BEST Checkpoint Secure Cloud Transformation
BEST Checkpoint Secure Cloud Transformation
BEST Checkpoint Secure Cloud Transformation
© June 2020 Check Point Software Technologies Ltd. All rights reserved
THE PATH TO SECURE CLOUD TRANSFORMATION 2
ABSTRACT
Moving to the cloud is more than a technical transition to a new platform. It is a core
part of an enterprise’s growth strategy and while strategically important, it can also
be potentially disruptive.
For security experts and security architects, the most critical challenge in cloud
adoption is handling complex technical scenarios where the mix of traditional and
cloud-driven infrastructures must be integrated and aligned with the security needs
of the organization.
Cloud transformation is a huge opportunity not without risks. At Check Point, our
goal is to support decision-makers navigating the challenges of defining their cloud
transformation strategy. This paper provides an evidence-based approach to
planning, designing, and implementing the transition, with the goal of reducing
design cycles and the overall cost of your cloud transformation.
AUDIENCE
CISO, security officers, architects, and designers engaged in cloud security
architecture will benefit from this paper. As a prerequisite, you should be well versed
in cloud and security design concepts and generic security architectural concepts
and framework.
©2© June 2020 Check Point Software Technologies Ltd. All rights reserved
020 Check Point Software Technologies Ltd. All rights reserved
THE PATH TO SECURE CLOUD TRANSFORMATION 1
TABLE OF CONTENTS
INTRODUCTION ...................................................................................................................................................... 2
Cloud transformation goals .............................................................................................................................. 2
CLOUD TRANSFORMATION DRIVERS ................................................................................................................. 3
SHARED RESPONSIBILITY .................................................................................................................................... 4
Security Responsibility and Security Oversight ............................................................................................... 5
SECURE CLOUD TRANSFORMATION .................................................................................................................. 7
CloudGuard Overview ...................................................................................................................................... 7
Phase I: Data center Centric ............................................................................................................................ 9
Phase II: Transformation and Hybrid ............................................................................................................. 10
Phase III: Cloud Centric ................................................................................................................................. 11
CLOUD TRANSFORMATION FRAMEWORK ....................................................................................................... 15
Business Review ............................................................................................................................................ 16
Cloud Maturity Assessment ........................................................................................................................... 18
Legacy to Cloud-Native Analysis and Mapping ............................................................................................. 19
Migrating Security Controls to the Cloud ....................................................................................................... 20
Cloud Native Security .................................................................................................................................... 21
Zero Trust Modelling ...................................................................................................................................... 24
Cloud Security Management .......................................................................................................................... 26
TRANSFORMING CLOUD SECURITY WITH CHECK POINT .............................................................................. 27
Cloud Transformation Workshop ................................................................................................................... 27
CONCLUSION ........................................................................................................................................................ 29
EXAMPLE: ECOMMERCE SECURITY MODELING ............................................................................................. 30
© June 2020 Check Point Software Technologies Ltd. All rights reserved
THE PATH TO SECURE CLOUD TRANSFORMATION 2
INTRODUCTION
Moving to the cloud takes careful consideration. Merely copying an existing setup and moving it off-premises
(referred to as a “lift & shift”) is usually the least preferred option. In order to successfully transition to the cloud,
organizations must find cloud computing technologies that best fit their business needs.
As we shift towards cloud-based architectures, security must not be an afterthought, it should be embedded in all
services rather than “sprinkled” on the architectural blueprints of a newly approved cloud-based data centre.
Gartner’s “Top Security and Risk Management Trends”1 report highlighted three important trends, referred to as
the building blocks of cloud transformation – Zero-Trust, Cloud Native Security and SASE.
The convergence of these trends is a unified view for a cloud centric security strategy, one that should be
considered by each and every enterprise as a target cloud security architecture and used for their digital
transformation journey.
Zero Trust
Underpinning both these design concepts is a principle that teaches us to approach networks as
inherently untrusted and to leverage identity and trust as key components. “Never trust, always verify”
has become a driving design principle and industry standard to which all cloud architecture should be
measured.
1
https://www.gartner.com/doc/reprints?id=1-1YKW4MUN&ct=200310&st=sb
©2© June 2020 Check Point Software Technologies Ltd. All rights reserved
020 Check Point Software Technologies Ltd. All rights reserved
THE PATH TO SECURE CLOUD TRANSFORMATION 3
Competitive Early adoption of cloud technology and the ability to leverage cloud native feature-sets can reduce
advantage time-to-market and positivity impact competitive advantage.
Business
Shifting infrastructure responsibility, and some security risk, to a cloud service provider means
Opportunity Flexibility
more time and budget for core business needs.
Branch offices / Shifting security for remote workers and branch offices to the cloud is cost effective and efficient.
remote workers
Cloud-centric security enables all employees to securely access corporate data and applications,
Operational Mobility
regardless of location.
Agility
Pay-as-you-grow The upfront cost is much lower
model/ cost There are no hidden costs for unused features
reduction The CAPEX is lower as overprovisioning is avoided; the capacity is purchased before it is used
according to Easy scaling: capacity upgrades do not translate to downtime, unlike most hardware-based
business needs solutions.
Most large enterprises spend time, effort, and money maintaining a resilient data center
Disaster recovery
infrastructure. Moving to the cloud means this responsibility is transferred to the service provider.
