
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Tue, 14 Apr 2026 19:00:40 GMT</lastBuildDate>
        <item>
            <title><![CDATA[Everything you need to know about NIST’s new guidance in “SP 1800-35: Implementing a Zero Trust Architecture”]]></title>
            <link>https://blog.cloudflare.com/nist-sp-1300-85/</link>
            <pubDate>Thu, 19 Jun 2025 13:00:00 GMT</pubDate>
            <description><![CDATA[ We read NIST’s new guidance on “Implementing a Zero-Trust Architecture” so that you don’t have to.  Read this to get the key points on the newly-released NIST Special Publication 1800-35.  ]]></description>
            <content:encoded><![CDATA[ <p>For decades, the United States <a href="https://www.nist.gov/"><u>National Institute of Standards and Technology (NIST)</u></a> has been guiding industry efforts through the many publications in its <a href="https://csrc.nist.gov/"><u>Computer Security Resource Center</u></a>. NIST has played an especially important role in the adoption of Zero Trust architecture, through its series of publications that began with <a href="https://csrc.nist.gov/pubs/sp/800/207/final"><u>NIST SP 800-207: Zero Trust Architecture</u></a>, released in 2020.</p><p>NIST has released another Special Publication in this series, <a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1800-35.pdf"><u>SP 1800-35</u></a>, titled "Implementing a Zero Trust Architecture (ZTA)" which aims to provide practical steps and <a href="https://www.cloudflare.com/learning/access-management/how-to-implement-zero-trust/">best practices for deploying ZTA</a> across various environments.  NIST’s publications about ZTA have been extremely influential across the industry, but are often lengthy and highly detailed, so this blog provides a short and easier-to-read summary of NIST’s latest guidance on ZTA.</p><p>And so, in this blog post:</p><ul><li><p>We summarize the key items you need to know about this new NIST publication, which presents a reference architecture for <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust Architecture (ZTA)</a> along with a series of “Builds” that demonstrate how different products from various vendors can be combined to construct a ZTA that complies with the reference architecture.</p></li><li><p>We show how <a href="https://www.cloudflare.com/zero-trust/products/">Cloudflare’s Zero Trust product suite</a> can be integrated with offerings from other vendors to support a Zero Trust Architecture that maps to the NIST’s reference architecture.</p></li><li><p>We highlight a few key features of Cloudflare’s Zero Trust platform that are especially valuable to customers seeking compliance with NIST’s ZTA reference architecture, including compliance with FedRAMP and new post-quantum cryptography standards.</p></li></ul><p>Let’s dive into NIST’s special publication!</p>
    <div>
      <h2>Overview of SP 1800-35</h2>
      <a href="#overview-of-sp-1800-35">
        
      </a>
    </div>
    <p>In <a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1800-35.pdf"><u>SP 1800-35</u></a>, NIST reminds us that:</p><blockquote><p><i>A zero-trust architecture (ZTA) enables secure authorized access to assets — machines, applications and services running on them, and associated data and resources — whether located on-premises or in the cloud, for a hybrid workforce and partners based on an organization’s defined access policy.</i></p></blockquote><p>NIST uses the term Subject to refer to entities (i.e. employees, developers, devices) that require access to Resources (i.e. computers, databases, servers, applications).  <a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1800-35.pdf"><u>SP 1800-35</u></a> focuses on developing and demonstrating various ZTA implementations that allow Subjects to access Resources. Specifically, the reference architecture in <a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1800-35.pdf"><u>SP 1800-35</u></a> focuses mainly on <i>EIG</i> or “Enhanced Identity Governance”, a specific approach to Zero Trust Architecture, which is defined by NIST in <a href="https://doi.org/10.6028/NIST.SP.800-207"><u>SP 800-207</u></a> as follows:</p><blockquote><p><i>For [the EIG] approach, enterprise resource access policies are based on identity and assigned attributes. </i></p><p><i>The primary requirement for [R]esource access is based on the access privileges granted to the given [S]ubject. Other factors such as device used, asset status, and environmental factors may alter the final confidence level calculation … or tailor the result in some way, such as granting only partial access to a given [Resource] based on network location.</i></p><p><i>Individual [R]esources or [policy enforcement points (PEP)] must have a way to forward requests to a policy engine service or authenticate the [S]ubject and approve the request before granting access.</i></p></blockquote><p>While there are other approaches to ZTA mentioned in the original NIST <a href="https://doi.org/10.6028/NIST.SP.800-207"><u>SP 800-207</u></a>, we omit those here because <a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1800-35.pdf"><u>SP 1800-35</u></a> focuses mostly on EIG.</p><p>The ZTA reference architecture from <a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1800-35.pdf"><u>SP 1800-35</u></a> focuses on EIG approaches as a set of logical components as shown in the figure below.  Each component in the reference architecture does not necessarily correspond directly to physical (hardware or software) components, or products sold by a single vendor, but rather to the logical functionality of the component.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/hXSpBQINdjqyl57by3Uhc/fd39f66cebc2dd0a79dc4749b02208f3/image4.png" />
