CyberArk Privileged Access Security
<div class="condensed-table">
| | |
| --- | --- |
| Version | 2.25.0 (View all) |
| Compatible Kibana version(s) | 8.14.0 or higher |
| Supported Serverless project types
What’s this? | Security
Observability |
| Subscription level
What’s this? | Basic |
| Level of support
What’s this? | Elastic |
</div>
The CyberArk Privileged Access Security integration collects audit logs and monitoring data from CyberArk’s Vault server.
The audit
data stream receives Vault Audit logs for User and Safe activities over the syslog protocol.
It will also receive monitoring data from the server and route it to the monitor
data stream (e.g. logs-cyberarkpas.monitor-default
).
Follow the steps under Security Information and Event Management (SIEM) Applications documentation to setup the integration:
- Copy the elastic-json-v1.0.xsl XSL Translator file to the
Server\Syslog
folder. - Sample syslog configuration for
DBPARM.ini
:
[SYSLOG]
UseLegacySyslogFormat=no
SyslogTranslatorFile=Syslog\elastic-json-v1.0.xsl
SyslogServerIP=<INSERT FILEBEAT IP HERE>
SyslogServerPort=<INSERT FILEBEAT PORT HERE>
SyslogServerProtocol=TCP
SendMonitoringMessage=yes
For proper timestamping of events, it’s recommended to use the newer RFC5424 Syslog format (UseLegacySyslogFormat=No
). To avoid event loss, use TCP
or TLS
protocols instead of UDP
.
The sample configuration above will include monitoring data. For more information about monitoring, see Monitor the Vault in SIEM Applications Using Syslog.
**Example**
An example event for audit
looks as following:
{
"@timestamp": "2021-03-04T17:27:14.000Z",
"agent": {
"ephemeral_id": "2e1e0d3f-9ac4-4f6a-816b-2b2b7400148a",
"id": "5607d6f4-6e45-4c33-a087-2e07de5f0082",
"name": "docker-fleet-agent",
"type": "filebeat",
"version": "8.9.1"
},
"cyberarkpas": {
"audit": {
"action": "Logon",
"desc": "Logon",
"iso_timestamp": "2021-03-04T17:27:14Z",
"issuer": "PVWAGWUser",
"message": "Logon",
"rfc5424": true,
"severity": "Info",
"station": "10.0.1.20",
"timestamp": "Mar 04 09:27:14"
}
},
"data_stream": {
"dataset": "cyberarkpas.audit",
"namespace": "ep",
"type": "logs"
},
"ecs": {
"version": "8.11.0"
},
"elastic_agent": {
"id": "5607d6f4-6e45-4c33-a087-2e07de5f0082",
"snapshot": false,
"version": "8.9.1"
},
"event": {
"action": "authentication_success",
"agent_id_status": "verified",
"category": [
"authentication",
"session"
],
"code": "7",
"dataset": "cyberarkpas.audit",
"ingested": "2023-08-29T14:16:49Z",
"kind": "event",
"outcome": "success",
"severity": 2,
"timezone": "+00:00",
"type": [
"start"
]
},
"host": {
"name": "VAULT"
},
"input": {
"type": "tcp"
},
"log": {
"source": {
"address": "172.21.0.4:38370"
},
"syslog": {
"priority": 5
}
},
"observer": {
"hostname": "VAULT",
"product": "Vault",
"vendor": "Cyber-Ark",
"version": "11.7.0000"
},
"related": {
"ip": [
"10.0.1.20"
],
"user": [
"PVWAGWUser"
]
},
"source": {
"address": "10.0.1.20",
"ip": "10.0.1.20"
},
"tags": [
"cyberarkpas-audit",
"forwarded"
],
"user": {
"name": "PVWAGWUser"
}
}
**Exported fields**
Field | Description | Type |
---|---|---|
@timestamp | Event timestamp. | date |
cyberarkpas.audit.action | A description of the audit record. | keyword |
cyberarkpas.audit.ca_properties.address | keyword | |
cyberarkpas.audit.ca_properties.cpm_disabled | keyword | |
cyberarkpas.audit.ca_properties.cpm_error_details | keyword | |
cyberarkpas.audit.ca_properties.cpm_status | keyword | |
cyberarkpas.audit.ca_properties.creation_method | keyword | |
cyberarkpas.audit.ca_properties.customer | keyword | |
cyberarkpas.audit.ca_properties.database | keyword | |
cyberarkpas.audit.ca_properties.device_type | keyword | |
cyberarkpas.audit.ca_properties.dual_account_status | keyword | |
