Implementing Zero Standing Privilege with CyberArk
Overview
Zero Standing Privileges (ZSP) is a security model where no user or identity retains persistent privileged access. Instead, elevated access is provisioned dynamically on a just-in-time (JIT) basis and automatically revoked after use. CyberArk implements ZSP through its Secure Cloud Access (SCA) module, which creates ephemeral, scoped roles in cloud environments (AWS, Azure, GCP) that exist only for the duration of a session. The TEA framework -- Time, Entitlements, and Approvals -- governs every privileged access session.
Prerequisites
- CyberArk Identity Security Platform (Privilege Cloud or self-hosted)
- CyberArk Secure Cloud Access (SCA) license
- Cloud provider accounts (AWS, Azure, GCP) with admin access for integration
- ITSM integration (ServiceNow, Jira) for approval workflows
- CyberArk Vault configured with safe management
Core Concepts
TEA Framework (Time, Entitlements, Approvals)
| Component | Description | Configuration |
|---|---|---|
| Time | Duration of the privileged session | Min 15 minutes, max 8 hours, default 1 hour |
| Entitlements | Permissions granted during the session | Dynamically scoped IAM roles/policies |
| Approvals | Authorization workflow before access | Auto-approve, manager approval, or multi-level |
ZSP Architecture
User requests access via CyberArk
โ
โโโ CyberArk evaluates request against policies:
โ โโโ Is user eligible for this access?
โ โโโ Does the request comply with TEA policies?
โ โโโ Is approval required?
โ
โโโ [If approval needed] โ Route to approver (ITSM/ChatOps)
โ
โโโ Upon approval:
โ โโโ CyberArk creates ephemeral IAM role in target cloud
โ โโโ Scopes permissions to minimum required entitlements
โ โโโ Sets session TTL (time-bound)
โ โโโ Provisions temporary credentials
โ
โโโ User accesses cloud resources via session
โ โโโ All actions logged and recorded
โ โโโ Session monitored for policy violations
โ
โโโ Session expires:
โโโ Ephemeral role deleted
โโโ Temporary credentials revoked
โโโ Zero standing privileges remain
CyberArk Components
| Component | Role |
|---|---|
| Identity Security Platform | Central management and policy engine |
| Privilege Cloud Vault | Stores privileged credentials and keys |
| Secure Cloud Access | Creates/destroys ephemeral cloud roles |
| Endpoint Privilege Manager | Controls local admin and app elevation |
| Privileged Session Manager | Records and monitors privileged sessions |
Implementation Steps
Step 1: Integrate Cloud Providers
AWS Integration:
- Create a CyberArk integration role in AWS IAM
- Configure cross-account trust policy allowing CyberArk to assume roles
- Create IAM policies that define maximum allowed entitlements
- Register AWS accounts in CyberArk SCA
{
"Version": "2012-10-17",
"Statement": [{
"Effect": "Allow",
"Principal": {
"AWS": "arn:aws:iam::CYBERARK_ACCOUNT:role/CyberArkSCARole"
},
"Action": "sts:AssumeRole",
"Condition": {
"StringEquals": {
"sts:ExternalId": "cyberark-external-id"
}
}
}]
}
Azure Integration:
- Register CyberArk as an enterprise application in Microsoft Entra ID
- Grant CyberArk application permissions: Directory.ReadWrite.All, RoleManagement.ReadWrite.Directory
- Create custom Azure roles with scoped permissions
- Register Azure subscriptions in CyberArk SCA
GCP Integration:
- Create a service account for CyberArk in GCP
- Grant IAM Admin and Service Account Admin roles
- Configure workload identity federation for cross-cloud access
- Register GCP projects in CyberArk SCA
Step 2: Define Access Policies
Create policies that map job functions to cloud entitlements:
# CyberArk SCA Policy Example
policy_name: "developer-aws-read-access"
description: "Read-only access to AWS production for developers"
target_cloud: "aws"
target_accounts: ["123456789012", "987654321098"]
time_policy:
max_duration: "4h"
default_duration: "1h"
business_hours_only: true
timezone: "America/New_York"
entitlement_policy:
aws_managed_policies:
- "arn:aws:iam::aws:policy/ReadOnlyAccess"
deny_actions:
- "iam:*"
- "organizations:*"
- "sts:*"
resource_restrictions:
- "arn:aws:s3:::production-*"
approval_policy:
