Cyberark Skyark Data Sheet
Cyberark Skyark Data Sheet
INTRODUCTION HIGHLIGHTS
Discover, assess, and secure
As business cloud adoption increases, so do the security risks associated with
cloud privileged entities
Cloud Shadow Admins – entities that appear to have limited permissions, but
Protect cloud environments
effectively are full admins. Shadow Admins have specific sensitive permissions
from the growing threat of
that grant them the ability to escalate privileges in the cloud. These entities, hidden Shadow Admin users
which often arise naturally from misconfigurations, can be targeted by
Scan both AWS and Azure
attackers and manipulated to put cloud environments at risk. CyberArk
environments to support blue
SkyArk is an open source tool that scans both AWS and Azure platforms to and red teams
discover the most privileged entities (users, groups and roles) in a given cloud
Easy to run and only requires
environment. Developed by the CyberArk Threat Research Labs team, the read-only permissions
SkyArk tool helps security teams identify and secure both straightforward
Available as a free open
privileged accounts and stealthy Shadow Admins that pose security risks. source solution.
The following scenarios provide examples of both how Shadow Admins can be created and the risks they pose:
• A user with only one permission, but a permission granting the ability to change passwords for other full admin users.
• A user with a single permission to manage other groups’ members. If an attacker gains control of this type of user, they
can modify the members of an existing admins group and add compromised users, in effect creating new full admins.
• Applications responsible for recovering users’ passwords. These applications have permission to reset passwords;
therefore, if compromised, these applications could enable attackers to reset an existing admin’s password and take
control of their account. In this scenario, an attacker could perform any malicious actions they wanted.
• AWS users with permissions to run new EC2 VM instances and attach IAM role identities. If compromised, these users
could run a new VM instance with an admin role identity attached to it. Attackers could then connect to this EC2 VM
instance to gain full admin control and assume the attached privileged role.
• Azure applications registered in the Azure Active Directory. These applications can be granted sensitive Azure
permissions. Therefore, if a user owns a sensitive application, a potential attacker could compromise this user, then
take control over the application and perform privileged actions through it. In this case, the attacker gains admin
www.cyberark.com Page 1 of 2
CYBERARK DATA SHEET
privileges through the sensitive application even if the compromised user wasn’t an Azure admin to begin with.
SkyArk is the most comprehensive scanning tool for discovering the most privileged entities throughout an organization’s
cloud environments, including entities with the permissions above.
1. Check the discovered entities to ensure they’re recognized. Unrecognized accounts have a higher probability of
being malicious accounts and should therefore be analyzed to determine their validity. Attackers may already have
created their own Shadow Admins to build persistence in the target cloud.
2. Eliminate unnecessary admins. Some admins discovered by SkyArk might be unintended admins. Organizations
should remove the sensitive permissions from unintended admins discovered by SkyArk and convert them to non-
privileged users.
3. Secure the remaining list of proper privileged entities. Admins need end-to-end protection: strong passwords with
frequent rotation, session monitoring, multi-factor authentication (MFA), audit trail of activities, and other security
best practices are essential.
Customization
SkyArk also includes customizable sub-modules that security teams can use to gain additional insights regarding their
organizations’ cloud environments, including AWStrace, which helps investigate sensitive actions within AWS environments
including those involving AWS Access Keys. More details and full explanations could be found on the SkyArk GitHub page.
Execution Options
For scanning AWS:
2. AWS PowerShell module (download link can be found in the tool’s GitHub page).
1. Read-only permissions over the Azure Active Directory and subscription’s IAM.
2. Azure PowerShell module locally available or run the scan directly from the Azure Portal using Azure CloudShell.
Businesses can only protect themselves from the risks they are aware of. CyberArk SkyArk is a complimentary, open source
cloud security tool to help your organization expose cloud Shadow Admins and protect cloud privileged entities. The
tool can enable Security and Red teams with the complex mission of identifying Shadow Admins that could escalate their
privileges to put full cloud environments at risk, underscoring the business need for a privileged access security program.
Get started today by contacting your local CyberArk Customer Success Representative, or by accessing the SkyArk Quick
Start Guide on GitHub.
©CyberArk Software Ltd. All rights reserved. No portion of this publication may be reproduced in any form or by any means without the express written consent
of CyberArk Software. CyberArk ®, the CyberArk logo and other trade or service names appearing above are registered trademarks (or trademarks) of CyberArk
Software in the U.S. and other jurisdictions. Any other trade and service names are the property of their respective owners. U.S., 12.19. Doc. 427598479
CyberArk believes the information in this document is accurate as of its publication date. The information is provided without any express, statutory, or implied
warranties and is subject to change without notice.
www.cyberark.com Page 2 of 2