<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Fede's Nexus: Mixing Business, SecOps & MSSPs]]></title><description><![CDATA[Cybersecurity manager with a focus on SecOps in MSSPs. Strong affinity for product, marketing, sales, and business dynamics. Expect some personal thoughts from time to time.]]></description><link>https://www.fedemeiners.com</link><image><url>https://substackcdn.com/image/fetch/$s_!wepa!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F55863760-e8c8-432f-8045-268c45716b84_800x800.png</url><title>Fede&apos;s Nexus: Mixing Business, SecOps &amp; MSSPs</title><link>https://www.fedemeiners.com</link></image><generator>Substack</generator><lastBuildDate>Fri, 17 Apr 2026 05:26:58 GMT</lastBuildDate><atom:link href="https://www.fedemeiners.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Federico Meiners]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[fedemeiners@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[fedemeiners@substack.com]]></itunes:email><itunes:name><![CDATA[Fede Meiners]]></itunes:name></itunes:owner><itunes:author><![CDATA[Fede Meiners]]></itunes:author><googleplay:owner><![CDATA[fedemeiners@substack.com]]></googleplay:owner><googleplay:email><![CDATA[fedemeiners@substack.com]]></googleplay:email><googleplay:author><![CDATA[Fede Meiners]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Why SecOps Automation and SOAR Initiatives Fail]]></title><description><![CDATA[Five lessons on security automation risks that will save you energy, time, and money.]]></description><link>https://www.fedemeiners.com/p/why-secops-automation-and-soar-initiatives-fail</link><guid isPermaLink="false">https://www.fedemeiners.com/p/why-secops-automation-and-soar-initiatives-fail</guid><dc:creator><![CDATA[Fede Meiners]]></dc:creator><pubDate>Sat, 03 Aug 2024 21:40:31 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/5af3297d-5615-42ea-83ee-d1af441e9a2b_1232x768.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>3 out of 4 organizations I encounter waste their investments in security automation.</p><p>After two years of automating our SOC, we decreased the alerts requiring human interaction by 40% and the time spent on alerts by 70%.</p><p>I will analyze 5 pitfalls we experienced internally or with customers to help you maximize your investments.</p><p><strong>1. Not using other products at their fullest first</strong></p><p><strong>2. Starting with SecOps automation for the wrong reasons or assumptions</strong></p><p><strong>3. Not having the right people or focus</strong></p><p><strong>4. Focusing on containment orchestrations too soon</strong></p><p><strong>5. Not knowing how to measure success</strong></p><div><hr></div><p><em>Over the past 8 years, I&#8217;ve helped cybersecurity service companies boost their revenue and profits while enhancing security for 60+ organizations worldwide.</em></p><p><em>I share business strategy insights on SecOps and cybersecurity that will take your company to new heights. Subscribe for free to get my latest ideas first!</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.fedemeiners.com/subscribe?utm_source=menu&amp;simple=true&amp;next=https%3A%2F%2Fwww.fedemeiners.com%2F&quot;,&quot;text&quot;:&quot;Sign me up!&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.fedemeiners.com/subscribe?utm_source=menu&amp;simple=true&amp;next=https%3A%2F%2Fwww.fedemeiners.com%2F"><span>Sign me up!</span></a></p><div><hr></div><h3>My Automation Journey</h3><p>I work for a company that offers 24x7 SOC as a Service and Incident Response.</p><p>When talking about security automation, it&#8217;s impossible not to mention SOAR. Whether open source or proprietary, both involve significant efforts and challenges.</p><p>In 2022, we decided to add a SOAR to our stack. We had automations based on Python and containers. Maintaining them was becoming complicated.</p><p>We were handling around 600-800 alerts per month from different customers. None of our analysts experienced 'alert fatigue' or burnout. Still, we felt there was room for improvement in our processes.</p><p>We had two foundational needs that aimed to move the company to the next level:</p><ul><li><p><strong>Skyrocket efficiency:</strong> We were transitioning our customers to a fixed-price model for our SOC service. Costs can spiral out of control when managing alerts and incidents in a 24x7 operation. We needed a new way of working and a stack to support it.</p></li><li><p><strong>Increase technical flexibility: </strong>Our previous technology stack wasn&#8217;t the best at working with cloud-native applications and APIs.</p></li></ul><p>We started our quest to find the perfect SOAR. After an extensive POC with three products, we chose a winner and implemented it in December 2022.</p><p>And we suffered. We wasted time. Until we got better.</p><p>Nowadays, the SOAR is the backbone of our operation.</p><p>Let&#8217;s analyze the pitfalls and key lessons that we learned along the way.</p><div><hr></div><h3><strong>1. Not Using Other Products at Their Fullest First</strong></h3><p>The world is full of tales of companies that bought technology and didn&#8217;t deploy it. I'm sure you experienced something similar at least once in your career.</p><p>Organizations of all sizes underestimate the technologies they have running in their environment. After a basic implementation, they become a story of the past, and we start looking for the next shiny thing.