cyberarkpas.audit.ca_properties.group_name | keyword | |
cyberarkpas.audit.ca_properties.in_process | keyword | |
cyberarkpas.audit.ca_properties.index | keyword | |
cyberarkpas.audit.ca_properties.last_fail_date | keyword | |
cyberarkpas.audit.ca_properties.last_success_change | keyword | |
cyberarkpas.audit.ca_properties.last_success_reconciliation | keyword | |
cyberarkpas.audit.ca_properties.last_success_verification | keyword | |
cyberarkpas.audit.ca_properties.last_task | keyword | |
cyberarkpas.audit.ca_properties.logon_domain | keyword | |
cyberarkpas.audit.ca_properties.other | flattened | |
cyberarkpas.audit.ca_properties.policy_id | keyword | |
cyberarkpas.audit.ca_properties.port | keyword | |
cyberarkpas.audit.ca_properties.privcloud | keyword | |
cyberarkpas.audit.ca_properties.reset_immediately | keyword | |
cyberarkpas.audit.ca_properties.retries_count | keyword | |
cyberarkpas.audit.ca_properties.sequence_id | keyword | |
cyberarkpas.audit.ca_properties.tags | keyword | |
cyberarkpas.audit.ca_properties.user_dn | keyword | |
cyberarkpas.audit.ca_properties.user_name | keyword | |
cyberarkpas.audit.ca_properties.virtual_username | keyword | |
cyberarkpas.audit.category | The category name (for category-related operations). | keyword |
cyberarkpas.audit.desc | A static value that displays a description of the audit codes. | keyword |
cyberarkpas.audit.extra_details.ad_process_id | keyword | |
cyberarkpas.audit.extra_details.ad_process_name | keyword | |
cyberarkpas.audit.extra_details.application_type | keyword | |
cyberarkpas.audit.extra_details.command | keyword | |
cyberarkpas.audit.extra_details.connection_component_id | keyword | |
cyberarkpas.audit.extra_details.dst_host | keyword | |
cyberarkpas.audit.extra_details.logon_account | keyword | |
cyberarkpas.audit.extra_details.managed_account | keyword | |
cyberarkpas.audit.extra_details.other | flattened | |
cyberarkpas.audit.extra_details.process_id | keyword | |
cyberarkpas.audit.extra_details.process_name | keyword | |
cyberarkpas.audit.extra_details.protocol | keyword | |
cyberarkpas.audit.extra_details.psmid | keyword | |
cyberarkpas.audit.extra_details.session_duration | keyword | |
cyberarkpas.audit.extra_details.session_id | keyword | |
cyberarkpas.audit.extra_details.src_host | keyword | |
cyberarkpas.audit.extra_details.username | keyword | |
cyberarkpas.audit.file | The name of the target file. | keyword |
cyberarkpas.audit.gateway_station | The IP of the web application machine (PVWA). | ip |
cyberarkpas.audit.hostname | The hostname, in upper case. | keyword |
cyberarkpas.audit.iso_timestamp | The timestamp, in ISO Timestamp format (RFC 3339). | date |
cyberarkpas.audit.issuer | The Vault user who wrote the audit. This is usually the user who performed the operation. | keyword |
cyberarkpas.audit.location | The target Location (for Location operations). | keyword |
cyberarkpas.audit.message | A description of the audit records (same information as in the Desc field). | keyword |
cyberarkpas.audit.message_id | The code ID of the audit records. | keyword |
cyberarkpas.audit.product | A static value that represents the product. | keyword |
cyberarkpas.audit.pvwa_details | Specific details of the PVWA audit records. | flattened |
cyberarkpas.audit.raw | Raw XML for the original audit record. Only present when XSLT file has debugging enabled. | keyword |
cyberarkpas.audit.reason | The reason entered by the user. | text |
cyberarkpas.audit.rfc5424 | Whether the syslog format complies with RFC5424. | boolean |
cyberarkpas.audit.safe | The name of the target Safe. | keyword |
cyberarkpas.audit.severity | The severity of the audit records. | keyword |
