e9f55c1b29 | ||
---|---|---|
.. | ||
CheckPointConnector | ||
CheckpointFunctionapp | ||
Data | ||
Logo | ||
Package | ||
Playbooks | ||
Workbooks | ||
images | ||
README.md | ||
SolutionMetadata.json | ||
deployCP.json | ||
deployCP.parameters.json | ||
deployCPgov.json |
README.md
Check Point Software Technologies Logic Apps Connector and Sentinel Playbook templates
Table of Contents
- Overview
- Deploy Connector and Playbook templates
- Deployment instructions
- Test the playbook
- Security Recommendations
Overview
The Check Point Logic App Connector and Playbooks allows you to automate security operations to all managed Check Point devices. The connector enables you to run Logic App playbooks that utilize Check Point Management API to automate most common security operations tasks.
For more information see:
Check Point Management API
Logic App Overview
Deploy Connector and Playbook templates
This package includes:
- Custom Connector which is based on Check Point Management API v1.6
- Playbook that will create IP objects and add objects to group
- FunctionApp Proxy
You can deploy Custom Connector, FunctionApp Proxy and Playbook all together or seperately from their specific folder.
Deployment instructions
-
Create an API key from Check Point management console
-
Launch the template
-
Fill in the template - Make sure you include the backslash of API extension /web_api/
-
Copy the API key from the function app
-
Paste function API key into the API management
-
Update LogicApp Sentinel Connection
-
Configure Sentinel Analytics Rule
Test the playbook
-
Dry run
-
Dry run result
Security Recommendations
Define Check Point Management User Profile
The following is the recommended Check Point user profile which will allow the Sentinel user to manage objects, policy and install security policy, all other access are turned off.
-
Create a new user profile
-
Access Control
-
Threat Prevention
-
Management
-
Disable all other settings
Access Control for Function Proxy
### Ingress to Function Proxy Only the Azure API Management is required to access the Proxy Function.
This deployment template is using Management API "Consumption" SKU, this is the lightweight and serverless version of API Management service, billed per execution and first 1M calls are free. However, this Management API SKU does not offer a static ip address, you will need to extract the IP address ranges of the entire region and apply it to the function rule.
For example, the following JSON fragment is what the allowlist for Western Europe might look like, Refer to Azure Region outbound IP ranges for your region.
{
"name": "AzureCloud.westeurope",
"id": "AzureCloud.westeurope",
"properties": {
"changeNumber": 9,
"region": "westeurope",
"platform": "Azure",
"systemService": "",
"addressPrefixes": [
"13.69.0.0/17",
"13.73.128.0/18",
... Some IP addresses not shown here
"213.199.180.192/27",
"213.199.183.0/24"
]
}
}
Once you have the IP address ranges, you can define the IP address under Access Restrictions
# Setting the SCM to be same as function
az functionapp config access-restriction set --use-same-restrictions-for-scm-site true -g ResourceGroup -n AppName
# Repeat the following per subnet
az functionapp config access-restriction add -g ResourceGroup -n AppName --action Allow --ip-address 13.64.0.0/16 --priority 200
Example:
az functionapp config access-restriction set --use-same-restrictions-for-scm-site true -g guoapr2311130-rg -n guoapr2311130-proxy-mrbz7
az functionapp config access-restriction add -g guoapr2311130-rg -n guoapr2311130-proxy-mrbz7 --action Allow --ip-address 13.64.0.0/16 --priority 200
az functionapp config access-restriction add -g guoapr2311130-rg -n guoapr2311130-proxy-mrbz7 --action Allow --ip-address 13.73.32.0/19 --priority 200
....
Function Access Restrictions from Azure portal:
Note: If your subscription is already using API management other than "Consumption" SKU then you can extract the IP address as per api-management-howto-ip-addresses
Egress from Function Proxy
The function proxy will connect to Check Point Management Station
How to get Function IP outbound IP address
To find the available outbound IP addresses is by using the Cloud Shell:
az webapp show --resource-group <group_name> --name <app_name> --query outboundIpAddresses --output tsv
az webapp show --resource-group <group_name> --name <app_name> --query possibleOutboundIpAddresses --output tsv
- Modify nesseary Firewall rules to allow the IP ranges from above
- Apply IP ranges as Check Point Mangement GUI clients, how to define GUI Clients
Rotate API Keys
Rotate the following API Keys every 90 days
* Check Point API Key
* Mgmt API Key
* Function Proxy Key