Unified It is important for enterprises to manage cloud security infrastructure the same way they manage
management on premise assets.
One of the core principles of Forrester’s Zero Trust Model is that network access should be user,
device, and application-centric rather than relying on IP information or geographical location.
Zero Trust Moving apps to the cloud and using an identity broker means these conditions are met adequately.
alignment Zero Trust is a component of a Secure Access Service Edge architecture and ensures the
Security confidentiality and integrity of the data exchanged, a critical factor when assuming the network is
Gains inherently hostile.
Controlled When workloads and data are stored in the cloud, there is a physical separation between
access employees, vendors, and visitors.
Frequent Cloud service providers are required by law to undergo yearly audits designed to prevent flaws in
auditing their security systems.
Unlike traditional IT environments, the cloud service provider’s data centres always have multi-
Physical security
layered security defences, including security guards, fences, barbed wire, surveillance cameras,
concrete barriers, etc.
©2© June 2020 Check Point Software Technologies Ltd. All rights reserved
020 Check Point Software Technologies Ltd. All rights reserved
THE PATH TO SECURE CLOUD TRANSFORMATION 4
Budget Optimization
One of the key cloud transformation drivers is the shift from a CAPEX to an OPEX cost model. Moving to cloud
computing and services inadvertently means making this accounting shift, for example, assets that are normally
obtained as CAPEX can now be consumed as an OPEX service cost.
We believe that further cost optimization can be gained from a hybrid model that mixes different computing models
(IaaS-PaaS, IaaS-PaaS-SaaS, PaaS-FaaS, etc.) allowing the optimization of day-to-day expenses. The
infographic below shows some of these options and how they impact IT spend.
SHARED RESPONSIBILITY
At some point, enterprises are likely to use all the available cloud services, including the public IaaS, PaaS, FaaS
and SaaS. The issue is all these platforms have different operational benefits, shared responsibilities, and security
challenges.
In traditional IT environments, the enterprise owns the whole stack and the dedicated security team make the
necessary infrastructure changes. In the cloud, some responsibilities are transferred to cloud service providers,
and some are transferred to application owners. Shared responsibility models challenge the traditional models of
security implementation, management, and administration.
Leading research and advisory company, Gartner, stated that “through 2020, 95% of cloud security failures will be
the customer’s fault.” Our own analysis also concludes that customer misconfiguration is the most common reason
behind cloud security breaches. We believe this is partly due to customers thinking the cloud provider has secured,
monitored, and appropriately configured the environment.
Enterprises must be aware that when they implement cloud-native security controls and integrate with solutions
such as FaaS, PaaS, and SaaS, they need to take responsibility for the new cloud security policies such as access
control, data protection, application activity visibility, content-awareness, and threat prevention.
In the example below we show how security responsibility is shared between the organization and the cloud
provider and also between Application teams and traditional Security teams.
2
Cloud Credential Council, ITpreneurs Nederland B.V. | CAPEX to OPEX transition analysis for Hybrid Clouds)
©2© June 2020 Check Point Software Technologies Ltd. All rights reserved
020 Check Point Software Technologies Ltd. All rights reserved
THE PATH TO SECURE CLOUD TRANSFORMATION 5
Figure 2: Shared responsibility for the user and business process owner between the cloud computing models
©2© June 2020 Check Point Software Technologies Ltd. All rights reserved
020 Check Point Software Technologies Ltd. All rights reserved
THE PATH TO SECURE CLOUD TRANSFORMATION 6
Figure 4: Security oversight and shared security responsibility in cloud native environments
©2© June 2020 Check Point Software Technologies Ltd. All rights reserved
020 Check Point Software Technologies Ltd. All rights reserved
THE PATH TO SECURE CLOUD TRANSFORMATION 7
CloudGuard Overview
From private cloud data centre to public cloud, PaaS, FaaS, and SaaS application migrations, Cloud
Guard provides comprehensive cloud security solutions to keep enterprise data, assets, and apps
protected against even the most sophisticated attacks. Whether one’s business strategy centres on cloud-
enabling applications and platforms, public and hybrid infrastructure, or a multi-cloud approach, Cloud
Guard ensures all assets are adequately protected while supporting the flexible, dynamic, and cost-
effective nature of the cloud.
©2© June 2020 Check Point Software Technologies Ltd. All rights reserved
020 Check Point Software Technologies Ltd. All rights reserved
THE PATH TO SECURE CLOUD TRANSFORMATION 8
The table below shows the major technology areas in the cloud supported by Check Point.
CLOUD
CHECK POINT APPROACH
PLATFORM
IaaS Check Point’s flagship CloudGuard IaaS Cloud Security solution is designed to keep data in public, private and
hybrid cloud networks safe from even the most sophisticated attacks. CloudGuard IaaS:
Enhances native micro-segmentation and elastic networking of cloud environments to dynamically deliver
advanced security and consistent policy enforcement that automatically grows and scales with cloud
environments.
Secures workloads and applications running in hybrid and public cloud environments such as Microsoft Azure,
Amazon AWS, and GCP, mitigating risks from breaches, data leakage and zero-day threats.
Supports leading network virtualization solutions such as VMware NSX and Cisco ACI. Check Point CloudGuard
IaaS enhances native micro-segmentation capabilities to provide proactive protections for East-West traffic inside
virtual data centres.
