CIS Check Point Firewall Benchmark v1.1.0 PDF
CIS Check Point Firewall Benchmark v1.1.0 PDF
CIS Check Point Firewall Benchmark v1.1.0 PDF
v1.1.0 - 06-29-2020
Terms of Use
Please see the below link for our current terms of use:
https://www.cisecurity.org/cis-securesuite/cis-securesuite-membership-terms-of-use/
1|Page
Table of Contents
2|Page
2.1.1 Ensure 'Login Banner' is set (Automated) ................................................................. 38
2.1.2 Ensure 'Message Of The Day (MOTD)' is set (Automated) .................................. 40
2.1.3 Ensure Core Dump is enabled (Automated) .............................................................. 42
2.1.4 Ensure Config-state is saved (Automated) ................................................................. 44
2.1.5 Ensure unused interfaces are disabled (Automated) ............................................ 45
2.1.6 Ensure DNS server is configured (Automated) ........................................................ 47
2.1.7 Ensure IPv6 is disabled if not used (Automated) .................................................... 49
2.1.8 Ensure Host Name is set (Automated)......................................................................... 50
2.1.9 Ensure Telnet is disabled (Automated) ....................................................................... 51
2.1.10 Ensure DHCP is disabled (Automated) ..................................................................... 53
2.2 SNMP ...................................................................................................................................................... 55
2.2.1 Ensure SNMP agent is disabled (Automated) ........................................................... 55
2.2.2 Ensure SNMP version is set to v3-Only (Automated) ............................................ 57
2.2.3 Ensure SNMP traps is enabled (Automated) ............................................................. 59
2.2.4 Ensure SNMP traps receivers is set (Automated) ................................................... 61
2.3 NTP ......................................................................................................................................................... 63
2.3.1 Ensure NTP is enabled and IP address is set for Primary and Secondary NTP
server (Automated)........................................................................................................................ 63
2.3.2 Ensure timezone is properly configured (Automated) ......................................... 65
2.4 Backup ................................................................................................................................................... 67
2.4.1 Ensure 'System Backup' is set. (Automated) ............................................................. 67
2.4.2 Ensure 'Snapshot' is set (Automated) .......................................................................... 69
2.4.3 Configuring Scheduled Backups (Manual) ................................................................. 71
2.5 Authentication Settings................................................................................................................... 72
2.5.1 Ensure CLI session timeout is set to less than or equal to 10 minutes
(Automated) ...................................................................................................................................... 72
2.5.2 Ensure Web session timeout is set to less than or equal to 10 minutes
(Automated) ...................................................................................................................................... 74
2.5.3 Ensure Client Authentication is secured. (Automated) ......................................... 76
2.5.4 Ensure Radius or TACACS+ server is configured (Automated) ......................... 78
3|Page
2.5.5 Ensure allowed-client is set to those necessary for device management
(Automated) ...................................................................................................................................... 80
2.6 Logging .................................................................................................................................................. 82
2.6.1 Ensure mgmtauditlogs is set to on (Automated) ..................................................... 82
2.6.2 Ensure auditlog is set to permanent (Automated) ................................................. 84
2.6.3 Ensure cplogs is set to on (Automated) ...................................................................... 86
3 Firewall Secure Settings .......................................................................................................................... 87
3.1 Enable the Firewall Stealth Rule (Automated) ............................................................ 88
3.2 Configure a Default Drop/Cleanup Rule (Automated) .............................................. 89
3.3 Use Checkpoint Sections and Titles (Manual) .............................................................. 91
3.4 Ensure Hit count is Enable for the rules (Automated) .............................................. 92
3.5 Ensure no Allow Rule with Any in Destination filed present in the Firewall
Rules (Automated) ......................................................................................................................... 93
3.6 Ensure no Allow Rule with Any in Source filed present in the Firewall Rules
(Automated) ...................................................................................................................................... 94
3.7 Ensure no Allow Rule with Any in Services filed present in the Firewall Rules
(Automated) ...................................................................................................................................... 95
3.8 Logging should be enable for all Firewall Rules (Manual) ...................................... 96
3.9 Review and Log Implied Rules (Automated) ................................................................ 97
3.10 Ensure Drop Out of State TCP Packets is enabled (Automated) ......................... 98
3.11 Ensure Drop Out of State ICMP Packets is enabled (Automated) ...................... 99
3.12 Ensure Anti-Spoofing is enabled and action is set to Prevent for all Interfaces
(Automated) .................................................................................................................................... 100
3.13 Ensure Disk Space Alert is set (Automated) ............................................................. 102
3.14 Ensure Accept RIP is not enabled (Automated) ...................................................... 103
3.15 Ensure Accept Domain Name over TCP (Zone Transfer) is not enabled
(Automated) .................................................................................................................................... 105
3.16 Ensure Accept Domain Name over UDP (Queries) is not enabled (Automated)
.............................................................................................................................................................. 107
3.17 Ensure Accept ICMP Requests is not enabled (Automated) ............................... 109
3.18 Ensure Allow bi-directional NAT is enabled (Automated) ................................. 110
3.19 Ensure Automatic ARP Configuration NAT is enabled (Automated) .............. 112
4|Page
3.20 Ensure Logging is enabled for Track Options of Global Properties
(Automated) .................................................................................................................................... 113
Appendix: Summary Table ........................................................................................................................... 115
Appendix: Change History ............................................................................................................................ 118
5|Page
Overview
This document, Security Configuration Benchmark for Checkpoint Firewall, provides
prescriptive guidance for establishing a secure configuration posture for Checkpoint
Firewall versions R75.x – 80.x installed on Gaia Platform. This guide was tested against
Checkpoint R80.10 installed on Gaia. To obtain the latest version of this guide, please visit
http://benchmarks.cisecurity.org. If you have questions, comments, or have identified
ways to improve this guide, please write us at feedback@cisecurity.org.
Intended Audience
This document is intended for system and application administrators, security specialists,
auditors, help desk, and platform deployment personnel who plan to develop, deploy,
assess, or secure solutions that incorporate Check Point Firewall.
Consensus Guidance
This benchmark was created using a consensus review process comprised of subject
matter experts. Consensus participants provide perspective from a diverse set of
backgrounds including consulting, software development, audit and compliance, security
research, operations, government, and legal.
Each CIS benchmark undergoes two phases of consensus review. The first phase occurs
during initial benchmark development. During this phase, subject matter experts convene
to discuss, create, and test working drafts of the benchmark. This discussion occurs until
consensus has been reached on benchmark recommendations. The second phase begins
after the benchmark has been published. During this phase, all feedback provided by the
Internet community is reviewed by the consensus team for incorporation in the
benchmark. If you are interested in participating in the consensus process, please visit
https://workbench.cisecurity.org/.
6|Page
Typographical Conventions
The following typographical conventions are used throughout this guide:
Convention Meaning
Stylized Monospace font Used for blocks of code, command, and script examples.
Text should be interpreted exactly as presented.
Monospace font Used for inline code, commands, or examples. Text should
be interpreted exactly as presented.
<italic font in brackets> Italic texts set in angle brackets denote a variable
requiring substitution for a real value.
Assessment Status
An assessment status is included for every recommendation. The assessment status
indicates whether the given recommendation can be automated or requires manual steps
to implement. Both statuses are equally important and are determined and supported as
defined below:
Automated
Manual
7|Page
Profile Definitions
The following configuration profiles are defined by this Benchmark:
Level 1
Items in this profile apply to Check Point Firewall and intend to:
Level 2
This profile extends the “Level 1” profile. Items in this profile apply to Check Point
Firewall and exhibit one or more of the following characteristics:
8|Page
Acknowledgements
This benchmark exemplifies the great things a community of users, vendors, and subject matter
experts can accomplish through consensus collaboration. The CIS community thanks the entire
consensus team with special recognition to the following individuals who contributed greatly to
the creation of this guide:
Editor
Jayesh Rajan
Contributor
Jayesh Rajan
Danny Kane
Darren Freidel
Tom Fowler CISSP, CRISC, Xcel Energy
9|Page
Recommendations
1 Password Policy
Setting for the Password Policy section of User Management
10 | P a g e
1.1 Ensure Minimum Password Length is set to 14 or higher
(Automated)
Profile Applicability:
Level 1
Description:
Defines the minimum length a password can be. The minimum number of characters of a
password that is to be allowed for users or SNMP users. Does not apply to passwords that
have already been set.
