Checkpoint Cloud
Checkpoint Cloud
Checkpoint Cloud
Misconfigurations
Exposed Vulnerabilities
Default permissions
Open-Source Code
©2022 Check Point Software Technologies Ltd. 3
DEPLOY SEPARATE TOOLS TO FIX ISSUES
Web, API, & Bot Attacks WAF, API SecGW & Bot Mitigation
Gartner
Platform, applications, identity and access management
Predictions:
Customer
Operating system, network & firewall configuration
Responsible for Through 2025, 99% of
cloud security failures will
security “IN” Client-side data be the customer’s fault
Server-side encryption
the cloud encryption and data
(file system and/or data)
Network traffic protection
Through 2025, 90% of the
integrity authentication
organizations that fail to
control public cloud use will
inappropriately share
Cloud Vendor Compute Storage Database Networking sensitive data.
Regions
https://informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/
July
2019
August
2020
• Hacker gained access to > 100 million Capital One customer records
• Ultimately fined US $80m + US $190m Customer Lawsuits + CEO makes public apology. Ouch!
Core Problem:
Misconfiguration & Lack of Visibility
[Internal Use] for Check Point employees ©2023 Check Point Software Technologies Ltd. 12
MORE CONTEXT
Prioritized
8 out of 108k risks
CloudGuard scans the entire cloud environment to identify security risks, and prioritizes those
risks based on the attack path and exposure impact to the business
Implement Suggested
Role Policy
CloudGuard automatically prevents threats in runtime and provide security teams with
actionable remediation guidance throughout your development pipeline
4 Prioritize risks across your cloud infrastructure Effective Risk Management Engine
1. More Context
CloudGuard looks across the entire cloud
environment to identify security risks, Vulnerability identified in store-front application code in development
understanding the attack path and exposure impact
to the business in order to apply actionable
security- in context
Unencrypted storage found, linked to an externally-facing, crown-jewel web-
server using default Admin Role policies with no WAF protection
Security Findings
Contextual Inputs Secrets found in GitHub repository that has been shared
Business Impact
Weak password configured on lab management console
Attack Path
2. Actionable Security
Instead of looking through a million findings. Spotlight the risks & threats, most critical
across cloud environments, workloads, and code
Secrets found in GitHub repository that has been shared 9.2 Secret in shared repository
Remediation
Urgency
Weak password configured on lab management console 7.1 Weak Passwords in Lab Admin Console
3. Smarter Prevention
Effective prevention with the fastest path to solve Misconfigured Workload:
security issue—blending runtime prevention, and Automatic Remediation: CloudGuard automatically turned-on encryption
intelligent remediation guidance across the entire on storage bucket using CloudBots
application lifecycle
Unauthorized Access:
Automatic Prevention: CloudGuard automatically blocked an attempt to
execute and unauthorized process on serverless functions
[Internal Use] for Check Point employees ©2023 Check Point Software Technologies Ltd. 26
THANK YOU
[Internal Use] for Check Point employees ©2023 Check Point Software Technologies Ltd. 27