<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Access to HTTPS decrypted data in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Access-to-HTTPS-decrypted-data/m-p/83040#M16792</link>
    <description>&lt;P&gt;Thanx, I though about that too but it is more like reactive measure and not proactive one as it should.&lt;/P&gt;
&lt;P&gt;You happen to know how much long will be that "long term" ? &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 24 Apr 2020 07:26:12 GMT</pubDate>
    <dc:creator>HristoGrigorov</dc:creator>
    <dc:date>2020-04-24T07:26:12Z</dc:date>
    <item>
      <title>Access to HTTPS decrypted data</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Access-to-HTTPS-decrypted-data/m-p/83021#M16788</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;You all know that there is a way to gain access to HTTPS decrypted data via fw ctl set ... interface.&lt;/P&gt;
&lt;P&gt;Now, we need to have second firewall admin with expert access, this cannot be avoided for many reasons.&lt;/P&gt;
&lt;P&gt;However, because of the EU GDPR requirements he/she must not be able to gain any access to employees personal data because he is not authorized for that.&lt;/P&gt;
&lt;P&gt;Certain categories (Health, Financial) are already bypassed and I am thinking to restrict that admin access to modify HTTPS Inspection policy but I am not sure that is good enough first because false categorization may happen and second it kind of limits that admin in his tasks to modify policy should another urgent reason arises.&lt;/P&gt;
&lt;P&gt;So, is there any way to restrict access to fw ctl set ... for an admin with expert access or otherwise how do you recommend to handle such situation?&lt;/P&gt;</description>
      <pubDate>Fri, 24 Apr 2020 05:22:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Access-to-HTTPS-decrypted-data/m-p/83021#M16788</guid>
      <dc:creator>HristoGrigorov</dc:creator>
      <dc:date>2020-04-24T05:22:05Z</dc:date>
    </item>
    <item>
      <title>Re: Access to HTTPS decrypted data</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Access-to-HTTPS-decrypted-data/m-p/83034#M16790</link>
      <description>If you give someone expert access, it's the same as giving them root shell access.&lt;BR /&gt;Which means: there's not really a way to restrict access to that.&lt;BR /&gt;&lt;BR /&gt;The way I've seen other customers handle this is to log all the commands a user does in expert mode and audit what they do to ensure they don't access any commands of concern.&lt;BR /&gt;You can see how to do that here: &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk99134" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk99134&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Longer term, the goal is to eliminate any reason to go to expert mode to begin with.&lt;BR /&gt;That means adding more commands to clish and ensuring RBA can be used to control access to said commands.</description>
      <pubDate>Fri, 24 Apr 2020 06:44:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Access-to-HTTPS-decrypted-data/m-p/83034#M16790</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-04-24T06:44:39Z</dc:date>
    </item>
    <item>
      <title>Re: Access to HTTPS decrypted data</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Access-to-HTTPS-decrypted-data/m-p/83040#M16792</link>
      <description>&lt;P&gt;Thanx, I though about that too but it is more like reactive measure and not proactive one as it should.&lt;/P&gt;
&lt;P&gt;You happen to know how much long will be that "long term" ? &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 24 Apr 2020 07:26:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Access-to-HTTPS-decrypted-data/m-p/83040#M16792</guid>
      <dc:creator>HristoGrigorov</dc:creator>
      <dc:date>2020-04-24T07:26:12Z</dc:date>
    </item>
    <item>
      <title>Re: Access to HTTPS decrypted data</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Access-to-HTTPS-decrypted-data/m-p/83043#M16794</link>
      <description>&lt;P&gt;I'd probably try to configure a restricted Admin role with &lt;A href="https://sc1.checkpoint.com/documents/R80.40/WebAdminGuides/EN/CP_R80.40_Gaia_AdminGuide/Content/Topics-GAG/User-Defined-Extended-Commands.htm" target="_self"&gt;extended commands&lt;/A&gt; and see if that fits my needs.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 679px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/5769i182D4A494D30E476/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Alternatively you could avoid access to the CLI by allowing this user to run a script within SmartConsole only that is preconfigured for fw ctl set..&lt;/P&gt;
&lt;P&gt;And then there are SmartConsole extensions you could use to reach your goal providing access to specific fw ctl output via run-script. I'd be more than happy to assist you with that.&lt;/P&gt;</description>
      <pubDate>Fri, 24 Apr 2020 07:50:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Access-to-HTTPS-decrypted-data/m-p/83043#M16794</guid>
      <dc:creator>Danny</dc:creator>
      <dc:date>2020-04-24T07:50:51Z</dc:date>
    </item>
    <item>
      <title>Re: Access to HTTPS decrypted data</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Access-to-HTTPS-decrypted-data/m-p/83048#M16796</link>
      <description>&lt;P&gt;Plenty of good ideas Danny!&lt;/P&gt;
&lt;P&gt;I have to think about it. Access is needed mostly for troubleshooting purposes and may be in case of DoS attack.&lt;/P&gt;
&lt;P&gt;So, CPView, ccc and of course "super seven", fwmonitor, etc....&lt;/P&gt;
&lt;P&gt;Setting kernel parameters isn't really daily task and I am fine with only one person having access to it.&lt;/P&gt;
&lt;P&gt;I like the Smart Extensions idea but they are currently a bit buggy and annoying. Hope CP improves them soon...&lt;/P&gt;</description>
      <pubDate>Fri, 24 Apr 2020 08:30:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Access-to-HTTPS-decrypted-data/m-p/83048#M16796</guid>
      <dc:creator>HristoGrigorov</dc:creator>
      <dc:date>2020-04-24T08:30:20Z</dc:date>
    </item>
    <item>
      <title>Re: Access to HTTPS decrypted data</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Access-to-HTTPS-decrypted-data/m-p/83079#M16800</link>
      <description>No specific timelines that I'm aware of.&lt;BR /&gt;May want to discuss an RFE with your local office.</description>
      <pubDate>Fri, 24 Apr 2020 15:21:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Access-to-HTTPS-decrypted-data/m-p/83079#M16800</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-04-24T15:21:32Z</dc:date>
    </item>
  </channel>
</rss>