Rationale:
Audit:
GUI:
Remediation:
GUI:
11 | P a g e
Default Value:
CIS Controls:
Version 7
12 | P a g e
1.2 Ensure Disallow Palindromes is selected (Automated)
Profile Applicability:
Level 1
Description:
A palindrome is a sequence of letters, numbers, or characters that can be read the same in
each direction. racecar, bob, and noon are some of the famous examples of Palindrome.
Rationale:
The Palindrome words are high on wordlists which are used before any brute-force attacks,
and it's simpler to crack using the password cracking tools.
Audit:
GUI:
Remediation:
GUI:
Default Value:
Selected
13 | P a g e
CIS Controls:
Version 7
14 | P a g e
1.3 Ensure Password Complexity is set to 3 (Automated)
Profile Applicability:
Level 1
Description:
This checks all new passwords to ensure that they meet basic requirements for strong
passwords. The required number of character types are: Upper case alphabetic (A-Z),
Lower case alphabetic (a-z), Digits (0-9), Other (everything else). A value of "1" effectively
disables this check. Changes to this setting do not affect existing passwords.
Rationale:
Password complexity recommendations are derived from the USGCB (United States
Government Configuration Baseline), Common Weakness Enumeration, and benchmarks
published by the CIS (Center for Internet Security). Password complexity adds entropy to a
password, in comparison to a simple password of the same length. A complex password is
more difficult to attack, either directly against administrative interfaces or
cryptographically, against captured password hashes. However, making a password of
greater length will generally have a greater impact in this regard, in comparison to making
a shorter password more complex.
Audit:
GUI:
Remediation:
15 | P a g e
GUI:
Default Value:
CIS Controls:
Version 7
16 | P a g e
1.4 Ensure Check for Password Reuse is selected and History Length is
set to 12 or more (Automated)
Profile Applicability:
Level 1
Description:
Check for reuse of passwords. When a user's password is changed, the new password is
checked against the recent passwords for the user. An identical password is not allowed.
The number of passwords kept in the record is set by History length. Does not apply to
SNMP passwords. Enables or disables password history checking and password history
recording, for all users.
Rationale:
The longer a user uses the same password, the greater the chance that an attacker can
determine the password through brute force attacks. Also, any accounts that may have
been compromised will remain exploitable for as long as the password is left unchanged. If
password changes are required but password reuse is not prevented, or if users continually
reuse a small number of passwords, the effectiveness of a good password policy is greatly
reduced. While current guidance emphasizes password length above frequent password
changes, not enforcing password re-use guidance adds the temptation of using a small pool
of passwords, which can make an attacker's job easier across an entire infrastructure.
Audit:
Run the following command to verify the Check for Password Reuse and History Length
setting.
CLI:
GUI:
17 | P a g e
Remediation:
GUI:
Default Value:
Selected
CIS Controls:
Version 7
18 | P a g e
1.5 Ensure Password Expiration is set to 90 days (Automated)
Profile Applicability:
Level 1
Description:
The number of days for which a password is valid. After that time, the password expires.
The count starts when the user changes their passwords. Users are required to change an
expired password the next time they log in. If set to never, passwords do not expire. Does
not apply to SNMP users.
Rationale:
Audit:
GUI:
Navigate to User Management > Password Policy > Mandatory Password Changes:
Password Expiration:
Ensure 'Password expires after' is checked and set to 90 or less.
Remediation:
GUI:
Navigate to User Management > Password Policy > Mandatory Password Changes:
Password Expiration:
Set 'Password expires after' setting to 90 or less
19 | P a g e
Default Value:
CIS Controls:
Version 7
20 | P a g e
1.6 Ensure Warn users before password expiration is set to 7 days
(Automated)
Profile Applicability:
Level 1
Description:
The number of days before the password expires that the user starts getting warned they
will have to change it. A user that does not log in will not see the warning.
Rationale:
Providing an advance warning that a password will be expiring gives users time to think of
a secure password. Users caught unaware may choose a simple password or write it down
where it may be discovered.
Audit:
Run the following command to verify the warn users before Password Expiration x days
setting.
CLI:
GUI:
Navigate to User Management > Password Policy > Mandatory Password Changes
Ensure 'Warn users before password expiration' is set to 7 days or less.
Remediation:
GUI:
Navigate to User Management > Password Policy > Mandatory Password Changes
Set 'Warn users before password expiration' is set to 7 days or less.
21 | P a g e
Default Value:
7 days
CIS Controls:
Version 7
22 | P a g e
1.7 Ensure Lockout users after password expiration is set to 1
(Automated)
Profile Applicability:
Level 1
Description:
Lockout users after password expiration. After a user's password has expired, they have
this number of days to log in and change it. If they do change their password within that
number of days they will be unable to log in: They are locked out. A value of never allows
the user to wait as long as they want to change their password.
Rationale:
User accounts and their passwords are the front-line of defense against malicious users
gaining access to critical systems and data. Just as important as ensuring strong passwords
are used and changed regularly, unused accounts should be closely monitored and
disabled, whenever possible. Inactive accounts could become targets of brute force or
dictionary attacks to gain access to the network and critical data/devices attached to it.
Audit:
Run the following command to verify the lockout users after x days setting.
CLI:
GUI:
Navigate to User Management > Password Policy > Mandatory Password Changes >
Lockout users after password expiration:
Ensure 'Lockout user after' is checked and set to 1 day.
Remediation:
23 | P a g e
GUI:
Navigate to User Management > Password Policy > Mandatory Password Changes >
Lockout users after password expiration:
Checked 'Lockout user after' setting and set to 1 day.
Default Value:
CIS Controls:
Version 7
24 | P a g e
1.8 Ensure Deny access to unused accounts is selected (Automated)
Profile Applicability:
Level 1
Description:
Deny access to unused accounts. If there has been no successful login attempt in a set
period of time, the user is locked out and cannot log in.
Rationale:
User accounts that have been unused for over a given period of time can be automatically
disabled. Unused accounts pose a threat to system security since the users are not logging
in to notice failed login attempts or other anomalies
Audit:
Run the following command to verify the Deny access to unused accounts setting.
CLI:
GUI:
Navigate to User Management > Password Policy > Deny access to unused
accounts:
Ensure 'Deny access to unused accounts' is checked.
Remediation:
GUI:
Navigate to User Management > Password Policy > Deny access to unused
accounts:
Checked the 'Deny access to unused accounts' setting.
Default Value:
Not Selected
25 | P a g e
CIS Controls:
Version 7
26 | P a g e
1.9 Ensure Days of non-use before lock-out is set to 30 (Automated)
Profile Applicability:
Level 1
Description:
Days of non-use before lock-out. The number of days in which a user has not (successfully)
logged in before that user is locked out. This only takes effect if Deny access to unused
accounts is selected.
Rationale:
User accounts that have been unused for over a given period of time can be automatically
disabled. It is recommended that accounts that are unused for 30 days should be disabled.
Unused accounts pose a threat to system security since the users are not logging in to
notice failed login attempts or other anomalies.
Audit:
Run the following command to verify the Days of non-use before lock-out setting.
CLI:
GUI:
Navigate to User Management > Password Policy > Deny access to unused
accounts:
Ensure 'Days of non-use before lock-out' is set to 30 or less.
Note: This setting only takes effect if 'Deny access to unused accounts' is enabled.
Remediation:
27 | P a g e
GUI:
Navigate to User Management > Password Policy > Deny access to unused
accounts:
Set 'Days of non-use before lock-out' to 30 or less.
Note: This setting only takes effect if 'Deny access to unused accounts' is enabled.
Default Value:
365
CIS Controls:
Version 7
28 | P a g e
1.10 Ensure Force users to change password at first login after
password was changed from Users page is selected (Automated)
Profile Applicability:
Level 1
Description:
Force users to change password at first login after their password was changed using the
command set user password or from the WebUI User Management > Users page.
Rationale:
This forces the user to change the password and not to use the password set by the
Administrator.
Audit:
Run the following command to verify the Force users to change password at first login after
password was changed from Users page setting.
CLI:
GUI:
Navigate to User Management > Password Policy > Mandatory Password Change:
Ensure 'Force users to change password at first login after password was
changed from Users page' is checked.
Remediation:
GUI:
Navigate to User Management > Password Policy > Mandatory Password Change:
Checked the 'Force users to change password at first login after password was
changed from Users page' setting.
