<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Check Point HTTPS Inspection Concerns in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Check-Point-HTTPS-Inspection-Concerns/m-p/64241#M13069</link>
    <description>There is one situation where the cleartext of an HTTPS connection is definitely accessible: when using the Mirror and Decrypt function in R80.20+.&lt;BR /&gt;This will "mirror" all traffic (including decrypted HTTPS traffic) to a specific port on the device.&lt;BR /&gt;This is needed to enable other devices to log the contents of specific traffic, which certain regulatory frameworks require.&lt;BR /&gt;&lt;BR /&gt;Obviously, if a nefarious person has access to your Security Gateway, whether it's doing this or not, you've got much bigger issues to worry about.</description>
    <pubDate>Thu, 03 Oct 2019 00:24:47 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2019-10-03T00:24:47Z</dc:date>
    <item>
      <title>Check Point HTTPS Inspection Concerns</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Check-Point-HTTPS-Inspection-Concerns/m-p/64177#M13043</link>
      <description>&lt;P&gt;Dear Mates&lt;/P&gt;&lt;P&gt;We wish to enable https inspection on our environment, but there are some privacy concerns. Thats why I am writing this post to get some feedback from the community. I am not worried about how it is done, I am would like to know if answers to the questions below:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;If I access for example hotmail.com, is it possible to see the user credentials (username and password) on the logs?&lt;/LI&gt;&lt;LI&gt;Is the inspected information stored on the gateway ? for how long? or the information is no longer visible after the inspection is done by the gateway?&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;There is currently a need to get https inspection working, but I need to have answers to questions that may be raised at the C level. We intend to start with the Outbout Inspection first.&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;</description>
      <pubDate>Wed, 02 Oct 2019 15:26:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Check-Point-HTTPS-Inspection-Concerns/m-p/64177#M13043</guid>
      <dc:creator>Di_Junior</dc:creator>
      <dc:date>2019-10-02T15:26:42Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point HTTPS Inspection Concerns</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Check-Point-HTTPS-Inspection-Concerns/m-p/64179#M13045</link>
      <description>&lt;P&gt;1 - No user credentials are shown in the logs.&lt;/P&gt;
&lt;P&gt;2 - You can't see the decrypted information on the gateway and it's not stored at all, only handled by the processes during inspection.&lt;/P&gt;</description>
      <pubDate>Wed, 02 Oct 2019 15:54:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Check-Point-HTTPS-Inspection-Concerns/m-p/64179#M13045</guid>
      <dc:creator>Danny</dc:creator>
      <dc:date>2019-10-02T15:54:16Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point HTTPS Inspection Concerns</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Check-Point-HTTPS-Inspection-Concerns/m-p/64186#M13050</link>
      <description>Thanks &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/687"&gt;@Danny&lt;/a&gt;&lt;BR /&gt;&lt;BR /&gt;That is great, this feedback gives me a peace of mind.&lt;BR /&gt;&lt;BR /&gt;However, sk108202 says: The Security Gateway uses certificates and becomes an intermediary between the client computer and the secure web site. All data is kept private in HTTPS Inspection logs. Only administrators with HTTPS Inspection permissions can see all the fields in a log.&lt;BR /&gt;&lt;BR /&gt;Any comments on that.</description>
      <pubDate>Wed, 02 Oct 2019 16:12:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Check-Point-HTTPS-Inspection-Concerns/m-p/64186#M13050</guid>
      <dc:creator>Di_Junior</dc:creator>
      <dc:date>2019-10-02T16:12:04Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point HTTPS Inspection Concerns</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Check-Point-HTTPS-Inspection-Concerns/m-p/64215#M13063</link>
      <description>Whatever data you can see today for unencrypted traffic, you'll be able to see for encrypted traffic.&lt;BR /&gt;For example, if you're using App Control/URL Filtering, you'll be able to see the full HTTPS URLs that people surf to in the logs.&lt;BR /&gt;It won't log things like usernames/passwords or other PII unless you're specifically looking for certain things with DLP and/or Content Awareness.</description>
      <pubDate>Wed, 02 Oct 2019 18:48:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Check-Point-HTTPS-Inspection-Concerns/m-p/64215#M13063</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-10-02T18:48:52Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point HTTPS Inspection Concerns</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Check-Point-HTTPS-Inspection-Concerns/m-p/64240#M13068</link>
      <description>&lt;P&gt;It would be nice to have a statement from Check Point on how the clear text data is protected while doing HTTPS Inspection, I guess that at some point is ""accessible"" in memory at least for some daemons.&lt;/P&gt;&lt;P&gt;Having said that and knowing Check Point philosophy I'm pretty sure that it's not accessible by users.&lt;/P&gt;&lt;P&gt;In the end it all depends on your C level of psychosis (AKA risk tolerance). If we speak about risk, not having HTTPS Inspection is far more riskier than worrying about credential sniffing in a hardened OS that performs that function.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Remember that you can bypass various categories.&lt;/P&gt;&lt;P&gt;___&lt;/P&gt;</description>
      <pubDate>Thu, 03 Oct 2019 00:02:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Check-Point-HTTPS-Inspection-Concerns/m-p/64240#M13068</guid>
      <dc:creator>FedericoMeiners</dc:creator>
      <dc:date>2019-10-03T00:02:23Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point HTTPS Inspection Concerns</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Check-Point-HTTPS-Inspection-Concerns/m-p/64241#M13069</link>
      <description>There is one situation where the cleartext of an HTTPS connection is definitely accessible: when using the Mirror and Decrypt function in R80.20+.&lt;BR /&gt;This will "mirror" all traffic (including decrypted HTTPS traffic) to a specific port on the device.&lt;BR /&gt;This is needed to enable other devices to log the contents of specific traffic, which certain regulatory frameworks require.&lt;BR /&gt;&lt;BR /&gt;Obviously, if a nefarious person has access to your Security Gateway, whether it's doing this or not, you've got much bigger issues to worry about.</description>
      <pubDate>Thu, 03 Oct 2019 00:24:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Check-Point-HTTPS-Inspection-Concerns/m-p/64241#M13069</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-10-03T00:24:47Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point HTTPS Inspection Concerns</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Check-Point-HTTPS-Inspection-Concerns/m-p/135116#M24194</link>
      <description>&lt;P&gt;Some customers have regulatory obligations that prevent them from dumping decrypted traffic in cleartext. We are currently testing a new scheme that addresses this concern.&lt;/P&gt;
&lt;P&gt;In particular, a Check Point Azure VMSS is performing HTTPS Inspection, and using Mirror and Decrypt to dump the decrypted traffic to a Check Point NDR sensor for advanced threat analysis, behavioral analytics, and selective packet capture. This is performed over Large Scale VPN (LSV) to deliver end to end IPsec protection for the dumped traffic in transit. LSV allows the scale set to expand (or contract) without requiring policy installation on the NDR sensor.&lt;/P&gt;</description>
      <pubDate>Mon, 29 Nov 2021 06:28:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Check-Point-HTTPS-Inspection-Concerns/m-p/135116#M24194</guid>
      <dc:creator>Nir_Naaman</dc:creator>
      <dc:date>2021-11-29T06:28:41Z</dc:date>
    </item>
  </channel>
</rss>

