agent security skill risk: medium
Privileged Access Workstation Implementation Guide
Provides steps to design and implement Privileged Access Workstations using device hardening, Intune/GPO compliance, JIT access, and PAM integration with CyberArk or BeyondTrust, f…
SKILL 4 files · 2 folders
SKILL.md
--- name: implementing-privileged-access-workstation description: "Design and implement Privileged Access Workstations (PAWs) with device hardening, just-in-time access, and integration" --- # Implementing Privileged Access Workstation ## Overview A Privileged Access Workstation (PAW) is a hardened device dedicated to performing sensitive administrative tasks. This skill covers PAW design using the tiered administration model, device compliance enforcement via Microsoft Intune or Group Policy, just-in-time (JIT) access provisioning, and integration with privileged access management (PAM) platforms like CyberArk and BeyondTrust. ## When to Use - When deploying or configuring implementing privileged access workstation capabilities in your environment - When establishing security controls aligned to compliance requirements - When building or improving security architecture for this domain - When conducting security assessments that require this implementation ## Prerequisites - Windows 10/11 Enterprise with Virtualization Based Security (VBS) - Microsoft Intune or Active Directory Group Policy - CyberArk Privileged Access Security or BeyondTrust Password Safe (optional) - Python 3.9+ with `requests`, `subprocess`, `json` - Administrative access to target endpoints ## Steps 1. Audit current privileged access patterns and identify Tier 0/1/2 assets 2. Configure device hardening baselines (AppLocker, Credential Guard, Device Guard) 3. Enforce compliance policies via Intune or GPO 4. Implement just-in-time access with time-limited admin group membership 5. Integrate with CyberArk/BeyondTrust for credential vaulting 6. Validate PAW configuration against CIS and Microsoft PAW guidance 7. Monitor privileged sessions and generate compliance reports ## Expected Output - JSON report listing device compliance status, hardening checks, JIT access windows, and PAM integration verification - Risk scoring per workstation with remediation recommendations
REQUIRED CONTEXT
- Windows 10/11 Enterprise with VBS
- Microsoft Intune or Active Directory Group Policy
- Administrative access to target endpoints
OPTIONAL CONTEXT
- CyberArk Privileged Access Security or BeyondTrust Password Safe
- Python 3.9+ environment
EXPECTED OUTPUT
- Format
- json
- Schema
- json_schema · device compliance status, hardening checks, JIT access windows, PAM integration verification, Risk scoring, remediation recommendations
- Constraints
- JSON report listing device compliance status, hardening checks, JIT access windows, and PAM integration verification
- include risk scoring per workstation with remediation recommendations
CAVEATS
- Dependencies
- Windows 10/11 Enterprise with Virtualization Based Security (VBS)
- Microsoft Intune or Active Directory Group Policy
- CyberArk Privileged Access Security or BeyondTrust Password Safe (optional)
- Python 3.9+ with `requests`, `subprocess`, `json`
- Administrative access to target endpoints
- Missing context
- Target environment details (e.g., domain/tenant names)
- Exact JSON schema for the report
- Ambiguities
- Python prerequisites listed without explaining their role in PAW implementation
QUALITY
- OVERALL
- 0.70
- CLARITY
- 0.85
- SPECIFICITY
- 0.60
- REUSABILITY
- 0.70
- COMPLETENESS
- 0.65
IMPROVEMENT SUGGESTIONS
- Add explicit placeholders for environment-specific inputs
- Define the precise JSON structure expected in the output
USAGE
Copy the prompt above and paste it into your AI of choice — Claude, ChatGPT, Gemini, or anywhere else you're working. Replace any placeholder sections with your own context, then ask for the output.
MORE FOR AGENT
- MoltPass Client for AI Agent Identitiesagentsecurity
- Supply Chain Dependency Risk Auditoragentsecurity
- Supply Chain Dependency Risk Auditoragentsecurity
- Threat Modeling Security Expertagentsecurity
- Security Bluebook Policy Builderagentsecurity
- Security Bluebook Policy Builderagentsecurity
- Security Blue Book Policy Builderagentsecurity
- Threat Modeling Security Architecture Expertagentsecurity
- Supply Chain Dependency Risk Auditoragentsecurity
- Threat Modeling Security Expertagentsecurity
- SIEM Detection Rule Tuning Guideagentsecurity
- AI File Metadata Compliance Auditoragentsecurity
- Azure Storage Misconfiguration Audit Reporteragentsecurity
- Implementing PAM for Database Accessagentsecurity
- AFL++ Coverage-Guided Fuzzing Procedureagentsecurity
- Supply Chain Attack Simulation Detectoragentsecurity
- Security Audit Fix Verifieragentsecurity
- Active Directory ACL Abuse Analyzeragentsecurity
- SSRF Vulnerability Testing and Reporting Guideagentsecurity
- Security Audit Fix Revieweragentsecurity
- AWS IAM Privilege Escalation Detectoragentsecurity
- SSL/TLS Security Assessment with Sslyzeagentsecurity
- GCP Penetration Testing with GCPBucketBruteagentsecurity
- AWS CloudTrail Anomaly Detection Guideagentsecurity
- Security Audit Fix Commit Revieweragentsecurity