Where Cybersecurity Meets Career Success – SecApps Learning

CyberArk Operations Guide (2026): System Health, Safe Management, Platform & Master Policy Explained

  • Home
  • Blog
  • CyberArk Operations Guide (2026): System Health, Safe Management, Platform & Master Policy Explained
Image
  • April 26 2026

CyberArk Operations Guide (2026): System Health, Safe Management, Platform & Master Policy Explained

Learn CyberArk Operations in detail including System Health checks, Safe Management, Platform configuration, Reports, and Master Policy. Complete guide for PAM engineers.


πŸš€ Introduction to CyberArk Operations

CyberArk CyberArk Operations is the day-to-day activity performed by L1, L2, and L3 engineers to ensure the PAM environment runs smoothly.

πŸ‘‰ It includes:

  • Monitoring system health
  • Managing safes and access
  • Configuring platforms
  • Generating reports
  • Enforcing security policies etc...

πŸ’‘ Strong operations knowledge = strong real-time project performance


🎯 Why CyberArk Operations is Important

Without proper operations:
❌ Components may go down unnoticed
❌ Password rotation may fail
❌ Users may lose access
❌ Security risks increase

πŸ‘‰ With proper operations:
βœ” System stability
βœ” Secure access control
βœ” Compliance & auditing
βœ” Smooth password management


🧩 1. System Health (L1 Engineer Task)


πŸ“Œ What is System Health?

Monitoring the status of all CyberArk components.


πŸ” What You Check Daily

βœ” Components status (Connected / Disconnected)
βœ” Vault, PVWA, CPM, PSM availability
βœ” Installed versions
βœ” Number of onboarded accounts
βœ” Accounts managed by CPM
βœ” Active user sessions in PVWA
βœ” Number of PSM connections
βœ” Internal users used by components


🎯 Why It Matters

πŸ‘‰ Early detection of issues prevents downtime


πŸ“Š 2. CyberArk Reports


πŸ“Œ Key Reports in PVWA


1️⃣ Privileged Account Inventory

  • Lists all accounts in CyberArk
  • Includes:
    • Account Name
    • Address
    • Last Accessed
    • Last Modified

2️⃣ Privileged Account Compliance

βœ” Compliant:

  • CPM successfully rotates password

❌ Non-Compliant:

  • CPM fails to rotate password

3️⃣ Application Inventory

  • Applications onboarded for:
    • Secret Manager

4️⃣ Entitlement Report

  • The Entitlement Report in the Privileged Identity Management (PIM) suite provides a comprehensive overview of user access and permissions. It details each user’s effective access control, authorization level, and privileges for every account stored within the vault or specific safe. This report ensures complete visibility into which users have access to which accounts, making it a critical tool for access governance, compliance auditing, and security management in CyberArk environments.

5️⃣ Activity Logs

  • Tracks user actions:
    • Login
    • Account changes
    • Deletion and much more...

πŸ†• New Reports (Version 14+)

βœ” License Capacity
βœ” User List
βœ” Safe Owners
βœ” Active vs Non-Active Safes


πŸ—‚οΈ 3. Safe Management


πŸ“Œ What is a Safe?

πŸ‘‰ A Safe is a secure container used to store:

  • Accounts
  • Passwords
  • Certificates
  • Files

πŸ’‘ Without Safe → No storage possible


🧭 Safe Creation Steps

  1. Login to PVWA
  2. Navigate to Policies → Safes
  3. Create Safe with:
  • Safe Name (Max 28 characters)
  • Description
  • OLAC (Object Level Access Control)
  • Password history settings
  • Assign CPM

⚠️ Important Rule

πŸ‘‰ If CPM is NOT assigned:
❌ Password rotation will NOT work


πŸ‘₯ Default Safe Members

When a Safe is created:

βœ” Master
βœ” DR Users
βœ” Backup Users
βœ” Operators
βœ” Batch
βœ” PasswordManager
βœ” Notification Engine
βœ” Auditors βœ” PSMAppUsers

❗ Administrator is NOT added by default


πŸ” Safe Permissions


πŸ‘€ End Users

βœ” List Account
βœ” Use Account


πŸ‘¨‍πŸ’Ό Managers / Leads

βœ” List
βœ” Use
βœ” Retrieve
βœ” Authorize Request


πŸ”‘ Important Permissions

  • Retrieve → View password
  • Use → Connect via PSM
  • Add/Update/Delete → Manage accounts
  • Move → Transfer account between safes
  • Access Without Confirmation → Bypass approval

βš™οΈ 4. Platform Management


πŸ“Œ What is a Platform?

πŸ‘‰ A Platform defines:

  • Password policies
  • CPM settings
  • PSM connection settings

🧱 Platform Types

  • Windows
  • Unix/Linux
  • Database (Oracle, SQL, MySQL)
  • Cloud (AWS, Azure, GCP) etc..

⚠️ Critical Rule

πŸ‘‰ Wrong Platform =
❌ CPM password rotation fails
❌ PSM session connection fails


πŸ’‘ Best Practice

βœ” Always duplicate and customize platform
βœ” Use correct platform per account type


πŸ” 5. Master Policy (Vault Settings)


πŸ“Œ What is Master Policy?

πŸ‘‰ Global security rules applied across CyberArk


πŸ”‘ Important Policies


1️⃣ Dual Control (Approval)

  • User must request access
  • Manager approves

βœ” Supports:

  • Single approval
  • Multi-level approval

πŸ”“ Bypass Approval

Permission:
πŸ‘‰ Access Safe Without Confirmation


2️⃣ Check-in / Check-out

  • Locks account to one user
  • Prevents concurrent usage

3️⃣ One-Time Password (OTP)

  • Password changes after every use

4️⃣ Specify Reason

  • User must provide reason before access
  • Used for auditing

5️⃣ Click-to-Connect

  • Enable/Disable PSM connection & View Password

πŸ”„ CPM Policies (Password Management)


βœ” Password Change: Default 90 days
βœ” Password Verify: Default 7 days

πŸ‘‰ CPM ensures:

  • Password rotation
  • Password validation

πŸ–₯️ PSM Policies (Session Management)


βœ” Session Recording: Enabled
βœ” Session Monitoring: Optional

πŸ‘‰ Ensures:

  • Secure access
  • Full session audit

🧾 Audit Retention Policy


βœ” Default: 90 Days

πŸ‘‰ Stores:

  • Logs
  • User activities
  • Session details

🧠 Key Takeaways

βœ” CyberArk Operations is daily activity
βœ” System Health ensures uptime
βœ” Safes control access
βœ” Platforms control behavior
βœ” Master Policy enforces security


 

🎯 Final Thoughts

CyberArk Operations is where real engineering happens.

πŸ‘‰ Anyone can learn theory…
πŸ‘‰ But operations define your real expertise

Comments ()

Leave a reply

Your email address will not be published. Required fields are marked*

Recent Post

Copyright 2022 SecApps Learning. All Right Reserved