          </figure><p><sup><i>Figure 1: General ZTA Reference Architecture. Source: NIST, </i></sup><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1800-35.pdf"><sup><i><u>Special Publication 1800-35</u></i></sup></a><sup><i>, "Implementing a Zero Trust Architecture (ZTA)”, 2025.</i></sup></p><p>The logical components in the reference architecture are all related to the implementation of policy. Policy is crucial for ZTA because the whole point of a ZTA is to apply policies that determine who has access to what, when and under what conditions.</p><p>The core components of the reference architecture are as follows:</p><p>| Policy Enforcement Point(PEP) | The PEP protects the “trust zones” that host enterprise Resources, and handles enabling, monitoring, and eventually terminating connections between Subjects and Resources.  You can think of the PEP as the dataplane that supports the Subject’s access to the Resources.</p><div>
    <figure>
        <table>
            <colgroup>
                <col></col>
                <col></col>
            </colgroup>
            <tbody>
                <tr>
                    <td>
                        <p><span><span>Policy Enforcement Point</span></span><br /><span><span>(PEP)</span></span></p>
                    </td>
                    <td>
                        <p><span><span>The PEP protects the “trust zones” that host enterprise Resources, and handles enabling, monitoring, and eventually terminating connections between Subjects and Resources.  You can think of the PEP as the dataplane that supports the Subject’s access to the Resources.</span></span></p>
                    </td>
                </tr>
                <tr>
                    <td>
                        <p><span><span>Policy Engine</span></span></p>
                        <p><span><span>(PE)</span></span></p>
                    </td>
                    <td>
                        <p><span><span>The PE handles the ultimate decision to grant, deny, or revoke access to a Resource for a given Subject, and calculates the trust scores/confidence levels and ultimate access decisions based on enterprise policy and information from supporting components. </span></span></p>
                    </td>
                </tr>
                <tr>
                    <td>
                        <p><span><span>Policy Administrator</span></span></p>
                        <p><span><span>(PA)</span></span></p>
                    </td>
                    <td>
                        <p><span><span>The PA executes the PE’s policy decision by sending commands to the PEP to establish and terminate the communications path between the Subject and the Resource.</span></span></p>
                    </td>
                </tr>
                <tr>
                    <td>
                        <p><span><span>Policy Decision Point (PDP)</span></span></p>
                    </td>
                    <td>
                        <p><span><span>The PDP is where the decision as to whether or not to permit a Subject to access a Resource is made.  The PIP included the Policy Engine (PE) and the Policy Administrator (PA).  You can think of the PDP as the control plane that controls the Subject’s access to the Resources.</span></span></p>
                    </td>
                </tr>
            </tbody>
        </table>
    </figure>
</div><p>The PDP operates on inputs from Policy Information Points (PIPs) which are supporting components that provide critical data and policy rules to the Policy Decision Point (PDP).</p><div>
    <figure>
        <table>
            <colgroup>
                <col></col>
                <col></col>
            </colgroup>
            <tbody>
                <tr>
                    <td>
                        <p><span><span>Policy Information Point</span></span></p>
                        <p><span><span>(PIP)</span></span></p>
                    </td>
                    <td>
                        <p><span><span>The PIPs provide various types of telemetry and other information needed for the PDP to make informed access decisions.  Some PIPs include:</span></span></p>
                        <ul>
                            <li><span><span>ICAM, or Identity, Credential, and Access Management, covering user authentication, single sign-on, user groups and access control features that are typically offered by Identity Providers (IdPs) like Okta, AzureAD or Ping Identity.  </span></span></li>
                            <li><span><span>Endpoint security includes endpoint detection and response (EDR) or endpoint protection platforms (EPP) that protect end user devices like laptops and mobile devices.  An EPP primarily focuses on preventing known threats using features like antivirus protection. Meanwhile, an EDR actively detects and responds to threats that may have already breached initial defenses using forensics, behavioral analysis and incident response tools. EDR and EPP products are offered by vendors like </span></span><a href="https://developers.cloudflare.com/cloudflare-one/identity/devices/service-providers/crowdstrike/"><span><span><u>CrowdStrike</u></span></span></a><span><span>, </span></span><a href="https://developers.cloudflare.com/cloudflare-one/identity/devices/service-providers/microsoft/"><span><span><u>Microsoft</u></span></span></a><span><span>, </span></span><a href="https://developers.cloudflare.com/cloudflare-one/identity/devices/service-providers/sentinelone/"><span><span><u>SentinelOne</u></span></span></a><span><span>, and </span></span><a href="https://developers.cloudflare.com/cloudflare-one/identity/devices/service-providers/"><span><span><u>more</u></span></span></a><span><span>. </span></span></li>
