Post

#27 - CyberArk SIA Linux SSH

Welcome back to the CyberArk SIA series! In this video, we take a deep dive into the SIA Linux SSH use case.

Video Preview

CyberArk Docs

SIA administration

Connect to a Linux target

Objectives

  • Applying the right level of Privilege Controls
  • Review PSM, PSMP, and SIA architecture
  • Review SIA: Connector install, Pools, Networks, and general settings
  • Connect via SIA-SSH using vaulted credentials
  • Deploy SIA CA and create recurring access policies
  • Understand SSH fingerprinting
  • Understand SSH certificate authority
  • Review auditing capabilities

Timeline

  • Intro – 0:00
  • Applying the Right Level of Privilege Controls – 1:17
  • PSM Architecture – 2:09
  • PSMP Architecture – 3:25
  • SIA Architecture – 4:00
  • Demo: PSM and PSMP – 6:52
  • Review SIA: Connector Install, Pools, Networks, and General Settings – 9:40
  • Connect via SIA-SSH Using Vaulted Credentials – 12:32
  • Deploy SIA CA and Create Recurring Access Policies – 14:32
  • Attempt SIA Connection When CA Is Not Present – 19:27
  • SIA: Multiple Policies – 21:00
  • Understanding SSH Fingerprinting – 22:56
  • Understanding SSH Certificate Authority – 25:06
  • Review Auditing Capabilities – 28:52

LinkedIn: https://au.linkedin.com/in/bradmcdowell

This post is licensed under CC BY 4.0 by the author.