SASE Reference Architecture Whitepaper
SASE Reference Architecture Whitepaper
[Type here]
Release 23-02-2021
CLOUD TRANSFORMATION - INTRODUCTION TO SASE 2
ABSTRACT
As resources and applications shift to the cloud, on-premise data centers are no
longer the core of the network, users are no longer found only in corporate offices,
and remote working becomes widely accepted with COVID-19 moving the world
into a new paradigm.
To meet these needs and more, enterprises are seeking advice on how to re-
architect their infrastructure.
This document provides a basic understanding of SASE architecture, explains
how it solves different needs of evolving organizations, and best practices for
deployment.
AUDIENCE
This document is written for technical readers, IT security architects, and network
specialists who are venturing out into cloud territory.
Readers should be familiar with basic concepts of virtualization, networks, and
have a strong understanding of security design.
CLOUD TRANSFORMATION - INTRODUCTION TO SASE 3
TABLE OF CONTENTS
INTRODUCTION TO SASE ........................................................................................................4
SASE Main Components ....................................................................................................................... 4
CHECK POINT SASE SOLUTION: HARMONY ..........................................................................6
SASE ARCHITECTURE REFERENCE .......................................................................................8
Alignment with the Zero Trust Model ................................................................................................... 11
CHECK POINT SASE COMPONENTS .....................................................................................12
Harmony Connect / Quantum Edge ..................................................................................................... 13
Remote Access for Corporate Applications ......................................................................................... 16
Remote Access to Corporate Resources Using the Public Cloud (ZTNA) .......................................... 22
Remote Access and Windows Virtual Desktop (RDP) ......................................................................... 27
Data Loss Prevention (DLP) ................................................................................................................ 29
Harmony Email & Office security ......................................................................................................... 29
MANAGEMENT AND REPORTING ..........................................................................................32
Harmony Email & Office Management ................................................................................................. 32
Harmony Connect Management .......................................................................................................... 33
CONCLUSION ..........................................................................................................................35
CLOUD TRANSFORMATION - INTRODUCTION TO SASE 4
INTRODUCTION TO SASE
IoT Security: SASE enables IoT devices to break out to the internet directly in a secure way.
Network
SD-WAN: Optimizing access to the Internet and Data Centers by allowing branch offices and users
to break out to the internet directly and securely, significantly improving the user experience.
Elements like routing, dynamic path selection, NaaS, and latency optimization are all essential
networking features of SD-WAN, laying the foundations on which security is built.
Business Reducing the With network security as a service, maintenance and upgrades are
Drivers operational burden included in the monthly cost. Upgrading multiple physical gateways
and cost is time-consuming and leaves security inconsistent and lagging;
converting to an FWaaS architecture and managing the entire
infrastructure from a single pane of glass saves time, resources,
and training as well as reduced cost.
Reducing the Wide Area Network costs by retiring expensive MPLS
circuits in favor of broadband internet links is a second important
driver.
Ubiquitous access to During the Covid-19, many enterprises allowed their workforce to
corporate resources work from home.
Many were pleasantly pandemic surprised to see that employee
productivity went up. In a post-pandemic world, this new way of
working will become the norm, and employees must be able to
access any corporate resource securely and efficiently. When
productivity goes up, business figures usually follow suit.
Security and Internet access SD-WAN Dynamic link selection ensures the best path is always
User optimization automatically chosen if multiple access circuits are present.
Experience
Drivers
Improving security and Increasing security to a level that can deal with Gen VI attacks,
reducing threats even with old EOL perimeter equipment.
Cloud adoption As enterprises rapidly move their data centers to the cloud,
backhauling traffic to the hub site may not be the best option in
terms of cost and/or latency for roaming users or for users in
branch offices requiring access to (corporate) resources in the
cloud. For instance, streaming audio or video is much more
efficient in terms of WAN bandwidth consumption with a local
breakout.
Zero Trust Network The same level of security should always be enforced, regardless
Access of the location of the user. Whether they are in the office or
roaming, a SASE architecture will constantly ensure complete
session protection.
CLOUD TRANSFORMATION - INTRODUCTION TO SASE 6
Harmony Connect - the network part - serves as a transport layer for users and devices connecting to resources
and applications on the corporate network and the internet.