SaaS Check Point offers CloudGuard SaaS – a cloud service that prevents attacks on enterprises using SaaS
applications:
Prevents malware and zero-day threats from attacking SaaS users
Stops sophisticated phishing attacks on Office365 and Gmail accounts
Eliminates the top SaaS threat by blocking account hijacks
Provides instant visibility into unauthorized SaaS activity
Protects shared files and sensitive business data
Security as a CloudGuard Connect is a cloud-hosted network threat prevention service offering a maintenance-free,
Service comprehensive, affordable security solution for remote sites and roaming users.
CloudGuard Connect supports adding advanced threat prevention capabilities on top of existing routers or SD-
WAN deployments, connecting to the corporate resources in the Public / Private IaaS and SaaS applications in
the Internet.
Cloud Security CloudGuard Dome9 delivers full lifecycle security for cloud native applications from development through runtime.
Posture With CloudGuard Dome9, organizations can gain complete control and visibility of their cloud native applications
Management and functions, across cloud providers.
Dome9 integrates with Azure NSG and AWS security groups allowing full control and viability using cloud native
controls.
Serverless / Cloud CloudGuard Dome9 automates the entire security lifecycle of serverless FaaS applications, from development to
Workload runtime.
Protection
CloudGuard Dome9 detects and alerts on security posture issues, as well as providing corrective remediation
Platform prior to deployment – saving developers’ time and assuring no vulnerabilities reach the live environment with
seamless CI/CD integration. During runtime, the CloudGuard Workloads agentless Function-Self-Protection
(FSP) layer detects and blocks OWASP TOP 10 attacks at the function level, like injection, broken authentication,
excessive permissions, and sensitive data exposure, while generating a highly accurate behavioural profile for
each function in order to stop anomalies.
Management as a Check Point offers all-inclusive security management as a service (MaaS) designed to manage security across
service on-premises appliances, Networks, Cloud, Mobile and IoT.
©2© June 2020 Check Point Software Technologies Ltd. All rights reserved
020 Check Point Software Technologies Ltd. All rights reserved
THE PATH TO SECURE CLOUD TRANSFORMATION 9
Transformation Phases
In this section, we present a visual representation of the three distinct cloud maturity levels after the
traditional data centre approach, each representing a defined phase of cloud adoption.
All transformation processes require several steps. By defining these into phases we can quickly visualize
the current levels of cloud adoption and efficiently design the target architecture. Most customers are
already in phase 1. However, some will be aiming to adopt phase 3, while other business models may
only require phase 2 adoptions.
Figure 8: Network and Infrastructure centric approach, the current situation for most enterprises
This diagram shows the current situation for most enterprises when they start to deploy computing
instances in the cloud to begin their transformation. A shift towards the partial public and private cloud
usage has been made, yet most users still connect to resources in the on-premises data centre. The
Internet egress point and corresponding policy are controlled centrally, and there is no way to avoid it.
Most, if not all, remote sites connect to HQ via a traditional WAN link, and do not have a local Internet
breakout.
While this traditional architecture is common, there are several significant challenges enterprises face:
©2© June 2020 Check Point Software Technologies Ltd. All rights reserved
020 Check Point Software Technologies Ltd. All rights reserved
THE PATH TO SECURE CLOUD TRANSFORMATION 10
The cost of running an on-premises data center is significantly higher than outsourcing it to public
cloud providers, regardless of the type of service.
As there is still a large amount of bare metal in the data center, the only way to truly microsegment is
to combine hypervisor-level security, with security in the switch fabric using Cisco ACI (Application
Centric Infrastructure). This comes at a high cost, especially from an operational point of view.
The Internet-bound traffic originating from remote sites is backhauled to the data center where the
Internet breakout is located. This leads to additional latency, decreased application performance for
cloud-based apps, and unnecessarily expensive Internet access pipes. This is especially true when
an IPSec VPN is used without split tunneling for remote sites. Traffic enters the HQ in an encrypted
way and leaves unencrypted, thereby doubling the throughput requirement of the access pipe. This
type of architecture has several names: traffic hair pinning, trombone, and backhauling. The
disadvantages outnumber the advantages.
SD-WAN technologies are not yet in place. Expensive MPLS (Multiprotocol Label Switching) circuits
are a significant cost factor in the organization’s telco OPEX.
Response times for SaaS applications are subpar because of the traffic hair pinning.
Some remote sites may already have a local Internet breakout, however if the same level of security
needs to be enforced as in the HQ’s Internet breakout point, the same security controls need to be in
place in remote sites. This refers to local appliances capable of running the full threat prevention stack
of controls, including SSL inspection. This is an expensive approach, especially if many remote sites
have a local Internet breakout.
©2© June 2020 Check Point Software Technologies Ltd. All rights reserved
020 Check Point Software Technologies Ltd. All rights reserved
THE PATH TO SECURE CLOUD TRANSFORMATION 11
Figure 10: Full cloud centric architecture with Security as a Service and SASE
©2© June 2020 Check Point Software Technologies Ltd. All rights reserved
020 Check Point Software Technologies Ltd. All rights reserved
THE PATH TO SECURE CLOUD TRANSFORMATION 12
Services
X-as-a-service first, where possible all services are subscription based.
Shift from CAPEX to OPEX.
Branch Offices
Reduced the on-premise appliances footprint according to the needs of internal site security,
e.g. OT/IT isolation and segregation.
