<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Guidance Rapid 7 Insight VM Authenticated Scans and CIS Compliance Reports in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Guidance-Rapid-7-Insight-VM-Authenticated-Scans-and-CIS/m-p/156889#M27124</link>
    <description>&lt;P&gt;Understood, but for awareness the Check Point Compliance Blade also has some coverage for this if you are licensed for it.&lt;/P&gt;</description>
    <pubDate>Fri, 09 Sep 2022 02:28:49 GMT</pubDate>
    <dc:creator>Chris_Atkinson</dc:creator>
    <dc:date>2022-09-09T02:28:49Z</dc:date>
    <item>
      <title>Guidance Rapid 7 Insight VM Authenticated Scans and CIS Compliance Reports</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Guidance-Rapid-7-Insight-VM-Authenticated-Scans-and-CIS/m-p/156841#M27081</link>
      <description>&lt;P&gt;All,&lt;/P&gt;&lt;P&gt;I'm looking for guidance on how best to approach and implement authenticated scans from Rapid 7 Insight VM to Checkpoint Devices running GAIA.&amp;nbsp; Rapid 7 has some generic best practice information on running authenticated scans but no details specific to Check Point or GAIA.&amp;nbsp; I figure even though GAIA is a Unix Variant it's different enough that I'd suspect approach may be a bit different.&amp;nbsp; I also don't want to cause any kind of operational impact by running these scans.&amp;nbsp; I'd assume SSH would be best method but not sure about what would be required from a privilege escalation/permissions standpoint to get all the vulnerability data as well as CIS Compliance Report Data.&amp;nbsp; Rapid7 support has not been the most helpful and is directing me to best practice resources I have already reviewed.&amp;nbsp; If anyone has input on this it would be much appreciated.&amp;nbsp; Below are some articles I have reviewed from Rapid 7.&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.rapid7.com/insightvm/authentication-on-unix-and-related-targets-best-practices" target="_blank" rel="noopener"&gt;https://docs.rapid7.com/insightvm/authentication-on-unix-and-related-targets-best-practices&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.rapid7.com/blog/post/2022/03/15/insightvm-scanning-demystifying-ssh-credential-elevation/" target="_blank" rel="noopener"&gt;https://www.rapid7.com/blog/post/2022/03/15/insightvm-scanning-demystifying-ssh-credential-elevation/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.rapid7.com/insightvm/scan-templates/#cis" target="_blank" rel="noopener"&gt;https://docs.rapid7.com/insightvm/scan-templates/#cis&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Sep 2022 14:15:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Guidance-Rapid-7-Insight-VM-Authenticated-Scans-and-CIS/m-p/156841#M27081</guid>
      <dc:creator>Gregory_Link</dc:creator>
      <dc:date>2022-09-08T14:15:16Z</dc:date>
    </item>
    <item>
      <title>Re: Guidance Rapid 7 Insight VM Authenticated Scans and CIS Compliance Reports</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Guidance-Rapid-7-Insight-VM-Authenticated-Scans-and-CIS/m-p/156843#M27119</link>
      <description>&lt;P&gt;Not so much Rapid 7 related but this should assist on the CIS front:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/Compliance/CIS-Benchmarks/m-p/134755/thread-id/30" target="_blank"&gt;https://community.checkpoint.com/t5/Compliance/CIS-Benchmarks/m-p/134755/thread-id/30&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Sep 2022 14:57:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Guidance-Rapid-7-Insight-VM-Authenticated-Scans-and-CIS/m-p/156843#M27119</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2022-09-08T14:57:40Z</dc:date>
    </item>
    <item>
      <title>Re: Guidance Rapid 7 Insight VM Authenticated Scans and CIS Compliance Reports</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Guidance-Rapid-7-Insight-VM-Authenticated-Scans-and-CIS/m-p/156865#M27121</link>
      <description>&lt;P&gt;Thanks Chris, but looking more at what is required from a permissions standpoint.&amp;nbsp; Rapid 7 already has the CIS Compliance Policy Template built in for Check Point.&lt;/P&gt;</description>