For secure branch office connectivity, Check Point has tight integration with most popular SD-WAN providers,
establishing a best-of-breed SASE solution that provides efficient connectivity and comprehensive security
capabilities.
The security part is a unified solution based on Check Point Harmony products, the adjacency of those provides
Check Point’s SASE solution. All services are managed using Web UI Management, providing a single pane
of glass for the Administrator.
The Check Point SASE solution places security as a service in the cloud in a distributed fashion instead of
enforcing it the legacy way on gateways, on-premise Data Centers, and branches. Access to corporate
resources is possible directly without detours, and securely, for everyone.
The service runs on top of the Amazon AWS and Azure infrastructure to ensure maximal availability and the
best possible response times when accessing cloud resources.
This cloud-based solution does not burden IT staff with deploying or maintaining dedicated hardware and
supports adding advanced threat prevention capabilities on top of existing routers or SD-WAN deployments.
With a simple and easy setup process, network traffic from existing SD-WAN edge devices are tunneled to a
primary cloud-based network security service at a nearby location. A second connection provides redundancy.
This ensures branch offices stay connected and removes the operational overhead of deploying and
maintaining security for hundreds and thousands of physical devices, reducing overall CAPEX and OPEX
costs.
The SASE infrastructure is deployed in the cloud, fully managed by Check Point. The SASE functionalities in
the cloud include the most sophisticated Next Generation Threat Prevention and zero-day protection
mechanisms, ensuring the best possible protection against Gen V attacks, such as Application Control and
URL Filtering, Anti-Bit / Anti-Virus, IPS, Threat Emulation, and Extraction along with SSL inspection capabilities
and Remote Access VPN technologies.
All features of the service can be managed using a single pane of glass; either by Management as a Service
(MaaS) leveraging the Infinity Web Portal or existing R80 Smart Center management system deployed on-
premises.
CLOUD TRANSFORMATION - INTRODUCTION TO SASE 8
Note: some features and capabilities shown above, are part of Check Point short-term roadmap and will become available
during the 2nd half of 2020, e.g.: remote access to an on-prem data center via the SASE cloud service, for users or branches;
branch-to-branch communication; the use of external Identity Providers as a Service.
Harmony browser
The browser extension secures all web traffic before it is SSL encrypted: direct visibility into the
rendered browsing content allows for zero-day protection (threat emulation and extraction) and
phishing protection.
It also permits dynamical delegation of network security functions (URLF, phishing & malware
prevention) to the endpoint allowing intelligent direct internet routing without compromising security.
SaaS Application Security (CASB)
Roaming users connect to SaaS applications in the public cloud, like Office365. Check Point’s SASE
cloud solution secures access to applications. A key part of this access process is determining the
identities (these originate from a 3rd party identity provider such as AzureAD) and risk level of users,
as this information is used in the security policy that decides which applications users get access to.
A second and equally important part is to provide data protection and threat prevention, both inline
and out-of-band through the API integration Check Point has with SaaS providers.
An additional advantage is that a local sensor in the branch office can be used to send the data it collects about
IoT devices to a cloud-based 3rd party discovery engine (1), which in turn feeds this information to the Check
Point cloud-based IoT controller (2). This Management-as-a-Service (MaaS) platform uses that data to
automatically generate objects and policies based on the behavior and communication patterns of the IoT
devices and feed them to the Infinity Management portal (3). After review by the security admin, the suggested
policies can be enforced in the SASE cloud (4) or on on-premise gateways.
CLOUD TRANSFORMATION - INTRODUCTION TO SASE 11
Secure Web Gateway – Check Point’s cloud SWG is designed to protect your organization from
known and unknown threats. It offers protection for users accessing the internet and SaaS
applications in the office or remotely, and includes functionality of FWaaS.
Security includes URL Filtering, application control, IPS, phishing, and malicious download
prevention using SandBlast technology to prevent zero-day attacks, and DLP.
Network Security as a Service – Cloud-hosted network threat prevention service, on top of existing
SD-WAN deployments. The solution delivers the latest and most comprehensive cyber security
available, protecting branch offices from the latest generation of targeted and advanced cyber
threats.