Secure branch office egress Internet-bound traffic in the cloud.
Branch office primary transport network is the internet.
If optimization is required SD-WAN is used.
Data Center
Web and Applications tiers complete migration from the data center to the Public cloud IaaS.
Leveraging Zero-Trust security design modeling to protect access the public cloud data center
and perform macro and micro-segmentation.
Resources such as mainframes and high-value databases remain on-premise, connected to
the public cloud IaaS through the VPN direct links secured by the single layer of the Firewalls
located at the perimeter of the on-premise Data Center.
The data center is no longer the core of the organization.
The hair-pining of traffic thought the DC has been removed.
©2© June 2020 Check Point Software Technologies Ltd. All rights reserved
020 Check Point Software Technologies Ltd. All rights reserved
THE PATH TO SECURE CLOUD TRANSFORMATION 13
SASE
The SASE model described a change in architecture that no longer places the traditional on-premise data
center at the core of the infrastructure and shifts the focus to decentralization. SASE is all about distributing
access to (corporate) resources instead of consolidating them.
SASE is an architectural model consisting of several products, whose goal is to allow users to access
applications with the best possible user experience and the highest level of security, all depending on the
user’s identity.
Any user, regardless of their location and the device they are using should be able to access any
application, corporate or public, in a secured way. Versatility, scalability and user experience are of
paramount importance.
Rather than routing traffic originating from branch offices and remote users to the data center where the
internet egress point was typically located, SASE dictates users and branches should all break out to the
internet directly. In any case, most resources are moving from the traditional data center to the cloud.
The SASE model covers a wide range of functionalities, ranging from layer 3 in the OSI model up to the
application layer, as depicted in the graphic above on the left-hand side.
The Check Point SASE model covers 2 aspects – network and security:
Security Allows companies dealing with a significant amount of legacy infrastructure in branch
offices to stop backhauling all internet-bound traffic to the regional hub site without
SD-WAN Security having to upgrade the legacy gateways, saving WAN costs without compromising
security.
Secures Internet access to Web applications and resources leveraging unified Threat
Web Security Prevention solutions, such as URL Filtering, Anti-Virus, IPS, Anti-Bot, and Zero-Day
attack prevention.
Security for mobile and portable devices to protect against loss of corporate data and to
End Point Security mitigate modern-day malware such as ransomware, zero-day attacks, phishing, etc. so
you can safely navigate today’s menacing threat landscape.
Secure Remote Replacing traditional remote access solutions where the VPN was terminated in an on
Access to corporate premise data center, SASE Remote access no longer requires the traffic to be
resources backhauled, improving the user experience.
Secure access to SaaS applications like Office 365, Google suite, etc. using a Cloud
SaaS security
Access Security Broker (CASB)
©2© June 2020 Check Point Software Technologies Ltd. All rights reserved
020 Check Point Software Technologies Ltd. All rights reserved
THE PATH TO SECURE CLOUD TRANSFORMATION 14
IoT security SASE enables IoT devices to break out to the internet directly in a secure way.
Network Optimizing access to the Internet and Data Canters by allowing branch offices
Latency and users to break out to the internet directly and securely, significantly improving
Optimisation the user experience.
Elements like routing, dynamic path selection, NaaS, and latency optimization are
Routing all essential networking features of SD-WAN, laying the foundations on which
security is built.
The Check Point SASE solution places security as a service in the cloud in a distributed fashion instead
of enforcing it the legacy way on gateways, on-premise Data Centers and branches.
The infographic below shows a high-level representation of the key SASE components.
©2© June 2020 Check Point Software Technologies Ltd. All rights reserved
020 Check Point Software Technologies Ltd. All rights reserved
THE PATH TO SECURE CLOUD TRANSFORMATION 15
Overview
Unlike other frameworks, Check Point’s cloud transformation framework is a collection of principles,
analyses, and recommendations presented as a single process. Our experience of working with
enterprises has led to the understanding that teams, strategies and internal processes are usually at very
different stages. Consequently, when we discuss the topics below with customers, some topics are well
developed and allow us to move directly to recommendations, while others require a deeper analysis, and
some are mainly aspirational.
The overall goal of the framework is to understand our customer’s current position, explain our
understanding of a holistic target architecture, and make recommendations that help them achieve their
strategic vision.
Check Point has identified the following key principles for cloud transformation:
Business
Review
+ Maturity
Assessment
Legacy
Conversion + Cloud Native
Security &
DevSecOps + Zero Trust
+ Cloud Security
Management
©2© June 2020 Check Point Software Technologies Ltd. All rights reserved
020 Check Point Software Technologies Ltd. All rights reserved
THE PATH TO SECURE CLOUD TRANSFORMATION 16
Business Review
The first step in the cloud transformation journey is the business review. It is focused on capturing
information that pertains to the enterprise’s business, both in terms of strategy and the role security plays
within. We often refer to this as security business modelling. This is an essential stage to learn business
needs and identify precise requirements for the cloud strategy. Afterwards, it will be easy to understand
the influence of security on these requirements. The final step is to express these requirements as
attributes, i.e. labels that describe what is required of the security architecture.
