Checkpoint Sase Architecture Reference Guide
Checkpoint Sase Architecture Reference Guide
[Type here]
Release 31-11.2020
CLOUD TRANSFORMATION - INTRODUCTION TO SASE 2
ABSTRACT
As resources and applications shift to the cloud, on-premise data centers are no
longer the core of the network, users are no longer found only in corporate offices,
and remote working becomes widely accepted with COVID-19 moving the world
into a new paradigm.
To meet these needs and more, enterprises are seeking advice on how to re-
architect their infrastructure.
This document provides a basic understanding of SASE architecture, explains
how it solves different needs of evolving organizations, and best practices for
deployment.
AUDIENCE
This document is written for technical readers, IT security architects, and network
specialists who are venturing out into cloud territory.
Readers should be familiar with basic concepts of virtualization, networks, and
have a strong understanding of security design.
CLOUD TRANSFORMATION - INTRODUCTION TO SASE 3
TABLE OF CONTENTS
INTRODUCTION TO SASE ........................................................................................................4
SASE Main Components ....................................................................................................................... 4
CHECK POINT SASE SOLUTION ..............................................................................................6
SASE ARCHITECTURE REFERENCE .......................................................................................8
Alignment with the Zero Trust Model ................................................................................................... 11
CHECK POINT SASE COMPONENTS.....................................................................................12
CloudGuard Connect / Edge ................................................................................................................ 13
Remote Access for Corporate Applications ......................................................................................... 16
Data Loss Prevention (DLP) ................................................................................................................ 23
CloudGuard SaaS security................................................................................................................... 23
MANAGEMENT AND REPORTING ..........................................................................................26
CloudGuard SaaS Management .......................................................................................................... 26
CloudGuard Connect Management ..................................................................................................... 27
CONCLUSION ..........................................................................................................................29
CLOUD TRANSFORMATION - INTRODUCTION TO SASE 4
INTRODUCTION TO SASE
• IoT Security: SASE enables IoT devices to break out to the internet directly in a secure way.
Network
• SD-WAN: Optimizing access to the Internet and Data Centers by allowing branch offices and users
to break out to the internet directly and securely, significantly improving the user experience.
• Elements like routing, dynamic path selection, NaaS, and latency optimization are all essential
networking features of SD-WAN, laying the foundations on which security is built.
Business Reducing the With network security as a service, maintenance and upgrades are
Drivers operational burden included in the monthly cost. Upgrading multiple physical gateways
and cost is time-consuming and leaves security inconsistent and lagging;
converting to an FWaaS architecture and managing the entire
infrastructure from a single pane of glass saves time, resources,
and training as well as reduced cost.
Reducing the Wide Area Network costs by retiring expensive MPLS
circuits in favor of broadband internet links is a second important
driver.
Ubiquitous access to During the Covid-19, many enterprises allowed their workforce to
corporate resources work from home.
Many were pleasantly pandemic surprised to see that employee
productivity went up. In a post-pandemic world, this new way of
working will become the norm, and employees must be able to
access any corporate resource securely and efficiently. When
productivity goes up, business figures usually follow suit.
Security and Internet access SD-WAN Dynamic link selection ensures the best path is always
User optimization automatically chosen if multiple access circuits are present.
Experience
Drivers
Improving security and Increasing security to a level that can deal with Gen VI attacks,
reducing threats even with old EOL perimeter equipment.
Cloud adoption As enterprises rapidly move their data centers to the cloud,
backhauling traffic to the hub site may not be the best option in
terms of cost and/or latency for roaming users or for users in
branch offices requiring access to (corporate) resources in the
cloud. For instance, streaming audio or video is much more
efficient in terms of WAN bandwidth consumption with a local
breakout.
Zero Trust Network The same level of security should always be enforced, regardless
Access of the location of the user. Whether they are in the office or
roaming, a SASE architecture will constantly ensure complete
session protection.
CLOUD TRANSFORMATION - INTRODUCTION TO SASE 6
The network part serves as a transport layer for users and devices connecting to resources and applications
on the corporate network and the internet.
Check Point has tight integration with most popular SD-WAN providers, establishing a best-of-breed SASE
solution that provides efficient connectivity and comprehensive security capabilities.
The security part is a unified solution based on Check Point CloudGuard products, the adjacency of those
provides Check Point’s SASE solution. All services are managed using Web UI Management, providing a
single pane of glass for the Administrator.