Secure Access to corporate resources – provide safe access to remote employees to corporate
resources, providing the same level of security as in the office.
Corporate resources are protected by zero-trust access based on user identity, endpoint security
posture, and session risk. Access is granted based on the Zero Trust policy as well as behavioral
models for users and applications. Corporate resources are protected in the data center or the
private and public cloud.
Corporate applications are also protected with advanced IPS and WAAP.
Anti-Bot and Anti-Virus - Protects against malicious files, malware-infested websites, and more. The
analysis uses real-time virus signatures and anomaly-based protections. Identifies and contains
infections by blocking Command and Control traffic between infected hosts and a remote operator.
DNS Security – Check Point’s solution prevents access to malicious domains, at the access
level. DNS Security prevents DNS exploits and tunneling, over HTTP or HTTP integrated
with Threat Cloud, solution provides malicious domain blocking, for newly-registered
domains related to active threat campaigns, as well as prevention against zero-phishing.
Harmony Connect is a native cloud service that requires no dedicated security hardware on-premise.
It can also be used as an FWaaS solution for roaming users and also allow them to access resources in an
on-prem Data center.
Quantum Edge is a Check Point VNF running on 3rd party SD-WAN hardware. Both solutions allow branch
offices to break out to the internet without the need to backhaul the traffic back over the WAN to the hub site
where the internet egress point would traditionally reside.
The Harmony Connect security as a service solution offers the following advantages:
Auto scaling
No operational hassle: no need to worry about upgrades and provisioning of hardware
Cost reduction: the WAN costs will decrease as traditional expensive MPLS circuits are replaced
by VPN over cheap broadband connections
Better user experience for internet-bound traffic (i.e. SaaS) by eliminating additional latency
caused by backhauling via the hub site
Specifications:
Check Point’s Harmony Connect is a cloud-hosted network threat prevention service offering a maintenance-
free, comprehensive, affordable security solution for branch offices and roaming users. Harmony Connect
seamlessly delivers the latest and most comprehensive cybersecurity available, protecting branch offices from
the latest generation of targeted and advanced cyber threats.
Harmony Connect doesn’t burden IT staff with deploying or maintaining dedicated hardware and supports
adding advanced threat prevention capabilities on top of existing routers or SD-WAN deployments. With a
simple and easy setup process, network traffic from existing SD-WAN edge devices is tunneled to a primary
cloud-based network security service at a nearby location. A second connection provides redundancy, ensuring
branch offices stay connected and removing the operational overhead of deploying and maintaining security
for hundreds and thousands of physical devices, reducing overall CAPEX and OPEX costs.
CLOUD TRANSFORMATION - INTRODUCTION TO SASE 15
Cloud Services
Branch-to-Site connection IPsec IKEv1, IPsec IKEv2 or GRE tunnels
Software
Latency Up to 50 milliseconds1
Performance
Single IPsec tunnel Up to 1 Gbps per tunnel
(1) The expected additional latency for a branch in the same Harmony Connect region
Specifications:
Quantum Edge is a lightweight virtual image of the Check Point Branch Office Security Gateway. Within a
minute of powering on the virtual security gateway, your branch office is protected.
Quantum Edge security gateways are deployed through the SD-WAN management console. This tight
integration reduces deployment time, effort, and costs. When Quantum Edge is deployed on SD-WAN or uCPE
equipment, the Quantum Edge virtual security gateway is configured, automatically connected, and ready to
be centrally managed and monitored by the customer’s domain in cloud-hosted SMP or the headquarters’ R80
Security Management.
Software
Security Firewall, VPN, User Awareness, QoS, Application Control, URL Filtering, IPS,
Anti-Bot,
Antivirus and SandBlast Threat Emulation (sandboxing)
Performance
VMware SD-
Edge 520v Edge 620 Edge 640 Edge 680 Edge 840
WAN
Threat
100 Mbps 100 Mbps 350 Mbps 500 Mbps 550 Mbps
Prevention
CLOUD TRANSFORMATION - INTRODUCTION TO SASE 16
Zero Trust is a set of principles, that are implemented as part of an SDP (Software Defined Perimeter)
architecture. The SDP architecture, as part of the SASE solution, will provide corporate access as a service to
applications such as Web, RDP, SSH and Databases. In other words, it will manage access to corporate
applications (in data centers), for all users, in a granular and flexible way.
