Checkpoint Enterprise Security Framework Whitepaper v2
Checkpoint Enterprise Security Framework Whitepaper v2
March 2023
Status: Published
Date Status Author Comments
30/01/2023 Release JP Edwards Version 7.1
Related Documentation
Section Title
CESF https://www.checkpoint.com/support-services/security-workshop/
What's New
Academic work, including cyber security frameworks, evolve the more they are tested in the real world. The CESF
process is no different. Since its conception, the original framework has been continuously tested in live
1
https://www.checkpoint.com/downloads/products/checkpoint-enterprise-security-framework-whitepaper.pdf1.
Below is a high-level list of the significant new components and their focus. We’ve worked hard to ensure that
CESFv2 reflects the need within organizations to work in a cross-functional manner whereby multiple teams are
stakeholders in the overall security posture, which is why each feature maps to a relevant audience.
We hope that through this paper, the audience will understand how and why to apply the CESFv2 process and how
the framework can support improvements and change.
Key Drivers
We’re proud to present the following new feature benefits:
• Improved communication: The language of risk is universally understood inside and outside of cyber
security; using this commonality enhances our communication with C-suite and governance teams. In our
experience, risk-based conversations reach a wider audience than those focused only on technology.
• Business-focused approach: Building a successful cyber security strategy today starts with a firm
understanding of the business impact and cyber security risk before technology. CESFv2 focuses on
understanding these core business concerns better so that decision-makers can make more informed and
effective technology/product choices.
• Strategic engagement plan: Good planning improves outcomes, which is why we’ve integrated the
concept of SABSA layers into our CESFv2 process and aligned these with different stakeholders. We’ll
explore this alignment in detail through this paper; however, for now, we invite the reader to
acknowledge the alignment and recognize its influence on our cross-functional methodology in which
each organizational role is represented.
Why
View SABSA Layer What (assets) How (process) Who (roles)
(motivation)
Informational Security
Engineer Logical Security Policies Security Design
Assets Experts
Security Operations
Operations Management Security Assets Security Posture
Operations and Analysts
• Assessment and RISK focus: CESFv2 makes significant use of public control libraries such as NIST and CIS
alongside industry-established cyber risk assessment practices. When combined with a solid
2
https://sabsa.org/sabsa-executive-summary/
• Cross-functional capability: Cyber security is a shared responsibility in any organization. The lines
between those who are accountable, responsible, consulted and informed on cyber security decisions is
often complex, which is why CESFv2 is designed so that different teams can interact with the overarching
process in the most appropriate format. The example below shows how roles and responsibilities are
aligned to various stages in the CESFv2 process.
Audience
Assessors and
GRC and C-suite Architects Operational
Auditors
GRC teams and those Enterprise, solution, Ops and incident Teams looking to
leadership functions and technical teams developing perform control-
that are looking to architecture teams workflow and based assessments
use the CESFv2 to looking to follow a processes for based on known
help develop SABSA-based process changes and libraries such as NIST
Governance models. for security incident handling. or CISv8.
architecture.
Low-Level Design
Builder Deliver Implementati
and Configuration
on Engineers Professional Services
Security
Incident Response and Services
Operations Account Management
Operations Manage Security Services and SOC
Teams
We would also like to draw attention to the general chronology of engagements to highlight that the workshops’
primarily focus on data gathering instead of presenting solutions. Doing so allows for the correct level of detail to
be collected and for analysis to be done post-workshop.
While CESFv2 defines the methodology and principles used to help achieve certain cyber security goals, we also
maintain that the process can effectively link leadership, architectural, and engineering teams in a common
understanding of the “as-is” and “to-be.” cyber security architecture In other words, using the features contained
in the CESFv2 framework, architects, consultants, and advisors are better able to "glue" customer and business
requirements to technology choices and thereby improve the efficiency and effectiveness of the cyber security
program.
In creating CESFv2, we wanted to increase the overall value that could be derived from following our process and
therefore explored how different presentations and visualizations could complement the outcome. Since we’re
confident the new process will deliver better data inputs and outputs, we wanted to explore new ways to present
the data.