29 | P a g e
Default Value:
Not Selected
CIS Controls:
Version 7
30 | P a g e
1.11 Ensure Deny access after failed login attempts is selected
(Automated)
Profile Applicability:
Level 1
Description:
If the configured limit is reached, the user is locked out (unable to log in) for a configurable
period of time.
Rationale:
Locking out user IDs after n unsuccessful consecutive login attempts mitigate brute force
password attacks against your systems.
Audit:
Run the following command to verify the Deny access after failed login attempts setting.
CLI:
GUI:
Navigate to User Management > Password Policy > Deny Access After Failed
Login Attempts:
Ensure 'Deny access after failed login attempts' is checked.
Remediation:
GUI:
Navigate to User Management > Password Policy > Deny Access After Failed
Login Attempts:
Checked the 'Deny access after failed login attempts' setting.
31 | P a g e
Default Value:
Not selected
CIS Controls:
Version 7
32 | P a g e
1.12 Ensure Maximum number of failed attempts allowed is set to 5 or
fewer (Automated)
Profile Applicability:
Level 1
Description:
This only takes effect if Deny access after failed attempts is enabled. The number of failed
login attempts that a user is allowed before being locked out. After making that many
successive failed attempts, future attempts will fail. When one login attempt succeeds,
counting of failed attempts stops, and the count is reset to zero.
Rationale:
Repeated failed login attempts could either be a valid user who has forgotten the password,
or a malicious attempt to gain access to the system. For this reason, this setting should be
as restrictive as possible to mitigate brute force attack attempts to discover a user's
password.
Audit:
Run the following command to verify the Deny access after failed login attempts setting.
CLI:
GUI:
Navigate to User Management > Password Policy > Deny Access After Failed
Login Attempts:
Ensure ' Maximum number of failed attempts allowed is set to' is set to 5or
fewer.
Remediation:
33 | P a g e
GUI:
Navigate to User Management > Password Policy > Deny Access After Failed
Login Attempts:
checked and set ' Maximum number of failed attempts allowed is set to'
setting to 5 or fewer.
Default Value:
10
References:
1. https://sc1.checkpoint.com/documents/R76/CP_R76_Gaia_WebAdmin/73101.htm
#o94478
Notes:
Warning: Enabling this leaves you open to a "denial of service" -- if an attacker issues
unsuccessful login attempts often enough you will be locked out. Please consider the
advantages and disadvantages of this option, in light of your security policy, before
enabling it.
CIS Controls:
Version 7
34 | P a g e
1.13 Ensure Allow access again after time is set to 300 or more seconds
(Automated)
Profile Applicability:
Level 1
Description:
Allow access again after a user has been locked out (due to failed login attempts). The user
is allowed access after the configured time if there have been no login attempts during that
time). This setting only takes effect if Deny access after failed login attempts is selected.
Rationale:
Users can accidentally lock themselves out of their accounts if they mistype their password
multiple times. To reduce the chance of such accidental lockouts, the Allow access again
after time setting determines the number of seconds that must elapse before the counter
that tracks failed logon attempts and triggers lockouts is reset to 0.
Audit:
Run the following command to verify the Allow access again after time setting.
CLI:
GUI:
Navigate to User Management > Password Policy > Deny Access After Failed
Login Attempts:
Ensure 'Allow access again after time' is set to 300 or more seconds.
Remediation:
35 | P a g e
GUI:
Navigate to User Management > Password Policy > Deny Access After Failed
Login Attempts:
Set the 'Allow access again after time' setting to 300 or more seconds.
Default Value:
Notes:
CIS Controls:
Version 7
36 | P a g e
2 Device Setup
37 | P a g e
2.1 General Settings
2.1.1 Ensure 'Login Banner' is set (Automated)
Profile Applicability:
Level 1
Description:
Configure a login banner, ideally approved by the organization’s legal team. This banner
should, at minimum, prohibit unauthorized access, provide notice of logging or monitoring,
and avoid using the word “welcome” or similar words of invitation.
Rationale:
Through a properly stated login banner, the risk of unintentional access to the device by
unauthorized users is reduced. Should legal action take place against a person accessing the
device without authorization, the login banner greatly diminishes a defendant’s claim of
ignorance.
Audit:
Run the following command to verify the Banner configured on the device and it's status.
CLI:
GUI:
Remediation:
38 | P a g e
GUI:
CIS Controls:
Version 7
39 | P a g e
2.1.2 Ensure 'Message Of The Day (MOTD)' is set (Automated)
Profile Applicability:
Level 1
Description:
Rationale:
Network banners are electronic messages that provide notice of legal rights to users of
computer networks. From a legal standpoint, banners have four primary functions.
First, banners may be used to generate consent to real-time monitoring under Title
III.
Second, banners may be used to generate consent to the retrieval of stored files and
records pursuant to ECPA.
Third, in the case of government networks, banners may eliminate any Fourth
Amendment "reasonable expectation of privacy" that government employees or
other users might otherwise retain in their use of the government's network under
O'Connor v.
Audit:
Run the following command to verify the MOTD Banner is configured on the device and it's
status.
CLI:
GUI:
Remediation:
Run the following command to enable and configured the MOTD setting.
CLI:
40 | P a g e
GUI:
CIS Controls:
Version 7
41 | P a g e
2.1.3 Ensure Core Dump is enabled (Automated)
Profile Applicability:
Level 1
Description:
A Core Dump contains the recorded state of the working memory and CPU's contents of the
Gaia system at the time that a Gaia process terminated abnormally. The core file is stored in
the /var/log/dump/usermode directory.
Rationale:
The Core Dump helps in troubleshooting to identify for which reason the process/system
got crashed.
Audit:
GUI:
Remediation:
GUI:
Navigate to System Management > Core Dump > select Enable Core Dumps
Default Value:
enabled
42 | P a g e
CIS Controls:
Version 7
43 | P a g e
2.1.4 Ensure Config-state is saved (Automated)
Profile Applicability:
Level 1
Description:
The 'Config state' setting provides the detail of the current configuration which is saved or
unsaved. Saved state indicates the current configuration of the system is matched with the
saved configuration, while unsaved state indicates a configuration change has been made
and it has not been saved to the configuration file.
Rationale:
The Unsaved state indicates that some configuration changes are made in the system.
Administrator needs to review whether all changes are authorized or not by verifying
configuration change logs.
Audit:
Remediation:
Default Value:
NA
CIS Controls:
Version 7
44 | P a g e
2.1.5 Ensure unused interfaces are disabled (Automated)
Profile Applicability:
Level 1
Description:
Rationale:
Audit:
Run the following command to check the status of all interfaces and verify interface state is
off if it is not in used.
CLI:
GUI:
Remediation:
GUI:
Navigate to Network Management > Network Interfaces > Open unused Interface >
unchecked Enable
Default Value:
NA
45 | P a g e
CIS Controls:
Version 7
9.2 Ensure Only Approved Ports, Protocols and Services Are Running
Ensure that only network ports, protocols, and services listening on a system with
validated business needs, are running on each system.
46 | P a g e
2.1.6 Ensure DNS server is configured (Automated)
Profile Applicability:
Level 1
Description:
Gaia uses the Domain Name Service (DNS) to translate host names into IP addresses. To
enable DNS lookups, you must specify the primary DNS server for your system. You can
also specify secondary and tertiary DNS servers. When resolving host names, the system
consults the primary name server. If a failure or time-out occurs, the system consults the
secondary name server, and if necessary, the tertiary.
Rationale:
The purpose is to perform the resolution of system hostnames to Internet Protocol (IP)
addresses.
Audit:
Run the following command to check the Primary, Secondary and tertiary DNS are
configured.
CLI:
GUI:
Remediation:
47 | P a g e
GUI:
Default Value:
Not Configured
CIS Controls:
Version 7
48 | P a g e
2.1.7 Ensure IPv6 is disabled if not used (Automated)
Profile Applicability:
Level 1
Description:
Although IPv6 has many advantages over IPv4, not all organizations have IPv6 or dual
stack configurations implemented
Rationale:
If IPv6 or dual stack is not to be used, it is recommended that IPv6 be disabled to reduce
the attack surface of the system.
Audit:
Remediation:
Default Value:
ipv6 is disabled
CIS Controls:
Version 7
49 | P a g e
2.1.8 Ensure Host Name is set (Automated)
Profile Applicability:
Level 1
Description:
Rationale:
The device hostname plays an important role in asset inventory and identification as a
security requirement, but also in the public keys and certificate deployments as well as
when correlating logs from different systems during an incident handling.
