Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 
Danny
MVP Gold
MVP Gold

Auditing the Auditor: A Real-World Test of Check Point’s Compliance Blade

I took a closer look at Check Point's Compliance Blade.
It's quite an interesting tool aiming to ensure various regulatory and compliance checks.

However, while the concept is great in theory, there's definitely room for improvement in terms of product maturity and transparency. For example, it doesn’t provide enough insight into how certain checks are performed, it doesn’t guide the user on remediation steps, it lacks automatic refreshes on scores, and it just detects and alerts compliance violations instead of a prevention-first approach. Essentially, it’s a promising tool that still needs some polish to meet real-world expectations.

Let's start our deep dive using a real world scenario:

Scenario: CISO wants to know the CIS benchmark score of all Check Point Appliances that are securing the company's network. Specifically it should be verified that a correctly configured firewall stealth rule is in place and actively drops all unwanted access to the Check Point systems and also protects itself from getting deleted or deactivated.

Network Topology: Company LAN gets segmented and protected by a Check Point Security Gateway Appliance with a dedicated Smart-1 Management Appliance, that is directly connected the gateways' management port. Company's external network perimeter gets protected by another Check Point Firewall Security Gateway.

cp_network.png

Compliance Blade details:

Training

CIS Benchmark details:

  • Latest benchmark version: 1.1.0
    • Checklist consists of three parts:
      • Part 1: Password Policy (1.1 - 1.13) - Community script
      • Part 2: Device Setup (2.1.1 - 2.6.3) - Community script
      • Part 3: Firewall Security Settings (3.1 - 3.20)

CISO expectations:

Expectations Result
CIS benchmark score per appliance ?
Support for all Check Point appliance types ?
Numbering of checks matches CIS summary table: 1.1 - 3.20 ?
Execution of benchmark checks as technically described by CIS ?
Documentation on the function of preconfigured test elements ?
Cloning and customisation of preconfigured test elements ?
Intuitive creation of custom test elements ?
Easy creation of custom regulatory standards ?
Prevention-first approach ?
Provides clear steps for alert remediation ?


ATRG findings
:

  • "Compliance Blade currently only supports regular Gateways and Clusters"
    • Result: No benchmark check for our Smart-1 Security Management.
  • "Each Security Best Practice is assigned to one or more regulatory requirements"
    • Result: No regulatory-specific checks, Check Point assigns their own Best Practices as Test Elements (TE) to their vendor-specific estimation of the checks of the regulatory standards.
  • Compliance checks are neither real-time nor proactive as they always require a reactive mini-scan or full-scan. This typically takes place after changes have already been published.
  • Compliance Blade doesn't provide a specific help file.
  • Compliance Blade may skip inspection of Inline Layers when it doesn't like the parent rule definition.

Positive findings from this review:

  • Regular gateways includes Maestro and ElasticXL
  • Compliance Blade supports Managements in standalone deployments
  • Enabling the blade is just a simple click on a checkbox at the Management object
  • Receiving an alert notification after publishing changes that lead to compliance score degradation is really helpful and allows revisits of the last changes
  • Policy installation is not required to make updates to the compliance blade effective. Publishing changes is enough.

Datasheet promises:

Promises Result
300+ Check Point Security Best Practices ?
Monitor changes in real-time ?
Translate regulatory requirements into actionable steps ?
Increase Security ?
Avoid Human Error ?
Comply with regulations ?
Clear requirements and regulations layed out ?
Fine-tuning of custom best practices ?


Datasheet findings
:

  • Gaia OS Best Practices are only available for security gateways
  • What about security managements, event managements, etc.?

Relevant files on the Security Management:

  • $FWDIR/bin/interpreter
  • $FWDIR/log/grc_interpreter.elg
  • $FWDIR/conf/grc*
  • $FWDIR/cpm-server/grc.jar
  • $FWDIR/cpm-server/mgmt_ compliance.jar

Compliance scan procedure:

  • interpreter
    • verifies compliance blade licenses
    • checks management database for grc test elements
    • utilizes psql_client to retrieve the Main IP of each connected CP security gateway
    • utilizes cprid_util to retrieve the "show configuration" data from all CP security gateways
    • runs custom user scripts on the security gateways
    • performs cleanup routines
    • updates the scan results for SmartConsole Views and Reports

Drill down on CIS check 3.1 for Firewall Stealth Rule:
fw_stealth.png

fw_stealth_def.png

Note: As Check Point supports distributed firewall environments, i.e. firewall managements run on a dedicated host, the firewall stealth rule also has to include the firewall management host > sk103369.

CIS definition of a proper firewall stealth rule:

Source Destination Service VPN Action
Any Gateway + Management Any Any Drop


Firewall Stealth Rule definitions

There are various ways to configure a proper stealth rule, depending on the requirements of the security infrastructure.
Security policies with multiple installation targets may want to configure multiple firewall stealth rules for each target, others may use an object group of gateways (and managements), and others may use DAIP gateways, SMB gateways, inline layer policies and many other different settings that need to be considered and properly handled by an automated compliance verification engine to avoid false positives. Additionally there should be a high level of transparency in regard to how a score was achieved, i.e. how the check routine operated in detail and how remediation steps, alternative best practice and recommended approaches would look like.