      <pubDate>Thu, 08 Sep 2022 18:43:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Guidance-Rapid-7-Insight-VM-Authenticated-Scans-and-CIS/m-p/156865#M27121</guid>
      <dc:creator>Gregory_Link</dc:creator>
      <dc:date>2022-09-08T18:43:45Z</dc:date>
    </item>
    <item>
      <title>Re: Guidance Rapid 7 Insight VM Authenticated Scans and CIS Compliance Reports</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Guidance-Rapid-7-Insight-VM-Authenticated-Scans-and-CIS/m-p/156868#M27122</link>
      <description>&lt;P&gt;Keep in mind that Gaia is a hardened, purpose-built OS based on RedHat Enterprise Linux.&lt;BR /&gt;Many findings a Rapid7-type product would find would be false positives as we patch our images for relevant, known vulnerabilities.&lt;/P&gt;
&lt;P&gt;If you're actually logging into the device with valid credentials (e.g. via SSH), you will get, by default, a restricted shell (clish) that does not allow access to most common Unix commands that could be used for privilege escalation.&lt;BR /&gt;Whether Rapid7 knows how to navigate clish is a separate question.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The only way you can get to a proper Unix-type shell on a Check Point appliance is:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Entering "expert" mode from clish (which requires valid credentials)&lt;/LI&gt;
&lt;LI&gt;Explicitly setting the shell for a given user to something other than clish (not default configuration) and logging in as that user.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Any shell-based privilege escalations can be mitigated by strictly limiting access to expert mode and ensuring all users that log in use clish.&lt;/P&gt;</description>
      <pubDate>Thu, 08 Sep 2022 18:55:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Guidance-Rapid-7-Insight-VM-Authenticated-Scans-and-CIS/m-p/156868#M27122</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2022-09-08T18:55:12Z</dc:date>
    </item>
    <item>
      <title>Re: Guidance Rapid 7 Insight VM Authenticated Scans and CIS Compliance Reports</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Guidance-Rapid-7-Insight-VM-Authenticated-Scans-and-CIS/m-p/156869#M27123</link>
      <description>&lt;P&gt;Appreciate the info Phoneboy.&amp;nbsp; I think where I landed is giving Rapid 7 SSH access and the bash shell expert mode which appears to be required to run the necessary info gathering commands I need.&amp;nbsp; I have the Rapid 7 support team doing a bit more digging internally to see what they come back with and will share that information here as well.&lt;/P&gt;</description>
      <pubDate>Thu, 08 Sep 2022 19:08:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Guidance-Rapid-7-Insight-VM-Authenticated-Scans-and-CIS/m-p/156869#M27123</guid>
      <dc:creator>Gregory_Link</dc:creator>
      <dc:date>2022-09-08T19:08:44Z</dc:date>
    </item>
    <item>
      <title>Re: Guidance Rapid 7 Insight VM Authenticated Scans and CIS Compliance Reports</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Guidance-Rapid-7-Insight-VM-Authenticated-Scans-and-CIS/m-p/156889#M27124</link>
      <description>&lt;P&gt;Understood, but for awareness the Check Point Compliance Blade also has some coverage for this if you are licensed for it.&lt;/P&gt;</description>
      <pubDate>Fri, 09 Sep 2022 02:28:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Guidance-Rapid-7-Insight-VM-Authenticated-Scans-and-CIS/m-p/156889#M27124</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2022-09-09T02:28:49Z</dc:date>
    </item>
    <item>
      <title>Re: Guidance Rapid 7 Insight VM Authenticated Scans and CIS Compliance Reports</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Guidance-Rapid-7-Insight-VM-Authenticated-Scans-and-CIS/m-p/190154#M35078</link>
      <description>&lt;P&gt;Any news on this from Rapid7? I have a similar open topic to address.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Aug 2023 14:04:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Guidance-Rapid-7-Insight-VM-Authenticated-Scans-and-CIS/m-p/190154#M35078</guid>
      <dc:creator>cezar_varlan1</dc:creator>
      <dc:date>2023-08-22T14:04:58Z</dc:date>
    </item>
  </channel>
</rss>