                            <li><span><span>Security Analytics and Data Security products use data collection, aggregation, and analysis to discover security threats using network traffic, user behavior, and other system data, such as, </span></span><a href="https://blog.cloudflare.com/customers-get-increased-integration-with-cloudflare-email-security-and-zero-trust/"><span><span><u>CrowdStrike</u></span></span></a><span><span>, </span></span><a href="https://developers.cloudflare.com/logs/get-started/enable-destinations/datadog/"><span><span><u>Datadog</u></span></span></a><span><span>, </span></span><a href="https://developers.cloudflare.com/logs/get-started/enable-destinations/ibm-qradar/"><span><span><u>IBM QRadar</u></span></span></a><span><span>, </span></span><a href="https://developers.cloudflare.com/analytics/analytics-integrations/sentinel/"><span><span><u>Microsoft Sentinel</u></span></span></a><span><span>, </span></span><a href="https://developers.cloudflare.com/logs/get-started/enable-destinations/new-relic/"><span><span><u>New Relic</u></span></span></a><span><span>, </span></span><a href="https://developers.cloudflare.com/logs/get-started/enable-destinations/splunk/"><span><span><u>Splunk</u></span></span></a><span><span>, and more.</span></span></li>
                        </ul>
                        <p> </p>
                        <p><span><span>NIST’s figure might suggest that supporting components in the PIP are mere plug-ins responding in real-time to the PDP.  However, for many vendors, the ICAM, EDR/EPP, security analytics, and data security PIPs often represent complex and distributed infrastructures.</span></span></p>
                    </td>
                </tr>
            </tbody>
        </table>
    </figure>
</div>
    <div>
      <h2>Crawl or run, but don’t walk</h2>
      <a href="#crawl-or-run-but-dont-walk">
        
      </a>
    </div>
    <p>Next, the <a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1800-35.pdf"><u>SP 1800-35</u></a> introduces two more detailed reference architectures, the “Crawl Phase” and the “Run Phase”.  The “Run Phase” corresponds to the reference architecture that is shown in the figure above.  The “Crawl Phase” is a simplified version of this reference architecture that only deals with protecting on-premise Resources, and omits cloud Resources. Both of these phases focused on Enhanced Identity Governance approaches to ZTA, as we defined above. <a href="https://www.nccoe.nist.gov/sites/default/files/2024-11/zta-nist-sp-1800-35-ipd.pdf"><u>NIST stated</u></a>, "<i>We are skipping the EIG walk phase and have proceeded directly to the run phase</i>".</p><p>The <a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1800-35.pdf"><u>SP 1800-35</u></a> then provides a sequence of detailed instructions, called “Builds”, that show how to implement “Crawl Phase” and “Run Phase” reference architectures using products sold by various vendors.</p><p>Since Cloudflare’s Zero Trust platform natively supports access to both cloud and on-premise resources, we will skip over the “Crawl Phase” and move directly to showing how Cloudflare’s Zero Trust platform can be used to support “Run Phase” of the reference architecture.</p>
    <div>
      <h2>A complete Zero Trust Architecture using Cloudflare and integrations</h2>
      <a href="#a-complete-zero-trust-architecture-using-cloudflare-and-integrations">
        
      </a>
    </div>
    <p>Nothing in NIST SP 1800-35 represents an endorsement of specific vendor technologies. Instead, the intent of the publication is to offer a general architecture that applies regardless of the technologies or vendors an organization chooses to deploy.   It also includes a series of “Builds” using a variety of technologies from different vendors, that allow organizations to achieve a ZTA.   This section describes how Cloudflare fits in with a ZTA, enabling you to accelerate your ZTA deployment from Crawl directly to Run.</p><p>Regarding the “Builds” in SP 1800-35, this section can be viewed as an aggregation of the following three specific builds:</p><ul><li><p><a href="https://pages.nist.gov/zero-trust-architecture/VolumeB/appendices/Appendix-E1B3.html#enterprise-1-build-3-e1b3-sdp-zscaler-zpa-ca-as-pe"><u>Enterprise 1 Build 3 (E1B3)</u></a>: <a href="https://www.cloudflare.com/learning/access-management/software-defined-perimeter/">Software-Defined Perimeter (SDP)</a> with Cloudflare as the Policy Engine (PE).</p></li><li><p><a href="https://pages.nist.gov/zero-trust-architecture/VolumeB/appendices/Appendix-E2B4.html#enterprise-2-build-4-e2b4-sdp-and-sase-symantec-cloud-secure-web-gateway-symantec-ztna-and-symantec-cloud-access-security-broker-as-pes"><u>Enterprise 2 Build 4 (E2B4)</u></a>: SDP and <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/">Secure Access Service Edge (SASE) </a>with <a href="https://www.cloudflare.com/zero-trust/products/gateway/">Cloudflare Secure Web Gateway</a>, <a href="https://www.cloudflare.com/zero-trust/products/access/">Cloudflare Zero Trust Network Access (ZTNA)</a>, and Cloudflare Cloud Access Security Broker as PEs.</p></li><li><p><a href="https://pages.nist.gov/zero-trust-architecture/VolumeB/appendices/Appendix-E3B5.html#enterprise-3-build-5-e3b5-sdp-and-sase-microsoft-entra-conditional-access-formerly-called-azure-ad-conditional-access-and-microsoft-security-service-edge-as-pes"><u>Enterprise 3 Build 5 (E3B5)</u></a>: SDP and SASE with Microsoft Entra Conditional Access (formerly known as Azure AD Conditional Access) and Cloudflare Zero Trust as PEs.</p></li></ul><p>Now let’s see how we can map Cloudflare’s Zero Trust platform to the ZTA reference architecture:</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/677H4TOcuuJQuQF51jgP5S/4c21589a9c61571182241e2255308b08/image3.png" />
          </figure><p><sup><i>Figure 2: General ZTA Reference Architecture Mapped to Cloudflare Zero Trust &amp; Key Integrations. Source: NIST, </i></sup><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1800-35.pdf"><sup><i><u>Special Publication 1800-35</u></i></sup></a><sup><i>, "Implementing a Zero Trust Architecture (ZTA)”, 2025, with modification by Cloudflare.</i></sup></p><p>Cloudflare’s platform simplifies complexity by delivering the PEP via our global anycast network and the PDP via our Software-as-a-Service (SaaS) management console, which also serves as a global unified control plane. A complete ZTA involves integrating Cloudflare with PIPs provided by other vendors, as shown in the figure above.</p><p>Now let’s look at several key points in the figure.</p><p>In the bottom right corner of the figure are Resources, which may reside on-premise, in private data centers, or across multiple cloud environments.  Resources are made securely accessible through Cloudflare’s global anycast network via <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-networks/"><u>Cloudflare Tunnel</u></a> (as shown in the figure) or <a href="https://developers.cloudflare.com/magic-wan/"><u>Magic WAN</u></a> (not shown). Resources are shielded from direct exposure to the public Internet by placing them behind <a href="https://www.cloudflare.com/en-au/zero-trust/products/access/"><u>Cloudflare Access</u></a> and <a href="https://www.cloudflare.com/en-au/zero-trust/products/gateway/"><u>Cloudflare Gateway</u></a>, which are PEPs that enforce zero-trust principles by granting access to Subjects that conform to policy requirements.</p><p>In the bottom left corner of the figure are Subjects, both human and non-human, that need access to Resources.  With Cloudflare’s platform, there are multiple ways that Subjects can again access to Resources, including:</p><ul><li><p>Agentless approaches that allow end users to access Resources directly from their <a href="https://developers.cloudflare.com/learning-paths/zero-trust-web-access/concepts/"><u>web browsers</u></a>. Alternatively, Cloudflare’s <a href="https://developers.cloudflare.com/magic-wan/"><u>Magic WAN</u></a> can be used to support connections from enterprise networks directly to Cloudflare’s global anycast network via <a href="https://developers.cloudflare.com/magic-wan/reference/tunnels/"><u>IPsec tunnels, GRE tunnels</u></a> or <a href="https://developers.cloudflare.com/magic-wan/network-interconnect/"><u>Cloudflare Network Interconnect (CNI)</u></a>.</p></li><li><p>Agent-based approaches use Cloudflare’s lightweight <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/"><u>WARP client</u></a>, which protects corporate devices by securely and privately sending traffic to Cloudflare's global network.</p></li></ul><p>Now we move onto the PEP (the Policy Enforcement Point), which is the dataplane of our ZTA.   Cloudflare Access is a modern <a href="https://www.cloudflare.com/learning/access-management/what-is-ztna/">Zero Trust Network Access </a>solution that serves as a dynamic PEP, enforcing user-specific application access policies based on identity, device posture, context, and other factors.  Cloudflare Gateway is a Secure Web Gateway for filtering and inspecting traffic sent to the public Internet, serving as a dynamic PEP that provides DNS, HTTP and network traffic filtering, DNS resolver policies, and egress IP policies.</p><p>Both Cloudflare Access and Cloudflare Gateway rely on Cloudflare’s control plane, which acts as a PDP offering a policy engine (PE) and policy administrator (PA).  This PDP takes in inputs from PIPs provided by integrations with other vendors for ICAM, endpoint security, and security analytics.  Let’s dig into some of these integrations.</p><ul><li><p><b>ICAM: </b>Cloudflare’s control plane integrates with many ICAM providers that provide <a href="https://www.cloudflare.com/learning/access-management/what-is-sso/">Single Sign On (SSO</a>) and <a href="https://www.cloudflare.com/learning/access-management/what-is-multi-factor-authentication/">Multi-Factor Authentication (MFA)</a>. The ICAM provider authenticates human Subjects and passes information about authenticated users and groups back to Cloudflare’s control plane using <a href="https://www.cloudflare.com/learning/access-management/what-is-saml/"><u>Security Assertion Markup Language (SAML)</u></a> or <a href="https://openid.net/developers/how-connect-works/"><u>OpenID Connect (OIDC)</u></a> integrations.  Cloudflare’s ICAM integration also supports AI/ML powered <a href="https://blog.cloudflare.com/protect-against-identity-based-attacks-by-sharing-cloudflare-user-risk-with-okta/"><u>behavior-based user risk scoring</u></a>, exchange, and re-evaluation.