Audit:
GUI:
Navigate to Network Management > Hosts and DNS > System Name > Host Name
Remediation:
GUI:
Navigate to Network Management > Hosts and DNS > System Name > Host Name
CIS Controls:
Version 7
50 | P a g e
2.1.9 Ensure Telnet is disabled (Automated)
Profile Applicability:
Level 1
Description:
Disables the telnet access to the security appliance in the case it has been configured.
Rationale:
Telnet is an unsecure protocol as username and password are conveyed in clear text during
the administrator authentication and can be retrieved through network sniffing.
Audit:
GUI:
Remediation:
GUI:
Navigate to System Management > Network Access > verify Enable Telnet is
unchecked.
Default Value:
Off
51 | P a g e
CIS Controls:
Version 7
9.2 Ensure Only Approved Ports, Protocols and Services Are Running
Ensure that only network ports, protocols, and services listening on a system with
validated business needs, are running on each system.
52 | P a g e
2.1.10 Ensure DHCP is disabled (Automated)
Profile Applicability:
Level 1
Description:
Disable the Dynamic Host Configuration Protocol (DHCP) server on your device.
Rationale:
Audit:
GUI:
Navigate to Network Management > DHCP Server > DHCP Server Configuration >
Enable DHCP Server
Remediation:
GUI:
Navigate to Network Management > DHCP Server > DHCP Server Configuration >
veriify Enable DHCP Server is unchecked
Default Value:
53 | P a g e
CIS Controls:
Version 7
54 | P a g e
2.2 SNMP
2.2.1 Ensure SNMP agent is disabled (Automated)
Profile Applicability:
Level 1
Description:
The Simple Network Management Protocol (SNMP) server is used to listen for SNMP
commands from an SNMP management system, execute the commands or collect the
information and then send results back to the requesting system.
Rationale:
The SNMP server can communicate using SNMP v1, which transmits data in the clear and
does not require authentication to execute commands. Unless absolutely necessary, it is
recommended that the SNMP service not be used. If SNMP is required the server should be
configured to use only SNMPv3.
Audit:
Run the following command to check whether the SNMP agent is configured:
CLI:
GUI:
Remediation:
CLI:
Hostname> set snmp agent off
GUI:
System Management > SNMP > Unhecked the Enable SNMP Agent
55 | P a g e
Default Value:
CIS Controls:
Version 7
56 | P a g e
2.2.2 Ensure SNMP version is set to v3-Only (Automated)
Profile Applicability:
Level 1
Description:
Rationale:
SNMP Version 3 provides security enhancements that are not available in SNMP Version 1
or SNMP Version 2c. SNMP Versions 1 and 2c transmit data between the SNMP server and
SNMP agent in clear text. SNMP Version 3 adds authentication and privacy options to
secure protocol operations. For configuration purposes, the authentication and privacy
options are grouped together into security models. Security models apply to users and
groups, and are divided into the following three types: •NoAuthPriv—No Authentication
and No Privacy, which means that no security is applied to messages. •AuthNoPriv—
Authentication but No Privacy, which means that messages are authenticated. •AuthPriv—
Authentication and Privacy, which means that messages are authenticated and encrypted.
It is recommended that packets should be authenticated and encrypted
Audit:
Run the following command to check whether the SNMP agent-version v3-only is
configured
CLI:
GUI:
Remediation:
57 | P a g e
GUI:
Default Value:
Not Configured
CIS Controls:
Version 7
58 | P a g e
2.2.3 Ensure SNMP traps is enabled (Automated)
Profile Applicability:
Level 1
Description:
Rationale:
The purpose of the SNMP service is to monitor in real time the events occurring on systems
in order to meet the security requirement of availability of systems and services. The traps
are SNMP notifications sent to the NMS and should be enabled in order to be sent and
processed by the NMS. The NMS will then provide a comprehensive aggregation and
reporting of events generated, thus helping administrator.
Audit:
Run the following command to check whether the SNMP traps are configured:
CLI:
GUI:
Remediation:
59 | P a g e
GUI:
Navigate to System Management > SNMP > Enabled Traps > Set and select the
following traps
uthorizationError, coldStart, configurationChange, configurationSave,
linkUpLinkDown and lowDiskSpace
Default Value:
Not Configured
CIS Controls:
Version 7
60 | P a g e
2.2.4 Ensure SNMP traps receivers is set (Automated)
Profile Applicability:
Level 1
Description:
Rationale:
The purpose of the SNMP service is to monitor in real time the events occurring on systems
in order to meet the security requirement of availability of systems and services. The traps
are SNMP notifications sent to the NMS or SNMP traps receivers and should be enabled in
order to be sent and processed by the NMS. The NMS or SNMP traps receivers will then
provide a comprehensive aggregation and reporting of events generated, thus helping
administrator.
Audit:
Run the following command to check whether the SNMP traps receivers are configured:
CLI:
GUI:
Remediation:
GUI:
Navigate to System Management > SNMP > Trap Receivers Setting > Add > Add IP
Address Version details.
61 | P a g e
Default Value:
Not Configured
CIS Controls:
Version 7
62 | P a g e
2.3 NTP
2.3.1 Ensure NTP is enabled and IP address is set for Primary and
Secondary NTP server (Automated)
Profile Applicability:
Level 1
Description:
These settings enable the use of primary and secondary NTP servers to provide
redundancy in case of a failure involving the primary NTP server.
Rationale:
NTP enables the device to maintain accurate time and date when receiving updates from a
reliable NTP server. Accurate timestamps are critical when correlating events with other
systems, troubleshooting, or performing investigative work. Logs and certain
cryptographic functions, such as those utilizing certificates, rely on accurate time and date
parameters. In addition, rules referencing a Schedule object will not function as intended if
the device’s time and date are incorrect. For additional security, authenticated NTP can be
utilized. If Symmetric Key authentication is selected, only SHA1 should be used, as MD5 is
considered severely compromised.
Audit:
Run the following command to verify the IP address is configured for Primary and
Secondary NTP server.
63 | P a g e
GUI:
Navigate to System Management > Time > Set Time and Date
Verify Set Time and Date automatically using Network Time Protocol (NTP) option is
checked and Primary NTP server and secondary NTP server address is configured.
Remediation:
Run the following command to enable the NTP and configure the Primary & Secondary NTP
server.
CLI:
GUI:
System Management > Time > Set Time and Date > Checked Set Time and Date
automatically using Network Time Protocol (NTP) and configured the Primary
NTP Server and Secondary NTP server
Default Value:
No
CIS Controls:
Version 7
64 | P a g e
2.3.2 Ensure timezone is properly configured (Automated)
Profile Applicability:
Level 1
Description:
Sets the local time zone information so that the time displayed by the device is more
relevant to those who are viewing it.
Rationale:
Having a correct time set on the device is important for two main reasons. The first reason
is that digital certificates compare this time to the range defined by their Valid From and
Valid To fields to define a specific validity period. The second reason is to have relevant
time stamps when logging information. Whether you are sending messages to a Syslog
server, sending messages to an SNMP monitoring station, or performing packet captures,
timestamps have little usefulness if you cannot be certain of their accuracy.
Audit:
GUI:
Remediation:
Run the following command to Configure the Timezone used by the enterprise (GMT, UTC,
EDT, PST).
CLI:
GUI:
System Management > Time > Set Time Zone > Time Zone
65 | P a g e
Default Value:
CIS Controls:
Version 7
66 | P a g e
2.4 Backup
2.4.1 Ensure 'System Backup' is set. (Automated)
Profile Applicability:
Level 1
Description:
List last-successful backup which is taken either locally or on a remote server. The backup
can be taken locally on the device and also on a remote server via FTP, tftp or scp. The
backup which is taken last is marked with (latest) in backup type.
Rationale:
The backup helps in restoring the configuration in the case of system failure or corruption
or in the condition of device replacement.
Audit:
GUI:
67 | P a g e
Remediation:
GUI:
Navigate to Maintenance > System Backup > Backup > Select (This appliance |
SCP Server | FTP Server | TFTP Server)
Default Value:
Not Configured
CIS Controls:
Version 7
68 | P a g e
2.4.2 Ensure 'Snapshot' is set (Automated)
Profile Applicability:
Level 1
Description:
An image of the system partition creates when takes the snapshots, includes all the
configuration settings, Operating System and Checkpoint files. The locally stored firewall
logs are not stored in the snapshots, as log partition is not included in the Snapshots.
