
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Mon, 13 Apr 2026 20:27:11 GMT</lastBuildDate>
        <item>
            <title><![CDATA[How we built Organizations to help enterprises manage Cloudflare at scale]]></title>
            <link>https://blog.cloudflare.com/organizations-beta/</link>
            <pubDate>Mon, 06 Apr 2026 21:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare Organizations is now in public beta, introducing a new management layer for enterprise customers with multiple accounts. Learn how we consolidated our authorization systems to enable org-wide management.  ]]></description>
            <content:encoded><![CDATA[ <p>Cloudflare was designed to be simple to use for even the smallest customers, but it’s also critical that it scales to meet the needs of the largest enterprises. While smaller customers might work solo or in a small team, enterprises often have thousands of users making use of Cloudflare’s developer, security, and networking capabilities. This scale can add complexity, as these users represent multiple teams and job functions. </p><p>Enterprise customers often use multiple <a href="https://developers.cloudflare.com/fundamentals/account/create-account/"><u>Cloudflare Accounts</u></a> to segment their teams (allowing more autonomy and separation of roles), but this can cause a new set of problems for the administrators by fragmenting their controls.</p><p>That’s why today, we’re launching our new Organizations feature in beta — to provide a cohesive place for administrators to manage users, configurations, and view analytics across many Cloudflare Accounts. </p>
    <div>
      <h2>Principle of least privilege</h2>
      <a href="#principle-of-least-privilege">
        
      </a>
    </div>
    <p>The principle of least privilege is one of the driving factors behind enterprises using multiple accounts. While Cloudflare’s role-based access control (RBAC) system now offers <a href="https://developers.cloudflare.com/changelog/post/2025-10-01-fine-grained-permissioning-beta/"><u>fine-grained permissions</u></a> for many resources, it can be cumbersome to enumerate all the resources one by one. Instead, we see enterprises use multiple accounts, so each team’s resources are managed by that team alone. This allows organic growth within the account: they can add new resources as needed, without giving Administrative control too widely. </p><p>While multiple accounts are great at limiting permissions for most of the users within an organization, they complicate things for the administrators, as the administrators need to be added to every account and given the appropriate permissions to handle tasks like reporting or setting policies. This situation is fragile, as other administrators could remove them.</p>
    <div>
      <h2>Organizations</h2>
      <a href="#organizations">
        
      </a>
    </div>
    <p>We designed <a href="https://developers.cloudflare.com/fundamentals/organizations/"><u>Cloudflare Organizations</u></a> with these scenarios in mind. Organizations adds a new layer to the hierarchy so that administrators can manage a collection of accounts together. Organizations is built on top of the <a href="https://developers.cloudflare.com/tenant/"><u>Tenant</u></a> system, which we created to support the needs of Cloudflare’s partner ecosystem. This provides a strong foundation for the many new features we’ve built with enterprises in mind. </p>
    <div>
      <h3>Features</h3>
      <a href="#features">
        
      </a>
    </div>
    
    <div>
      <h4>Account list</h4>
      <a href="#account-list">
        
      </a>
    </div>
    <p>The account list is at the core of the organization. This is a flat list of all the accounts that have been onboarded to the organization. “Org Super Administrator” is a new user role that is managed at the organization level; users with this role can add more accounts to the list as long as they are a Super Administrator of the account as well.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4LThxKEAFT6H3Tb8YypZUj/53baf77029a6da59b9cc2fd13be04f5d/BLOG-3245image2.png" />
          </figure>
    <div>
      <h4>Org Super Administrators</h4>
      <a href="#org-super-administrators">
        
      </a>
    </div>
    <p>Org Super Administrators have Super Administrator permissions to every account in the organization. They do not require a membership in any of the child accounts and will not be listed in the account level UI. Org Super Administrator is the first of many roles we anticipate adding at the organization layer over the course of the year.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2z7czWidmYeFay9jx6Gv4W/b1ebea039f5dc1e64c7dea9e30d4aa59/BLOG-3245image6.png" />
          </figure><p>This feature was the culmination of a major <a href="https://github.com/resources/articles/innersource"><u>innersource development</u></a> project that we ran within the organization to remove legacy codepaths and consolidate every authorization check on our <a href="https://blog.cloudflare.com/domain-scoped-roles-ga/"><u>domain-scoped roles system</u></a>. We added almost 133,000 lines of new code and removed about 32,000 lines of old code in support of this, making it one of the largest changes to our permissions system ever. This foundational improvement will make it easier to deliver additional roles in the future, both at the organization and account levels. We also made a 27% performance improvement in how we check permissions on enumeration calls like /accounts or /zones, which previously struggled with users that have access to thousands of accounts.</p>
    <div>
      <h4>Analytics</h4>
      <a href="#analytics">
        