In the figure above, we depicted Okta as the ICAM provider, but Cloudflare supports many other ICAM vendors (e.g. <a href="https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/entra-id/"><u>Microsoft Entra</u></a>, <a href="https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/jumpcloud-saml/"><u>Jumpcloud</u></a>, <a href="https://blog.cloudflare.com/multi-sso-and-cloudflare-access-adding-linkedin-and-github-teams/"><u>GitHub SSO</u></a>, <a href="https://blog.cloudflare.com/cloudflare-ping/"><u>PingOne</u></a>).   For non-human Subjects — such as service accounts, Internet of Things (IoT) devices, or machine identities — authentication can be performed through <a href="https://developers.cloudflare.com/cloudflare-one/identity/devices/warp-client-checks/client-certificate/"><u>certificates</u></a>, <a href="https://developers.cloudflare.com/cloudflare-one/identity/service-tokens/"><u>service tokens</u></a>, or other cryptographic methods.</p></li><li><p><b>Endpoint security: </b>Cloudflare’s control plane integrates with many endpoint security providers to exchange signals, such as device posture checks and user risk levels. Cloudflare facilitates this through integrations with endpoint detection and response EDR/EPP solutions, such as <a href="https://developers.cloudflare.com/cloudflare-one/identity/devices/service-providers/crowdstrike/"><u>CrowdStrike</u></a>, <a href="https://developers.cloudflare.com/cloudflare-one/identity/devices/service-providers/microsoft/"><u>Microsoft</u></a>, <a href="https://developers.cloudflare.com/cloudflare-one/identity/devices/service-providers/sentinelone/"><u>SentinelOne</u></a>, and <a href="https://developers.cloudflare.com/cloudflare-one/identity/devices/service-providers/"><u>more</u></a>. When posture checks are enabled with one of these vendors such as Microsoft, device state changes, <a href="https://learn.microsoft.com/en-us/graph/api/resources/intune-devices-compliancestate?view=graph-rest-1.0"><u>'noncompliant'</u></a>, can be sent to Cloudflare Zero Trust, automatically restricting access to Resources. Additionally, Cloudflare Zero Trust enables the ability to synchronize the <a href="https://developers.cloudflare.com/cloudflare-one/tutorials/entra-id-risky-users/"><u>Microsoft Entra ID risky users list</u></a> and apply more stringent Zero Trust policies to users at higher risk. </p></li><li><p><b>Security Analytics: </b>Cloudflare’s control plane integrates with real-time logging and <a href="https://developers.cloudflare.com/cloudflare-one/insights/analytics/analytics-overview/"><u>analytics</u></a> for persistent monitoring.  Cloudflare's own <a href="https://developers.cloudflare.com/cloudflare-one/insights/analytics/analytics-overview/"><u>analytics</u></a> and <a href="https://developers.cloudflare.com/cloudflare-one/insights/logs/"><u>logging</u></a> features monitor access requests and security events. Optionally, these events can be sent to a Security Information and Event Management (SIEM)  solution such as, <a href="https://blog.cloudflare.com/customers-get-increased-integration-with-cloudflare-email-security-and-zero-trust/"><u>CrowdStrike</u></a>, <a href="https://developers.cloudflare.com/logs/get-started/enable-destinations/datadog/"><u>Datadog</u></a>, <a href="https://developers.cloudflare.com/logs/get-started/enable-destinations/ibm-qradar/"><u>IBM QRadar</u></a>, <a href="https://developers.cloudflare.com/analytics/analytics-integrations/sentinel/"><u>Microsoft Sentinel</u></a>, <a href="https://developers.cloudflare.com/logs/get-started/enable-destinations/new-relic/"><u>New Relic</u></a>, <a href="https://developers.cloudflare.com/logs/get-started/enable-destinations/splunk/"><u>Splunk</u></a>, and <a href="https://developers.cloudflare.com/logs/get-started/enable-destinations/"><u>more</u></a> using Cloudflare’s <a href="https://developers.cloudflare.com/logs/get-started/"><u>logpush</u></a> integration.