</p><blockquote><p><strong>You prefer to invest in other tools rather than in expertise on the existing ones.</strong></p></blockquote><p>This trap is especially damaging for one single reason: </p><p><strong>The value return of automations depends on your knowledge and capabilities of other technologies.</strong></p><p>But there&#8217;s a more pressing issue. A mirage around SOAR that makes companies believe that is the key to fixing their security issues.</p><p><em>&#8220;You are able to contain users and workstations.&#8221;</em></p><p><em>&#8220;SOAR removes the pain of phishing attacks.&#8221;</em></p><blockquote><p><strong>SOAR is not the problem, but the misinterpretation of its promise.</strong></p></blockquote><p>You don&#8217;t need automation for your firewall to block traffic. Nor for your WAF to apply certain rate limiting, or for your EDR to block a malicious file.</p><p>If you bought a SOAR for that, I&#8217;m sorry to tell you, you&#8217;ve wasted your budget.</p><p>You don&#8217;t need anything new to do most of the containment and prevention actions you have in mind. <strong>You need to spend more time increasing the potential of your existing solutions.</strong></p><p>You will be surprised how much you can do with your current M365 licenses, anti-phishing, EDR, Next-Gen firewall, and cloud application.</p><p>Focus on the features that are not enabled. Once you hit a roadblock, before thinking that a SOAR will save you, make sure that it&#8217;s not a product or license limitation.</p><blockquote><p><strong>You must maximize containment within a product before adding an extra layer.</strong></p></blockquote><div><hr></div><h3>2. Starting With SecOps Automation for the Wrong Reasons or Assumptions</h3><p>You are using your existing technologies at their best, but there&#8217;s still a high chance that you are doing SecOps automation for the wrong reasons.</p><p>Consider a scenario: you work for Company X, a fintech company looking into SOAR because they believe it will help you analyze phishing cases faster.</p><p>But&#8230; are you actually having this problem? How many cases do you analyze daily? How many hours are you losing to this issue? Is it really a bottleneck for your team?</p><p>And&#8230; do you understand the implications of analyzing phishing cases with external tools? You might need additional, and potentially paid, threat intelligence.</p><p>Let&#8217;s take another example: Company Y, an MSSP offering 24x7 SOC services, wants to automate its level 1 operations.</p><p>First, what does that even mean? Every organization I&#8217;ve met has a different definition for level 1 and its corresponding responsibilities.</p><p>How much are you spending on your first line? What processes do you want to automate? Is it even possible? Do you have the required access with your customers to trigger certain automations?</p><p>Or&#8230; do you just want to resell the tool because your customers are asking for it? Be honest about what you expect.</p><p>Yes, SecOps automation can have amazing returns, but only if you identify your true constraints and understand the potential effort and time required to address them.</p><p>The best advice I can give you is to <strong>identify your top three bottlenecks and do a proof of concept around them before investing in new technology or profiles.</strong></p><p>For us, it was only two, and it was hard enough.</p><p>The journey takes time, lots of iterations, and money.</p><div><hr></div><h3>3. Not Having the Right People or Focus</h3><p>This was our first challenge.</p><p>We'd been doing automations for two years before formalizing our SOAR investment and realigning our SOC strategy.</p><p>We had people who knew how to code and make APIs dance.</p><p>Still, progress was slow during the first months. After various discussions with my team, we found that there was a lack of focus.</p><p>We automated tasks on an ad-hoc basis whenever necessary. These team members also handled alerts, consultancy and performed incident response.</p><p>Things improved when we decided to formalize the role of Automation Engineering. We allowed team members to focus and we set clear accountability and goals.</p><p>This is the first mistake I see in different teams. I get it, you don't have a big team and try to concentrate capacities as much as possible. But it doesn&#8217;t work. Security automation is a complex domain that requires plenty of focus.</p><p>Don't just take my word for it. <a href="https://www.coursera.org/learn/modern-security-operations">Google's course on Modern Security Operations (2024)</a> states the significance of this role in a SOC team.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!GPeh!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3af46ba5-a365-47b2-838c-6a16a6b62d07_990x142.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!GPeh!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3af46ba5-a365-47b2-838c-6a16a6b62d07_990x142.png 424w, https://substackcdn.com/image/fetch/$s_!GPeh!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3af46ba5-a365-47b2-838c-6a16a6b62d07_990x142.png 848w, https://substackcdn.com/image/fetch/$s_!GPeh!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3af46ba5-a365-47b2-838c-6a16a6b62d07_990x142.png 1272w, https://substackcdn.com/image/fetch/$s_!GPeh!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3af46ba5-a365-47b2-838c-6a16a6b62d07_990x142.