The PAM Playbook

Championship Implementation Guide

CyberArk Core Privileged Access Security (PAS)

Golf-Ball

1. Executive Summary: The Championship Strategy

The CyberArk Core PAS is a complex suite designed to be the “Master’s Jacket” of your security infrastructure1111. The primary objective of this implementation is to secure, manage, and monitor every privileged account across the Golf Cyber landscape2. By deploying this solution, Golf Cyber will centralize credential management, enforce automated rotation, and provide fully audited access to all critical systems3.
Golf-Ball

2. Architectural Overview: The Pro’s Bag

The deployment consists of four core components that work together to secure the course4 :

Z

Digital Vault (EPV):

The hardened “Trophy Vault” where all secrets and credentials are stored securely5.

Z

Password Vault Web Access (PVWA):

The web-based “Clubhouse” interface for users and administrators6.
Z

Central Policy Manager (CPM):

The automated “Grounds Crew” engine that changes passwords and performs system health checks7.
Z

Privileged Session Manager (PSM):

The “Course Proxy” that records, isolates, and monitors all RDP/SSH sessions8.
Golf-Ball

3. Pre-Implementation: Course Requirements

Before teeing off, ensure the following hardware and network specifications are met 9 :

Hardware Requirements

Component CPU RAM Storage Notes
Vault 4 vCPU 16GB 2x 100GB HDD Must be standalone/non-domain joined10
Component Servers 4 vCPU 16GB 100GB HDD CPM/PVWA/PSM (Separate recommended)11

Software & Connectivity

Z

OS:

Windows Server 2016, 2019, or 202212.
Z

Database:

Built-in Vault database; no external SQL required13.

Z

Network Ports:

* Port 1858 (TCP): Vault to Component Servers14.

Z

Port 443 (HTTPS):

Users to PVWA15.
Z

Port 3389/22:

PSM to Target Servers (RDP/SSH)16.
Golf-Ball

4. Implementation Roadmap: The Playbook

Phase 1: The Core (Vault Installation)

Z

Server Hardening:

Run the CyberArk hardening script to disable unnecessary services and close all ports except 185817.
Z

Vault Setup:

Execute the Digital Vault installation18.
Z

Key Generation:

Generate the Master and Operator Keys19.

Critical: Store the Master Key on a physical USB/CD and place it in a physical safe20.

Z

Licensing:

Upload the provided license.xml file21.

Phase 2: The Interface (PVWA & CPM)

Z

IIS Role:

Enable the IIS role on the PVWA server before running the installer22.
Z

CPM Setup:

Install the CPM; this requires a dedicated “Password Manager” user in the Vault23.
Z

Verification:

Confirm the interface is active by logging into the Password Vault web portal24.

Phase 3: The Proxy (PSM Installation)

Z

RDS Role:

Install the Remote Desktop Services (Session Host) role25.
Z

PSM Install:

Run the PSM installer and link it to the Vault26.
Z

Hardening:

Apply the PSM hardening GPO to ensure users cannot “break out” of their proxy sessions27.
Golf-Ball

5. Post-Installation: The Scorecard Setup

Z

Identity Integration:

Integrate with Active Directory (LDAP) and map AD groups (e.g., GolfCyber_Admins ) to Vault groups28.
Z

Safe Structure:

Establish a logical safe structure, including Golf_Windows_Admins, Golf_Network_Core, and Golf_Database_Prod29.
Z

Key Generation:

Account Onboarding: Configure platforms (Windows/Unix) and use Bulk Upload or the Discovery Tool to ingest accounts30 .

Z

Verification:

Trigger a “Change” task in the CPM to confirm communication with target systems31.
Golf-Ball

6. Pro Tips & Groundskeeping

Z

Dual Control:

Enable “Request/Approval” workflows for highly sensitive Domain
Admin accounts32.
Z

SIEM Integration:

Forward Vault syslog data to your SOC (Splunk/Sentinel)33.
Z

Key Generation:

Disaster Recovery: Implement a DR Vault in a separate geographic zone for
high availability34.

Z

Monthly Health Check:

Perform credential rotation tests and review Compliance
Reports in the PVWA35.
pdf
Download The PAM Playbook