- Products
- Learn
- Local User Groups
- Partners
- More
Introduction to Lakera:
Securing the AI Frontier!
Quantum Spark Management Unleashed!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
General Compliance questions and answers
A: Compliance is a process by which an organization checks itself against best practices and legal or regulatory requirements.
A: Check Point provides automated regulatory compliance reporting highlighting what is being checked and tested, as well as regulations that are at risk of being breached.
A: No. Organizations need to ensure they are constantly in compliance. The Compliance Software Blade automates this process and monitors the security policy in real-time and on an on-going basis.
A: Definitely. Non-regulated companies can use the security best practices that will help them improve their overall security. Many of the Early Availability participants had minimal regulatory exposure yet still found immense value from the best practices.
A: Please refer to Supported Regulatory Standards section of the Advanced Technical Reference Guide for Compliance Blade
A: Please refer to Checkmates Toolbox Repository. You may download an XML which you can then import into the Compliance dashboard.
A: The Compliance team is constantly looking for new regulations and standards to include. If you have suggestions, send them through to compliance@checkpoint.com.
A: 3D Security is about People, Policy and Enforcement. The Compliance Software Blade is a key component that adds value to any company in understanding and managing its overall security policy against Check Point best practices and security regulations.
A: No. The Compliance Software Blade is a Management Software Blade and runs on the management environment and not on the gateway.
A: Yes. Those solutions provide compliance reporting for firewalls only, and their security checks are mapped to a limited set of regulations. The Check Point Compliance Software Blade has coverage of all the Network Security Software Blades and has much broader regulatory coverage too.
A: The Compliance Software Blade is non-intrusive. This is a real benefit to the customer as once the Software Blade is turned on, it constantly monitors the security architecture with next to zero investment on the part of the user.
A: Definitely. There are a number of pre-defined reports. The compliance summary report shows all the security best practices and the scoring. The regulation report shows all the checked regulatory requirements and itemizes what has been checked. This is a valid piece of documentation for any auditor.
A: Yes. Since CISOs are in charge of the company’s overall security strategy, they will get a lot of value from the tool, as it provides a clear picture on Check Point’s security recommendations and compares it to their current architecture, without any additional work.
A: The Compliance Software Blade presents the status of relevant security best practices according to the installed Software Blades. Security best practices for non-installed Software Blades can be viewed in a comprehensive table within the Compliance Software Blade. The purpose is to highlight to the customer what they could be monitoring if they had more blades from Check Point.
A: No.
A: A best practice is a specific recommendation developed by Check Point which defines the optimal way to configure the Check Point security and management blades. Best practices receive a compliance status that allows you to understand how well the best practice is currently implemented in your own environment.
A: Check Point’s compliance team is currently authoring new content. Check Point will manage new content requests coming from Check Point SEs. Check Point is also exploring the possibility of allowing customers to write their own security checks and to define the automation rules from within.
A: The customer can decide which gateways and clusters are relevant and can exclude all others, ensuring minimal degradation in the overall security grade.
A: Yes. Sometimes, organizations have certain constraints that prevent them from configuring a Check Point Software Blade according to the recommendation. The Compliance Software Blade allows individual checks to be excluded along with the reason why the check should be excluded and for which period of time.
A: No. The Compliance Software Blade supports all of the Network Security Software Blades: Firewall, IPS, IPSec VPN, Application Control, URL Filtering, Identity Awareness, Anti-Bot, Antivirus, Mobile Access, Anti-Spam and Email Security, and DLP.
A: There is a nightly re-scan of the management which takes approximately 10 minutes. During this time, the Compliance Software Blade cannot be used but the other Software Blades can.
If you have this feature, you will have CPSB-COMP in your license string and in an associated contract (shown with cplic print -x on the management)
The blade is license by number of managed gateways and is sold as an annual subscription.
Believe it is also included with most management SKUs for the first year.
The Attached document is protected with Check Point Capsule. Unable to access
My apologies ! Attached is an unprotected version. Let me know if any issues.
Corinne
Hi there,
something is wrong with attached pdf. It says document is protected...
Link to supported regulations does not work. Does it support CIS benchmark for Firewalls?
That's an internal link which should have been changed to: https://support.checkpoint.com/results/sk/sk120256
Will fix this in the original post.
Hello,
Yes Compliance supports CIS Benchmarks. You may download the latest mapping (XML file) and import it to your Compliance. It's downloadable from our Checkmates -> Toobox -> Compliance repository. https://community.checkpoint.com/t5/Compliance/CIS-Benchmarks/m-p/134755#M30. The file contains also installation instructions.
Thanks
Corinne
@Corinne_Vakulen, the Compliance blade is currently not enabled for me. What are the licence requirements and how can I determine if I do have the required licence to enable and use the blade?
Thanks!
If you have this feature, you will have CPSB-COMP in your license string and in an associated contract (shown with cplic print -x on the management)
The blade is license by number of managed gateways and is sold as an annual subscription.
Believe it is also included with most management SKUs for the first year.
Thank you @PhoneBoy!
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
24 | |
15 | |
4 | |
3 | |
3 | |
3 | |
3 | |
3 | |
2 | |
2 |
Tue 30 Sep 2025 @ 08:00 AM (EDT)
Tips and Tricks 2025 #13: Strategic Cyber Assessments: How to Strengthen Your Security PostureTue 07 Oct 2025 @ 10:00 AM (CEST)
Cloud Architect Series: AI-Powered API Security with CloudGuard WAFTue 30 Sep 2025 @ 08:00 AM (EDT)
Tips and Tricks 2025 #13: Strategic Cyber Assessments: How to Strengthen Your Security PostureThu 09 Oct 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: Discover How to Stop Data Leaks in GenAI Tools: Live Demo You Can’t Miss!Wed 22 Oct 2025 @ 11:00 AM (EDT)
Firewall Uptime, Reimagined: How AIOps Simplifies Operations and Prevents OutagesAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY