CyberArk Identity Security Platform

Comprehensive identity security platform to secure human and machine access across Red Hat OpenShift and hybrid environments.

Overview

The CyberArk Identity Security Platform is a comprehensive solution designed to secure both human and machine identities across various environments, including on-premises, hybrid, and cloud environments.

Within Kubernetes and Red Hat OpenShift environments, the platform provides visibility, tracking, and management of secrets and keys. CyberArk's Identity Security Platform offers Privileged Access Management (PAM), Identity Lifecycle Management and Secrets Management. Security teams benefit from centralized policy control, advanced automation features, and detailed audit trails. This allows them to manage credentials, rotate secrets, and secure workloads efficiently and at scale, all without causing any disruptions to operations.


Supported Services: Secrets Manager, SaaS - Privileged Cloud - PAM self-hosted - Secure Infrastructure Access - Remote Access - Vendor PAM

Managing Machine Identities

Securely authenticate and authorize all machines in Red Hat OpenShift environments, where containers and virtual machines (VMs) are frequently created and destroyed. A robust system for managing machine identities ensures that each workload is properly authenticated and authorized before access to sensitive resources is granted.

Securing Human Identities

Protect human identities, centralize privileged access and secure secrets using CyberArk’s integrations with Red Hat OpenShift and Ansible. With just-in-time access, automated secrets injection and session controls, it enforces least privilege while enabling secure and efficient DevSecOps.

Delivering Comprehensive Security Governance

Integrated secrets management to help enforce security controls across workloads. This unified approach protects both containers and VMs, ensuring consistent governance and reducing the attack surface.

REST APIs for Automation and Integration

Enable policy automation, and integration with external systems through REST APIs, reducing manual processes and supporting DevOps workflows.

Audit and Compliance Reporting

Gain detailed visibility into machine identity usage, events, and secret access patterns. Generate audit-ready reports to support compliance with standards such as PCI-DSS, NIST, and SOX.

Get started with OpenShift

A container platform to build, modernize, and deploy applications at scale.

Try itDeployment options
Resources
Red Hat logoLinkedInYouTubeFacebookTwitter

Platforms

Products & services

Try, buy, sell

Help

About Red Hat Ecosystem Catalog

The Red Hat Ecosystem Catalog is the official source for discovering and learning more about the Red Hat Ecosystem of both Red Hat and certified third-party products and services.

We’re the world’s leading provider of enterprise open source solutions—including Linux, cloud, container, and Kubernetes. We deliver hardened solutions that make it easier for enterprises to work across platforms and environments, from the core datacenter to the network edge.

© 2025 Red Hat