Cyberark Integration

Cyberark is a global leader in privileged access management (PAM) solutions. Privileged access management refers to the cybersecurity practice of securing, managing, and monitoring privileged accounts and access within an organization's IT infrastructure.

How does this integration help Sprinto

The integration primarily helps Sprinto retrieve the user account details like user name, email address, role, etc. It helps Sprinto to map and check if the user with access offboards the organization. The org role information also helps Sprinto ensure only the configured valid roles access the system.

Sprinto checks for Cyberark

Following are the available Sprinto checks for Cyberark integration:

Sprinto check
Reference procedure

User should be identified

Cyberark access should be removed for offboarded user

Critical system access control should be configured

User access to Critical System should be valid

How to fix Note: The user access to the critical system becomes valid if the respective Org role is added to the system.

Before you begin

  • Log in to Sprinto as administrator.

  • Ensure you have “Admin” access on the Cyberark account you want to integrate.

  • Ensure you have Audit user permissions to build this integration.

  • Sprinto uses Truto.one as the integration partner to build this integration.

Integrate Sprinto with Cyberark

  1. Integrate Cyberark on Sprinto.

    • Go to Security Hub > Settings > Integrations > Available, and click Connect next to Cyberark.

    • Read the on-screen instructions, and click Next.

    • On Integration page, select the acknowledgment checkbox and click Connect to Cyberark. Note: Ensure you have a pop-up window enabled on your browser.

    • On Authentication page, enter your Cyberark Username, Password, and IIS Server IP, and click Connect.

  2. Add Cyberark as a critical system.

    • On Sprinto app, go to Security Hub > Access > Critical systems, and click + Add Critical System.

    • On Add Critical System page, select Cyberark and click Add System.

  3. Configure valid users for Cyberark.

    • Go to Security Hub > Access > Critical systems, and select Cyberark.

    • On the Summary page, click Configure Now next to the Cyberark account.

    • On the Manage page, click Configure next to access validity.

    • Choose one of the options to define valid users based on roles.

Final Step

After completing Step 3, allow 15 to 20 minutes for Sprinto to finish the data syncing process. Sprinto may take several hours to evaluate the synced data and activate relevant Sprinto checks. If needed, go to Security Hub > Access > Critical System to check for pending tasks next to Cyberark.

If you need any assistance with the integration, kindly get in touch with Sprinto support.

Last updated