secrets Manager (ASM)
  •  AWS IAM
  •  Azure Key Vault (AKV)
  •  Google Cloud Platform (GCP)
  •  JSON Web Token (JWT)
  •  OpenID Connect (OIDC)

Discovery Capabilities

  • AWS secrets stores
  • Azure secrets stores

COTS Application Integrations:

  • Security Software: Vulnerability
    Management, Discovery
    Solutions, etc.
  •  IT Management Software
  •  Robot Process Automation and other Automation Solutions

Application Server Integrations:

  • JBoss, Oracle WebLogic Server,
    Tomcat, IBM WebSphere Application
    Server, WebSphere Liberty

Enterprise Grade:

  •  HSM integration, SIEM Tools
  •  AES-256, RSA-2048, SHA2

SDK and Development Libraries:

  • DevOps: Go, Java, Ruby, .NET
  •  Application SDK: C/C++, CLI, Java,
    .NET, .NET Core, / .NET Standard, Web
    Service/REST

CyberArk Vault Integrations:

  • CyberArk Privilege Access Manager
    (Self-hosted)
  • CyberArk Privilege Cloud®


Datasheet

Cyberark Secrets Management – Product Brief