Snapshots can be restored on the same hardware on which it takes or on the same
configuration hardware.
Rationale:
Audit:
Run the following command to verify the list of snapshots taken on the system,
CLI:
Hostname>show snapshots
Restore points:
---------------
monthlysnapshot
GUI:
Remediation:
GUI:
69 | P a g e
Default Value:
Not Configured
CIS Controls:
Version 7
70 | P a g e
2.4.3 Configuring Scheduled Backups (Manual)
Profile Applicability:
Level 1
Description:
The backup can be scheduled to take daily, weekly or monthly. The backup can be taken
locally on the device and also on a remote server via FTP, tftp or scp. The backup which is
taken last is marked with (latest) in backup type.
Rationale:
The backup helps in restoring the configuration in the case of system failure or corruption
or in the condition of device replacement.
Audit:
GUI:
Remediation:
GUI:
Navigate to Maintenance > System Backup > Scheduled Backup > Add Scheduled
Backup
Provide the Backup Type and Backup Schedule as per organization's policy.
CIS Controls:
Version 7
71 | P a g e
2.5 Authentication Settings
2.5.1 Ensure CLI session timeout is set to less than or equal to 10
minutes (Automated)
Profile Applicability:
Level 1
Description:
Set the CLI Session Timeout value for device management to 10 minutes or less to
automatically close inactive sessions.
Rationale:
An unattended computer with an open administrative session to the device could allow an
unauthorized user access to the firewall’s management interface
Audit:
Run the following command to check Inactivity Timeout for Command Line is set to 10 or
less.
CLI:
Hostname>show inactivity-timeout
10
GUI:
Navigate to System Management > Session > Command Line Shell > Inactivity
Timeout - Set to 10 or less
Remediation:
Run the following command to Configure the Inactivity Timeout for Command Line.
CLI:
GUI:
Navigate to System Management > Session > Command Line Shell > Inactivity
Timeout - Set to 10 or less
72 | P a g e
Default Value:
10
CIS Controls:
Version 7
73 | P a g e
2.5.2 Ensure Web session timeout is set to less than or equal to 10
minutes (Automated)
Profile Applicability:
Level 1
Description:
Set the WebUI Session Timeout value for device management to 10 minutes or less to
automatically close inactive sessions.
Rationale:
An unattended computer with an open administrative session to the device could allow an
unauthorized user access to the firewall’s management interface
Audit:
Run the following command to check Inactivity Timeout for Web UI is set to 10 or less.
CLI:
GUI:
Navigate to System Management > Session > Web UI > Inactivity Timeout - Set
to 10 or less
Remediation:
Run the following command to Configure the Inactivity Timeout for Web UI.
CLI:
GUI:
Navigate to System Management > Session > Web UI > Inactivity Timeout - Set
to 10 or less
Default Value:
10
74 | P a g e
CIS Controls:
Version 7
75 | P a g e
2.5.3 Ensure Client Authentication is secured. (Automated)
Profile Applicability:
Level 1
Description:
Client Authentication allows a user and device to authenticate to the firewall and inherit
pre-configured firewall rules for a set amount of time. By default, these connections are
unencrypted yet can travel over unsecured networks. It is recommended that all Client
Authentication connections be made using the HTTPS configuration. This both uniquely
identifies the gateway and keeps the authentication credentials from being copied when
going over the network.
Rationale:
The Client Authentication is used to authenticate a user or device to the firewall and by
default, it works on HTTP port 900 and telnet port 259. The setting is stored in
$FWDIR/conf/fwauthd.conf file. HTTP and telnet both are non-secure plaintext protocol
and there is a number of published vulnerabilities, including the possibility of information
disclosure and unauthorized access to the host system, which could permit sensitive data
to be compromised. HTTPS configuration for all Client Authentication connections helps in
identifying the gateway and keeps the authentication credentials from being copied when
passes through the network.
Audit:
76 | P a g e
Remediation:
Comment out or remove the following line from $FWDIR/conf/fwauthd.conf file, or disable
the telnet service listening on port 259 by default, write a rule that prevents connections to
the daemon in the rulebase.
Default Value:
259 fwssd in.aclientd wait 259 900 fwssd in.ahclientd wait 900
CIS Controls:
Version 7
77 | P a g e
2.5.4 Ensure Radius or TACACS+ server is configured (Automated)
Profile Applicability:
Level 1
Description:
Rationale:
Audit:
Run the following command to check TACACS+ server status and TACACS+ servers list.
CLI:
GUI:
GUI:
78 | P a g e
Remediation:
GUI:
GUI:
Navigate to User Management > Authentication Servers > Radius Servers > Add
Provide <Server_IP_Address>, <Priority>, <UDP_Port> and <Timeout>.
Default Value:
Not Configured
CIS Controls:
Version 7
79 | P a g e
2.5.5 Ensure allowed-client is set to those necessary for device
management (Automated)
Profile Applicability:
Level 2
Description:
Rationale:
Management access to the device should be restricted to the IP addresses or subnets used
by firewall administrators. Permitting management access from other IP addresses
increases the risk of unauthorized access through password guessing, stolen credentials, or
other means.
Audit:
Run the following command to verify the Device access restrictions. Verify IP Addresses in
allowed-client is limited to those necessary for device management.
CLI:
Host Any
Host 10.22.2.1
Network 172.16.31.0 24
GUI:
Navigate to System Management > Host Access > Allowed Hosts
Remediation:
Run the following command to remove the IP Address or Network from allowed-client list.
CLI:
80 | P a g e
GUI:
Navigate to System Management > Host Access > Allowed Hosts > Select and
Delete the not required IP address or Network
Default Value:
Any
CIS Controls:
Version 7
81 | P a g e
2.6 Logging
2.6.1 Ensure mgmtauditlogs is set to on (Automated)
Profile Applicability:
Level 1
Description:
The mgmtauditlogs specifies if the Gaia sends the Gaia audit logs (for configuration changes
that authorized users make) to a Check Point Management Server.
Rationale:
The mgmtauditlogs enables the logging functionality for configuration change done by the
user. In Gaia os, we can export the Syslog messages from security gateway to Syslog server
or security management server, and it can be reviewed as normal logs in SmartView
Tracker. This enables organizations to monitor and analyze configuration change made by
users.
Audit:
GUI:
Remediation:
82 | P a g e
GUI:
CIS Controls:
Version 7
83 | P a g e
2.6.2 Ensure auditlog is set to permanent (Automated)
Profile Applicability:
Level 1
Description:
The auditlog specifies if the Gaia saves the logs for configuration changes that authorized
users have done.
Rationale:
The auditlogs defines how it saves the configuration change logs. The configuration change
log helps organizations to monitor and analyze configuration change made by users.
Audit:
GUI:
Remediation:
GUI:
84 | P a g e
CIS Controls:
Version 7
85 | P a g e
2.6.3 Ensure cplogs is set to on (Automated)
Profile Applicability:
Level 1
Description:
The cplogs specifies if the Gaia sends the Gaia system logs to a Check Point Management
Server:
Rationale:
Audit:
GUI:
Remediation:
GUI:
CIS Controls:
Version 7
86 | P a g e
3 Firewall Secure Settings
87 | P a g e
3.1 Enable the Firewall Stealth Rule (Automated)
Profile Applicability:
Level 2
Description:
Create a rule to drop Any Service from Any Source or Any VPN that attempts to connect to
the gateway.
Rationale:
The stealth rule will limit access to the gateway to the control and service connections
enabled as part of the design. As such, it is very important to enable access to the gateway
as its role changes, for example, become a client VPN gateway. Another common example is
enabling Client Authentication. If ports TCP 259 and 900 are not opened (or if you change
the ports in the conf file), access will not work. Organizations with many Check Point
gateways may want to document each gateway and the Check Point services it is intended
and configured to accept.
Audit:
Login to the Management Server via SmartConsole and create or edit the stealth rule and
make sure it is on top of all rules and only allowed sources and services are allowed to
access the Gateway.
Remediation:
Login to the Management Server via SmartDashboard and create or edit the stealth rule,
allowed only required IP address to manage the gateway and make sure it is on top of all
rules.