Cloudflare's user risk scoring system is built on the <a href="https://openid.net/specs/openid-sharedsignals-framework-1_0.html"><u>OpenID Shared Signals Framework (SSF) Specification</u></a>, which allows integration with existing and future providers that support this standard. SSF focuses on the exchange of <a href="https://www.rfc-editor.org/rfc/rfc8417.html"><u>Security Event Tokens (SETs)</u></a>, a specialized type of JSON Web Token (JWT). By using SETs, providers can share user risk information, creating a network of real-time, shared security intelligence. In the context of NIST’s Zero Trust Architecture, this system functions as a PIP, which is responsible for gathering information about the Subject and their context, such as risk scores, device posture, or threat intelligence. This information is then provided to the PDP, which evaluates access requests and determines the appropriate policy actions. The PEP uses these decisions to allow or deny access, completing the cycle of secure, dynamic access control.</p></li><li><p><b>Data security: </b>Cloudflare’s Zero Trust offering provides robust <a href="https://www.cloudflare.com/learning/cloud/what-is-dspm/">data security capabilities</a> across <a href="https://developers.cloudflare.com/reference-architecture/diagrams/security/securing-data-in-transit/"><u>data-in-transit</u></a>, <a href="https://developers.cloudflare.com/reference-architecture/diagrams/security/securing-data-in-use/"><u>data-in-use</u></a>, and <a href="https://developers.cloudflare.com/reference-architecture/diagrams/security/securing-data-at-rest/"><u>data-at-rest</u></a>. Its <a href="https://developers.cloudflare.com/cloudflare-one/policies/data-loss-prevention/"><u>Data Loss Prevention (DLP)</u></a> safeguards sensitive information in transit by inspecting and blocking unauthorized data movement. <a href="https://developers.cloudflare.com/cloudflare-one/policies/browser-isolation/"><u>Remote Browser Isolation (RBI)</u></a> protects data-in-use by preventing malware, phishing, and unauthorized exfiltration while enabling secure web access. Meanwhile, <a href="https://developers.cloudflare.com/cloudflare-one/applications/casb/"><u>Cloud Access Security Broker (CASB)</u></a> ensures data-at-rest security by enforcing granular controls over SaaS applications, preventing unauthorized access and data leakage. Together, these capabilities provide comprehensive protection for modern enterprises operating in a cloud-first environment.</p></li></ul><p>By leveraging Cloudflare's Zero Trust platform, enterprises can simplify and enhance their ZTA implementation, securing diverse environments and endpoints while ensuring scalability and ease of deployment. This approach ensures that all access requests—regardless of where the Subjects or Resources are located—adhere to robust security policies, reducing risks and improving compliance with modern security standards.</p>
    <div>
      <h2>Support for agencies and enterprises running towards Zero Trust Architecture</h2>
      <a href="#support-for-agencies-and-enterprises-running-towards-zero-trust-architecture">
        
      </a>
    </div>
    <p>Cloudflare works with multiple enterprises, and federal and state agencies that rely on NIST guidelines to secure their networks.  So we take a brief detour to describe some unique features of Cloudflare’s Zero Trust platform that we’ve found to be valuable to these enterprises.</p><ul><li><p><b>FedRAMP data centers.  </b>Many <a href="https://www.cloudflare.com/public-sector/">government agencies</a> and commercial enterprises have FedRAMP requirements, and Cloudflare is well-equipped to support them. <a href="https://www.cloudflare.com/learning/privacy/what-is-fedramp/">FedRAMPs requirements</a> sometimes require organizations <a href="https://fedscoop.com/decentralizing-digital-infrastructure-the-path-to-resilient-and-responsive-government-services/"><u>to self-host software</u></a> and services inside their own network perimeter, which can result in higher latency, degraded performance and increased cost.  At Cloudflare, we take a different approach. Organizations can still benefit from Cloudflare’s global network and unparalleled performance while remaining Fedramp compliant.  To support FedRAMP customers, Cloudflare’s dataplane (aka our PEP, or Policy Enforcement Point) consists of <a href="https://www.cloudflare.com/network"><u>data centers in over 330 cities</u></a> where customers can send their encrypted traffic, and 32 FedRAMP datacenters where traffic is sent to when sensitive dataplane operations are required (e.g. TLS inspection).  This architecture means that our customers do not need to self-host a PEP and incur the associated cost, latency, and performance degradation.</p></li><li><p><b>Post-quantum cryptography. </b>NIST has <a href="https://nvlpubs.nist.gov/nistpubs/ir/2024/NIST.IR.8547.ipd.pdf?cf_history_state=%7B%22guid%22%3A%22C255D9FF78CD46CDA4F76812EA68C350%22%2C%22historyId%22%3A8%2C%22targetId%22%3A%22FB69F839F2A2B930C3DFD855687A1E68%22%7D"><u>announced </u></a>that by 2030 all conventional cryptography (RSA and ECDSA) must be deprecated and upgraded to <a href="https://www.cloudflare.com/learning/ssl/quantum/what-is-post-quantum-cryptography/">post-quantum cryptography</a>.  But upgrading cryptography is hard and takes time, so Cloudflare aims to take on the burden of managing cryptography upgrades for our customers. That’s why organizations can tunnel their corporate network traffic though Cloudflare’s Zero Trust platform, protecting it against quantum adversaries without the hassle of individually upgrading each and every corporate application, system, or network connection. <a href="https://blog.cloudflare.com/post-quantum-zero-trust/"><u>End-to-end quantum safety</u></a> is available for communications from end-user devices, via web browser (today) or Cloudflare’s WARP device client (mid-2025), to secure applications connected with Cloudflare Tunnel.</p></li></ul>
    <div>
      <h2>Run towards Zero Trust Architecture with Cloudflare </h2>
      <a href="#run-towards-zero-trust-architecture-with-cloudflare">
        
      </a>
    </div>
    <p>NIST’s latest publication, SP 1800-35, provides a structured approach to <a href="https://www.cloudflare.com/learning/access-management/how-to-implement-zero-trust/">implementing Zero Trust</a>, emphasizing the importance of policy enforcement, continuous authentication, and secure access management. Cloudflare’s Zero Trust platform simplifies this complex framework by delivering a scalable, globally distributed solution that is <a href="https://www.cloudflare.com/trust-hub/compliance-resources/fedramp/">FedRAMP-compliant</a> and integrates with industry-leading providers like Okta, Microsoft, Ping, CrowdStrike, and SentinelOne to ensure comprehensive protection.</p><p>A key differentiator of Cloudflare’s Zero Trust solution is our global anycast network, one of the world’s largest and most interconnected networks. Spanning 330+ cities across 120+ countries, this network provides unparalleled performance, resilience, and scalability for enforcing Zero Trust policies without negatively impacting the end user experience. By leveraging Cloudflare’s network-level enforcement of security controls, organizations can ensure that <a href="https://www.cloudflare.com/learning/access-management/what-is-access-control/">access control</a>, data protection, and security analytics operate at the speed of the Internet — without backhauling traffic through centralized choke points. This architecture enables low-latency, highly available enforcement of security policies, allowing enterprises to seamlessly protect users, devices, and applications across on-prem, cloud, and hybrid environments.</p><p>Now is the time to take action. You can start implementing Zero Trust today by leveraging Cloudflare’s platform in alignment with NIST’s reference architecture. Whether you are beginning your Zero Trust journey or enhancing an existing framework, Cloudflare provides the tools, network, and integrations to help you succeed. <a href="https://developers.cloudflare.com/cloudflare-one/setup/"><u>Sign up for Cloudflare Zero Trust</u></a>, explore our integrations, and secure your organization with a modern, globally distributed approach to cybersecurity.</p> ]]></content:encoded>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Public Sector]]></category>
            <category><![CDATA[NIST]]></category>
            <category><![CDATA[Compliance]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">4Py1QO6TikGfaBeGSPBmFv</guid>
            <dc:creator>Aaron McAllister</dc:creator>
            <dc:creator>Sharon Goldberg</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare is now IRAP assessed at the PROTECTED level, furthering our commitment to the global public sector]]></title>
            <link>https://blog.cloudflare.com/irap-protected-assessment/</link>
            <pubDate>Fri, 21 Mar 2025 13:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare is now assessed at the IRAP PROTECTED level, bringing our products and services to the Australian Public Sector. ]]></description>
            <content:encoded><![CDATA[ <p>We are excited to announce our public sector suite of services for Australia, Cloudflare for Government - Australia, has been assessed under the <a href="https://www.cyber.gov.au/irap"><u>Infosec Registered Assessor Program (IRAP)</u></a> at the PROTECTED level in Australia.</p><p>IRAP, established by the Australian government, provides a rigorous, standardized approach to security assessment for cloud products and services. Achieving IRAP PROTECTED assessment reinforces our commitment to providing secure, high-performance solutions for government agencies and highly regulated industries across the globe.  </p><p>Obtaining our IRAP assessment is one part of our broader strategy to scale out our <a href="https://www.cloudflare.com/cloudflare-for-government/"><u>Cloudflare for Government</u></a> offering to as many areas of the world as possible. Cloudflare’s global network offers governments and highly regulated customers a unique capability to be within 50ms of 95% of Internet users globally, while also offering robust security for data processing, key management, and metadata storage. Earlier this year, we announced that we completed our <a href="https://blog.cloudflare.com/cloudflares-commitment-to-advancing-public-sector-security-worldwide/"><u>ENS certification in Spain</u></a>, and we are well underway on the development of our <a href="https://www.fedramp.gov/understanding-baselines-and-impact-levels/"><u>FedRAMP High</u></a> systems in the United States. </p><p><a href="https://www.cloudflare.com/network"><u>Cloudflare’s network</u></a> spans more than 330 cities in over 120 countries, where we interconnect with approximately 13,000 network providers in order to provide a broad range of services to millions of customers. Our network is our greatest strength to provide resiliency, security, and performance. So, instead of creating a siloed government network that has limited access to our products and services, we decided to build the unique government compliance capabilities directly into our platform from the very beginning. We accomplished this by delivering critical controls in three key areas: traffic processing, management, and metadata storage.</p><p>The benefit of running the same software across our entire network is that it enables us to leverage our global footprint, and then make smart choices about how to handle traffic. For instance, Regional Services (our system that ensures that traffic is processed in the correct region) runs globally. Regional Services allows us to do global Layer 3 (network layer) DDoS attack prevention, while still only decrypting traffic inside our IRAP boundary, which includes both US and Australian facilities. This software-defined regionalization approach allows us to get the full benefits of the global network running anycast, while offering highly specific regionalization on the same hardware. We get similar advantages for key management and metadata storage locality. </p><p>Network and security services can dramatically improve user experiences, but only when they run as close to the user as possible, even if the user doesn’t live close to a major hub. Leveraging our global network of over 300 data centers to ingest traffic to our network, our private backbone can move traffic to the closest certified processing location that is within the scope of our IRAP system. This enables you to meet the most stringent controls of the IRAP assessment without trading off user experience.