Skip to main content
robinh007
Explorer III
April 10, 2025
Solved

Intergrity Checking

  • April 10, 2025
  • 1 reply
  • 1318 views

My observation:

Secure Boot is a general control intended for the configuration review of firewalls. We are using a customized image during firmware updates, which makes this option not mandatory. You can either provide this justification to close the finding or, if feasible, implement the control using the attached reference

 

https://docs.fortinet.com/document/fortigate/7.4.0/new-features/249947/enhance-bios-level-signature-and-file-integrity-checking

What is the relevance of changing the security level to 1 and how we can do this?

Best answer by atakannatak

Hi @robinh007 ,

 

FortiOS introduces an enhanced security framework focused on the BIOS and runtime integrity of FortiGate devices. The improvements aim to detect unauthorized changes and ensure trustworthiness at the firmware level. This includes:

 

  • Stronger file signature validation during firmware upgrades.
  • Improved runtime integrity checking, verifying system files and binaries are not tampered with.
  • Enhanced protection against persistent threats at the BIOS or bootloader level.

Changing the security level to 1 increases the strictness of file and BIOS validation. Here's why it's important:

 

  • Level 0: Default — less strict. Signature and file checks occur, but are not enforced at runtime.
  • Level 1: Enforced — BIOS-level and file integrity checks are strictly applied at boot and during runtime. Any deviation may prevent system operation or trigger alerts.
  • Level 2: It enforces the highest file and firmware integrity by requiring all system files to be signed by both Fortinet’s CA and a trusted third-party CA; if a file has only Fortinet’s signature, FortiOS will run but show warnings, while any unsigned or invalid file prevents the system from running entirely.

Why set the security level to 1 in the FortiGate BIOS configuration:

 

  • Enforces Zero Trust posture on firmware and system files.
  • Crucial for high-security environments (e.g., finance, government, defense).
  • Provides strong assurance against bootkits, firmware tampering, or supply-chain attacks.

You can set the enhanced integrity checking level using CLI (console access only) but reboot required for this process.

 

https://docs.fortinet.com/document/fortigate/7.2.9/fortios-release-notes/661811/bios-level-signature-and-file-integrity-checking-during-downgrade

 

BR.

 

If my answer provided a solution for you, please mark the reply as solved it so that others can get it easily while searching for similar scenarios.

 

CCIE #68781

 

1 reply

atakannatak
Explorer
April 10, 2025

Hi @robinh007 ,

 

FortiOS introduces an enhanced security framework focused on the BIOS and runtime integrity of FortiGate devices. The improvements aim to detect unauthorized changes and ensure trustworthiness at the firmware level. This includes:

 

  • Stronger file signature validation during firmware upgrades.
  • Improved runtime integrity checking, verifying system files and binaries are not tampered with.
  • Enhanced protection against persistent threats at the BIOS or bootloader level.

Changing the security level to 1 increases the strictness of file and BIOS validation. Here's why it's important:

 

  • Level 0: Default — less strict. Signature and file checks occur, but are not enforced at runtime.
  • Level 1: Enforced — BIOS-level and file integrity checks are strictly applied at boot and during runtime. Any deviation may prevent system operation or trigger alerts.
  • Level 2: It enforces the highest file and firmware integrity by requiring all system files to be signed by both Fortinet’s CA and a trusted third-party CA; if a file has only Fortinet’s signature, FortiOS will run but show warnings, while any unsigned or invalid file prevents the system from running entirely.

Why set the security level to 1 in the FortiGate BIOS configuration:

 

  • Enforces Zero Trust posture on firmware and system files.
  • Crucial for high-security environments (e.g., finance, government, defense).
  • Provides strong assurance against bootkits, firmware tampering, or supply-chain attacks.

You can set the enhanced integrity checking level using CLI (console access only) but reboot required for this process.

 

https://docs.fortinet.com/document/fortigate/7.2.9/fortios-release-notes/661811/bios-level-signature-and-file-integrity-checking-during-downgrade

 

BR.

 

If my answer provided a solution for you, please mark the reply as solved it so that others can get it easily while searching for similar scenarios.

 

CCIE #68781

 

robinh007
robinh007Author
Explorer III
April 11, 2025

Thanks mate!! @atakannatak