CIS Controls:
Version 7
88 | P a g e
3.2 Configure a Default Drop/Cleanup Rule (Automated)
Profile Applicability:
Level 2
Description:
Ensure that the final rule in the rulebase explicitly drops all services, destinations, etc not
specifically allowed in the previous rules. It is important that any access not explicitly
allowed be explicitly dropped.
Rationale:
The Clean up rule is necessary to block all the traffic which is not allowed by earlier rules in
the firewall. Ideally, Clean up rule be at the bottom in the Firewall rule base. By default an
Implied Rule in Checkpoint firewall which does the same thing, but logging is not enabled
for this rule.
Audit:
Verify the last rule is present in the rulebase which is denying all traffic from any source to
any destination.
Remediation:
Create or edit the last rule in the rulebase which is denying all traffic from any source to
any destination.
89 | P a g e
CIS Controls:
Version 7
90 | P a g e
3.3 Use Checkpoint Sections and Titles (Manual)
Profile Applicability:
Level 1
Description:
Use Sections to organize rules into related groups, whenever possible. Set each off with a
descriptive Section Title.
Rationale:
Rulebase clarity helps all workers and reviewers. By organizing rules, inserting new rules
is easier, and all can see the relationships among rules.
Audit:
Verify each rule has a description added and sections are used as per the requirement.
Remediation:
CIS Controls:
Version 7
91 | P a g e
3.4 Ensure Hit count is Enable for the rules (Automated)
Profile Applicability:
Level 2
Description:
The Hit Count setting shows the number of hits for the rules if enabled. When a new
connection crosses a Firewall, hits are incremented for the matching rule.
Rationale:
The Hit Count is a very useful feature which helps in finding the unused rules, which can be
reviewed and removed or update the rules accordingly as per the requirement.
Audit:
Go to the following path in Smart Console and verify Enable Hit Count is enabled.
Remediation:
Go to the following path in Smart Console and Enable the Enable Hit Count setting.
CIS Controls:
Version 7
92 | P a g e
3.5 Ensure no Allow Rule with Any in Destination filed present in the
Firewall Rules (Automated)
Profile Applicability:
Level 2
Description:
The Firewall Rules with Any in Source field allows all the IP Addresses of the Network to
access the specified destination configured in the Firewall rules for specific services.
Rationale:
Ideally, the traffic should be explicitly allowed from specific Source to specific Destination
for the required services. This provides better control over the traffic passes through the
firewall and reduce the chances of an exploit because of service misconfiguration.
Audit:
Verify there are no allowed rules present in the firewall which has Any used in the Source
field. If there is any such rule present in the firewall, it should have a business justification
and also it should be documented.
Remediation:
Delete the rule from the firewall which has Any used in the Source field.
CIS Controls:
Version 7
93 | P a g e
3.6 Ensure no Allow Rule with Any in Source filed present in the Firewall
Rules (Automated)
Profile Applicability:
Level 2
Description:
The Firewall Rules with Any in the Destination field allows accessing all the IP Addresses of
Network from specified Sources configured in the Firewall rules for specific services.
Rationale:
Ideally, the traffic should be explicitly allowed from the specific Source to specific
Destination for the required services. This provides better control over the traffic passes
through the firewall and reduce the chances of an exploit because of service
misconfiguration.
Audit:
Verify there are no allowed rules present in the firewall which has Any used in the
Destination field. If there is any such rule present in the firewall, it should have a business
justification and also it should be documented.
Remediation:
Delete the rule from the firewall which has Any used in the Destination field.
CIS Controls:
Version 7
94 | P a g e
3.7 Ensure no Allow Rule with Any in Services filed present in the
Firewall Rules (Automated)
Profile Applicability:
Level 2
Description:
The Firewall Rules with Any in the Service field allows accessing all the Services from
specified Source to specified Destination configured in the Firewall rules.
Rationale:
There are many services like telnet, FTP, TFTP which are having many security issues.
Hackers can take advantage of these services to gain the credentials, access to the systems
or they can use these services for DoS attacks. These services need to be configured as per
the needs of the business.
Audit:
Verify there are no allowed rules present in the firewall which has Any used in the Service
field.
Remediation:
Delete the rule from the firewall which has Any used in the Service field.
CIS Controls:
Version 7
95 | P a g e
3.8 Logging should be enable for all Firewall Rules (Manual)
Profile Applicability:
Level 2
Description:
The Track Field defines how the events of the rule are captured.
Rationale:
The event log of firewall rules helps in identifying the allowed and blocked traffic and also
helps in troubleshooting and forensic investigation. It is always good to enable logging for
all the firewall rules, but by logging multiple firewall rules results in a huge log files, which
requires huge disk space and management operations. Logs play an important role in
security auditing, incident response, system maintenance and forensic investigation, and
should be configured as per the business needs.
Audit:
Verify all Track field in all firewall rules should have set to Log.
Remediation:
CIS Controls:
Version 7
96 | P a g e
3.9 Review and Log Implied Rules (Automated)
Profile Applicability:
Level 2
Description:
Rulebase clarity helps all workers and reviewers. Stating rules explicitly in the rulebase
makes policy analysis and review significantly easier. Select the ‗Log Implied Rules‘ to
ensure all understand when connectivity is denied or allowed through a subtle Implied
Rule.
Rationale:
It is recommended to define rules explicitly rather than state them implicitly in the Implied
Rules section of Global Properties. If Implied Rules are used, configure logging for implied
rules by accessing the ‗Global Properties‘ dialog box.
Audit:
Go to the following path in the Smart Console and verify Log Implied Rules is enabled.
Remediation:
Go to the following path in the Smart Console and enabled the Log Implied Rules.
Default Value:
Disabled
CIS Controls:
Version 7
97 | P a g e
3.10 Ensure Drop Out of State TCP Packets is enabled (Automated)
Profile Applicability:
Level 2
Description:
The Drop out of state TCP Packets setting will drop the out of state or non-synchronized
TCP Packets for which firewall does not have a matching state table entry.
Rationale:
Bypassing security setting Drop out of state TCP Packets means that non-synchronized
packets which do not belong to an established connection in the Firewall's connections
table or non-TCP compliant traffic will not be dropped. This can be potentially used by
attackers for Denial-of-service attacks by flooding non-synchronized TCP packets.
Audit:
Go to the following path and verify Drop Out of State TCP Packets and Log on Drop is
enabled.
Remediation:
Go to the following path and checked the Drop Out of State TCP Packets and Log on Drop.
Default Value:
Enabled
CIS Controls:
Version 7
98 | P a g e
3.11 Ensure Drop Out of State ICMP Packets is enabled (Automated)
Profile Applicability:
Level 2
Description:
Rationale:
The Firewall verifies that each ICMP reply packet matches a previous request, and each
ICMP error matches an existing connection. Out of State ICMP packets should be dropped
and logged.
Audit:
Go to the following path and verify Drop Out of State ICMP Packets and Log on Drop is
enabled.
Remediation:
Go to the following path and checked the Drop Out of State ICMP Packets and Log on Drop.
Default Value:
Enabled
CIS Controls:
Version 7
99 | P a g e
3.12 Ensure Anti-Spoofing is enabled and action is set to Prevent for all
Interfaces (Automated)
Profile Applicability:
Level 2
Description:
The Anti-Spoofing is a technique which is used to identify and drop the packets that have a
false source IP address. The Anti-Spoofing detect mode is only monitor the Anti-spoofing
events while prevent mode drops the Anti-spoofing events.
Rationale:
Hackers change the packet's IP address and make a packet which looks like it is from a
trusted source. If your network is not protected with the IP-spoofing, hackers can exploit
the vulnerability to gain access to the network.
Audit:
For all managed gateways verify that Anti-Spoofing is enabled, Anti-Spoofing action is set
to Prevent and tracking is set to Log.
SmartConsole > Gateways & Servers > select managed Gateway > Network
Management > Select each interface > General > Modify
- Verify Perform Anti-Spoofing based on Interface topology is checked
- Verify Anti-Spoofing action is set to Prevent
- Verify Spoof Tracking is set to Log
Remediation:
For all managed gateways enable the Anti-Spoofing, set the Anti-Spoofing action to Prevent
and set the tracking to Log.
SmartConsole > Gateways & Servers > select managed Gateway > Network
Management > Select each interface > General > Modify
- Checked the Perform Anti-Spoofing based on Interface topology
- Set the Anti-Spoofing action to Prevent
- Set the Spoof Tracking to Log
100 | P a g e
CIS Controls:
Version 7
101 | P a g e
3.13 Ensure Disk Space Alert is set (Automated)
Profile Applicability:
Level 1
Description:
This is used to generate the Log and Alert when disk space reaches the configured limit.