      </a>
    </div>
    <p>Org super administrators can view a roll-up dashboard complete with analytics about their HTTP traffic from across all accounts and zones. HTTP traffic analytics is the first of many analytics dashboards that we expect to deliver over the course of the year as we add this feature for more products. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4GMhq9wMeoU95gawztpCXB/5cdba02f65008df0dc0a1327c9e242b9/BLOG-3245image4.png" />
          </figure>
    <div>
      <h4>Shared configurations</h4>
      <a href="#shared-configurations">
        
      </a>
    </div>
    <p>Managing shared policies across your organization allows one team to centrally manage features like WAF (Web Application Firewall) or Gateway policies. Org Super Administrators will have the ability to share a policy set from one account to the rest of the accounts within the organization. That means any users in the source account with permission to manage those configurations can update the policy sets. So security analysts can update WAF rules for an entire enterprise centrally, without needing to be org administrators or administrators of other accounts in the organization. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2S3NWXMyP6vl5EyeYC79qB/205c49f2e829509b7e7ea19fe6e1ef34/BLOG-3245image1.png" />
          </figure>
    <div>
      <h2>Roadmap</h2>
      <a href="#roadmap">
        
      </a>
    </div>
    <p>We’ve limited the initial launch of Organizations only to enterprise customers, but will be expanding it to all customers in the coming months starting with pay-as-you-go customers. We’ll be working to extend this to our partner ecosystem too, but have a number of special scenarios we need to address for them before we do.</p><p>There’s a lot more on the roadmap in this space. Keep an eye on the <a href="https://developers.cloudflare.com/changelog/"><u>changelog</u></a> for capabilities coming soon:</p><ul>
    <li>
        Organization-level audit logs
    </li>
    <li>
        Organization-level billing reports
    </li>
    <li>
        More organization-level analytics reports
    </li>
    <li>
        Additional organization user roles
    </li>
    <li>
        Self-serve account creation
    </li>
</ul>
    <div>
      <h2>A security-first rollout</h2>
      <a href="#a-security-first-rollout">
        
      </a>
    </div>
    <p>Organizations is rolling out in public beta over the next several days to enterprise customers. In introducing Organizations, our own key requirements are that we do not elevate privilege for any users, and that customers create just one organization each. To deliver on those requirements, we elected not to do a backfill and create organizations on your behalf, and are instead using a self-serve invitation process. </p><p>If you are a Super Administrator of an enterprise account, and nobody else has created an organization for your company, then you will see an invitation to create an organization in your Cloudflare dashboard. Once you have created an organization, you can add accounts to the organization if you are a super administrator of that account as well.</p><p>If another user in your company has already claimed the organization, then they can either invite you as an Org Super Administrator so that you can add your accounts to the organization, or you can invite them as a Super Administrator of your account, so they can add your account to the organization. This process ensures that no user ever gets permission to a Cloudflare account where a Super Administrator was not involved in approving it. Cloudflare support will not be making configuration changes on behalf of customers, so plan to work with other administrators to complete your internal rollout of Organizations. </p>
    <div>
      <h2>Get started</h2>
      <a href="#get-started">
        
