Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 
Aleksey139180
Explorer
Jump to solution

The requirement to adjust the Information Security Regulator

Colleagues, good afternoon
We have received a request from the information security regulator
I'm quoting exactly
@ Ensure that the sha2 hash function is used for signing certificates. Use the sha1 hash function only if it is necessary to ensure compatibility with outdated software. Do not use md2 and md5 hash functions@@
Can you tell me how to check these requirements at check point?

0 Kudos
1 Solution

Accepted Solutions
simonemantovani
MVP Silver
MVP Silver

I think you should start from this SK: https://support.checkpoint.com/results/sk/sk103840

In my opinion, but anyone could correct if I'm wrong, you should verify these aspects if used:

  • vpn site-to-site with certificate.
  • platform portal certificate.
  • HTTPS inspection certificate.
  • UserCheck certificate.
  • SAML portal certifica.
  • and everything else feature that could use certificate on your Check Point infrastructure.

 

View solution in original post

0 Kudos
(1)
1 Reply
simonemantovani
MVP Silver
MVP Silver

I think you should start from this SK: https://support.checkpoint.com/results/sk/sk103840

In my opinion, but anyone could correct if I'm wrong, you should verify these aspects if used:

  • vpn site-to-site with certificate.
  • platform portal certificate.
  • HTTPS inspection certificate.
  • UserCheck certificate.
  • SAML portal certifica.
  • and everything else feature that could use certificate on your Check Point infrastructure.

 

0 Kudos
(1)

Leaderboard

Epsum factorial non deposit quid pro quo hic escorol.

Upcoming Events

    CheckMates Events