The Check Point SASE solution places security as a service in the cloud in a distributed fashion instead of
enforcing it the legacy way on gateways, on-premise Data Centers, and branches. Access to corporate
resources is possible directly without detours, and securely, for everyone.
The service runs on top of the Amazon AWS and Azure infrastructure to ensure maximal availability and the
best possible response times when accessing cloud resources.
This cloud-based solution does not burden IT staff with deploying or maintaining dedicated hardware and
supports adding advanced threat prevention capabilities on top of existing routers or SD-WAN deployments.
With a simple and easy setup process, network traffic from existing SD-WAN edge devices are tunneled to a
primary cloud-based network security service at a nearby location. A second connection provides redundancy.
This ensures branch offices stay connected and removes the operational overhead of deploying and
maintaining security for hundreds and thousands of physical devices, reducing overall CAPEX and OPEX
costs.
The SASE infrastructure is deployed in the cloud, fully managed by Check Point. The SASE functionalities in
the cloud include the most sophisticated Next Generation Threat Prevention and zero-day protection
mechanisms, ensuring the best possible protection against Gen V attacks, such as Application Control and
URL Filtering, Anti-Bit / Anti-Virus, IPS, Threat Emulation, and Extraction along with SSL inspection capabilities
and Remote Access VPN technologies.
All features of the service can be managed using a single pane of glass; either by Management as a Service
(MaaS) leveraging the Infinity Web Portal or existing R80 Smart Center management system deployed on-
premises.
CLOUD TRANSFORMATION - INTRODUCTION TO SASE 8
Note: some features and capabilities shown above, are part of Check Point short-term roadmap and will become available
during the 2nd half of 2020, e.g.: remote access to an on-prem data center via the SASE cloud service, for users or branches;
branch-to-branch communication; the use of external Identity Providers as a Service.
An additional advantage is that a local sensor in the branch office can be used to send the data it collects about
IoT devices to a cloud-based 3rd party discovery engine (1), which in turn feeds this information to the Check
Point cloud-based IoT controller (2). This Management-as-a-Service (MaaS) platform uses that data to
automatically generate objects and policies based on the behavior and communication patterns of the IoT
devices and feed them to the Infinity Management portal (3). After review by the security admin, the suggested
policies can be enforced in the SASE cloud (4) or on on-premise gateways.
CLOUD TRANSFORMATION - INTRODUCTION TO SASE 11
• Secure Web Gateway – Check Point’s cloud SWG is designed to protect your organization from
known and unknown threats. It offers protection for users accessing the internet and SaaS
applications in the office or remotely, and includes functionality of FWaaS.
Security includes URL Filtering, application control, IPS, phishing, and malicious download
prevention using SandBlast technology to prevent zero-day attacks, and DLP.
• Network Security as a Service – Cloud-hosted network threat prevention service, on top of existing
SD-WAN deployments. The solution delivers the latest and most comprehensive cyber security
available, protecting branch offices from the latest generation of targeted and advanced cyber
threats.
• Secure Access to corporate resources – provide safe access to remote employees to corporate
resources, providing the same level of security as in the office.
Corporate resources are protected by zero-trust access based on user identity, endpoint security
posture, and session risk. Access is granted based on the Zero Trust policy as well as behavioral
models for users and applications. Corporate resources are protected in the data center or the
private and public cloud.
Corporate applications are also protected with advanced IPS and WAAP.
• Anti-Bot and Anti-Virus - Protects against malicious files, malware-infested websites, and more. The
analysis uses real-time virus signatures and anomaly-based protections. Identifies and contains
infections by blocking Command and Control traffic between infected hosts and a remote operator.
• DNS Security – Check Point’s solution prevents access to malicious domains, at the access
level. DNS Security prevents DNS exploits and tunneling, over HTTP or HTTP integrated
with Threat Cloud, solution provides malicious domain blocking, for newly-registered
domains related to active threat campaigns, as well as prevention against zero-phishing.
CloudGuard Connect is a native cloud service that requires no dedicated security hardware on-premise.
It can also be used as an FWaaS solution for roaming users and also allow them to access resources in an
on-prem Data center.
CloudGuard Edge is a Check Point VNF running on 3rd party SD-WAN hardware. Both solutions allow branch
offices to break out to the internet without the need to backhaul the traffic back over the WAN to the hub site
where the internet egress point would traditionally reside.
4. CloudGuard Connect can also be used to provide roaming users with secure internet access without
having to deploy a fat agent on their machines; a lightweight client will provide secure access to all
resources, or even clientless for non-managed devices.