This process is described in more detail in the Check Point Enterprise Security Framework (CESF) that
can be found here: https://www.checkpoint.com/downloads/products/checkpoint-enterprise-security-
framework-whitepaper.pdf
3. Attributes
The next and final stage is “business attribute mapping.” This is the process of assigning a number of
attributes to each requirement identified during the review stage. “Attributes” play the important role of
providing a link between the requirement and the recommendation.
An attribute is a conceptual abstraction of a real business requirement (the objectives, drivers, and
targets), which is modelled into a normalized language that articulates requirements, and measures
performance in an instinctive way for all stakeholders. Although the attributed terms are abstract in nature,
they are an excellent mechanism to map out security controls. There are no fixed rules on how attributes
are used and their use is often subjective.
Defining attributes also helps us to prioritize the business requirements and security drivers, as attributes
can be given different weightings.
©2© June 2020 Check Point Software Technologies Ltd. All rights reserved
020 Check Point Software Technologies Ltd. All rights reserved
THE PATH TO SECURE CLOUD TRANSFORMATION 17
Business Enable Acme business growth through elastic, agile and scalable technology.
Requirements Enable e-commerce services to be provided through computing resources
(BR)
Improve time-to-market requirements deploying public and private cloud IaaS/PaaS, performing a combination between Microsoft Azure
and Red Hat Openshift etc.
Security Data and information in the cloud are exposed to the same threats as traditional infrastructures. However, due to the large amount of
Analysis data processed in cloud computing, data leaks can lead to a chain of unfortunate events for IT companies and Infrastructure as a
Service (IaaS).
External Exposure – Cloud services are typically accessed from any location and any device. All that’s needed is an
Internet connection. While ease of access can boost company agility, services running in the cloud versus those on premise
are more likely to be breached.
Only Default Security – Typically, cloud services are provided with only basic security, which allows unrestricted open
Internet file sharing. This vulnerability can open the door to any number of malware attacks.
Cloud services are vulnerable across three main attack vectors:
1. Account Hijacks – Gaining unauthorized access to an individual or organization’s email or computer account for malicious
purposes. In a Check Point survey, account hijacks were the most significant concern amongst customers and partners.
2. Malware Delivery – Propagation, primarily through in-app file-sharing services, such as Drop Box or One Drive cloud apps, to
commit a variety of cybercrimes.
3. Data Leaks – Whether intentionally or unintentionally, data leakage occurs with the seamlessness of sharing information using
cloud services.
To meet these requirements the organization will need to adopt a significant amount of cloud technology, which needs to on-board in a
Business secure manner. The attack surface will change when workloads are moved to the cloud.
Drivers for
Security (BDS)
Risk Statements
Risk: Lack of visibility in the cloud virtual network (Vnet) can lead to a sensitive problem if one of the computing instances is
compromised to extract information.
Risk: Lack of identity management in the public cloud IaaS can lead to an employee accidentally modifying the logic of the configuration
template, and impacting the services.
Risk: Lack of lateral protections can lead to a compromised computing instance, which can impact the customer’s services, and,
consequently, the business’s reputation.
Risk: Lack of visibility in the encrypted communications from public cloud IaaS can lead to malicious code gaining access to the data
centre’s resources.
Risk: Time-to-market requirements can lead to mistakes in the configurations of the workloads.
Risk: The company reputation can be impacted by compromised content in the public/ private workloads that aren’t protected in public
networks.
Accessible, Reliable, Cost-Effective, Elastic, Agile, Access-controlled, Accountable, Authenticated, Authorized, Identified, Adaptable,
Attributes
Scalable, Enables Time-to-Market
Figure 13: Example of using the CESF process to define risk statements for IaaS
©2© June 2020 Check Point Software Technologies Ltd. All rights reserved
020 Check Point Software Technologies Ltd. All rights reserved
THE PATH TO SECURE CLOUD TRANSFORMATION 18
Phase 1: Applications are primarily hosted on-site with a few instances in the cloud. Remote users are
connected to DC using MPLS. Applications are developed and deployed into the on premise DC and any
cloud deployments are done using IaaS virtual machines.
Phase 2: Applications have moved to the cloud with the majority of applications existing as SaaS and
IaaS services. Those applications that are in cloud DC’s are protected by an IaaS perimeter gateway and
follow a spoke-and-hub cloud architecture. SD-WAN has replaced some of the MPLS circuits.
Phase 3: Full SASE architecture. It is important to note that at this phase these is still hybrid cloud
architecture.
Applications have b been refactored or re-build using cloud native solutions such as serverless and
containers by dedicated DevSecOps teams.
©2© June 2020 Check Point Software Technologies Ltd. All rights reserved
020 Check Point Software Technologies Ltd. All rights reserved
THE PATH TO SECURE CLOUD TRANSFORMATION 19
Figure 16: Magic quadrants for business process analysis. Used for categorization of cloud computing enterprise needs3
The goal behind using quadrant analysis, as shown above, is to help us visualize which existing
technologies and services suit what cloud technologies. Typically, organizations will have a mix of cloud
platforms and technologies depending on the workload:
We expect that most enterprises will continue to use legacy hardware, custom developments, enterprise
applications, and operations. Digital transformation does not mean moving everything. The transformation
process should go through several phases and place workloads where they are the best fit.