Rationale:
The device might get inaccessible and the logs are not getting stored once the disk space
reaches to the maximum capacity. It is imperative that organizations log critical
infrastructure appropriately, store and archive these logs in a central location
Audit:
Verify Disk Space Alert is configured if disk space goes beyond the organization defined
configured limit.
SmartConsole > Gateways & Servers > Select each Gateway > Logs > Local
Storage
* When disk space is below is checked and value MBytes or Percentage is
configured
* Issue alert is set to Log, Popup Alert, Mail or SNMP trap alert.
Remediation:
SmartConsole > Gateways & Servers > Select each Gateway > Logs > Local
Storage
* Checked the When disk space is below and value MBytes or Percentage is
configured as per the Organization Policy.
* Set the Issue alert to Log, Popup Alert, Mail or SNMP trap alert.
CIS Controls:
Version 7
102 | P a g e
3.14 Ensure Accept RIP is not enabled (Automated)
Profile Applicability:
Level 2
Description:
The Accept RIP is a Global property setting which you can set either to accept or reject the
RIP packets which is using UDP Port 520. RIP maintains information about reachable
systems and routes to those systems.
Rationale:
The security policy is made up of rules in the Firewall Rule Base. Other than the rules
defined by the administrator, The Check Point Security Gateway also creates Implied Rules,
which are defined in the Firewall Global Properties. The Check Point Security Gateway
places the implied rules first, last, or before last in the Firewall Rule Base. The
administrator can decide whether or not to log implied rules.
First — The Implicit rule will be placed before the explicit rules. Last — The Implicit rule
will be placed after the explicit rules. Before Last — The Implicit rule will be placed before
the last explicit rule.
Audit:
SmartConsole > Gateways & Servers > select each Gateway > Firewall
Veiry Accept RIP is unchecked.
Remediation:
SmartConsole > Gateways & Servers > select each Gateway > Firewall
Unchecked the Accept RIP
Default Value:
Disabled
103 | P a g e
CIS Controls:
Version 7
9.2 Ensure Only Approved Ports, Protocols and Services Are Running
Ensure that only network ports, protocols, and services listening on a system with
validated business needs, are running on each system.
104 | P a g e
3.15 Ensure Accept Domain Name over TCP (Zone Transfer) is not
enabled (Automated)
Profile Applicability:
Level 2
Description:
The 'Domain Name Over TCP (Zone transfer)' is a global property setting which is used to
allow or reject all the TCP-type DNS packets to and from anywhere. These rules are
considered as rule zero which are executed before any user-defined rules.
Rationale:
If this rule is enabled, it accepts Domain Name (DNS) queries and replies over TCP, to allow
downloading of the domain name-resolving tables used for zone transfers between servers.
For clients, DNS over TCP is only used if the tables to be transferred are very large. The
security policy is made up of rules in the Firewall Rule Base. Other than the rules defined
by the administrator, The Check Point Security Gateway also creates Implied Rules, which
are defined in the Firewall Global Properties. The Check Point Security Gateway places the
implied rules first, last, or before last in the Firewall Rule Base. The administrator can
decide whether or not to log implied rules.
First > The Implicit rule will be placed before the explicit rules.
Last > The Implicit rule will be placed after the explicit rules.
Before Last > The Implicit rule will be placed before the last explicit rule.
Audit:
Verify Accept Accept Domain Name over TCP (Zone Transfer) under Global Properties is
not enabled.
SmartConsole > Gateways & Servers > select each Gateway > Firewall
Veiry Accept Accept Domain Name over TCP (Zone Transfer) is unchecked.
Remediation:
Go to the following path and Configured the Accept Accept Domain Name over TCP (Zone
Transfer).
SmartConsole > Gateways & Servers > select each Gateway > Firewall
Unchecked the Accept Accept Domain Name over TCP (Zone Transfer)
105 | P a g e
CIS Controls:
Version 7
11.3 Use Automated Tools to Verify Standard Device Configurations and Detect Changes
Compare all network device configuration against approved security configurations
defined for each network device in use and alert when any deviations are discovered.
106 | P a g e
3.16 Ensure Accept Domain Name over UDP (Queries) is not enabled
(Automated)
Profile Applicability:
Level 2
Description:
The 'Domain Name Over UDP (Queries)' is a global property setting which is used to allow
or reject all the UDP-type DNS packets to and from anywhere. These rules are considered
as rule zero which are execute before any user-defined rules.
Rationale:
If this rule is set to enable it allows the DNS traffic to pass over the firewall without any
control. The security policy is made up of rules in the Firewall Rule Base. Other than the
rules defined by the administrator, The Check Point Security Gateway also creates Implied
Rules, which are defined in the Firewall Global Properties. The Check Point Security
Gateway places the implied rules first, last, or before last in the Firewall Rule Base. The
administrator can decide whether or not to log implied rules.
First > The Implicit rule will be placed before the explicit rules.
Last > The Implicit rule will be placed after the explicit rules.
Before Last > The Implicit rule will be placed before the last explicit rule.
Audit:
Verify Accept Accept Domain Name over UDP (Queries) under Global Properties is not
enabled.
SmartConsole > Gateways & Servers > select each Gateway > Firewall
Verify Accept Accept Domain Name over UDP (Queries) is unchecked.
Remediation:
Go to the following path and Configured the Accept Accept Domain Name over UDP
(Queries).
SmartConsole > Gateways & Servers > select each Gateway > Firewall
Unchecked the Accept Accept Domain Name over UDP (Queries)
107 | P a g e
CIS Controls:
Version 7
11.3 Use Automated Tools to Verify Standard Device Configurations and Detect Changes
Compare all network device configuration against approved security configurations
defined for each network device in use and alert when any deviations are discovered.
108 | P a g e
3.17 Ensure Accept ICMP Requests is not enabled (Automated)
Profile Applicability:
Level 2
Description:
The 'Accept ICMP requests' is a global property setting which is used to allow the ICMP
requests from any location. ICMP is used to send control messages (for example, ping,
destination unreachable, source quench, route change) to other systems. These rules are
considered as rule zero which are executed before any user-defined rules.
Rationale:
If this rule is enabled, it allows the echo requests, timestamp requests, information
requests, and mask requests. This can be used by a malicious user to create a denial of
service condition by flooding the network with broadcast echo requests and revealing
mask request information. The security policy is made up of rules in the Firewall Rule Base.
Other than the rules defined by the administrator, The Check Point Security Gateway also
creates Implied Rules, which are defined in the Firewall Global Properties. The Check Point
Security Gateway places the implied rules first, last, or before last in the Firewall Rule Base.
The administrator can decide whether or not to log implied rules.
First > The Implicit rule will be placed before the explicit rules.
Last > The Implicit rule will be placed after the explicit rules.
Before Last > The Implicit rule will be placed before the last explicit rule.
Audit:
Verify Accept Accept ICMP Requests under Global Properties is not enabled.
SmartConsole > Gateways & Servers > select each Gateway > Firewall
Verify Accept Accept ICMP Requests is unchecked.
Remediation:
Go to the following path and Configured the Accept Accept ICMP Requests.
SmartConsole > Gateways & Servers > select each Gateway > Firewall
Unchecked the Accept Accept ICMP Requests
109 | P a g e
3.18 Ensure Allow bi-directional NAT is enabled (Automated)
Profile Applicability:
Level 2
Description:
Allow bi-directional NAT applies to automatic NAT rules in the NAT Rule Base and allows
two automatic NAT rules to match a connection. Without Bidirectional NAT, only one
automatic NAT rule can match a connection.
Rationale:
When NAT is defined for a network object, an automatic NAT rule is generated which
performs the required translation. If there are two such objects and one is the source of a
connection and the other the destination, then without Bidirectional NAT, only one of these
objects will be translated, because only one of the automatically generated NAT rules will
be applied, and so a connection between the two objects will only be allowed in one
direction. With Bidirectional NAT, both automatic NAT rules are applied, and both objects
will be translated, so connections between the two objects will be allowed in both
directions.
Audit:
SmartConsole > Gateways & Servers > select each Gateway > NAT - Network
Address Translation
Verify Allow bi-directional NAT is checked.