The CloudGuard Connect security as a service solution offers the following advantages:
• Autoscaling
• No operational hassle: no need to worry about upgrades and provisioning of hardware
• Cost reduction: the WAN costs will decrease as traditional expensive MPLS circuits are replaced
by VPN over cheap broadband connections
• Better user experience for internet-bound traffic (i.e. SaaS) by eliminating additional latency
caused by backhauling via the hub site
Specifications:
Check Point’s CloudGuard Connect is a cloud-hosted network threat prevention service offering a
maintenance-free, comprehensive, affordable security solution for branch offices and roaming users.
CloudGuard Connect seamlessly delivers the latest and most comprehensive cybersecurity available,
protecting branch offices from the latest generation of targeted and advanced cyber threats.
CloudGuard Connect doesn’t burden IT staff with deploying or maintaining dedicated hardware and supports
adding advanced threat prevention capabilities on top of existing routers or SD-WAN deployments. With a
simple and easy setup process, network traffic from existing SD-WAN edge devices is tunneled to a primary
cloud-based network security service at a nearby location. A second connection provides redundancy, ensuring
branch offices stay connected and removing the operational overhead of deploying and maintaining security
for hundreds and thousands of physical devices, reducing overall CAPEX and OPEX costs.
CLOUD TRANSFORMATION - INTRODUCTION TO SASE 15
Cloud Services
Branch-to-Site connection IPsec IKEv1, IPsec IKEv2 or GRE tunnels
Software
Latency Up to 50 milliseconds1
Performance
Single IPsec tunnel Up to 1 Gbps per tunnel
(1) The expected additional latency for a branch in the same CloudGuard Connect region
Specifications:
CloudGuard Edge is a lightweight virtual image of the Check Point Branch Office Security Gateway. Within a
minute of powering on the virtual security gateway, your branch office is protected.
CloudGuard Edge security gateways are deployed through the SD-WAN management console. This tight
integration reduces deployment time, effort, and costs. When CloudGuard Edge is deployed on SD-WAN or
uCPE equipment, the CloudGuard Edge virtual security gateway is configured, automatically connected, and
ready to be centrally managed and monitored by the customer’s domain in cloud-hosted SMP or the
headquarters’ R80 Security Management.
Software
Security • Firewall, VPN, User Awareness, QoS, Application Control, URL Filtering, IPS,
Anti-Bot,
• Antivirus and SandBlast Threat Emulation (sandboxing)
Performance
VMware SD-
Edge 520v Edge 620 Edge 640 Edge 680 Edge 840
WAN
Threat
100 Mbps 100 Mbps 350 Mbps 500 Mbps 550 Mbps
Prevention
CLOUD TRANSFORMATION - INTRODUCTION TO SASE 16
- Secure access using advanced threat prevention mechanisms and data protection engines
Corporate Access can be deployed in a clientless mode for unmanaged devices, with a lightweight VPN agent
for managed devices, or with a browser extension.
The blue lines in the diagram above mark the functionalities covered by Odo, as explained in the Clientless
Remote Access below.
CLOUD TRANSFORMATION - INTRODUCTION TO SASE 18
Odo’s solution is delivered as a cloud service, making it very easy for customers to deploy.
The technology addresses the following key use cases:
• VPN replacement:
Provide zero-trust remote access to corporate applications that are delivered as a cloud service, and
are easy to deploy and manage.
• BYOD and third-party access:
Secure clientless access for unmanaged devices: employees with BYOD, contractors, etc.
• DevOps access:
Addresses the need of DevOps and development teams to access cloud environments securely and
easily from any device and at any scale.
CLOUD TRANSFORMATION - INTRODUCTION TO SASE 19
Features include:
o Automated discovery of cloud resource
o Dynamic access policy automatically provides granular access based on asset tags
o Cloud-based Privilege Access Management (PAM), with built-in key management and single-
sign-on services
The architecture Odo developed is based on Zero Trust Network Access (ZTNA) and Software Defined
Perimeter (SDP) principles. This means the solution is inherently secure through:
Architecture components:
1. Controller
The controller is the entity authorization end-point. It specifies who has access to what resources through a
simple policy framework that factors in contextual data such as user attributes and device state. Policies can
be tuned for each team or individual for more granular access management.
