0% found this document useful (0 votes)
84 views

Cyberark Skyark Data Sheet

This document discusses the CyberArk SkyArk tool, which is an open source tool that scans cloud environments to discover privileged entities that could pose security risks, known as Shadow Admins. Shadow Admins are entities that appear to have limited permissions but can effectively act as full administrators. The document outlines how Shadow Admins can be unintentionally created and the risks they pose if compromised. It also describes how the SkyArk tool can help identify Shadow Admins and the steps organizations should take to secure privileged entities once discovered.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
84 views

Cyberark Skyark Data Sheet

This document discusses the CyberArk SkyArk tool, which is an open source tool that scans cloud environments to discover privileged entities that could pose security risks, known as Shadow Admins. Shadow Admins are entities that appear to have limited permissions but can effectively act as full administrators. The document outlines how Shadow Admins can be unintentionally created and the risks they pose if compromised. It also describes how the SkyArk tool can help identify Shadow Admins and the steps organizations should take to secure privileged entities once discovered.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

DATA SHEET

DISCOVER SHADOW ADMIN RISKS AND PROTECT


CLOUD PRIVILEGED ENTITIES WITH CYBERARK SKYARK

INTRODUCTION HIGHLIGHTS
ƒ Discover, assess, and secure
As business cloud adoption increases, so do the security risks associated with
cloud privileged entities
Cloud Shadow Admins – entities that appear to have limited permissions, but
ƒ Protect cloud environments
effectively are full admins. Shadow Admins have specific sensitive permissions
from the growing threat of
that grant them the ability to escalate privileges in the cloud. These entities, hidden Shadow Admin users
which often arise naturally from misconfigurations, can be targeted by
ƒ Scan both AWS and Azure
attackers and manipulated to put cloud environments at risk. CyberArk
environments to support blue
SkyArk is an open source tool that scans both AWS and Azure platforms to and red teams
discover the most privileged entities (users, groups and roles) in a given cloud
ƒ Easy to run and only requires
environment. Developed by the CyberArk Threat Research Labs team, the read-only permissions
SkyArk tool helps security teams identify and secure both straightforward
ƒ Available as a free open
privileged accounts and stealthy Shadow Admins that pose security risks. source solution.

Shadow Admins and the Needed Paradigm Shift


While organizations may have a grasp of their legitimate admin accounts, Shadow Admins in cloud environments can be
more difficult to discover. Thousands of permissions can exist in the cloud. As a result, there are many cases through which
Shadow Admins can be created, all of which vary from one organization to another. The risks to all organizations, however,
are the same; despite the appearance of limited permissions, Shadow Admins with only one permission could potentially
have the equivalent power of legitimate admins. Additionally, Shadow Admins can in effect have unrestricted control over
existing legitimate cloud admins.

The following scenarios provide examples of both how Shadow Admins can be created and the risks they pose:

• A user with only one permission, but a permission granting the ability to change passwords for other full admin users.
• A user with a single permission to manage other groups’ members. If an attacker gains control of this type of user, they
can modify the members of an existing admins group and add compromised users, in effect creating new full admins.

• Applications responsible for recovering users’ passwords. These applications have permission to reset passwords;
therefore, if compromised, these applications could enable attackers to reset an existing admin’s password and take
control of their account. In this scenario, an attacker could perform any malicious actions they wanted.

• AWS users with permissions to run new EC2 VM instances and attach IAM role identities. If compromised, these users
could run a new VM instance with an admin role identity attached to it. Attackers could then connect to this EC2 VM
instance to gain full admin control and assume the attached privileged role.

• Azure applications registered in the Azure Active Directory. These applications can be granted sensitive Azure
permissions. Therefore, if a user owns a sensitive application, a potential attacker could compromise this user, then
take control over the application and perform privileged actions through it. In this case, the attacker gains admin

www.cyberark.com Page 1 of 2
CYBERARK DATA SHEET

privileges through the sensitive application even if the compromised user wasn’t an Azure admin to begin with.

SkyArk is the most comprehensive scanning tool for discovering the most privileged entities throughout an organization’s
cloud environments, including entities with the permissions above.

Securing Shadow Admins


Following the discovery of admin users, including Shadow Admins, organizations should take three critical steps:

1. Check the discovered entities to ensure they’re recognized. Unrecognized accounts have a higher probability of
being malicious accounts and should therefore be analyzed to determine their validity. Attackers may already have
created their own Shadow Admins to build persistence in the target cloud.

2. Eliminate unnecessary admins. Some admins discovered by SkyArk might be unintended admins. Organizations
should remove the sensitive permissions from unintended admins discovered by SkyArk and convert them to non-
privileged users.

3. Secure the remaining list of proper privileged entities. Admins need end-to-end protection: strong passwords with
frequent rotation, session monitoring, multi-factor authentication (MFA), audit trail of activities, and other security
best practices are essential.

Customization
SkyArk also includes customizable sub-modules that security teams can use to gain additional insights regarding their
organizations’ cloud environments, including AWStrace, which helps investigate sensitive actions within AWS environments
including those involving AWS Access Keys. More details and full explanations could be found on the SkyArk GitHub page.

Execution Options
For scanning AWS:

1. Read-only permissions over the IAM service.

2. AWS PowerShell module (download link can be found in the tool’s GitHub page).

For scanning Azure:

1. Read-only permissions over the Azure Active Directory and subscription’s IAM.

2. Azure PowerShell module locally available or run the scan directly from the Azure Portal using Azure CloudShell.

TAKE THE NEXT STEP

Businesses can only protect themselves from the risks they are aware of. CyberArk SkyArk is a complimentary, open source
cloud security tool to help your organization expose cloud Shadow Admins and protect cloud privileged entities. The
tool can enable Security and Red teams with the complex mission of identifying Shadow Admins that could escalate their
privileges to put full cloud environments at risk, underscoring the business need for a privileged access security program.
Get started today by contacting your local CyberArk Customer Success Representative, or by accessing the SkyArk Quick
Start Guide on GitHub.

©CyberArk Software Ltd. All rights reserved. No portion of this publication may be reproduced in any form or by any means without the express written consent
of CyberArk Software. CyberArk ®, the CyberArk logo and other trade or service names appearing above are registered trademarks (or trademarks) of CyberArk
Software in the U.S. and other jurisdictions. Any other trade and service names are the property of their respective owners. U.S., 12.19. Doc. 427598479

CyberArk believes the information in this document is accurate as of its publication date. The information is provided without any express, statutory, or implied
warranties and is subject to change without notice.

www.cyberark.com Page 2 of 2

You might also like