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!GPeh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3af46ba5-a365-47b2-838c-6a16a6b62d07_990x142.png" width="716" height="102.6989898989899" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3af46ba5-a365-47b2-838c-6a16a6b62d07_990x142.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:142,&quot;width&quot;:990,&quot;resizeWidth&quot;:716,&quot;bytes&quot;:122199,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!GPeh!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3af46ba5-a365-47b2-838c-6a16a6b62d07_990x142.png 424w, https://substackcdn.com/image/fetch/$s_!GPeh!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3af46ba5-a365-47b2-838c-6a16a6b62d07_990x142.png 848w, https://substackcdn.com/image/fetch/$s_!GPeh!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3af46ba5-a365-47b2-838c-6a16a6b62d07_990x142.png 1272w, https://substackcdn.com/image/fetch/$s_!GPeh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3af46ba5-a365-47b2-838c-6a16a6b62d07_990x142.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><blockquote><p><strong>Allow at least one team member to focus on automation engineering.</strong></p></blockquote><p>The second mistake I see is the underestimation of knowledge when automating processes.</p><p>A SOC team may be proficient in SIEM, incident response, EDR and detection. But it's not going to be enough.</p><p>SecOps automation requires a different set of skills and mentality. <strong>An almost impossible conjunction of knowledge in different domains.</strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!lfyR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7dd4d5e4-23b3-4426-b2be-a3ae15100204_1166x581.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!lfyR!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7dd4d5e4-23b3-4426-b2be-a3ae15100204_1166x581.png 424w, https://substackcdn.com/image/fetch/$s_!lfyR!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7dd4d5e4-23b3-4426-b2be-a3ae15100204_1166x581.png 848w, https://substackcdn.com/image/fetch/$s_!lfyR!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7dd4d5e4-23b3-4426-b2be-a3ae15100204_1166x581.png 1272w, https://substackcdn.com/image/fetch/$s_!lfyR!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7dd4d5e4-23b3-4426-b2be-a3ae15100204_1166x581.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!lfyR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7dd4d5e4-23b3-4426-b2be-a3ae15100204_1166x581.png" width="1166" height="581" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7dd4d5e4-23b3-4426-b2be-a3ae15100204_1166x581.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:581,&quot;width&quot;:1166,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:110855,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!lfyR!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7dd4d5e4-23b3-4426-b2be-a3ae15100204_1166x581.png 424w, https://substackcdn.com/image/fetch/$s_!lfyR!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7dd4d5e4-23b3-4426-b2be-a3ae15100204_1166x581.png 848w, https://substackcdn.com/image/fetch/$s_!lfyR!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7dd4d5e4-23b3-4426-b2be-a3ae15100204_1166x581.png 1272w, https://substackcdn.com/image/fetch/$s_!lfyR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7dd4d5e4-23b3-4426-b2be-a3ae15100204_1166x581.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>A solid security automation initiative requires harmony between four key domains:</p><ul><li><p><strong>Blue team knowledge:</strong> Most SOC teams already have this. You need proficiency in detections, alert handling, and the associated workload challenges. After all, what are you planning to automate?</p></li><li><p><strong>Automation knowledge:</strong> You need people who are able to code, use git, and be proficient with the SOAR itself. Especially, they need to know how to think automations. What if you push a playbook that completely breaks your organization?</p></li><li><p><strong>End-Product knowledge:</strong> It's not only about knowing your SIEM and SOAR. You need deep product knowledge of other systems within your company: Ticketing systems, EDR, firewalls, cloud applications, and so on.</p></li><li><p><strong>End-Product API knowledge:</strong> Often overlooked. Being proficient with a technology doesn't necessarily mean understanding its API. Deploying a product and working with its API require different skill sets. Failing to understand End-Product APIs can lead to limitations and production impacts. We'll explore this further in the next chapter.</p></li></ul><p>It's nearly impossible to have all this knowledge in one individual. Still, various teams try to make it happen and fail.</p><p>The challenge is that it's hard to distribute these domains among different collaborators. You need a certain background in more than one domain if you want to be successful.</p><p>If you're starting, <strong>stack blue team and automation knowledge into one collaborator</strong>. Your engineer will need to work with other product specialists to ensure the validity and safety of your ideas.</p><div><hr></div><h3>4. Focusing On Containment Orchestrations Too Soon</h3><p>This was our second challenge.</p><p>Orchestration refers to the coordination and management of multiple automated tasks or processes working together to achieve a larger goal.</p><p>We wanted what every vendor promises:</p><p>The End-To-End orchestration containment experience. To detect a threat and automatically block users in Active Directory and in every other application. All while pushing rules firewalls to block traffic from compromised users. And of course, trigger an automatic threat hunt to find more indicators.