Real world test

  • Ordered layer #1 - Standard
    ordered_regular.png
  • Compliance blade
    success.png
  • Result: Success, the 'FW Stealth' rule was found to be compliant.
  • Finding: Compliance blade properly detects a firewall stealth rule, when it's configured according ti Check Point's pre-configured best practice.
    te_fw130.png
  • Ordered layer #2 - Multiple installation targets
    multiple_targets.png
  • Compliance blade
    ordered_fail.png
  • Result: Success, the existing 'FW Stealth' is only found to be compliant, when all installation targets are added to the destination field.
  • Finding: Compliance blade handles this situation perfectly. This compliance check even works, when there are dedicated 'FW Stealth' rules for each installation target. Good job, Check Point!
  • Ordered layer #2 - No log
    ordered.png
  • Compliance blade
    ordered_fail.png
  • Result: Fail, the existing 'FW Stealth' rule wasn't found.
  • Finding: Compliance blade requires, that the 'FW Stealth' rule has an action that is not 'None'. This is not defined by CIS's stealth rule definition.
  • Ordered layer #3 - Missing Management
    no_mgmt.png
  • Compliance blade
    no_mgmt_score.png
  • Result: Fail, the existing 'FW Stealth' rule is missing the Management object and is therefore not a complete firewall stealth rule.
  • Finding: Compliance blade doesn't verify, that the 'FW Stealth' rule includes both, the firewall gateway AND firewall management.

  • Inline layerinline.png
  • Compliance blade
    inline_secure.png
  • Result: Double fail, the 'FW Stealth' rule #2.3 wasn't identified as stealth rule and the final Cleanup rule #18 got incorrectly counted as stealth rule, that is A - not part of the first 30% of the rule base and B - has 'Any' in it's Destination field, which disqualifies it as firewall stealth rule.
  • Finding: Compliance blade is not capable to handle inline layers yet.
  • DAIP gatewaysdaip.png
  • Compliance blade
    ordered_fail.png
  • Result: Fail, the 'FW Stealth' rule #4 wasn't identified.
  • Finding: Compliance blade is not capable to handling DAIP gateways yet. sk167473 doesn't mention if Compliance blade supports DAIP gateways.
  • Group of firewall gateway and management objectsgroup.png
  • Compliance blade
    ordered_fail.png
  • Result: Fail, the 'FW Stealth' rule #4 wasn't identified.
  • Finding: Compliance blade is not capable to handling object groups yet.
  • Compliance score degradation
    compliance_alert.png
  • Findings: Compliance blade shows an alert if the score of a compliance check drops.
    Not real-time, as the change needs to be published first. Datasheet promised real-time alerts.
    Anyhow, the alert is still helpful!

Final conclusion

Compliance blade, formerly easy2comply, was officially introduced in R80.x versions, offering:

  • Automated alerts for misconfigurations or policy violations.

  • Mapping to regulatory frameworks

  • Best practice score views and reports

It is now an integrated, scalable, and automated solution for enterprise customers, while it requires a friendly push to maturity as it doesn't support a list of standard features yet (grouped objects, inline layers, etc.), as outlined in this audit. Currently, it should only be used with caution and verification, as it is also not free of some inconsistencies. Example:
inconsistency.png

Customers are currently quite limited in their choice of available customization options. Compliance blade currently only supports custom firewall access control and Gaia OS best practices. While Gaia OS best practices can be highly fine-tuned via shell scripts, the access control policy can neither be filtered by nested queries nor advanced conditional checks. It's currently just a simple rule filter with some standard options for negation, tolerance levels, string settings etc.
new_test_elements.png

Customers looking for more flexibility and compliance verification before firewall changes are published may want to check out Check Point SmartTasks, which (unfortunately) are not available for Smart-1 Cloud customers yet.

CISO expectations fulfilled:

Expectations Result
CIS benchmark score per appliance No
Support for all Check Point appliance types No
Numbering of checks matches CIS summary table: 1.1 - 3.20 No
Execution of benchmark checks as technically described by CIS No
Documentation on the function of preconfigured test elements No
Cloning and customisation of preconfigured test elements No
Intuitive creation of custom test elements Partially
Easy creation of custom regulatory standards No
Prevention-first approach No
Provides clear steps for alert remediation No


Datasheet promises 
fulfilled:

Promises Result
300+ Check Point Security Best Practices Yes
Monitor changes in real-time Partially
Translate regulatory requirements into actionable steps Partially
Increase Security Yes
Avoid Human Error Partially
Comply with regulations Partially
Clear requirements and regulations layed out Partially
Fine-tuning of custom best practices Partially

 
@erankov , @RobertoQ , @Corinne_Vakulen , @Chris_Atkinson 

(2)
3 Replies
the_rock
MVP Gold
MVP Gold

BRILLIANT work, as always @Danny 

Best,
Andy
0 Kudos
PhoneBoy
Admin
Admin

Tagging @RobertoQ 

_Val_
Admin
Admin

@Danny, I believe you pointed out the obvious: most of the reports are for GWs and not management servers. 

However, there is some serious work in progress around the Compliance blade, and we all should expect major changes in 2026. It might be a good idea to revisit this topic once the product is out.

0 Kudos

Leaderboard

Epsum factorial non deposit quid pro quo hic escorol.

Upcoming Events

    CheckMates Events