收藏 分销(赏)

Security-CheckUP-Report-requirements-v1.docx

上传人:二*** 文档编号:4748498 上传时间:2024-10-11 格式:DOCX 页数:5 大小:171KB
下载 相关 举报
Security-CheckUP-Report-requirements-v1.docx_第1页
第1页 / 共5页
本文档共5页,全文阅读请下载到手机保存,查看更方便
资源描述
Requirements document Security CheckUP Threat Analysis Report Overview A Check Point Security CheckUP report is a comprehensive security analysis report based on data within your organisation. It automatically integrates security events from different Software Blades: Application Control, URL Filtering, IPS, Anti-Virus, Anti-Bot, DLP and Threat Emulation. The Security CheckUP Report accentuates Check Point Added Value, exposing security risks and suggesting remediation. When a Check Point Security Gateway runs in a PoC environment, inline or Mirror Port, we gain an insight into the activity on the network and will generate logs and security events for the activated Software Blades. The report gives a comprehensive security analysis that summarizes security events, their risks, and their remediation actions. Further information can be found here - Technical Overview From a technical perspective there are two elements in the architecture which are required to generate a Security CheckUP report. The first is the security gateway, which receives a copy of the traffic and generates logs, and the second is the management server which correlates the logs and produces the report. These functions can be consolidated on the same hardware for smaller implementations, or separated out on multiple platforms for larger implementations. These appliances are provided by Check Point or their partners. The gateway can be set up ‘in-line’ but is more commonly connected to a mirror port in the infrastructure and such will receive a copy of the live production traffic. In this way we can guarantee that live traffic is not interfered with and there are no changes that need to be made to the network topology. Security CheckUP Report Software Blade Options Check Point have the capability of running the Security CheckUP report against the following software blade technologies. Anti-Bot - detects bot-infected machines, prevents bot damages by blocking bot C&C communications, and is continually updated from ThreatCloud™ Anti-Virus - uses real-time virus signatures and anomaly-based protections to detect and block malware at the gateway. Application Control - provides the industry's strongest application security and identity control to organizations of all sizes. URL filtering - provides optimized web security through full integration in the gateway. Intrusion Prevention System - delivers complete and proactive intrusion prevention. Data Loss Prevention - combines technology and processes to revolutionize Data Loss Prevention (DLP), helping businesses to pre-emptively protect sensitive information. Threat Emulation - prevents infections from undiscovered exploits, zero-day and targeted attacks. We can also use identity logging to capture user account and identity information that can then be correlated with logged activity. We will also be running the following management functions. Smart Management Smart Event Smart Reporter Confidentiality Check Point will ensure that no data pertaining to your environment will leave your site. Check Point do use an external internet connection for cloud based lookups, security and URL categorization and for downloading updates to various treat and application databases associated with the next generation features of the security gateway. The Security CheckUP Report is usually generated on site by Check Point or their partners and then the device can be wiped before leaving site ensuring no data leaves site. If stricter controls on the data are required then this can usually be accommodated. Check Point will discuss the findings of the report with the customer at a later date and for this purpose Check Point would keep a copy of the report. This information would not be shared with anyone outside of Check Point and the relevant partner. Another option, in place of the on premise report, Check Point can also offer a cloud based report service. In this scenario the onsite gateway appliance would send it’s logs via an encrypted channel to the Check Point cloud, and after a pre-determined period of time the report would be generated offsite. Technical Requirements For the Security CheckUP report to operate properly in the environment, the following technical requirements need to be met. Contactable external DNS addresses and external DNS resolution To properly classify traffic with Application Control, URL Filtering, and Anti-Bot, the Security Gateway will need access (either directly or via proxy) to the following hosts, which are hosted at Akamai: The IP of the hostnames will vary depending on location so both the gateway and the gateway management should be able to resolve DNS. Hostname  (IP Varies based on location) Protocol From Used For (Version) http Gateway 1. Social Media Widget Detection (R75+) 2. URL Filtering Cloud Categorization (R75.20+) 3. Bot Detection (R75.40+) 4. Virus Detection (R75.40+) https Gateway All Services / Updates (R75+) https Gateway Management Contract Entitlement for all services (R75+) Download Service Updates (R70+) https Gateway Contract Entitlement for IPS (R70+) https Gateway Management Download Service Updates (R70+) http Gateway Suspicious Mail Outbreaks (R75.40+) WMI Subscription to the DC If you require the visibility of having usernames attributed to tracked actions in the logs instead of IP addresses, the gateway management server will need to subscribe to WMI logs on the domain controller. In order to do so connectivity to the DC will need to be established and authentication credentials provided to the management server. Check Point do not require an agent installation on the AD server and do not continuously request data. After WMI subscription, AD will send WMI events to the CheckUP appliance Gateway and Management Communications In order for the management server to be able to receive logs from the gateway, the gateway needs to be able to communicate with the management server on port 257. This does not need to be built into the gateway firewall policy but needs to be considered if there are other firewalls between the gateway and management. Diagram Below is a typical on site, standalone deployment layout. Check Point Responsibilities Check Point will be responsible for; · Delivery and collections of the hardware to and from site. · Providing the hardware for the Security CheckUP report. · Configuring the Check Point appliance software and building the necessary policies. · Generating the report. · Destruction of confidential data on the appliances. · Work with you to establish where on the network the appliance should sit for maximum results and which port in your environment should be mirrored. This is generally the egress interface of the main external switch so we would see outgoing SMTP and HTTP traffic. Customer responsibilities The customer would be responsible for; · Complete customer agreement form and return to Check Point · Provisioning of a mirror port in an appropriate point in the network. · Provision a switch port, IP address and routing info (such as default gw) for each Check Point appliance in order that they are able to connect to the internet and receive updates. · Assist with establishing communication between the Check Point appliances if for example there is a NAT device or firewall in between them. · Racking and cabling the Check Point appliances at the appropriate locations. · If ID awareness is required, entering AD admin credentials into the management appliance. · Provide information on internal domains and networks for DLP policy. · Attend a follow up meeting where we can discuss the findings of the report with Check Point representatives. Technical Requirements to be completed by the customer Management (or Mgmt/GW in standalone) Gateway (not required in standalone) IP Address / DHCP Default route Network Link speed – 10/100/1000/Auto Primary DNS Secondary DNS Proxy IP and Port External DNS Access confirmed Mirror port provisioned Software Blade Select blades for Security CheckUP report Additional information required Required information Anti Bot None required Anti-Virus None required App Control None required URL filtering None required IPS None required DLP Please provide all internal network subnet IPs and internal email domain names Identity Logging Please provide • AD Server IP addresses • Domain • AD Account Name • AD Account Password ©2014 Check Point Software Technologies Ltd. All rights reserved. Classification: [Confidential] For Check Point users and approved third parties | P. 5
展开阅读全文

开通  VIP会员、SVIP会员  优惠大
下载10份以上建议开通VIP会员
下载20份以上建议开通SVIP会员


开通VIP      成为共赢上传
相似文档                                   自信AI助手自信AI助手

当前位置:首页 > 环境建筑 > 其他

移动网页_全站_页脚广告1

关于我们      便捷服务       自信AI       AI导航        抽奖活动

©2010-2025 宁波自信网络信息技术有限公司  版权所有

客服电话:4009-655-100  投诉/维权电话:18658249818

gongan.png浙公网安备33021202000488号   

icp.png浙ICP备2021020529号-1  |  浙B2-20240490  

关注我们 :微信公众号    抖音    微博    LOFTER 

客服