cyberarkpas.audit.source_user | The name of the Vault user who performed the operation. | keyword |
cyberarkpas.audit.station | The IP from where the operation was performed. For PVWA sessions, this will be the real client machine IP. | ip |
cyberarkpas.audit.target_user | The name of the Vault user on which the operation was performed. | keyword |
cyberarkpas.audit.timestamp | The timestamp, in MMM DD HH:MM:SS format. | keyword |
cyberarkpas.audit.vendor | A static value that represents the vendor. | keyword |
cyberarkpas.audit.version | A static value that represents the version of the Vault. | keyword |
data_stream.dataset | Data stream dataset. | constant_keyword |
data_stream.namespace | Data stream namespace. | constant_keyword |
data_stream.type | Data stream type. | constant_keyword |
event.dataset | Event dataset | constant_keyword |
event.module | Name of the module this data is coming from. | constant_keyword |
input.type | Type of Filebeat input. | keyword |
log.flags | Flags for the log file. | keyword |
log.offset | Offset of the entry in the log file. | long |
log.source.address | Source address from which the log event was read / sent from. | keyword |
**Example**
An example event for monitor
looks as following:
{
"@timestamp": "2024-10-15T00:29:00.000Z",
"agent": {
"name": "elastic-agent-85013",
"id": "0a6fa575-a3ed-463b-b47f-9c3e3a07e56f",
"ephemeral_id": "c2d94886-0c83-475b-b25b-7e136a32240d",
"type": "filebeat",
"version": "8.14.3"
},
"cyberarkpas": {
"monitor": {
"syslog_queue_size": 0,
"iso_timestamp": "2024-10-15T00:29:00Z",
"drive_free_space_in_gb": 20,
"drive_total_space_in_gb": 40,
"max_parallel_tasks": 20,
"transaction_count": 315,
"memory_usage": 62,
"average_queue_time": 0,
"max_execution_time": 148,
"version": "11.7.0029",
"average_execution_time": 10,
"max_queue_time": 37,
"number_of_parallel_tasks": 1,
"cpu_usage": 7,
"timestamp": "Oct 15 00:29:00"
}
},
"data_stream": {
"namespace": "22830",
"type": "logs",
"dataset": "cyberarkpas.monitor"
},
"ecs": {
"version": "8.11.0"
},
"elastic_agent": {
"id": "0a6fa575-a3ed-463b-b47f-9c3e3a07e56f",
"version": "8.14.3",
"snapshot": false
},
"event": {
"agent_id_status": "verified",
"ingested": "2024-10-21T07:32:45Z",
"timezone": "+00:00",
"kind": "metric",
"dataset": "cyberarkpas.monitor"
},
"host": {
"name": "VAULT",
"cpu": {
"usage": 0.07
}
},
"input": {
"type": "log"
},
"log": {
"file": {
"path": "/tmp/service_logs/monitor.log"
},
"offset": 15547
},
"observer": {
"product": "VaultMonitor",
"hostname": "VAULT",
"vendor": "Cyber-Ark",
"version": "11.7.0029"
},
"related": {
"hosts": [
"VAULT"
]
},
"tags": [
"forwarded",
"cyberarkpas-monitor"
]
}
**Exported fields**
Field | Description | Type |
---|---|---|
@timestamp | Event timestamp. | date |
cyberarkpas.monitor.average_execution_time | The average time it has taken the Vault to complete the execution of a transaction in the last minute, in milliseconds. | integer |
cyberarkpas.monitor.average_queue_time | The average time that a transaction waited in the Vault’s queue for execution in the last minute, in milliseconds. | integer |
cyberarkpas.monitor.cpu_usage | Percent of CPU usage on the Vault machine. | integer |
cyberarkpas.monitor.drive_free_space_in_gb | Number of GB available on the drive of the Vault installation folder. | integer |
cyberarkpas.monitor.drive_total_space_in_gb | Total number of GB on the drive of the Vault installation folder. | integer |
cyberarkpas.monitor.iso_timestamp | The timestamp, in ISO timestamp format (RFC 3339). | date |
cyberarkpas.monitor.max_execution_time | The maximum time it has taken the Vault to complete the execution of a transaction, in the last minute, in milliseconds. | integer |
cyberarkpas.monitor.max_parallel_tasks | The maximum number of Vault transactions that can run concurrently, based on the TasksCount parameter in DBParm.ini. | integer |
cyberarkpas.monitor.max_queue_time | The maximum time that a transaction waited in the Vault’s queue for execution in the last minute, in millisecond. | integer |
cyberarkpas.monitor.memory_usage | Percent of used physical memory on the Vault machine. | integer |
cyberarkpas.monitor.number_of_parallel_tasks | Number of Vault transactions that are currently running. | integer |
cyberarkpas.monitor.raw | Raw XML for the original audit record. Only present when XSLT file has debugging enabled. | keyword |
cyberarkpas.monitor.syslog_queue_size | The size of the syslog queue. | integer |
cyberarkpas.monitor.timestamp | The timestamp, in MMM DD HH:MM:SS format. | keyword |
cyberarkpas.monitor.transaction_count | Number of Vault transactions in the last minute. | integer |
cyberarkpas.monitor.version | A static value that represents the version of the Vault. | version |
data_stream.dataset | Data stream dataset. | constant_keyword |
data_stream.namespace | Data stream namespace. | constant_keyword |
data_stream.type | Data stream type. | constant_keyword |
event.dataset | Event dataset | constant_keyword |
event.module | Name of the module this data is coming from. | constant_keyword |
input.type | Type of Filebeat input. | keyword |
log.flags | Flags for the log file. | keyword |
log.offset | Offset of the entry in the log file. | long |
log.source.address | Source address from which the log event was read / sent from. | keyword |
**Changelog**
Version | Details | Kibana version(s) |
---|---|---|
2.25.0 | pass:[] Enhancement (View pull request) Add "preserve_original_event" tag to documents with event.kind set to "pipeline_error". |
8.14.0 or higher |
2.24.0 | pass:[] Enhancement (View pull request) Collect monitoring data. |
8.14.0 or higher |
2.23.0 | pass:[] Enhancement (View pull request) Improve efficiency of event.duration calculation. |
8.13.0 or higher |
2.22.0 | pass:[] Enhancement (View pull request) Allow @custom pipeline access to event.original without setting preserve_original_event. |
8.13.0 or higher |
2.21.0 | pass:[] Enhancement (View pull request) Update the kibana constraint to ^8.13.0. Modified the field definitions to remove ECS fields made redundant by the ecs@mappings component template. |
8.13.0 or higher |
2.20.0 | pass:[] Enhancement (View pull request) Update manifest format version to v3.0.3. |
8.7.1 or higher |
2.19.3 | pass:[] Bug fix (View pull request) Clean up null handling, formatting |
8.7.1 or higher |
2.19.2 | pass:[] Enhancement (View pull request) Changed owners |
8.7.1 or higher |
2.19.1 | pass:[] Bug fix (View pull request) Fix exclude_files pattern. |
8.7.1 or higher |
2.19.0 | pass:[] Enhancement (View pull request) ECS version updated to 8.11.0. |
8.7.1 or higher |
2.18.0 | pass:[] Enhancement (View pull request) Improve event.original check to avoid errors if set. |
8.7.1 or higher |
2.17.0 | pass:[] Enhancement (View pull request) Update the package format_version to 3.0.0. |
8.7.1 or higher |
2.16.0 | pass:[] Enhancement (View pull request) Update package to ECS 8.10.0 and align ECS categorization fields. |
8.7.1 or higher |
2.15.0 | pass:[] Enhancement (View pull request) Add tags.yml file so that integration’s dashboards and saved searches are tagged with "Security Solution" and displayed in the Security Solution UI. |
8.7.1 or higher |
2.14.0 | pass:[] Enhancement (View pull request) Update package-spec to 2.10.0. |
8.7.1 or higher |
2.13.0 | pass:[] Enhancement (View pull request) Update package to ECS 8.9.0. |
