This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

PCI Compliance with connected REDs. Auto-fail. Sophos gave up.

We have a recorded instance of a Sophos XG (v17+) failing a PCI compliance scan (by a major provider) because they use RED appliances.   I asked if Sophos could provide me with mitigation policy or something I could give the PCI compliance vendor an exception basis.

Support eventually came back with:

Sophos RED communication is designed to use self-signed certificates between the XG and RED devices.  Self-signed certificates will fail/warn on PCI scans as they are not trusted.

We do not have a document to mitigate this design as there is no vulnerability with using self-signed certificates.

Now, the last sentence is laughable, but the concept that a firewall vendor can't make a PCI compliant hardware-accelerated VPN tunnel is mind boggling.



This thread was automatically locked due to age.
Parents
  • Hi  

    Thanks for reaching out and my apologies for your negative experience.

    I was able to locate your support case and review the activities within. Has your third-party compliance scanning provider responded back to you regarding this exception?

    For reference to our community, this was the KB article and information shared:

    • Sophos UTM: RED configuration for PCI DSS compliance
    • Here's the Sophos XG article: Sophos XG Firewall: RED configuration for PCI DSS compliance 
      • RED devices use a self-signed certificate in a private trust model rather than the public CA trust model, so there is no danger of a Man-in-the-middle attack fooling the RED device or the Sophos UTM. Also certificate pinning techniques are used to ensure that only our RED devices can connect to the RED server on Sophos UTM. For more reading about certificate pining, please visit Certificate and Public Key Pinning.

        However the self signed certificate can be flagged as a problem on some security audits that don't take the full context of it's use into account. If this is the case, the following steps can be used to ensure that RED server port is only accessible from the source IP addresses of the RED devices themselves.

        We need to create a DNAT rule in Sophos UTM which takes any inbound connections over TCP 3400, and route them to a null interface (any non-existent IP). We then create a second rule to exempt the expected RED traffic from being sent to this null interface / IP.

        First, we need to add a rule that matches the traffic from the internet on port 3400, and sends it to NULL. The NULL object is a host object with a non-routable IP address. This rule ensures that any RED traffic not coming from the branch office address is dropped at the first module in the pipeline.

    Please don't hesitate to PM me if you would like to discuss this issue or your support case further.

    Regards,

Reply
  • Hi  

    Thanks for reaching out and my apologies for your negative experience.

    I was able to locate your support case and review the activities within. Has your third-party compliance scanning provider responded back to you regarding this exception?

    For reference to our community, this was the KB article and information shared:

    • Sophos UTM: RED configuration for PCI DSS compliance
    • Here's the Sophos XG article: Sophos XG Firewall: RED configuration for PCI DSS compliance 
      • RED devices use a self-signed certificate in a private trust model rather than the public CA trust model, so there is no danger of a Man-in-the-middle attack fooling the RED device or the Sophos UTM. Also certificate pinning techniques are used to ensure that only our RED devices can connect to the RED server on Sophos UTM. For more reading about certificate pining, please visit Certificate and Public Key Pinning.

        However the self signed certificate can be flagged as a problem on some security audits that don't take the full context of it's use into account. If this is the case, the following steps can be used to ensure that RED server port is only accessible from the source IP addresses of the RED devices themselves.

        We need to create a DNAT rule in Sophos UTM which takes any inbound connections over TCP 3400, and route them to a null interface (any non-existent IP). We then create a second rule to exempt the expected RED traffic from being sent to this null interface / IP.

        First, we need to add a rule that matches the traffic from the internet on port 3400, and sends it to NULL. The NULL object is a host object with a non-routable IP address. This rule ensures that any RED traffic not coming from the branch office address is dropped at the first module in the pipeline.

    Please don't hesitate to PM me if you would like to discuss this issue or your support case further.

    Regards,

Children
  • Still curious about this point.

    Because UTM uses the same method for years and this question did not came up much in the past years for UTM. 

    This came up quite frequently lately. Most of the time, if i talk to partner / customers, they can create exceptions for our RED Product. Because it relies for years on this mechanism of using self signed certificates. 

  • It is possible the guide I followed previously was for UTM, which caused the REDs to not reconnect after an event.

    I can try the new procedure for XG - however we are awaiting a response from TrustWave.  Unfortunately my time to work on this particular issue is limited, but I hope to do so on 1/15/19.

    Trustwave wants proof that only RED appliances will use the self-signed cert (and that no card-holder data will pass through this connection); this proof was not offered by Sophos, only a statement.  And while in our case, no card-holder data does, if it did - I fear it would be a compliance fail.