SASE ZTNA application will support the following features:
- Least privilege access – minimum privileges to all users by default, while unauthorized applications
and services are completely blackened.
- Secure access using advanced threat prevention mechanisms and data protection engines
Corporate Access can be deployed in a clientless mode for unmanaged devices, with a lightweight VPN agent
for managed devices, or with the Harmony Browser extension.
The blue lines in the diagram above mark the functionalities covered by Odo, as explained in the Clientless
Remote Access below.
CLOUD TRANSFORMATION - INTRODUCTION TO SASE 18
In September 2020, Check Point acquired Odo, a Tel-Aviv based start-up that developed a cloud-based,
clientless SASE technology that delivers secure remote access.
Unlike traditional secure remote access solutions, this technology enables:
Users to easily connect through a unified portal to wide range of applications such as remote desktops,
web applications, database servers, cloud and corporate servers, with no client or software installation.
Security administrators to easily deploy the solution in less than five minutes from the cloud. They also
gain enhanced visibility including full audit trail of user activity.
Zero Trust Architecture – Define granular access policy to give the right people in the right context, the
least privileged access to applications and reduce the attack surface
Odo has developed innovative technology that provides clientless remote access – it enables users to connect
remotely and securely to corporate applications, without requiring the user to install a connectivity agent like a
VPN client.
Using the technology, users can remotely access corporate applications and remote desktops by using just a
web browser. The technology currently supports access to web applications, RDP, SSH and databases.
Odo’s solution is delivered as a cloud service, making it very easy for customers to deploy.
The technology addresses the following key use cases:
VPN replacement:
Provide zero-trust remote access to corporate applications that are delivered as a cloud service, and
are easy to deploy and manage.
BYOD and third-party access:
Secure clientless access for unmanaged devices: employees with BYOD, contractors, etc.
DevOps access:
Addresses the need of DevOps and development teams to access cloud environments securely and
easily from any device and at any scale.
CLOUD TRANSFORMATION - INTRODUCTION TO SASE 19
Features include:
o Automated discovery of cloud resource
o Dynamic access policy automatically provides granular access based on asset tags
o Cloud-based Privilege Access Management (PAM), with built-in key management and single-
sign-on services
The architecture Odo developed is based on Zero Trust Network Access (ZTNA) and Software Defined
Perimeter (SDP) principles. This means the solution is inherently secure through:
Architecture components:
1. Controller
The controller is the entity authorization end-point. It specifies who has access to what resources through a
simple policy framework that factors in contextual data such as user attributes and device state. Policies can
be tuned for each team or individual for more granular access management.
2. Gateway
A network tunneling gateway. Every user request flows through the gateway for consistent authentication and
authorization, as well as providing a unified monitoring and logging point. This component makes sure validated
users see only the applications they have permission to see, while the rest of the resources are not only
inaccessible, they are completely invisible.
3. Connector
The only network leg in the internal site. This component is a docker image and connects to the gateway
through a reversed tunnel and effectively makes the organizational DMZ redundant by being the only access
point to the site.
4. Clients
Lightweight Client
The lightweight agent routes all traffic to the closest Harmony Connect instance where all necessary security
controls are enforced before the user is allowed to access any corporate resource or the internet, as with
branch offices.
This means the endpoint, as well as the data and application, is protected but requires an agent to be installed.
It ensures the same level of security for the users, regardless of their location. At the same time, the client also
allows for a bypass path for specific types of traffic to break out to the internet directly, such as streaming
services, thus avoiding a detour via the SASE cloud.
The lightweight Agent also adds an additional layer of DNS security to the ZTNA functionality.