2. Gateway
A network tunneling gateway. Every user request flows through the gateway for consistent authentication and
authorization, as well as providing a unified monitoring and logging point. This component makes sure validated
users see only the applications they have permission to see, while the rest of the resources are not only
inaccessible, they are completely invisible.
3. Connector
The only network leg in the internal site. This component is a docker image and connects to the gateway
through a reversed tunnel and effectively makes the organizational DMZ redundant by being the only access
point to the site.
4. Clients
Lightweight Client
The lightweight agent routes all traffic to the closest CloudGuard Connect instance where all necessary security
controls are enforced before the user is allowed to access any corporate resource or the internet, as with
branch offices.
This means the endpoint, as well as the data and application, is protected but requires an agent to be installed.
It ensures the same level of security for the users, regardless of their location. At the same time, the client also
allows for a bypass path for specific types of traffic to break out to the internet directly, such as streaming
services, thus avoiding a detour via the SASE cloud.
The lightweight Agent also adds an additional layer of DNS security to the ZTNA functionality.
DNS security reroutes corporate DNS queries to Check Point, allowing the following:
• Malicious domain prevention using Check Point's ThreatCloud
• DNS exploit prevention
• DNS tunneling prevention
• Prevention of infected hosts from communicating back to their command & control servers
• Check Point’s ThreatCloud proactively discovers and prevents access to newly-registered
domains related to active threat campaigns and exploit kits
• Access control policy for domains using your own definitions as well as with 115 predefined
categories by Check Point
• Zero phishing by defining domains of interest to prevent access to lookalike domains
CLOUD TRANSFORMATION - INTRODUCTION TO SASE 22
Browser extension
It is also possible to use the SandBlast browser extension, preventing the download of malicious files, without
the need for an agent to be installed. The functionality of the browser extension includes
• Threat Emulation:
Detect malicious behavior by running files within a secure virtual environment.
• Threat Extraction:
Obtain immediate and safe access to documents by removing potentially malicious elements or
converting the downloaded file to PDF. Users can download the original file once Threat Emulation
completes.
• Phishing protection:
Zero Phishing is an innovative Anti-Phishing product, protecting corporate users and administrators
from Zero-day phishing sites and Password/identity theft
CLOUD TRANSFORMATION - INTRODUCTION TO SASE 23
Email Security
Many organizations have moved or are in the process of moving towards cloud-based email services such as
Office 365 or G-Suite, for obvious reasons. However, when doing so, it is important to re-evaluate the email
security, as attack vectors shift.
CloudGuard SaaS is a cutting-edge email and office-suite security solution that is trained to catch what other
solutions miss. CloudGuard SaaS deploys in minutes and provides organizations with a simple management
platform and an invisible architecture that will not expose you to cybercriminals.
CLOUD TRANSFORMATION - INTRODUCTION TO SASE 24
The following graphic outlines the key components and their relationships:
This graphic shows how the CloudGuard SaaS integrates with the cloud and device ID services
Another option is to manage the SD-WAN policy using an >R80.20 management station.
This method is supported by both CloudGuard Edge and CloudGuard Connect.
As CloudGuard Edge VNF is a gateway SMB image, it can be managed by the local web, SMP cloud web
management, or by SmartConsole of any version that supports Check Point’s Large-Scale Management
(LSM), which is essentially any version except for R80.10.
As can be seen at the bottom of the screenshot, HTTPS inspection can be bypassed for traffic originating from
specific sources at the branch office.
Examples of a weekly threat report and logs:
CONCLUSION
SASE allows organizations to easily migrate from expensive on-premise, bare-metal-based networks to an
OPEX-based and cloud-centric security architecture that is far more agile, cost-effective, and secure.
Check Point believes that SASE technology will gradually become more widely used and accepted and that
eventually, most on-premise appliance-based security controls will be replaced with cloud-based alternatives.
SASE helps support SD-WAN technology, secure access to SaaS applications, and protect roaming users -
while meeting the specific needs of each business and their unique infrastructure. All products discussed in
this paper are part of the Check Point Infinity architecture and can be managed from a single pane of glass;
the Infinity portal.
CONTACT US
Worldwide Headquarters | 5 Shlomo Kaplan Street, Tel Aviv 67897, Israel | Tel: 972-3-753-4555 | Fax: 972-3-624-1100 | Email: info@checkpoint.com
U.S. Headquarters | 959 Skyway Road, Suite 300, San Carlos, CA 94070 | Tel: 800-429-4391; 650-628-2117 | Fax: 650-654-4233 | www.checkpoint.com