</p><p>From the MSSP perspective, the premise is beautiful. Containment orchestration can offload your SOC tremendously.</p><p>For instance, even if your SOC operates 24/7, your customers might not. No one wants to receive a call at 3 AM. That&#8217;s why one of our main KPIs is the percentage of alerts that involve contacting the customer. With End-To-End orchestration, you could take automatic containment to mitigate risks outside business hours, so you don&#8217;t wake your customers in the middle of the night.</p><p>Our customers wanted it, and so did we. We assigned part of our team to work on these playbooks, but we started to hit roadblocks.</p><h4>Buy-In From Stakeholders</h4><p>You are removing control and adding a point of failure.</p><p>Everyone agreed, but in the end, customers didn&#8217;t want to commit to its implications. Even with guardrails and controls, giving admin rights to an external automation that you don&#8217;t control isn&#8217;t easy to digest. </p><h4>End-Product API Limitations &amp; Knowledge</h4><p>First, none of the promised built-in containment playbooks worked out of the box. We ended up creating our own from scratch.</p><p>We encountered various API limitations from other products. For example, in Check Point firewalls, you need to push policies to apply rulebase changes. This can increase CPU usage of the appliance or apply unwanted changes.</p><p><strong>Your SOAR will use the APIs of a target product.</strong> You might know how to use your stack, but you can&#8217;t expect your team to know the API of each product and its implications.</p><h4>Increased Complexity</h4><p>The complexity factor plays a big role. As soon as you need to stitch two technologies together, complexity skyrockets. More than 2... well...</p><p>Let&#8217;s say that you make it work. Who&#8217;s going to check for changes in the API? Or the product modifications that might affect your automations? Your integrations might not update with the same frequency.</p><p>And what if, by overlooking this, you start affecting core operations?</p><p><strong>That&#8217;s why maximizing your current technologies and End-Product knowledge is so important.</strong></p><p>Automated containment is a logical evolution. It required a high organizational and SecOps maturity to make it work.</p><p>Instead, starting with what I call <strong>facilitation orchestrations</strong> is a better approach.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!0Qwo!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F77f940fc-a885-46ab-8fd4-bd235fb64e73_1166x581.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!0Qwo!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F77f940fc-a885-46ab-8fd4-bd235fb64e73_1166x581.png 424w, https://substackcdn.com/image/fetch/$s_!0Qwo!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F77f940fc-a885-46ab-8fd4-bd235fb64e73_1166x581.png 848w, https://substackcdn.com/image/fetch/$s_!0Qwo!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F77f940fc-a885-46ab-8fd4-bd235fb64e73_1166x581.png 1272w, https://substackcdn.com/image/fetch/$s_!0Qwo!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F77f940fc-a885-46ab-8fd4-bd235fb64e73_1166x581.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!0Qwo!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F77f940fc-a885-46ab-8fd4-bd235fb64e73_1166x581.png" width="1166" height="581" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/77f940fc-a885-46ab-8fd4-bd235fb64e73_1166x581.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:581,&quot;width&quot;:1166,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:73073,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!0Qwo!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F77f940fc-a885-46ab-8fd4-bd235fb64e73_1166x581.png 424w, https://substackcdn.com/image/fetch/$s_!0Qwo!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F77f940fc-a885-46ab-8fd4-bd235fb64e73_1166x581.png 848w, https://substackcdn.com/image/fetch/$s_!0Qwo!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F77f940fc-a885-46ab-8fd4-bd235fb64e73_1166x581.png 1272w, https://substackcdn.com/image/fetch/$s_!0Qwo!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F77f940fc-a885-46ab-8fd4-bd235fb64e73_1166x581.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>Facilitation orchestrations improve your operational efficiency with almost no risk of affecting production.</strong></p><p>These orchestrations also use external APIs, though not for containment purposes.</p><p>We decided to switch our focus to using SOAR to streamline the process and make the lives of our analysts easier.</p><p>Our first eureka moment with the SOAR was when we were able to enforce processes. An alert is always handled in the same way with a consistent communication template. This approach allowed us to decrease the time spent on alerts by more than 70% in one year.</p><p>The second big leap came. We were able to close alerts without human intervention based on enrichment.</p><p>Finally, we overhauled our SOC analytics by applying context in our ticketing system. </p><p>Your first months should focus on facilitation. It's not an easy task. You will need to tinker with your ticketing system, threat intelligence tools, SOAR, and so on.</p><blockquote><p><strong>Leave containment as much as possible to the End-Product.</strong></p></blockquote><div><hr></div><h3>5. Not Knowing How to Measure Success</h3><p>Justifying technology investment and defending your hard-earned budget is a complex undertaking.</p><p>Most organizations are not metric-driven. Some want to be but don't have the necessary systems in place to track what matters.</p><p>Once you start, It's easy to get lost in the endless KPIs of cybersecurity. You might convince your stakeholders of effectiveness with a pie chart of detection.</p><p>But sooner or later, management will challenge your return on investments.</p><blockquote><p><strong>You need to define between 2 and 4 measurements to assess the success of your initiatives.</strong></p></blockquote><p>In my experience, there are two key performance indicators to achieve this:</p><ul><li><p><strong>Average time per alert (Goal: Decrease):</strong> This is a great measurement to assess alert handling optimization in your SOC. It's a basic metric for every SOC. If you don't have it, don't start with SecOps automation.</p><p></p></li><li><p><strong>Alerts without human intervention (Goal: Increase):</strong> The golden metric. It encompasses alerts that were filtered, auto-closed, or handled without your analyst even seeing them. This metric will help you assess your progress and identify areas where you need to focus in terms of processes.</p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!sZZJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9286cdeb-3754-40c2-995f-e9c3b6738343_1166x581.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!sZZJ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9286cdeb-3754-40c2-995f-e9c3b6738343_1166x581.png 424w, https://substackcdn.com/image/fetch/$s_!sZZJ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9286cdeb-3754-40c2-995f-e9c3b6738343_1166x581.png 848w, https://substackcdn.com/image/fetch/$s_!sZZJ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9286cdeb-3754-40c2-995f-e9c3b6738343_1166x581.png 1272w, https://substackcdn.com/image/fetch/$s_!sZZJ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9286cdeb-3754-40c2-995f-e9c3b6738343_1166x581.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!sZZJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9286cdeb-3754-40c2-995f-e9c3b6738343_1166x581.png" width="1166" height="581" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9286cdeb-3754-40c2-995f-e9c3b6738343_1166x581.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:581,&quot;width&quot;:1166,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:75374,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!sZZJ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9286cdeb-3754-40c2-995f-e9c3b6738343_1166x581.png 424w, https://substackcdn.com/image/fetch/$s_!sZZJ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9286cdeb-3754-40c2-995f-e9c3b6738343_1166x581.png 848w, https://substackcdn.com/image/fetch/$s_!sZZJ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9286cdeb-3754-40c2-995f-e9c3b6738343_1166x581.png 1272w, https://substackcdn.com/image/fetch/$s_!sZZJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9286cdeb-3754-40c2-995f-e9c3b6738343_1166x581.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Less is better. You will see that getting these metrics right is hard enough. Don't invest further if you don't have the means to gather these measurements.</p><p>After getting these metrics you will need to establish safety indicators. Be aware that these are more challenging to measure. Some examples are:</p><ul><li><p>Number of failed playbook executions.</p></li><li><p>Number of missed true positives due to automations.</p></li><li><p>Production incidents due to automations.</p></li></ul><blockquote><p><strong>Define which metrics represent operational efficiency improvements in your organization. Then, ensure you have the means to track them.</strong></p></blockquote><div><hr></div><h2>Conclusions</h2><p>The described pitfalls stem from my experience working with different SecOps teams.</p><p>Security automation is a mandatory quest for every SOC. Sadly, Everyone talks about the benefits and not the downfalls.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!-efr!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ea8b84c-8130-4f2e-8030-25bcecd73d2d_1166x581.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!-efr!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ea8b84c-8130-4f2e-8030-25bcecd73d2d_1166x581.png 424w, https://substackcdn.com/image/fetch/$s_!-efr!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ea8b84c-8130-4f2e-8030-25bcecd73d2d_1166x581.png 848w, https://substackcdn.com/image/fetch/$s_!-efr!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ea8b84c-8130-4f2e-8030-25bcecd73d2d_1166x581.png 1272w, https://substackcdn.com/image/fetch/$s_!-efr!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ea8b84c-8130-4f2e-8030-25bcecd73d2d_1166x581.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!-efr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ea8b84c-8130-4f2e-8030-25bcecd73d2d_1166x581.png" width="1166" height="581" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8ea8b84c-8130-4f2e-8030-25bcecd73d2d_1166x581.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:581,&quot;width&quot;:1166,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:78833,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!-efr!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ea8b84c-8130-4f2e-8030-25bcecd73d2d_1166x581.png 424w, https://substackcdn.com/image/fetch/$s_!-efr!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ea8b84c-8130-4f2e-8030-25bcecd73d2d_1166x581.png 848w, https://substackcdn.com/image/fetch/$s_!-efr!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ea8b84c-8130-4f2e-8030-25bcecd73d2d_1166x581.png 1272w, https://substackcdn.com/image/fetch/$s_!-efr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8ea8b84c-8130-4f2e-8030-25bcecd73d2d_1166x581.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>I encourage you to start taking the first steps towards automation. The sole effort of setting the foundations right will already benefit your organization.</p><p>Wasting some effort will be inevitable; after all, you must improve through iterations. I hope that my ideas allow you to find a strategy that maximizes returns.</p><p>Feel free to reach out if you want to discuss further. I'm always up for meeting interesting people with cool ideas.</p>]]></content:encoded></item><item><title><![CDATA[Navigating TLS/SSL Inspection with Check Point: Insights and Challenges]]></title><description><![CDATA[The write-up that took my career to new heights]]></description><link>https://www.fedemeiners.com/p/navigating-tls-ssl-inspection-with-check-point</link><guid isPermaLink="false">https://www.fedemeiners.com/p/navigating-tls-ssl-inspection-with-check-point</guid><dc:creator><![CDATA[Fede Meiners]]></dc:creator><pubDate>Fri, 26 Jul 2024 18:31:49 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/7fd05e3f-8733-4d55-83bf-4937b26a66b4_1232x768.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><strong>The post is from July 2019 (Versions r77.30 and r80.30). Since then, Check Point has issued hundreds of upgrades to their products, dramatically improving their capabilities.</strong></p><p>My Check Point days are in the past, at least for the moment.</p><p>But&#8230;</p><p>This write-up and research hold a special place in my heart. It played a pivotal role in my career:</p><p>It was featured in Tim Hall&#8217;s book, <a href="https://www.amazon.com/dp/1652347704">&#8220;Check Point Firewall Performance Optimization - Third Edition&#8221;</a></p><p>It allowed me to present at my first international conference on one of the main stages: <a href="https://www.youtube.com/watch?v=7Niv06TbwkU">Check Point CPX 2020 - New Orleans</a></p><p>And so on.</p><p>Keep reading below.</p><div><hr></div><p>Hello everyone,</p><p>I'm looking to share my experience and concerns regarding the current state of SSL Inspection in general, and with Check Point in particular. I'm also interested in hearing your approaches to this matter.</p><p>Important: This post focuses strictly on outbound SSL Inspection; my experience with inbound is limited to Check Point.</p><p>I'll start with a vendor-agnostic statement: One of the things that bothers me most about this subject is that many people claim to have this technology implemented in their organizations without any issues. However, upon meeting those organizations, I found one of the following:</p><ol><li><p>They have at most 10 users.</p></li><li><p>Their SSL Inspection technology is shady: SSL Inspection is enabled, but there is a working and HUGE fail-open at the bottom of the engine. If something may cause issues, the connection is accepted, the log shows that the packet was "inspected," and everyone is happy.</p></li><li><p>They think they have SSL Inspection but don&#8217;t actually have it enabled; instead, they have a feature similar to categorizing HTTPS sites.</p></li></ol><p><strong>My Personal Experience</strong></p><p>We all know the importance of inspecting HTTPS traffic in our network for visibility and security. However, at times, I feel like this way of thinking is my InfoSec persona speaking&#8212;one that only gives "woo woo" advice to the business regarding security and doesn&#8217;t even know how to install antivirus software. Why? Because properly implementing this solution is just painful. I also know that most customers don't want to dive into this matter and prefer to rely on their endpoint solutions for this layer of security. Even if it's not the same, I respect that.</p><p>Among our customers, we have one that is particularly tech-savvy with 900+ users. They like to enable all features in their NGFW, and one of the requirements was to enable full outgoing SSL inspection in the Check Point firewall. We started with this customer years ago with R77.30 in gateways, so you can imagine that I've been through all kinds of fun experiences with SSL Inspection.</p><p>We have fully tested SSL Inspection in the following versions: R77.30, R80.10, and R80.30.</p><p>During this journey, we went through a lot of information. There are many awesome posts here in Check Mates, SKs, SRs with the TAC&#8212;you name it.</p><p><strong>Issues We Faced</strong></p><p>Here is a summarized list of issues we encountered:</p><ul><li><p>Heavy performance issues in R77.30 (fixed in R80.10+)</p></li><li><p>Many pages fail to load or load intermittently.</p></li><li><p>Some pages work, but specific sections (like login pages) fail.</p></li><li><p>Sophos Antivirus solution doesn't work for installation or updates: There are some posts about this issue.</p></li><li><p>AWS Connectors failing (solved in R80.30).</p></li></ul><p><strong>The Issue with Check Point and Outbound SSL Inspection</strong></p><p>I really like Check Point firewalls, but sometimes I feel that they take control away from the administrator. One of the first things we did was disable all options related to dropping connections that don't follow the RFC line by line, and allowing connections to non-trusted certificates. We tried everything, yet we still faced many issues.</p><p>Bypassing the connection? Good luck with that. Check Point firewalls always inspect the first packet, and because of this, many connections fail.</p><p>Probe bypass to mitigate the previous issue? Sure, but be prepared to face other issues due to SNI verification.</p><p>Fail-open in probe bypass? This was a huge surprise after it was changed in Take 189, but we still had a lot of issues even after enabling this flag.</p><p>WSTLSD debug? Many times, but good luck not taking down the firewall with it and be prepared to wait a long time for the TAC to inspect it. It's not their fault; it's just really hard to troubleshoot these issues.</p><p>The only way we found to properly bypass connections was to exclude them COMPLETELY from the SSL policy. For example, let's say you have two network segments and you only want to inspect traffic in one of them:</p><p><strong>What Most People Do</strong></p><p>In this example, all traffic from 10.0.0.0 will be inspected. However, you will probably have some issues in the 192.168.0.0 network as well since the bypass action enforces inspecting the first packet of the SSL handshake.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Yr53!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F251ee23d-20dc-4218-81cc-a050c07ae3a0_836x124.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Yr53!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F251ee23d-20dc-4218-81cc-a050c07ae3a0_836x124.png 424w, https://substackcdn.com/image/fetch/$s_!Yr53!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F251ee23d-20dc-4218-81cc-a050c07ae3a0_836x124.png 848w, https://substackcdn.com/image/fetch/$s_!Yr53!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F251ee23d-20dc-4218-81cc-a050c07ae3a0_836x124.png 1272w, https://substackcdn.com/image/fetch/$s_!Yr53!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F251ee23d-20dc-4218-81cc-a050c07ae3a0_836x124.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Yr53!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F251ee23d-20dc-4218-81cc-a050c07ae3a0_836x124.png" width="836" height="124" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/251ee23d-20dc-4218-81cc-a050c07ae3a0_836x124.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:124,&quot;width&quot;:836,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;SSL 1.png&quot;,&quot;title&quot;:&quot;SSL 1.png&quot;,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="SSL 1.png" title="SSL 1.png" srcset="https://substackcdn.com/image/fetch/$s_!Yr53!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F251ee23d-20dc-4218-81cc-a050c07ae3a0_836x124.png 424w, https://substackcdn.com/image/fetch/$s_!Yr53!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F251ee23d-20dc-4218-81cc-a050c07ae3a0_836x124.png 848w, https://substackcdn.com/image/fetch/$s_!Yr53!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F251ee23d-20dc-4218-81cc-a050c07ae3a0_836x124.png 1272w, https://substackcdn.com/image/fetch/$s_!Yr53!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F251ee23d-20dc-4218-81cc-a050c07ae3a0_836x124.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p><strong>The Only Way to Do Nothing with the Connections</strong></p><p>In our research, we found that the only way to properly bypass a connection was to exclude it completely from the policy. Obviously, this approach is not scalable and somewhat utopian in a big network.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!XtRd!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91517f19-fb90-4a89-bbd9-7e58952a2a69_838x189.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!XtRd!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91517f19-fb90-4a89-bbd9-7e58952a2a69_838x189.png 424w, https://substackcdn.com/image/fetch/$s_!XtRd!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91517f19-fb90-4a89-bbd9-7e58952a2a69_838x189.png 848w, https://substackcdn.com/image/fetch/$s_!XtRd!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91517f19-fb90-4a89-bbd9-7e58952a2a69_838x189.png 1272w, https://substackcdn.com/image/fetch/$s_!XtRd!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91517f19-fb90-4a89-bbd9-7e58952a2a69_838x189.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!XtRd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91517f19-fb90-4a89-bbd9-7e58952a2a69_838x189.png" width="838" height="189" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/91517f19-fb90-4a89-bbd9-7e58952a2a69_838x189.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:189,&quot;width&quot;:838,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;SSL 2.png&quot;,&quot;title&quot;:&quot;SSL 2.png&quot;,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="SSL 2.png" title="SSL 2.png" srcset="https://substackcdn.com/image/fetch/$s_!XtRd!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91517f19-fb90-4a89-bbd9-7e58952a2a69_838x189.png 424w, https://substackcdn.com/image/fetch/$s_!XtRd!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91517f19-fb90-4a89-bbd9-7e58952a2a69_838x189.png 848w, https://substackcdn.com/image/fetch/$s_!XtRd!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91517f19-fb90-4a89-bbd9-7e58952a2a69_838x189.png 1272w, https://substackcdn.com/image/fetch/$s_!XtRd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91517f19-fb90-4a89-bbd9-7e58952a2a69_838x189.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p><strong>The Most Stable Scenario We Reached</strong></p><p>We reached a state of stability in R80.10 with the JHF prior to 189 by enabling the following flags and features:</p><ul><li><p>appi_urlf_ssl_cn_allow_not_rfc_ssl_protocols=1 (Don&#8217;t know where I got this; also, there is no documentation about it)</p></li><li><p>enhanced_ssl_inspection=1 (Probe bypass)</p></li><li><p>bypass_on_enhanced_ssl_inspection=1 (Fail-open probe bypass)</p></li><li><p>Almost all features that drop packets turned off in SSL Inspection.</p></li><li><p>HTTPS categorization turned on.</p></li></ul><p>Sophos antivirus worked fine, and issues with web pages were minimized.</p><p><strong>The Journey to R80.30</strong></p><p>We decided to migrate one of the cluster members to R80.30 to test the new SSL Inspection engine and solve some issues we had with UserCheck. After deployment, we had issues with Proxy ARP:</p><p><a href="https://community.checkpoint.com/t5/Enterprise-Appliances-and-Gaia/Proxy-ARP-after-upgrade-to-R80-30/m-p/58315/highlight/true">https://community.checkpoint.com/t5/Enterprise-Appliances-and-Gaia/Proxy-ARP-after-upgrade-to-R80-30...</a></p><p>Some inspection settings started to cause issues in R80.30 that didn't previously.</p><p>We sorted them all, and the first impression was great:</p><ul><li><p>AWS Connectors worked flawlessly without enabling any of the previously stated kernel flags.</p></li><li><p>Sophos Antivirus could get updated without enabling any of the previously stated kernel flags.</p></li><li><p>All the services detailed in the preliminary testing document worked great.</p></li></ul><p>The next day, a waterfall of user complaints started to appear:</p><ul><li><p>Sophos Antivirus could not be installed: Updates worked fine, but installation failed. After looking into the logs, no traffic was dropped (logs and output from fw ctl zdebug). The only log was a Detect regarding untrusted certificates, which we configured to accept in the SSL settings. We tried the flags, setting up an FQDN object just for *.sophos.com in the SSL Inspection policy, and it still failed.</p></li><li><p>The main billing service of the company stopped working. Again, no logs or possible leads as to why. We even looked at PCAPs, and everything seemed fine from the firewall&#8217;s perspective. As soon as we routed this traffic through pfSense, everything worked flawlessly.</p></li><li><p>Another invoice service stopped working: Again, no leads whatsoever. After we routed this traffic through pfSense, everything started to work.</p></li><li><p>Web pages that did not load properly or had some functions affected.</p></li></ul><p>We tried everything: performed captures by turning off SecureXL, but even the bypass flags could not solve these issues in R80.30. We had these issues in R80.10, and after turning on the different flags, everything worked, but not in this new version.</p><p>At this point, there were many issues impacting production. We blocked one hole, and another 10 appeared. It was just impossible to properly troubleshoot each issue, so we had no other option but to revert to our most stable version.</p><p><strong>Future Plans</strong></p><p>There is no way to deploy SSL Inspection without issues; the problem is that these issues will probably heavily affect your production environment. There is no way you can test all your organization&#8217;s use cases, and there is no way to properly assure functionality in a lab environment.</p><p>Our main concern now is the remote possibility that we will have to stick with R80.10 for life. We know we will have to update sooner or later, which is why we are now implementing a parallel CHKP Frontier similar to our failback pfSense. This new gateway will have R80.30 with the same features. Think of it as a hybrid testing/production environment.</p><p>The main idea is to route certain subnets to the R80.30 gateway and study their behavior and troubleshoot without all the user complaints.</p><p><strong>Concerns Regarding the Current State of SSL Inspection</strong></p><ul><li><p>Check Point firewalls don't provide a proper solution to bypass desired SSL traffic, making it hard to deploy this solution in a large environment.</p></li><li><p>Lab tests are not representative; the only way to test is in production.</p></li><li><p>Troubleshooting is really difficult: Many times there are no leads, and everything seems fine on the firewall, forcing you to perform PCAPs on different parts of the network and debugging.</p></li><li><p>Check Point&#8217;s current approach to SSL Inspection impacts the brand&#8217;s image: I hear it all the time&#8212;&#8220;I have a friend who inspects SSL traffic with YYY and has no issues.&#8221; Most people don&#8217;t know that it&#8217;s more of a technology issue in general regarding SSL/TLS rather than a Check Point fault. However, other vendors offer this functionality with failback mechanisms that work without the user knowing. It&#8217;s less secure, but at the end of the day, the main metric is functionality and not security in most cases.</p></li></ul><p>Hope this post helps you implement this feature in a harmless way.</p><div><hr></div><p>Link to the original post: <a href="https://community.checkpoint.com/t5/General-Topics/Outbound-SSL-Inspection-A-war-story/td-p/58647">Check Mates - Outbound SSL Inspection: A War Story</a></p>]]></content:encoded></item></channel></rss>