DNS security reroutes corporate DNS queries to Check Point, allowing the following:
Malicious domain prevention using Check Point's ThreatCloud
DNS exploit prevention
DNS tunneling prevention
Prevention of infected hosts from communicating back to their command & control servers
Check Point’s ThreatCloud proactively discovers and prevents access to newly-registered
domains related to active threat campaigns and exploit kits
Access control policy for domains using your own definitions as well as with 115 predefined
categories by Check Point
Zero phishing by defining domains of interest to prevent access to lookalike domains
CLOUD TRANSFORMATION - INTRODUCTION TO SASE 22
It is also possible to use the SandBlast browser extension, preventing the download of malicious files, without
the need for an agent to be installed. The functionality of the browser extension includes
Threat Emulation:
Detect malicious behavior by running files within a secure virtual environment.
Threat Extraction:
Obtain immediate and safe access to documents by removing potentially malicious elements or
converting the downloaded file to PDF. Users can download the original file once Threat Emulation
completes.
Phishing protection:
Zero Phishing is an innovative Anti-Phishing product, protecting corporate users and administrators
from Zero-day phishing sites and Password/identity theft
Under a new approach, Check Point's ZTNA strategy is to allow remote access communications without
deploying traditional gateways in the public IaaS. This new method facilitates global coverage to be reached
through proximity algorithms.
CLOUD TRANSFORMATION - INTRODUCTION TO SASE 23
In the flow description visualized above we can see that traffic, which originated from point A, is located by
external users with a client-based, or clientless, VPN. This traffic is terminated in the Harmony Connect for
users where all traffic will be inspected and the posture security device will confirm if the remote user can be
considered as trusted. If the answer is 'yes', traffic is forwarded to the relevant computing instances (point B)
through the Check Point Harmony Connect (ZTNA), peering to the public IaaS data center to access specific
services in PaaS (such as app services in point C) or services in the Kubernetes cluster.
FROM TO
Remote access traffic to cloud data - Remote access users ("A") connect to the Harmony Connect ("B") using its
center applications public IP address to access all the remote access services in the cloud
access gateway.
- The Check Point SASE connector ("C“, acting as a reverse proxy) is located
in the cloud data center and has the capability to connect to different
applications located in the production vNETs. The reverse proxy also has
CLOUD TRANSFORMATION - INTRODUCTION TO SASE 24
connection t through the egress traffic to the internet ("E") and is connected
to the Harmony Connect services ("F").
Public cloud IaaS integrated with a ZTNA framework has many advantages for organizations, the most
important of which is how it helps adopters prioritize security, no matter what other tools they're using.
For example, if a business requires a transition from one cloud service provider to another cloud service
provider, the SASE platform continues undisrupted due to its platform agnostic. This flexibility also makes
it easy for businesses to scale up their security infrastructure as they grow, without having to reconfigure
the central architecture or deploy dedicated VPN clusters in the public cloud data center. Such an ability
to customize security setting operational needs, enables organizations to create an architecture that meets
their current and evolving business needs. It is important to keep in mind the following security and network
components of a ZTNA architecture:
1
Check Point Remote Access – URL: https://docs.odo.io/docs/odoaccess-architecture
CLOUD TRANSFORMATION - INTRODUCTION TO SASE 25
A similar approach can be seen on the Google Cloud Platform. Following the egress use case described in
Google Cloud, the new element here is the ZTNA connector (flow B) that connects to different applications
(web, RDP or SSH) located in different VPC’s (flow A). Once the reverse proxy is connected to the relevant
applications and services are authorized, we can follow the same flow for the egress traffic starting with the
Google routes (flow C) and it being processed by Check Point MIG Clusters.
Figure 3: Remote Access Through Check Point SASE – Google Cloud Platform
In AWS, we can integrate the egress and east-west use cases to allow for the connectivity between the SASE
connector and Harmony Connect cloud service. The ZTNA connector is located in the SASE and shared
services VPC, where it connects to the specific applications located in different VPC’s (web applications,
remote desktop or SSH), as a reverse-proxy (flow A). The transit gateway then forwards the traffic (flow B) to
connect to the applications located in frontend VPC (flow C).
From the user perspective, the clientless VPN first originate the traffic from internet (flow 1), and then connects
to the Harmony Connect cloud service (flow 2). Once the user is authenticated, according with their role
previously defined in the RBAC policies (flow 3), the reverse proxy uses the egress flow traffic (from A to D,
then D to forward the connection from the connector to the Harmony Cloud service.
