Kyivteleservice is Kyiv’s municipal enterprise responsible for developing, operating, and protecting the city’s telecommunications and digital infrastructure, as well as developing and maintaining the “Kyiv Digital” government services portal.
The company ensures the stable operation of municipal information systems and services, provides telecommunications and IT services to local government bodies, municipal institutions, and the capital's residents, and serves as the city's cybersecurity operator for its digital services.
It focuses on ensuring the continuity, security, and resilience of Kyiv’s critical digital services amid high demand and a growing number of cyber threats.
Key tasks:
Kyiv’s digital municipal services operate in an environment characterized by extremely high traffic volumes and constant cyber threats. Every day, the infrastructure processes tens of millions of information security events, a significant portion of which are related to user authentication and remote connections.
Oleksandr Voloshchuk, deputy director of the municipal enterprise Kyivteleservice.
“Every day, about 10% of all events involve user authentication. Of these, high-risk connections—such as external connections—account for about 1%. In actual numbers, that amounts to 100,000 events,” notes Oleksandr Voloshchuk, deputy director of the municipal enterprise Kyivteleservice.
This scale renders traditional approaches to access control largely ineffective. Even with formalized procedures, requests, approvals, and designated personnel in place, the subsequent use of access remained high risk.
Actual monitoring was carried out using event logs within the systems themselves and by correlating events in the SOC's SIEM. However, this approach only revealed the consequences, not the actual process of using privileged access.
“This is an approach that has its merits, but it does not mitigate or minimize the risks of unauthorized use of privileged accounts,” adds Oleksandr Voloshchuk.
A key security challenge
One of the most critical risks is the inability to distinguish a legitimate privileged session from a malicious one when the attack uses valid credentials.
The situation was further complicated by the overall threat landscape in Ukraine, where attacks exploiting privileged accounts are one of the most common vectors for compromising infrastructure.
Operational restrictions
Another factor was the need to effectively handle a large volume of events, automate responses, and reduce reliance on manual work, given the SOC’s limited human resources.
Together, these factors led to a clear realization: without a specialized solution for managing and controlling privileged access, further risk mitigation had become impossible.
Given the scale of the infrastructure and the nature of the threats, Kyivteleservice has come to clearly understand that its existing monitoring and response capabilities are insufficient to control one of the most critical attack vectors: privileged access.
“Without a specialized solution that analyzes the session, collects metadata, and can determine that the connection does not conform to standard behavior, it is practically impossible to detect an attack,” notes Oleksandr Voloshchuk
The organization needed a solution that would allow it to monitor the use of privileged accounts in real time, rather than after the fact; analyze user actions during sessions; detect atypical or potentially malicious behavior even when legitimate credentials are used; and integrate privileged access management into a unified SOC framework.
That is why the focus was placed on privileged access management (PAM) solutions as a separate, specialized security subsystem. CyberArk PAM was chosen not as a standalone product, but as
A key factor was the ability to quickly and seamlessly integrate the solution into the existing infrastructure without disrupting service operations, as well as the potential for future scaling and expansion of use cases.
“Given the speed of integration, the depth of functionality, the advanced integration scenarios, and the flexible licensing policy, the team concluded that CyberArk is the optimal choice for building a privileged access control system in such a complex and large-scale infrastructure,” concludes Oleksandr Voloshchuk
The implementation of CyberArk Privileged Access Management was carried out in phases, taking into account the need for uninterrupted operation of municipal services and the existing architecture of the security monitoring center.
The key objective during the implementation phase was to integrate PAM as a separate subsystem into the SOC architecture, connect critical systems without altering users’ business processes, and ensure a smooth transition that does not impact infrastructure performance.
Thanks to pre-built connectors and integration capabilities, the solution was connected to systems already under SOC control, with coverage gradually expanding. Particular attention was paid to monitoring remote connections and privileged sessions.
In parallel with the technical implementation, PAM events were integrated into existing monitoring and automated response processes.
Following the successful implementation of CyberArk Privileged Access Management at Kyivteleservice, the company plans to gradually expand the solution's use and strengthen access controls across the city’s IT infrastructure.
Specifically, plans are in place to complete the integration of PAM with all critical information systems in the near future, to extend controls to users who do not have formal administrator status but can influence system configurations and security, and to further integrate PAM with automated response processes within the SOC framework.
Another area of focus is integration with modern development and operations processes: secret management in CI/CD processes and access control in containerized environments and Kubernetes.
This approach allows PAM to be viewed not merely as a tool for real-time monitoring but as a long-term access management platform that supports the cyber resilience of digital municipal services as they evolve and become more complex.
If you are interested in the CyberArk solution and would like to test it personally,please click the button below: