CyberArk Dynamic Privileged Access Now Supports JIT Access to Windows Targets in AWS

September 26, 2022 Sarven Ipek

CyberArk Dynamic Privileged Access Now Supports JIT Access to Windows Targets in AWS

CyberArk is proud to announce Dynamic Privileged Access now supports Just-In-Time (JIT) access to Windows targets in AWS. This is on top of existing support for Linux targets, completing the Just-In-Time access story for Virtual Machines (VMs) in AWS environments. 

Developers familiar with performing operations using either Windows or Linux Operating Systems (OS) can now securely work in AWS without adjusting their daily routines. By using the tooling they’re familiar with, they can operate more efficiently.

Greatly Reduce Cyber Risk Within AWS Using DPA

Organizations actively pursuing a Zero Trust methodology within their AWS environment can measurably reduce cyber risk by decreasing the quantity of accounts with standing access.  Organizations can now provision Just-In-Time operational access to both Windows VMs and Linux VMs in AWS to perform daily operations on cloud targets.

CyberArk DPA provisions an ephemeral account once the DPA service matches the end user’s identity, target machine details and connection time based on attribute-based access controls (ABAC).  The connection to the target machine is isolated, and once the session is closed — or times out — the ephemeral user is deleted. All sessions can be set as time-bound with adjustable parameters.

Comprehensive Just-In-Time Coverage Within AWS

Businesses can achieve greater operational efficiency, as their IT team has a single platform to provision Just-In-Time access for Windows and Linux targets within AWS. Organizations can now allow their developers and IT teams to host workloads on their preferred OS. At the same time, the risks of standing access to those environments are reduced.

For additional insight regarding this release please see the DPA release notes.

Previous Article
5 Defense-in-Depth Layers for Enabling Secure Access  
5 Defense-in-Depth Layers for Enabling Secure Access  

Cybersecurity is one of many industries that love jargon. As in the medical and legal professions, complex ...

Next Article
Why and How Federal Agencies Need to Improve Their FITARA Scorecard
Why and How Federal Agencies Need to Improve Their FITARA Scorecard

In a big, highly anticipated move, last week the White House introduced new cybersecurity guidance to harde...