3
Cloud Credential Council, https://www.cloudcredential.org/
©2© June 2020 Check Point Software Technologies Ltd. All rights reserved
020 Check Point Software Technologies Ltd. All rights reserved
THE PATH TO SECURE CLOUD TRANSFORMATION 20
Figure 17: How different security components are migrated to the cloud
Cloud transformation involves more than just data centre and workload migration; it includes aspects such
as SD-WAN and adoption of network-based SASE solutions. As part of the transformation process it is
important to have a firm grasp of what form the exiting security control will, if any, take in the cloud.
Depending on what is being hosted and the DevSecOps-readiness of the organization we would anticipate
a “where it make sense” approach to the uptake of cloud native services such as containers and
serverless.
One of the key security challenges that we often face as part of cloud transformation is how to manage
security when adopting cloud native services and cloud native working practices such as micro-services
and DevSecOps.
In the following section we will look at this topic in more detail and explore some of Check Points approach
to securing cloud native workloads.
©2© June 2020 Check Point Software Technologies Ltd. All rights reserved
020 Check Point Software Technologies Ltd. All rights reserved
THE PATH TO SECURE CLOUD TRANSFORMATION 21
Containers built on top of images from public registries and added packages from public repositories.
They can be compromised intentionally and replaced by hackers after they hack the registry (for example
190K accounts on the Docker Hub were compromised in 2019, images may have been tampered with).
The use of repositories (RPM’s and other dependencies) may not be safe either.
Improper environment configuration (file permissions, access rights, etc.) could have a serious negative
impact. There are many benchmarks (for example the CIS Kubernetes Benchmark) that provide lists of
hundreds of items to check, which is often too difficult to be done manually on a regular basis.
The environment could have its own vulnerabilities (multiple CVEs for Docker, Kubernetes and plugins
like “execute code”, “bypass something”, and “gain privilege”).
Ephemerality on the containers (start/ stop/ create/ delete/ change IP) makes traditional IP-based firewall
policies useless.
©2© June 2020 Check Point Software Technologies Ltd. All rights reserved
020 Check Point Software Technologies Ltd. All rights reserved
THE PATH TO SECURE CLOUD TRANSFORMATION 22
Serverless functions represent a growing component of an organizations’ cloud native technology mix but
are, at the time of writing, the most ephemeral in terms of security, maintaining the correct level of security
around their use is a key concern for all security teams who need to be fully aware of the security
requirements and implications.
The infographic below shows Check Points approach to serverless security whereby the security is done
using a combination of posture management and workload protection at various stages of the
development and runtime.
©2© June 2020 Check Point Software Technologies Ltd. All rights reserved
020 Check Point Software Technologies Ltd. All rights reserved
THE PATH TO SECURE CLOUD TRANSFORMATION 23
Cloud
Security CloudGuard Continuous analysis of multi cloud security posture from CI/CD to Production.
Posture Dome9 Prevents configuration errors (CIS Kubernetes and other benchmarks).
Management
Delivers automated and elastic security for your cloud networks in order to
IaaS CloudGuard
Check Security
keep assets and data protected, while meeting the dynamic needs of your
IaaS cloud environment. Supports cloud and k8s aware policies
Point
Cloud Web
Native Application CloudGuard WAF and REST API protection; bot mitigation.
and API WAAP
Security
Protection
Container Secures serverless applications (in Java, Node.js, Python, C#, etc.).
and CloudGuard Multi-layer security, leveraging machine learning to
Serverless Workload profile and protect workloads.
Security Enforce granular security policies during CI/CD and production
Cloud
Intelligence Log analysis; detects suspicious and dangerous patterns in the network and
& Threat CloudGuard other activities; forensics and incident investigation; mitigation using
Hunting Log.ic CloudBots.
©2© June 2020 Check Point Software Technologies Ltd. All rights reserved
020 Check Point Software Technologies Ltd. All rights reserved
THE PATH TO SECURE CLOUD TRANSFORMATION 24
In order to achieve this goal, the process should start with the analysis of all the applications and their
relationships. Emphasis should be placed on creating an ‘assets and applications’ inventory that should
be grouped into classes based on complexity, dependencies, data classification and interdependencies.
Completing this analysis will provide macro and micro segmentation planning and define security access
roles, and assets security classification to create Zero-Trust based policies.
The analysis should consider the following:
The real business context, i.e. what role does technology play in the business
Data has to be transformed and structured to have business meaning and relevance through intelligent
analysis and synthesis
Raw facts and quantities that form the inputs and outputs of all business processes, and are processed
and stored during process execution
Data classification, which is defined as the process of organizing data in different and relevant
categories to be used and protected more efficiently. Also, it is an essential component for risk
management, compliance, and data security
©2© June 2020 Check Point Software Technologies Ltd. All rights reserved
020 Check Point Software Technologies Ltd. All rights reserved
THE PATH TO SECURE CLOUD TRANSFORMATION 25
Data flows related to stream processing or reactive programming to which all business processes are
related
©2© June 2020 Check Point Software Technologies Ltd. All rights reserved
020 Check Point Software Technologies Ltd. All rights reserved
THE PATH TO SECURE CLOUD TRANSFORMATION 26
©2© June 2020 Check Point Software Technologies Ltd. All rights reserved
020 Check Point Software Technologies Ltd. All rights reserved
THE PATH TO SECURE CLOUD TRANSFORMATION 27
The service is based on the core principles defined in the Check Point Enterprise Security Framework (CESF).