approval_required: true
approvers:
- type: "manager"
- type: "group"
group: "cloud-security-team"
auto_approve_conditions:
- previous_approved_same_policy: true
within_days: 7
escalation_timeout: "2h"
escalation_approver: "cloud-security-lead"
Step 3: Configure Session Monitoring
Set up privileged session recording and real-time monitoring:
- Enable session recording for all ZSP sessions
- Configure keystroke logging for SSH/RDP sessions
- Set up real-time alerts for suspicious activities:
- Attempts to escalate privileges during session
- Access to resources outside policy scope
- Session duration exceeding 2x the normal pattern
- Forward session metadata to SIEM
Step 4: Implement Approval Workflows
Integrate with ITSM tools for access request and approval:
- ServiceNow: CyberArk SCA connector creates ServiceNow tickets for approval
- Slack/Teams: ChatOps bot for quick approvals within messaging platforms
- Jira: Integration for development-related access requests
- Auto-Approval: Configure rules for low-risk, previously approved requests
Step 5: Migrate from Standing Privileges
Phase 1: DISCOVERY (Weeks 1-2)
โโโ Inventory all standing privileged roles across cloud accounts
โโโ Map users to their standing role assignments
โโโ Analyze CloudTrail/activity logs for actual permission usage
โโโ Identify roles that can be converted to JIT
Phase 2: POLICY CREATION (Weeks 3-4)
โโโ Create ZSP policies based on actual usage analysis
โโโ Define TEA parameters for each policy
โโโ Configure approval workflows
โโโ Test policies with pilot users
Phase 3: MIGRATION (Weeks 5-8)
โโโ Assign ZSP policies to pilot group
โโโ Remove standing privileges from pilot users
โโโ Monitor for access issues and adjust policies
โโโ Expand to additional teams incrementally
โโโ Remove all standing privileges organization-wide
Phase 4: GOVERNANCE (Ongoing)
โโโ Monthly review of ZSP policy effectiveness
โโโ Quarterly entitlement optimization
โโโ Monitor for policy drift or standing privilege re-creation
โโโ Report ZSP metrics to security leadership
Validation Checklist
- [ ] Cloud providers integrated with CyberArk SCA
- [ ] TEA policies defined for all privileged access scenarios
- [ ] Approval workflows configured and tested
- [ ] Session recording and monitoring enabled
- [ ] All standing privileged roles identified for migration
- [ ] Pilot group successfully using ZSP without standing privileges
- [ ] Break-glass procedure defined for emergency access
- [ ] SIEM integration receiving session and access logs
- [ ] Auto-approval rules configured for low-risk, repeat access
- [ ] Organization-wide migration plan approved and scheduled
- [ ] KPI tracking: reduction in standing privilege assignments
Compliance Framework Mapping
This skill supports compliance evidence collection across multiple frameworks:
- SOC 2: CC6.1 (Logical Access), CC6.2 (Credentials), CC6.3 (Provisioning)
- ISO 27001: A.9.1 (Access Control), A.9.2 (User Access Management), A.9.4 (System Access Control)
- NIST 800-53: AC-2 (Account Management), IA-2 (Identification), AC-6 (Least Privilege)
- NIST CSF: PR.AC (Access Control)
Claw GRC Tip: When this skill is executed by a registered agent, compliance evidence is automatically captured and mapped to the relevant controls in your active frameworks.
Deploying This Skill with Claw GRC
Agent Execution
Register this skill with your Claw GRC agent for automated execution:
# Install via CLI
npx claw-grc skills add implementing-zero-standing-privilege-with-cyberark
# Or load dynamically via MCP
grc.load_skill("implementing-zero-standing-privilege-with-cyberark")
Audit Trail Integration
When executed through Claw GRC, every step of this skill generates tamper-evident audit records:
- SHA-256 chain hashing ensures no step can be modified after execution
- Evidence artifacts (configs, scan results, logs) are automatically attached to relevant controls
- Trust score impact โ successful execution increases your agent's trust score
Continuous Compliance
Schedule this skill for recurring execution to maintain continuous compliance posture. Claw GRC monitors for drift and alerts when re-execution is needed.