Some of these new visualizations are described here:
Cyber Security SWOT
analysis: We borrowed the
SWOT (strengths,
weaknesses, opportunities,
and threats) analysis
format and applied it to
our work in cyber security.
This visualization presents
the internal and external
issues identified as part of
the assessment alongside
our recommendations in a
single view. It’s a powerful
single-page view we often
use as part of an executive
summary.
Fig: Example radar graph showing GAP analysis and priority weighting
CISO dashboards: How data is presented is very important when communicating across various teams within a
specific organization. We’ve therefore defined several presentations explicitly designed for different audiences.
The table below shows how we construct these views. It’s an example of a C-level Zero Trust dashboard showing
the overall maturity score and various data representations.
CESFv2 Layers
Even though our new framework evolved from the previous versions, the basic premise has not changed. There is
still a need for a defined and repeatable process that is easy to follow and guides us to deliver accountable and
traceable security architecture.
Introduction to Layers
The most significant change has been to append our previous version of CESF with new layers, which we did in
order to increase the effectiveness of the process by allowing the sub-process to be included. We call this sub-
Description Detail
Outer Ring, Refers to the core architectural process for which CESF was originally intended. The
Primary process starts with the ASSESS phase.
Function, Core
Inner Ring, This ring refers to a contextual process, or function, that exists in support of the
Contextual primary, or outer, process. The aim is for the addition of the context to support the
Layer, Support overall process by allowing various sub-processes to be included.
Function For example, "Plan" (as seen in the inner ring of the complete CESFv2 graphic) provides
context when dealing with assessment planning i.e. it is the first phase in the process of
starting an assessment.
The introduction of these additional layers has been driven by our knowledge that cyber security is an increasingly
cross-functional activity. Therefore, by engaging with multiple different teams throughout the process, the quality
of advice and recommendations significantly increases.
In the following section, we explore the components of each layer and describe how they were designed to work
and how they could be further adapted to suit bespoke requirements.
• Delivery: In this step, the system is physically built or deployed. It includes all operational testing,
documentation, and acceptance into the final environment.
• Manage: A vital component of any design is to have the lifecycle of the service understood and managed.
This is critical when defining the budget, and, also for making sure the solution performs its role as
required.
Contextual Layers
CESFv2 introduces the concept of "contextual layers" into the framework. This concept allows the framework to
appeal to various user groups and increases its scope and effectiveness. Depending on what you are looking to
achieve, you can use the framework in a different manner.
In some cases, the contextual layers are used independently from the core layers, such as in the table below:
Now that we’ve established how the various layers are used, we will explore their function in more detail.
• Enterprise Security Architecture (ESA): This team bridges business and technology. They function as a
liaison between the C-suite and technology teams and are responsible for delivering justified solutions
and services.
• Technical Architecture (TA): The TA delivers implementable design documents with a clearly defined
technology specification, including sizing and configuration. They have a strong understanding of
products, their roles, and their limitations.
• Ops: The role of this team is critical to the continued success of the architecture throughout its life cycle,
as all systems require an operational element. In this phase, the expectation is that processes are defined
and implemented alongside a collection of metrics and data to demonstrate the system's effectiveness.
• Plan: Our consultants plan assessments with GRC and other cyber risk professionals with support from
the client’s leadership. The assessments are designed to address cyber security gaps, map these to a risk
score and present the findings in risk language understood by a C-level and executive audience. Our
most common assessments are based on NIST CSF or CISv8.
3
https://www.gartner.com/en/information-technology/glossary/solution-architecture
Now that we have completed an overview of the various layers and the reader has an appreciation of their
function, we can explore the contextual layers in more detail. These layers represent the most significate new
component of CESFv2, which are the use of a formalized assessment process and the use of cross-functional teams
within architecture.
Each framework brings a different value depending on the domain under assessment. For example, SOC-CMM is
typically used to assess Secure Operations Centre capability. In contrast, NIST CSF will highlight gaps in overall
cyber security capability.
The example below is a 5x5 risk matrix produced as part of our RISK assessments. Based on the likelihood and
impact calculation above, it acts as an effective tool to communicate those risks that we consider to be outside of
acceptable thresholds and, therefore, pose a real risk to the business, both operationally and financially.