      </a>
    </div>
    <p>If you’re a Super Administrator of an enterprise account, claim your company’s organization now. There is no additional fee for using Organizations. You can find more details on how to get started in the Dashboard under the new Organizations tab, or at our <a href="https://developers.cloudflare.com/fundamentals/organizations/"><u>developer docs</u></a>. </p><p>If you’re not an enterprise customer, keep an eye on our <a href="https://developers.cloudflare.com/changelog/"><u>changelog</u></a> for more information about when Organizations will be available for your plan. And to learn more about our enterprise offerings, our <a href="https://www.cloudflare.com/plans/enterprise/contact/"><u>enterprise sales team</u></a> can get you started today.</p> ]]></content:encoded>
            <category><![CDATA[Identity]]></category>
            <category><![CDATA[Enterprise]]></category>
            <guid isPermaLink="false">5wIrgcYpkdmQZSnU1skUjM</guid>
            <dc:creator>Justin Hutchings</dc:creator>
            <dc:creator>Adam Bouhmad</dc:creator>
            <dc:creator>Nick Zylstra</dc:creator>
        </item>
        <item>
            <title><![CDATA[Advancing account security as part of Cloudflare’s commitment to CISA’s Secure by Design pledge]]></title>
            <link>https://blog.cloudflare.com/advancing-account-security-as-part-of-cloudflare-commitment-to-cisa-secure-by-design-pledge/</link>
            <pubDate>Mon, 17 Mar 2025 13:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare has made significant progress in boosting multi-factor authentication (MFA) adoption. With the addition of Apple and Google social logins, we’ve made secure access easier for our users. ]]></description>
            <content:encoded><![CDATA[ <p>In May 2024, Cloudflare signed the <a href="https://www.cisa.gov/"><u>Cybersecurity and Infrastructure Security Agency (CISA)</u></a> Secure By Design <a href="https://blog.cloudflare.com/secure-by-design-principles/#what-do-secure-by-design-and-secure-by-default-mean"><u>pledge</u></a>. Since then, Cloudflare has been working to enhance the security of our products, ensuring that users are better protected from evolving threats. </p><p>Today we are excited to talk about the improvements we have made towards <a href="https://www.cisa.gov/securebydesign/pledge#:~:text=Pledge%20Goals-,Multi%2Dfactor%20authentication%20(MFA),-Goal%3A%20Within%20one"><u>goal number one</u></a> in the pledge, which calls for increased multi-factor authentication (MFA) adoption. MFA takes many forms across the industry, from app-based and hardware key authentication, to email or SMS. Since signing the CISA pledge we have continued to iterate on our MFA options for users, and most recently added support for social logins with Apple and Google, building on the strong foundation that both of these partners offer their users with required MFA for most accounts. Since introducing social logins last year, about 25% of our users use it weekly, and it makes up a considerable portion of our MFA secured users. There’s much more to do in this space, and we are continuing to invest in more options to help secure your accounts. </p>
    <div>
      <h3>Mirror, mirror on the wall who is the most secure of them all?</h3>
      <a href="#mirror-mirror-on-the-wall-who-is-the-most-secure-of-them-all">
        
      </a>
    </div>
    <p>According to the <a href="https://www.verizon.com/business/resources/T663/reports/2024-dbir-data-breach-investigations-report.pdf"><u>2024 Verizon Data Breach Investigations Report</u></a>, leaked credentials continue to be the top cause of application breaches. Even when users employ strong passwords, attackers often make use of techniques like <a href="https://owasp.org/www-community/attacks/Credential_stuffing"><u>credential stuffing</u></a>, or <a href="https://owasp.org/www-community/attacks/Password_Spraying_Attack"><u>password spraying</u></a>, to gain unauthorized access to accounts. These approaches build on previous data breaches and are much quicker than brute force attacks of the past.  </p><p>Ultimately, the most effective defense against these threats is <a href="https://www.cloudflare.com/en-gb/learning/access-management/what-is-multi-factor-authentication/"><b><u>multi-factor authentication (MFA)</u></b></a>. By requiring an additional verification step beyond just a password, MFA significantly strengthens account security. In fact, studies show that MFA can block <a href="https://www.microsoft.com/en-us/security/blog/2019/08/20/one-simple-action-you-can-take-to-prevent-99-9-percent-of-account-attacks/"><b><u>99.9% of automated attacks</u></b></a>, reducing the risk of unauthorized access even if your credentials are compromised. </p><p>Every user on Cloudflare is protected by our <a href="https://developers.cloudflare.com/fundamentals/setup/account/account-security/multi-factor-email-authentication/"><u>built-in challenge system</u></a>, which will prompt users for a multi-factor authentication code from their email whenever they log in from a new IP address. This provides an important layer of protection by default.</p><p>At Cloudflare, MFA is available to <b>all</b> Cloudflare customers, and we strongly encourage every user to enable at least one additional authentication factor to better protect their account.</p>
    <div>
      <h3>What’s new?</h3>
      <a href="#whats-new">
        
      </a>
    </div>
    <p>We made a number of improvements over the course of 2024 to protect you, with more ways to secure your account and adopt MFA. </p>
    <div>
      <h4>Social login with Google and Apple</h4>
      <a href="#social-login-with-google-and-apple">
        
