Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
robinh007
New Contributor III

Intergrity Checking

My observation:

Secure Boot is a general control intended for the configuration review of firewalls. We are using a customized image during firmware updates, which makes this option not mandatory. You can either provide this justification to close the finding or, if feasible, implement the control using the attached reference

 

https://docs.fortinet.com/document/fortigate/7.4.0/new-features/249947/enhance-bios-level-signature-...

What is the relevance of changing the security level to 1 and how we can do this?

RH007
RH007
1 Solution
atakannatak
Contributor II

Hi @robinh007 ,

 

FortiOS introduces an enhanced security framework focused on the BIOS and runtime integrity of FortiGate devices. The improvements aim to detect unauthorized changes and ensure trustworthiness at the firmware level. This includes:

 

  • Stronger file signature validation during firmware upgrades.
  • Improved runtime integrity checking, verifying system files and binaries are not tampered with.
  • Enhanced protection against persistent threats at the BIOS or bootloader level.

Changing the security level to 1 increases the strictness of file and BIOS validation. Here's why it's important:

 

  • Level 0: Default — less strict. Signature and file checks occur, but are not enforced at runtime.
  • Level 1: Enforced — BIOS-level and file integrity checks are strictly applied at boot and during runtime. Any deviation may prevent system operation or trigger alerts.
  • Level 2: It enforces the highest file and firmware integrity by requiring all system files to be signed by both Fortinet’s CA and a trusted third-party CA; if a file has only Fortinet’s signature, FortiOS will run but show warnings, while any unsigned or invalid file prevents the system from running entirely.

Why set the security level to 1 in the FortiGate BIOS configuration:

 

  • Enforces Zero Trust posture on firmware and system files.
  • Crucial for high-security environments (e.g., finance, government, defense).
  • Provides strong assurance against bootkits, firmware tampering, or supply-chain attacks.

You can set the enhanced integrity checking level using CLI (console access only) but reboot required for this process.

 

https://docs.fortinet.com/document/fortigate/7.2.9/fortios-release-notes/661811/bios-level-signature...

 

BR.

 

If my answer provided a solution for you, please mark the reply as solved it so that others can get it easily while searching for similar scenarios.

 

CCIE #68781

 

Atakan Atak

View solution in original post

Atakan Atak
2 REPLIES 2
atakannatak
Contributor II

Hi @robinh007 ,

 

FortiOS introduces an enhanced security framework focused on the BIOS and runtime integrity of FortiGate devices. The improvements aim to detect unauthorized changes and ensure trustworthiness at the firmware level. This includes:

 

  • Stronger file signature validation during firmware upgrades.
  • Improved runtime integrity checking, verifying system files and binaries are not tampered with.
  • Enhanced protection against persistent threats at the BIOS or bootloader level.

Changing the security level to 1 increases the strictness of file and BIOS validation. Here's why it's important:

 

  • Level 0: Default — less strict. Signature and file checks occur, but are not enforced at runtime.
  • Level 1: Enforced — BIOS-level and file integrity checks are strictly applied at boot and during runtime. Any deviation may prevent system operation or trigger alerts.
  • Level 2: It enforces the highest file and firmware integrity by requiring all system files to be signed by both Fortinet’s CA and a trusted third-party CA; if a file has only Fortinet’s signature, FortiOS will run but show warnings, while any unsigned or invalid file prevents the system from running entirely.

Why set the security level to 1 in the FortiGate BIOS configuration:

 

  • Enforces Zero Trust posture on firmware and system files.
  • Crucial for high-security environments (e.g., finance, government, defense).
  • Provides strong assurance against bootkits, firmware tampering, or supply-chain attacks.

You can set the enhanced integrity checking level using CLI (console access only) but reboot required for this process.

 

https://docs.fortinet.com/document/fortigate/7.2.9/fortios-release-notes/661811/bios-level-signature...

 

BR.

 

If my answer provided a solution for you, please mark the reply as solved it so that others can get it easily while searching for similar scenarios.

 

CCIE #68781

 

Atakan Atak
Atakan Atak
robinh007

Thanks mate!! @atakannatak 

RH007
RH007
Announcements
Check out our Community Chatter Blog! Click here to get involved
Labels
Top Kudoed Authors