Once the appropriate assessment frameworks have been selected, there is an assessment design phase that allows
the frameworks (more specifically, the controls within the framework) to be edited to make them more relevant to
the audience. For example, if the scope were to assess and recommend a cloud architecture, then it would be
reasonable to use a section of controls from NIST CSF v1.1 such as:
"Control: PR.DS-5: Protections against data leaks are implemented."
This control could then be re-formatted in a manner that is more relevant to our advance, for example:
"CESF Control: Is the environment designed to restrict each container's access to shared resources so that
information cannot inadvertently be leaked from one container to another?"
The second control would then be placed alongside similar controls and presented as a questionnaire.
Another example would be where the assessment scope includes perimeter security, for which the assessment
designer can select controls such as this one from NIST 800-53:
"SC-7: Boundary Protection: Monitor and control communications at the external managed interfaces to the
system and key internal managed interfaces within the system."
Once the process of building a bespoke and targeted assessment is completed, the controls are published as a
questionnaire or hosted with our Cyber Security Assessment platform.
Fig: Extract taken from Check Point CISA Zero Trust Maturity Assessment
We have chosen not to delve into the assessment workings within this paper other than to highlight the following;
Zero Trust means different things to different audiences. Some organizations will focus on specific Zero Trust
principles above others; for example, a software application organization would most likely see Zero Trust in the
context of application security. This organization-specific focus should be reflected in the "weighting" we give to
the maturity score – it doesn't make sense to downgrade a maturity score if the control is irrelevant. We,
therefore, added a weighting capability to our assessment. While we’ll be able to fully explore the Zero Trust
maturity assessment in another paper, the weighting calculation we use is based on the table below:
4
https://pages.checkpoint.com/the-ultimate-guide-to-zero-trust.html
5
https://www.cisecurity.org/insights/blog/prioritizing-a-zero-trust-journey-using-cis-controls-v8
The architect scores each control in the table, and the data is used to complete the GAP analysis of the assessment
type executed. This data visualization is core to effectively communicating where effort and spending is required.
When each function is supportive and complimentary of the others, it means there is no architectural hierarchy
but rather a symbiotic interaction of different disciplines. When done correctly, each step in the process will be
represented by the most appropriate stakeholder and their counterpart within the architecture team (assuming all
three architectural functions are represented):
By leveraging multiple different architectural disciplines, we can better support the development of quality
architectural patterns and plans. Two critical deliverables from any architectural engagement should be a cyber
security roadmap that defines the logical steps required to achieve the desired goal and a conceptual/HLD diagram
that logically positions the security components into the broader ecosystem.
Network Diagrams
As discussed, a core deliverable of CESFv2 is to arrive at an actionable set of recommendations. More often than
not, this is done through the production of conceptual architecture diagrams such as the example shown below.
Fig: Network topology produced as part of the CESFv2 process and workshop
Once completed, our framework will help conceptualize the link between security strategy, architecture, and
functional security controls, and streamline communication from the boardroom to security engineers through a
commonly understood framework.
Framework Design
In order to proceed, we first acknowledge that the original CESFv2 process needs to be re-formatted because a
governance framework is not a process. We call this new format the "framework mode" so that there is a clear
distinction between the CESFv2 process and the CESFv2 framework. It’s important to note that the following
framework is only one interpretation based on our use case. If required, the framework can be mapped to other,
more suitable functions.
Moving into the framework mode requires a restructuring of the CESFv2 layout and a redefinition of the process.
The mapping is shown below:
6
https://www.ncsc.gov.uk/collection/cloud/the-cloud-security-principles/principle-4-governance-framework
Once the concept of roles and layers is translated into the framework mode, we can apply our governance
terminology and language to the new pillars, or, "anticipate, prevent, detect, respond". The critical design point is
to define the roles of each pillar clearly, and they must document the goals of the governance model. In simple
terms, an effective governance model clearly articulates the organization's goals, the key personnel and their
responsibilities, and the tools they will use to achieve the strategic objectives.
A representation is shown below and should be used as a template for the following section, which involves
populating the framework, starting with the "Anticipate" phase.
This paper is written for the community, and we hope that it is of use for the betterment of security architecture in
general. For more information, please see https://www.checkpoint.com/support-services/security-consulting/.