CLOUD TRANSFORMATION - INTRODUCTION TO SASE 26
Figure 4: Remote Access Through Check Point SASE – Amazon Web Services
CLOUD TRANSFORMATION - INTRODUCTION TO SASE 27
However, one of the major concerns is the latency to deploy ZTNA services located in different data centers
worldwide. To provide a more optimized model, Check Point ZTNA can be complemented with virtual desktop
infrastructures. In the following diagram, we can gain an overview of how the customer can access their cloud
data center services using the WDI (the same approach could be done with VDI).
Figure 5: Secure Remote Access With SASE and WDI to the Cloud Data Center
CLOUD TRANSFORMATION - INTRODUCTION TO SASE 28
FROM TO
Remote access traffic to cloud data - Remote access users ("A") connect to Harmony Connect for users ("B"),
center applications through using its public IP address. Check Point ZTNA service inspects the traffic
Windows Desktop Infrastructure and sends it to the internet or to the peering communications ("C"). This
provides communication into the virtual network to access Windows
Desktop Infrastructure (or another similar solution in "D"). Then, according
to policies, remote users ("E") can access one specific application using the
service portal or full desktop. Under this approach computing execution is
done in the user virtual environment. This saves on bandwidth and latency
to access applications installed in the computing instances, PaaS web
applications, or container applications.
- In this scenario, the routing is more simple and flexible. This is due to
returning packets being managed internally between the WDI managed
services and the peering to the functional vNETs. The only returning packets
to warranty are the routes back to the gateway through the use of User
Defined Routes (UDR) for the thin client, and the WDI managed service.
- The reverse-proxy also has connection to the internet through the egress
traffic to internet ("F") and is connected to the Harmony Connect services
("G").
For more details about Security Architecture Reference Guide for Public Cloud IaaS, please refer to the
whitepaper at https://www.checkpoint.com/downloads/products/cloudguard-iaas-architecture-reference-and-
best-practices.pdf
CLOUD TRANSFORMATION - INTRODUCTION TO SASE 29
Email Security
Many organizations have moved or are in the process of moving towards cloud-based email services such as
Office 365 or G-Suite, for obvious reasons. However, when doing so, it is important to re-evaluate the email
security, as attack vectors shift.
Harmony Email & Office is a cutting-edge email and office-suite security solution that is trained to catch what
other solutions miss. Harmony Email & Office deploys in minutes and provides organizations with a simple
management platform and an invisible architecture that will not expose you to cybercriminals.
CLOUD TRANSFORMATION - INTRODUCTION TO SASE 30
The following graphic outlines the key components and their relationships:
This graphic shows how the Harmony Email & Office integrates with the cloud and device ID services
Another option is to manage the SD-WAN policy using an >R80.20 management station.
This method is supported by both Quantum Edge and Harmony Connect.
As Quantum Edge VNF is a gateway SMB image, it can be managed by the local web, SMP cloud web
management, or by SmartConsole of any version that supports Check Point’s Large-Scale Management
(LSM), which is essentially any version except for R80.10.
As can be seen at the bottom of the screenshot, HTTPS inspection can be bypassed for traffic originating from
specific sources at the branch office.
Examples of a weekly threat report and logs:
CONCLUSION
SASE allows organizations to easily migrate from expensive on-premise, bare-metal-based networks to an
OPEX-based and cloud-centric security architecture that is far more agile, cost-effective, and secure.
Check Point believes that SASE technology will gradually become more widely used and accepted and that
eventually, most on-premise appliance-based security controls will be replaced with cloud-based alternatives.
SASE helps support SD-WAN technology, secure access to SaaS applications, and protect roaming users -
while meeting the specific needs of each business and their unique infrastructure. All products discussed in
this paper are part of the Check Point Infinity architecture and can be managed from a single pane of glass;
the Infinity portal.
CONTACT US
Worldwide Headquarters | 5 Shlomo Kaplan Street, Tel Aviv 67897, Israel | Tel: 972-3-753-4555 | Fax: 972-3-624-1100 | Email: [email protected]
U.S. Headquarters | 959 Skyway Road, Suite 300, San Carlos, CA 94070 | Tel: 800-429-4391; 650-628-2117 | Fax: 650-654-4233 | www.checkpoint.com