Remediation:
SmartConsole > Gateways & Servers > select each Gateway > NAT - Network
Address Translation
Unchecked the Allow bi-directional NAT
110 | P a g e
CIS Controls:
Version 7
11.3 Use Automated Tools to Verify Standard Device Configurations and Detect Changes
Compare all network device configuration against approved security configurations
defined for each network device in use and alert when any deviations are discovered.
111 | P a g e
3.19 Ensure Automatic ARP Configuration NAT is enabled (Automated)
Profile Applicability:
Level 2
Description:
Proxy ARP is a mechanism that allows the configuration of a Gateway to respond to ARP
requests on behalf of other hosts.
Rationale:
Automatic ARP configuration ensures that ARP requests for a translated (NATed) machine,
network or address range are answered by the Check Point Security Gateway. This option
removes the requirement for manual ARP configuration for automatic NAT rules (using the
arp command in Unix or the local.arp file in Windows).
The command fw ctl arp displays the ARP proxy table on Check Point Security Gateways
that run on Windows. On Unix, use the arp -a command.
Audit:
SmartConsole > Gateways & Servers > select each Gateway > NAT - Network
Address Translation
Verify Automatic ARP Configuration NAT is checked.
Remediation:
Go to the following path and Configured the Automatic ARP Configuration NAT.
SmartConsole > Gateways & Servers > select each Gateway > NAT - Network
Address Translation
Unchecked the Automatic ARP Configuration NAT
CIS Controls:
Version 7
11.3 Use Automated Tools to Verify Standard Device Configurations and Detect Changes
Compare all network device configuration against approved security configurations
defined for each network device in use and alert when any deviations are discovered.
112 | P a g e
3.20 Ensure Logging is enabled for Track Options of Global Properties
(Automated)
Profile Applicability:
Level 1
Description:
Rationale:
This enables the logging and alerting for specific types of parameters.
VPN successful key exchange: specifies the action to be taken when VPN keys are
successfully exchanged.
VPN packet handling errors: specifies the action to be taken when encryption or
decryption errors occur. A log entry contains the action performed (Drop or Reject) and a
short description of the error cause, for example, scheme or method mismatch.
VPN configuration & key exchange errors: specifies the action to be taken when logging
configuration or key exchange errors occur, for example, when attempting to establish
encrypted communication with a network object inside the same encryption domain.
IP Options drop: specifies the action to take when a packet with IP Options is encountered.
The Check Point Security Gateway always drops these packets, but you can log them or
issue an alert.
SLA violation: specifies the action to be taken when an SLA violation occurs, as defined in
the Virtual Links window.
Dynamic object resolution failure: specifies the action to be taken when a dynamic
object cannot be resolved.
Log every authenticated HTTP connection: specifies that a log entry should be generated
for every authenticated HTTP connection.
113 | P a g e
Audit:
Verify Logging is set to Log or Popup Alert or Mail Alert or SNMP Trap Alert for the
following events
SmartConsole > Global Properties > Log and Alert > Track Options
VPN successful key exchange
VPN packet handling errors
VPN configuration & key exchange errors
IP Options drop
Administrative Notification
Connection matched by SAM
Dynamic object resolution failure
Packet is incorrectly tagged
Packet tagging brute force attack
Remediation:
Logging is set to Log or Popup Alert or Mail Alert or SNMP Trap Alert for the following
events
SmartConsole > Global Properties > Log and Alert > Track Options
VPN successful key exchange
VPN packet handling errors
VPN configuration & key exchange errors
IP Options drop
Administrative Notification
Connection matched by SAM
Dynamic object resolution failure
Packet is incorrectly tagged
Packet tagging brute force attack
114 | P a g e
Appendix: Summary Table
Control Set
Correctly
Yes No
1 Password Policy
1.1 Ensure Minimum Password Length is set to 14 or higher
(Automated)
1.2 Ensure Disallow Palindromes is selected (Automated)
1.3 Ensure Password Complexity is set to 3 (Automated)
1.4 Ensure Check for Password Reuse is selected and History
Length is set to 12 or more (Automated)
1.5 Ensure Password Expiration is set to 90 days (Automated)
1.6 Ensure Warn users before password expiration is set to 7
days (Automated)
1.7 Ensure Lockout users after password expiration is set to 1
(Automated)
1.8 Ensure Deny access to unused accounts is selected
(Automated)
1.9 Ensure Days of non-use before lock-out is set to 30
(Automated)
1.10 Ensure Force users to change password at first login after
password was changed from Users page is selected
(Automated)
1.11 Ensure Deny access after failed login attempts is selected
(Automated)
1.12 Ensure Maximum number of failed attempts allowed is set
to 5 or fewer (Automated)
1.13 Ensure Allow access again after time is set to 300 or more
seconds (Automated)
2 Device Setup
2.1 General Settings
2.1.1 Ensure 'Login Banner' is set (Automated)
2.1.2 Ensure 'Message Of The Day (MOTD)' is set (Automated)
2.1.3 Ensure Core Dump is enabled (Automated)
2.1.4 Ensure Config-state is saved (Automated)
2.1.5 Ensure unused interfaces are disabled (Automated)
2.1.6 Ensure DNS server is configured (Automated)
2.1.7 Ensure IPv6 is disabled if not used (Automated)
2.1.8 Ensure Host Name is set (Automated)
2.1.9 Ensure Telnet is disabled (Automated)
2.1.10 Ensure DHCP is disabled (Automated)
115 | P a g e
2.2 SNMP
2.2.1 Ensure SNMP agent is disabled (Automated)
2.2.2 Ensure SNMP version is set to v3-Only (Automated)
2.2.3 Ensure SNMP traps is enabled (Automated)
2.2.4 Ensure SNMP traps receivers is set (Automated)
2.3 NTP
2.3.1 Ensure NTP is enabled and IP address is set for Primary and
Secondary NTP server (Automated)
2.3.2 Ensure timezone is properly configured (Automated)
2.4 Backup
2.4.1 Ensure 'System Backup' is set. (Automated)
2.4.2 Ensure 'Snapshot' is set (Automated)
2.4.3 Configuring Scheduled Backups (Manual)
2.5 Authentication Settings
2.5.1 Ensure CLI session timeout is set to less than or equal to 10
minutes (Automated)
2.5.2 Ensure Web session timeout is set to less than or equal to 10
minutes (Automated)
2.5.3 Ensure Client Authentication is secured. (Automated)
2.5.4 Ensure Radius or TACACS+ server is configured
(Automated)
2.5.5 Ensure allowed-client is set to those necessary for device
management (Automated)
2.6 Logging
2.6.1 Ensure mgmtauditlogs is set to on (Automated)
2.6.2 Ensure auditlog is set to permanent (Automated)
2.6.3 Ensure cplogs is set to on (Automated)
3 Firewall Secure Settings
3.1 Enable the Firewall Stealth Rule (Automated)
3.2 Configure a Default Drop/Cleanup Rule (Automated)
3.3 Use Checkpoint Sections and Titles (Manual)
3.4 Ensure Hit count is Enable for the rules (Automated)
3.5 Ensure no Allow Rule with Any in Destination filed present
in the Firewall Rules (Automated)
3.6 Ensure no Allow Rule with Any in Source filed present in the
Firewall Rules (Automated)
3.7 Ensure no Allow Rule with Any in Services filed present in
the Firewall Rules (Automated)
3.8 Logging should be enable for all Firewall Rules (Manual)
3.9 Review and Log Implied Rules (Automated)
3.10 Ensure Drop Out of State TCP Packets is enabled
(Automated)
116 | P a g e
3.11 Ensure Drop Out of State ICMP Packets is enabled
(Automated)
3.12 Ensure Anti-Spoofing is enabled and action is set to Prevent
for all Interfaces (Automated)
3.13 Ensure Disk Space Alert is set (Automated)
3.14 Ensure Accept RIP is not enabled (Automated)
3.15 Ensure Accept Domain Name over TCP (Zone Transfer) is
not enabled (Automated)
3.16 Ensure Accept Domain Name over UDP (Queries) is not
enabled (Automated)
3.17 Ensure Accept ICMP Requests is not enabled (Automated)
3.18 Ensure Allow bi-directional NAT is enabled (Automated)
3.19 Ensure Automatic ARP Configuration NAT is enabled
(Automated)
3.20 Ensure Logging is enabled for Track Options of Global
Properties (Automated)
117 | P a g e
Appendix: Change History
Date Version Changes for this version
118 | P a g e