The Check Point Enterprise Security Framework is built around the architectural methodology of SABSA, and the
design principles of Zero Trust. The CESF allows Check Point to translate business requirements into practical
security solutions.
Figure 29: Check Point Enterprise Security Framework for enterprise architecture
©2© June 2020 Check Point Software Technologies Ltd. All rights reserved
020 Check Point Software Technologies Ltd. All rights reserved
THE PATH TO SECURE CLOUD TRANSFORMATION 28
Reporting
We believe this process is an effective means of communicating a long-term vision for better security
architecture. In order for this message to be accurately delivered, the workshop process culminates in a
bespoke report that outlines the key design concepts and recommendations. Upon completion, we will
deliver an architectural report that includes a customized transformation blueprint and recommendations
that we align to your business objectives.
Digital and cloud transformation requires careful planning and a long-term vision. It is not enough to
choose a collection of cloud technologies without having a solid understanding of the why, what, and how
they will be used. From experience, it is known that enterprises see value in a more structured approach,
which is why Check Point have developed a unique enterprise security framework.
©2© June 2020 Check Point Software Technologies Ltd. All rights reserved
020 Check Point Software Technologies Ltd. All rights reserved
THE PATH TO SECURE CLOUD TRANSFORMATION 29
CONCLUSION
Cloud transformation is in every enterprise’s pipeline. However, it can easily disrupt day-to-day business.
Check Point understands the complexity of these architectural engagements and has therefore derived best
practice strategies and approaches. Check Point’s vision for this paper was to present an approach to cloud
transformation, from conception to completion, based on the real-world experiences of our customers’ transitions
to the cloud.
The ‘phases and transitions approach’ acknowledges that enterprises don’t arrive at their target architecture
overnight, and that successful transition to the cloud requires careful planning and a long-term vision. We hope
that this paper has provided you with an honest approach to planning, designing, and implementing the transition,
and has helped to reduce your design cycles, as well as the eventual overall cost of your cloud transformation.
©2© June 2020 Check Point Software Technologies Ltd. All rights reserved
020 Check Point Software Technologies Ltd. All rights reserved
THE PATH TO SECURE CLOUD TRANSFORMATION 30
APPENDIX
Figure 31: Example of a cloud solution template that we will use in this example
In the following example, we demonstrate how the CESF process delivers complete enterprise security solutions.
The example describes a typical case of an enterprise adopting eCommerce for their business and then needing
to move some components from the on-premise data centre to computing instances in the cloud.
©2© June 2020 Check Point Software Technologies Ltd. All rights reserved
020 Check Point Software Technologies Ltd. All rights reserved
THE PATH TO SECURE CLOUD TRANSFORMATION 31
We will use the reference architecture documented by The Cloud Standards Customer Council for eCommerce4
use case as a guideline in the analysis, and help to put all the different elements together in a secure way using
the hybrid cloud model.
According to the Cloud Standards Customer Council for eCommerce use-case, “The public network domain
contains commerce users and their eCommerce channel for interaction with the enterprise. The public network
also includes communication with peer clouds. The edge services handle traffic between the pubic network and
the cloud.”
Business Enable eCommerce services, improving time-to-market requirements, deploying public and private cloud
Requirements (BR) IaaS/PaaS, doing a combination of public cloud data centre with Microsoft Azure and Red Hat Openshift
data centre.
Check Point Data and information in the cloud are exposed to the same threats as traditional infrastructures; however,
Analysis due to a large amount of data processed in cloud computing, data leaks can lead to a chain of unfortunate
events for IT companies and infrastructure as a service (IaaS).
CESF Review & Architecture Layer
External Exposure – Cloud services are typically accessed from any location and any device. All
that’s needed is an Internet connection. While ease of access can boost company agility, services
running in the cloud versus those on premise are just as likely to be breached. Furthermore, since
cloud and internal physical networks are frequently tightly integrated, a breach on either network will
likely affect both systems.
Restricting Security to Native Cloud Tools – Typically, cloud providers offer an extensive range of
security solutions and services that are natively bundled with their systems. While many of these tools
are very capable, they do not address the entire range of attacks and vulnerabilities found in today’s
information systems. This sometimes leads to a false sense of security and leaves cloud systems
under-protected.
Cloud services are vulnerable across three principal attack vectors:
Account Hijacks – Gaining unauthorized access to an individual’s or organization’s email or computer
account, for malicious purposes. In a Check Point survey, account hijacks were the most significant
concern amongst customers and partners.
Malware Delivery – Propagation, primarily through in-app file-sharing services, such as Box or One
Drive cloud apps, to commit a variety of cybercrimes.
Data Leaks – Whether intentionally or unintentionally, data leakage occurs with the seamlessness of
sharing information with cloud services.
Code Vulnerabilities – Public applications hosted in the cloud are by their very nature accessible to
everyone. This access allows for attacks that target known and unknown vulnerabilities, which form
part of the code or underlying operating system.
Business Drivers The attack surface changes when workloads are moved to the cloud. These are some of the vectors likely
for Security (BDS) to be exploited that should therefore be protected vigilantly.
4
Cloud Customer Architecture for eCommerce , URL: https://www.omg.org/cloud/deliverables/cloud-customer-architecture-for-
ecommerce.htm
©2© June 2020 Check Point Software Technologies Ltd. All rights reserved
020 Check Point Software Technologies Ltd. All rights reserved
THE PATH TO SECURE CLOUD TRANSFORMATION 32
Risk Statements
Business Drivers
Risk: Lack of visibility inside a VNET/VPC can allow breached systems or misconfigurations to remain
for Security
undiscovered. Even if visibility exists, it must be monitored by a human or an automated system.
