DIY CyberArk Blueprint Roadmap Template
DIY CyberArk Blueprint Roadmap Template
DIY CyberArk Blueprint Roadmap Template
CP1* CP2 CP3 CP4 CP1 CP2 CP3 CP4 CP1 CP2 CP3 CP4 ...
*CP = Checkpoint
Instructions: Update phase definitions and timing per your requirements. Define appropriate checkpoints & milestones.
EXAMPLE IDENTITY SECURITY PROGRAM ROADMAP
Legend
Blueprint Stages 1, 2, 3 Blueprint Stages 2 & 3 Blueprint Stages 1, 3, 4
Access & PAM
Phase 1 Phase 2 Phase 4 Phase 6
• Cloud Admins • Local Admins • Cloud VM Instances • VMWare/Virtualization Least Privilege
• Domain Admins • Server Admins • PaaS Admins • Network Devices
• WKS Admins • Remote Access ilO/DRAC Secrets Management
• Vuln. Scanner • Apps Stage 1: DevOps
Strategy Refresh
CP1* CP2 CP3 CP4 CP1 CP2 CP3 CP4 CP1 CP2 CP3 CP4 ...
Blueprint Stages 1 & 3 Blueprint Stages 2 & 3 Blueprint Stage 4 Blueprint Stages 3 & 4 Blueprint Stages 4 & 5
The Blueprint is NOT a roadmap. It is a series of recommendations which GUIDE roadmap design.
CYBERARK BLUEPRINT STAGES OVERVIEW
IDENTITY SECURITY CONTROL FAMILIES & TECHNOLOGIES
GOAL
Access Least Privilege Privileged Access Secrets Management
Focus on locking down PaaS Admins, Workstation Local Admins, 3rd Party Business Tools &
STAGE 2 the most universal Cloud Privileged Entities Cloud Privileged Entities Privileged AD Users & Application Servers
technology platforms & CI/CD Console Admins *NIX Root + SSH Keys (via C3 Alliance)
USERS
WORKPLACES WORKSPACES
THE CYBERARK BLUEPRINT
is a framework of SIMPLE PRESCRIPTIVE GUIDANCE
designed to measurably REDUCE RISKS
and DEFEND AGAINST ATTACKS
WHICH IS BUILT ON
Remote Vendor
Internal
Attacker
IT Admin
Business
User
External
Attacker Developer
Robot
Internal Application
Attacker
BUILDING OUR ROADMAP
Current StateBlueprint
CyberArk Assessment
Identity Security Roadmap
Internal Priorities
Business Outcomes