Cyberark Integration
Cyberark is a global leader in privileged access management (PAM) solutions. Privileged access management refers to the cybersecurity practice of securing, managing, and monitoring privileged accounts and access within an organization's IT infrastructure.
How does this integration help Sprinto
The integration primarily helps Sprinto retrieve the user account details like user name, email address, role, etc. It helps Sprinto to map and check if the user with access offboards the organization. The org role information also helps Sprinto ensure only the configured valid roles access the system.
Sprinto checks for Cyberark
Following are the available Sprinto checks for Cyberark integration:
User should be identified
Cyberark access should be removed for offboarded user
Critical system access control should be configured
User access to Critical System should be valid
How to fix Note: The user access to the critical system becomes valid if the respective Org role is added to the system.
Before you begin
Log in to Sprinto as administrator.
Ensure you have “Admin” access on the Cyberark account you want to integrate.
Ensure you have Audit user permissions to build this integration.
Sprinto uses Truto.one as the integration partner to build this integration.
Integrate Sprinto with Cyberark
Integrate Cyberark on Sprinto.
Go to Security Hub > Settings > Integrations > Available, and click Connect next to Cyberark.
Read the on-screen instructions, and click Next.
On Integration page, select the acknowledgment checkbox and click Connect to Cyberark. Note: Ensure you have a pop-up window enabled on your browser.
On Authentication page, enter your Cyberark Username, Password, and IIS Server IP, and click Connect.
Add Cyberark as a critical system.
On Sprinto app, go to Security Hub > Access > Critical systems, and click + Add Critical System.
On Add Critical System page, select Cyberark and click Add System.
Configure valid users for Cyberark.
Go to Security Hub > Access > Critical systems, and select Cyberark.
On the Summary page, click Configure Now next to the Cyberark account.
On the Manage page, click Configure next to access validity.
Choose one of the options to define valid users based on roles.
Final Step
After completing Step 3, allow 15 to 20 minutes for Sprinto to finish the data syncing process. Sprinto may take several hours to evaluate the synced data and activate relevant Sprinto checks. If needed, go to Security Hub > Access > Critical System to check for pending tasks next to Cyberark.
If you need any assistance with the integration, kindly get in touch with Sprinto support.
Last updated