8.7.1 or higher |
2.12.0 | pass:[] Enhancement (View pull request) Convert visualizations to lens. |
8.7.1 or higher |
2.11.0 | pass:[] Enhancement (View pull request) Update package to ECS 8.8.0. |
7.16.0 or higher 8.0.0 or higher |
2.10.0 | pass:[] Enhancement (View pull request) Update package to ECS 8.7.0. |
7.16.0 or higher 8.0.0 or higher |
2.9.1 | pass:[] Enhancement (View pull request) Added categories and/or subcategories. |
7.16.0 or higher 8.0.0 or higher |
2.9.0 | pass:[] Enhancement (View pull request) Update package to ECS 8.6.0. |
7.16.0 or higher 8.0.0 or higher |
2.8.0 | pass:[] Enhancement (View pull request) Add udp_options to the UDP input. |
7.16.0 or higher 8.0.0 or higher |
2.7.0 | pass:[] Enhancement (View pull request) Update package to ECS 8.5.0. |
7.16.0 or higher 8.0.0 or higher |
2.6.2 | pass:[] Bug fix (View pull request) Remove duplicate field. |
7.16.0 or higher 8.0.0 or higher |
2.6.1 | pass:[] Enhancement (View pull request) Use ECS geo.location definition. |
7.16.0 or higher 8.0.0 or higher |
2.6.0 | pass:[] Enhancement (View pull request) Update package to ECS 8.4.0 |
7.16.0 or higher 8.0.0 or higher |
2.5.1 | pass:[] Enhancement (View pull request) Update package name and description to align with standard wording |
7.16.0 or higher 8.0.0 or higher |
2.5.0 | pass:[] Enhancement (View pull request) Update package to ECS 8.3.0. |
7.16.0 or higher 8.0.0 or higher |
2.4.2 | pass:[] Bug fix (View pull request) Fix broken file paths configuration variable |
7.16.0 or higher 8.0.0 or higher |
2.4.1 | pass:[] Enhancement (View pull request) Update to readme. added link to vendor documentation |
— |
2.4.0 | pass:[] Enhancement (View pull request) Update to ECS 8.2 |
7.16.0 or higher 8.0.0 or higher |
2.3.2 | pass:[] Bug fix (View pull request) Fix error ingesting events with a single entry in the CAProperties field |
7.16.0 or higher 8.0.0 or higher |
2.3.1 | pass:[] Enhancement (View pull request) Add documentation for multi-fields pass:[] Bug fix (View pull request) Remove duplicated definition of event.dataset field. |
— |
2.3.0 | pass:[] Enhancement (View pull request) Update to ECS 8.0 |
7.16.0 or higher 8.0.0 or higher |
2.2.2 | pass:[] Bug fix (View pull request) Regenerate test files using the new GeoIP database |
7.16.0 or higher 8.0.0 or higher |
2.2.1 | pass:[] Bug fix (View pull request) Change test public IPs to the supported subset |
— |
2.2.0 | pass:[] Enhancement (View pull request) Add 8.0.0 version constraint |
7.16.0 or higher 8.0.0 or higher |
2.1.4 | pass:[] Enhancement (View pull request) Uniform with guidelines |
7.16.0 or higher |
2.1.3 | pass:[] Enhancement (View pull request) Remove dash from title for consistency with brand. |
— |
2.1.2 | pass:[] Enhancement (View pull request) Update Title and Description. |
7.16.0 or higher |
2.1.1 | pass:[] Bug fix (View pull request) Fix logic that checks for the forwarded tag |
— |
2.1.0 | pass:[] Enhancement (View pull request) Update to ECS 1.12.0 |
— |
2.0.0 | pass:[] Enhancement (View pull request) make GA |
— |
1.2.3 | pass:[] Enhancement (View pull request) Convert to generated ECS fields |
7.14.0 or higher |
1.2.2 | pass:[] Enhancement (View pull request) update to ECS 1.11.0 |
— |
1.2.1 | pass:[] Enhancement (View pull request) Escape special characters in docs |
— |
1.2.0 | pass:[] Enhancement (View pull request) Update integration description |
— |
1.1.0 | pass:[] Enhancement (View pull request) Set "event.module" and "event.dataset" |
7.14.0 or higher |
1.0.1 | pass:[] Enhancement (View pull request) updating ECS version and adding event.original options |
— |
1.0.0 | pass:[] Enhancement (View pull request) initial release |
7.13.0 or higher |