Truststream Security Solutions

CyberArk Application Access Manager

CyberArk Application Access Manager is designed to provide comprehensive privileged access, credential, and secrets management for widely used application types and non-human identities. For example, Application Access Manager secures credentials for commercial off-the-shelf applications, traditional internally developed applications, scripts, as well as containerised applications built using DevOps methodologies


  • Comprehensive Secrets Management
  • Robust Authorisation and Audit
  • Enterprise Scale and Availability
  • Extensive Integrations Library
  • CyberArk Solution Portfolio


  • Secure all credentials and secrets used by non-human users
  • Eliminate hard-coded credentials in applications
  • Rotate Credentials based on policy
  • Authenticate applications using native application attributes
  • Authenticate containers using role-based access controls
  • Record key events with tamper-resistant audit
  • Accelerate deployment with validated integrations & Robotic Process Automation tools
  • Distributed high-availability


£5990 to £15000 per instance per month

  • Education pricing available
  • Free trial available

Service documents


G-Cloud 11

Service ID

9 4 8 9 7 8 1 3 1 1 4 2 0 0 1


Truststream Security Solutions

Bryan Thomson

07827 327320‬

Service scope

Software add-on or extension
What software services is the service an extension to
CyberArk Application Access Manager is part of the CyberArk Privileged Access Security , a comprehensive solution to protect, monitor, detect, alert, and manage privileged accounts and other credentials for both human and non-human users and identities.
Cloud deployment model
  • Private cloud
  • Hybrid cloud
Service constraints
Supplied upon request, contact Truststream to arrange an initial needs assessment session to capture your service specific requirements
System requirements
  • RHEL-Intel 5,6 and 7 (32/64-bit)
  • RHEL-Power PC 7.1 64-bit
  • SUSE-Intel 11 and 12 (64-bit)
  • SUSE-Power PC 12 (Little Endian) 64-bit
  • CentOS-Intel 5, 6 and 7 (32/64-bit)
  • Fedora 13 and 14 (32-bit)
  • Windows Server 2008R2 , 2012, 2012 R2, 2016 and 2019
  • HP-UX 11.23 PA-Risc & HP-UX on itanium 11i v3
  • AIX 6.1 and 7.1 TL1, TL2 and TL3 (64-bit)
  • Solaris Intel 10 & 11, Solaris SPARC 10, 11 64-bit

User support

Email or online ticketing support
Email or online ticketing
Support response times
Customers cases will be assessed and graded on receipt. The customer can also request an escalation to a case. CyberArk operates 24x7 follow the sun support, so response times are the same at weekends.
User can manage status and priority of support tickets
Online ticketing support accessibility
None or don’t know
Phone support
Phone support availability
24 hours, 7 days a week
Web chat support
Onsite support
Yes, at extra cost
Support levels
24x7 telephone support is provided by fully certified CyberArk Certified Delivery Engineers (CDE).

All customers are provided with a Technical Account Manager and a Customer Service Manager who are committed to helping you achieve the highest value, performance and results.

The latest system enhancements and updates. Including Alert announcements.

Truststream offers 3 different levels of support; CyberArk Enhanced 24x7 Telephone and Email Support, CyberArk Managed Upgrade Service & CyberArk Managed Operations.
Support available to third parties

Onboarding and offboarding

Getting started
All customers are provided with operational guides, network design documents and customised training can be provided upon request.
Service documentation
Documentation formats
End-of-contract data extraction
We do not hold any client data
End-of-contract process
If your maintenance contract expires then all users within your company will no longer be able to directly contact Support. All active Support cases will be put on hold until maintenance has been paid. Once maintenance is paid Support assistance will resume.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
Application to install
Compatible operating systems
  • Linux or Unix
  • Windows
Designed for use on mobile devices
Service interface
What users can and can't do using the API
The PAS Web Services is a RESTful API that enables users to create, list, modify and delete entities in Privileged Access Security solution from within programs and scripts. The main purpose of the PAS Web Services is to automate tasks that are usually performed manually using the UI, and to incorporate them into system and account-provisioning scripts.
API documentation
API documentation formats
API sandbox or test environment
Customisation available
Description of customisation
The PAS Web Services SDK is a RESTful API that can be invoked by any RESTful client for various programming and scripting environments, including Java, C#, Perl, PHP, Python and Ruby.


Independence of resources
CyberArk Application Access Manager is not a shared service. It is implemented as an individual instance per enterprise so there is complete independence from the demands of other businesses


Service usage metrics
Metrics types
Metrics include: transactions per second, number of users, average queue time, number of successful changes/verifications/reconciliations , number of failed change/verifications/reconciliations.
Reporting types
  • Regular reports
  • Reports on request


Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
CyberArk Software Limited

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • EU-US Privacy Shield agreement locations
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
Protecting data at rest
Other data at rest protection approach
We do not hold customer data
Data sanitisation process
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Users can export metadata, but not passwords from the solution. Users are able to produce reports on activity using the web portal.
Data export formats
  • CSV
  • Other
Other data export formats
Data import formats

Data-in-transit protection

Data protection between buyer and supplier networks
Private network or public sector network
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
SLA's will be defined once the target operating model with the buyer is agreed. This will include service credits for non-performance.
Approach to resilience
Available on request
Outage reporting
Public Dashboard & Email

Identity and authentication

User authentication needed
User authentication
2-factor authentication
Access restrictions in management interfaces and support channels
Available upon request
Access restriction testing frequency
At least every 6 months
Management access authentication
2-factor authentication

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
Between 1 month and 6 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
Between 1 month and 6 months
How long system logs are stored for
Between 1 month and 6 months

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Who accredited the PCI DSS certification
Comsec Consulting
PCI DSS accreditation date
What the PCI DSS doesn’t cover
All covered.
Other security certifications
Any other security certifications
  • We are looking into FEDRAMP for the coming year
  • On top of our PCI, SOC and ISO 27001 program
  • Truststream is Cyber Essentials Plus certified

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
  • CSA CCM version 3.0
  • ISO/IEC 27001
Information security policies and processes
Available on request

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Available on request
Vulnerability management type
Vulnerability management approach
CyberArk implemented a process of scanning internal systems and identifying possible vulnerabilities.

Patches deployed by designated technical team, according to a deployment guidelines which are part of the procedure.
Protective monitoring type
Protective monitoring approach
Available upon request
Incident management type
Incident management approach
Available upon request

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks


£5990 to £15000 per instance per month
Discount for educational organisations
Free trial available
Description of free trial
Full product on qualified 14- day proof-of-concept trial

Service documents

Return to top ↑