(BDS)
(Continuation)
Risk: Lack of proper identity management in the public cloud IaaS (such as granting too much access or
permitting too little access) can lead to breaches or service interruptions.
Risk: Lack of lateral protections could allow intruders (that gain access to one internal system), to propagate
their level of access laterally throughout the unmonitored sections of the internal network and remain
undetected for long periods.
Risk: Lack of visibility inside encrypted communications can render deep inspection systems ineffective and
allow intruders to move undetected inside of the network. Over 80% of breaches in the last few years were
utilizing encrypted protocols for communication.
Risk: Time constraints and hasty learning curves can lead to mistakes in the configurations of topologies,
security systems and workloads. This makes posture analysis and configuration control essential to reduce
accidental or malicious misconfigurations.
Risk: Zero-day attacks embedded in data files. If you host VDI users in the cloud, or if your public
applications accept document uploads (i.e. resumes, documentation for loans, proposals, photos, etc.) your
ingress traffic could include files infected with zero-day malware. WAFs generally do not inspect payloads for
infection.
Risk: Lack of threat analysis on API traffic can allow attacks against the cloud control plane.
Risk: No visibility into Bastion Host traffic and activities. Bastion hosts usually have admin access levels, and
actions performed by users connected to a Bastion host are not always tracked.
Risk: Lack of capability to block certain file types from moving internally between restricted cloud zones (i.e.
moving documents containing credit card information to another section of the cloud that may not be fully PCI
compliant).
Risk: Lack of threat analysis on serverless traffic, which can lead to embedded commands that include
attacks or be used to leverage other vulnerabilities.
Risk: Lack of log and workload analysis can allow attacks or breaches that managed to elude or bypass
network security and remain undetected.
Risk: Egress traffic should be URL filtered and analysed for Bot C&C traffic to prevent outbound traffic from
connecting to malicious sites.
5
According to the Security Business attributes described in the ANDRITZ Financial Report 2019 -
https://www.andritz.com/resource/blob/340670/5bb77db191467e3f3eabd0322a70582d/andritz-annual-financial-report-2019-data.zip
©2© June 2020 Check Point Software Technologies Ltd. All rights reserved
020 Check Point Software Technologies Ltd. All rights reserved
THE PATH TO SECURE CLOUD TRANSFORMATION 33
Security segmentation and visibility are highly relevant to the Network Security
business requirements and must feature in the cloud security
architecture CloudGuard IaaS for Public Cloud
It is essential to complete VPC/VNET segmentation that defines a Microsoft Azure
web tier, business logic tier and data-tier. Security hubs for macro-segments:
Design must include cloud Configuration management and identity o Inbound Hub
management. o E-W Traffic Hub
Keep and maintain the same security level and posture in the cloud o Outbound Hub
CESF Design & Build Layer
and data center using the unified security approach. o VPN Hub
o Network: Reduce risk of lateral movement with micro-
perimeters and identity-based policies. CloudGuard IaaS for Private Cloud
o Workloads: Secure data and applications in public clouds and
NSX-T 2.5
data centres
o Data: Keep data safe, anywhere, with comprehensive multi- Express Route or VPN IPSec
layered security architecture Security Gateways with R80.x
o Visibility and Analytics: Full threat visibility with single view into
security risks.
Cloud Workload Protection Platforms
o Automation and Orchestration: Automate all processes and
tasks using flexible APIs and rich 3rd party integrations. CloudGuard WAAP
CloudGuard Workload
SourceGuard (For CI/CD)
In this analysis, we can see advanced access control and threat prevention for enterprise networks in public and
private clouds, native security, compliance across the public cloud, the prevention of targeted attacks on SaaS
applications and cloud-based email.
Whether a business strategy centres on cloud-enabling applications and platforms, public and hybrid infrastructure
or a multi-cloud approach, CloudGuard ensures all assets are fully protected, while supporting the flexible,
dynamic, and cost effective nature of the cloud.
By analysing this use case, an architecture can be built using the Check Point CloudGuard portfolio, which
integrates several components to create a secure eCommerce site.
The diagram below is the result of the analysis above. The requirements have been developed into a working
design blueprint that can now be moved to an implementation stage.
©2© June 2020 Check Point Software Technologies Ltd. All rights reserved
020 Check Point Software Technologies Ltd. All rights reserved
THE PATH TO SECURE CLOUD TRANSFORMATION 34
©2© June 2020 Check Point Software Technologies Ltd. All rights reserved
020 Check Point Software Technologies Ltd. All rights reserved
THE PATH TO SECURE CLOUD TRANSFORMATION 35
CONTACT US
Worldwide Headquarters | 5 Shlomo Kaplan Street, Tel Aviv 67897, Israel | Tel: 972-3-753-4555 | Fax: 972-3-624-1100 | Email: info@checkpoint.com U.S.
Headquarters | 959 Skyway Road, Suite 300, San Carlos, CA 94070 | Tel: 800-429-4391; 650-628-2117 | Fax: 650-654-4233 | www.checkpoint.com
© May 2020 Check Point Software Technologies Ltd. All rights reserved