      </a>
    </div>
    <p>Social login allows you to login to Cloudflare using the secure credentials you already use for your Google or Apple accounts. Most Apple and Google accounts have mandatory multi-factor authentication, so this approach provides a seamless and robust layer of security. By reducing the need to manage separate credentials, social login also makes it easier for customers to secure their accounts from the start. </p><p>Social login has quickly become one of our top login methods, comprising about 25% of all logins weekly on Cloudflare. </p>
    <div>
      <h4>Leaked password notifications</h4>
      <a href="#leaked-password-notifications">
        
      </a>
    </div>
    <p>Cloudflare automatically detects and notifies users who are using known, <a href="https://blog.cloudflare.com/helping-keep-customers-safe-with-leaked-password-notification/"><u>leaked passwords</u></a>. These users are then asked to change their password when they log into Cloudflare. This ensures that users with leaked passwords can address this security lapse easily and keep themselves safe. </p>
    <div>
      <h3>Improve your security posture</h3>
      <a href="#improve-your-security-posture">
        
      </a>
    </div>
    <p>If you’re not already using MFA on your account, you have options. It’s never too late to reevaluate your security posture! </p>
    <div>
      <h4>Replace default passwords with strong passwords  </h4>
      <a href="#replace-default-passwords-with-strong-passwords">
        
      </a>
    </div>
    <p>As much as we’re focused on MFA, creation of a strong password is the first line of defense for secure MFA! To safeguard our users, and in alignment with <a href="https://www.cisa.gov/securebydesign/pledge#:~:text=READ%20MORE-,Default%20passwords,-Goal%3A%20Within%20one"><u>CISA Goal #2 (Default Passwords)</u></a>, Cloudflare does not provide users with preconfigured passwords, or  “default passwords”, during initial password generation. This helps reduce the risk of automated attacks such as credential stuffing and brute force attempts which often target default logins. </p><p>Instead, Cloudflare advocates for strong user-generated passwords. Ideally, users choose unique passwords they have not used before and meet the <a href="https://www.cisa.gov/secure-our-world/use-strong-passwords"><u>CISA recommendations for password creation</u></a>. Use of a password manager can help users adopt strong passwords and reduce friction. By enforcing unique strong passwords, our company ensures a higher level of security making unauthorized access significantly more difficult. </p>
    <div>
      <h4>Enable MFA for your account</h4>
      <a href="#enable-mfa-for-your-account">
        
      </a>
    </div>
    <p>Cloudflare supports multiple MFA methods. The most secure option is to use a phishing-resistant security key like a YubiKey, or a hardware key that is built into your primary computer like Windows Hello or Apple’s TouchID. We also support Time-Based One-Time passwords (TOTP) using a mobile authenticator app like Google Authenticator or Microsoft Authenticator. Importantly, these apps support optional backup to the cloud, so if you ever lose your phone, you’ll still be able to get into your account. Don’t forget to download backup codes and store them somewhere safe like your password manager in case you lose your MFA device! <a href="https://developers.cloudflare.com/fundamentals/setup/account/account-security/2fa"><u>Configure MFA for your account now</u></a> in the Cloudflare dashboard. </p>
    <div>
      <h4>Require MFA for all users in your Cloudflare account</h4>
      <a href="#require-mfa-for-all-users-in-your-cloudflare-account">
        
      </a>
    </div>
    <p>If you’re an administrator for a Cloudflare account and want to ensure your users are all using MFA, you can set this as a policy on the account in the Manage Members experience. Note, this setting is not available if you have not used MFA, or if your users are using social login. For social login we encourage users to set up MFA on their associated accounts. </p>
    <div>
      <h4>Enable SSO for your enterprise</h4>
      <a href="#enable-sso-for-your-enterprise">
        
      </a>
    </div>
    <p>For enterprise customers, <a href="https://developers.cloudflare.com/cloudflare-one/applications/configure-apps/dash-sso-apps/"><b><u>single sign-on (SSO)</u></b></a> is one of the most secure and convenient ways to manage authentication at scale. At Cloudflare, we offer SSO free of charge to all enterprise customers and actively encourage organizations to enable it for stronger security. </p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[2FA]]></category>
            <category><![CDATA[CISA]]></category>
            <guid isPermaLink="false">4hqEBqkVICd3mxzq92gbQe</guid>
            <dc:creator>Kristina Galicova</dc:creator>
            <dc:creator>Justin Hutchings</dc:creator>
        </item>
    </channel>
</rss>