Vendor Sheet

CyberArk Secure Cloud Access (SCA) – Security overview

CyberArk Secure Cloud Access (SCA) – Security overview

Pages 3 Pages

CyberArk Secure Cloud Access (SCA) secures native access to cloud environments by enforcing Zero Standing Privileges and just-in-time entitlements. Users authenticate via CyberArk or third-party IdPs, then receive temporary access roles that are revoked automatically after use, with sessions recorded for compliance. Built on AWS, SCA delivers 99.95% availability, SOC 2&3, ISO 27001, and CSA STAR certifications, ensuring resilience and transparency. Data is encrypted at rest with customer-dedicated AES-256 keys and in transit with TLS 1.2, maintaining tenant isolation. Continuous monitoring, penetration testing, and secure SDLC practices further protect environments.

Join for free to read