CIS Logo
tagline: Confidence in the Connected World
Young woman working on a computer

Securing Check Point Firewall An objective, consensus-driven security guideline for the Check Point Firewall Network Devices.

An objective, consensus-driven security guideline for the Check Point Firewall Network Devices.

A step-by-step checklist to secure Check Point Firewall:

For Check Point Firewall R80.10 (CIS Check Point Firewall Benchmark version 1.1.0)

CIS has worked with the community since 2010 to publish a benchmark for Check Point Firewall

Join the Check Point Firewall community Arrow

Information Hub : Check Point Firewall


CONTROL: 1 --- ADVISORY CONTROL: 0

Pencil Blog post 06 Aug 2020
CONTROL: 2 --- ADVISORY CONTROL: 0
CONTROL: 3 --- ADVISORY CONTROL: 0
CONTROL: 4 --- ADVISORY CONTROL: 0