</p><p>Our single platform strategy enables almost every Cloudflare product and service across all of our solution areas to be included in scope with Cloudflare for Government - Australia. This includes our application security products like our CDN, WAF, API Shield, Rate Limiting, and Bot Management. Our Zero Trust Products like Secure Web Gateway, CASB, Magic Transit, Magic WAN, and Remote Browser Isolation are also in scope, as are developer platform components including Workers, R2, Durable Objects, Stream, and Cache Reserve. </p><p>We invite all of our Cloudflare for Government public and private partners to learn more about our capabilities and work with us to develop solutions to meet the security demands required in complex environments. Please reach out to us at <a href="#"><u>publicsector@cloudflare.com</u></a> with any questions.</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Compliance]]></category>
            <category><![CDATA[Public Sector]]></category>
            <category><![CDATA[IRAP]]></category>
            <guid isPermaLink="false">1dhrjh3QJmujurTsOE2fqW</guid>
            <dc:creator>Wesley Evans</dc:creator>
            <dc:creator>Damien Lhuilier</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare’s commitment to advancing Public Sector security worldwide by pursuing FedRAMP High, IRAP, and ENS]]></title>
            <link>https://blog.cloudflare.com/cloudflares-commitment-to-advancing-public-sector-security-worldwide/</link>
            <pubDate>Wed, 05 Feb 2025 14:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare achieves ENS certification, and intends to pursue FedRAMP High and IRAP.  ]]></description>
            <content:encoded><![CDATA[ <p>Today, we announced our commitment to achieving the US Federal Risk and Authorization Management Program <a href="https://www.fedramp.gov/understanding-baselines-and-impact-levels/"><u>(FedRAMP) - High</u></a>, Australian Infosec Registered Assessors Program <a href="https://www.cyber.gov.au/irap"><u>(IRAP)</u></a>, and Spain’s Esquema Nacional de Seguridad <a href="https://ens.ccn.cni.es/en/"><u>(ENS)</u></a> as part of <a href="https://www.cloudflare.com/cloudflare-for-government/"><u>Cloudflare for Government</u></a>. As more and more essential services are being shifted to the Internet, ensuring that governments and regulated industries have industry standard tools is critical for ensuring their uptime, reliability and performance.</p>
    <div>
      <h2>What sets Cloudflare for Government apart?</h2>
      <a href="#what-sets-cloudflare-for-government-apart">
        
      </a>
    </div>
    <p>Cloudflare’s <a href="https://www.cloudflare.com/network"><u>network</u></a> spans more than 330 cities in over 120 countries, where we interconnect with approximately 13,000 network providers in order to provide a broad range of services to millions of customers. Our network is our greatest strength to provide resiliency, security, and performance. So instead of creating a siloed government network that has limited access to our products and services, we decided to build the unique government compliance capabilities directly into our platform from the very beginning. We accomplished this by delivering critical controls in three key areas: traffic processing, management, and metadata storage.</p><p>The benefit of running the same software across our entire network is that it enables us to leverage our global footprint, and then make smart choices about how to handle traffic. For instance, <a href="https://blog.cloudflare.com/introducing-regional-services/"><u>Regional Services</u></a> (our system that ensures that traffic is processed in the correct region) runs globally. We can offer anycast for all customer traffic, even <a href="https://www.fedramp.gov/understanding-baselines-and-impact-levels/"><u>FedRAMP Moderate</u></a> traffic. Regional Services allows us to do global Layer 3 (network layer) DDoS attack prevention, while still only decrypting traffic inside our <a href="https://www.cloudflare.com/learning/privacy/what-is-fedramp/">FedRAMP</a>, IRAP, or ENS boundary. We get similar advantages for key management and metadata storage locality. </p><p>Network and security services can dramatically improve user experiences, but only when they run as close to the user as possible, even if the user doesn’t live close to a major hub. Leveraging our global network of over 300 data centers to ingest traffic to our network, our <a href="https://blog.cloudflare.com/backbone2024/"><u>private backbone</u></a> can move traffic to the closest certified processing location. This enables you to meet the most stringent compliance requirements without trading off user experience.</p><p>Cloudflare’s strong commitment is to deliver a first class experience for all regulated and public sector customers, regardless of the complexity of their requirements, on one single platform with all of our products. Doing the hard work upfront of building on a single network without taking shortcuts has allowed us to provide our FedRAMP Moderate, and soon our FedRAMP High, ENS, and IRAP offering to everyone without segmentation of the platform.</p><p>Our single platform strategy enables almost every Cloudflare product and service across all of our solution areas to be included in scope with Cloudflare for Government. </p>
    <div>
      <h2>How has the Cloudflare for Government service offering evolved over the past two years?</h2>
      <a href="#how-has-the-cloudflare-for-government-service-offering-evolved-over-the-past-two-years">
        
      </a>
    </div>
    <p>Since our <a href="https://blog.cloudflare.com/cloudflare-achieves-fedramp-authorization/"><u>FedRAMP Moderate authorization in 2022</u></a>, Cloudflare has continuously expanded and improved our program. This has included the expansion of our <a href="https://marketplace.fedramp.gov/products/FR2000863987"><u>FedRAMP scope to include even more products</u></a> to secure the US public sector:</p><ul><li><p><a href="https://developers.cloudflare.com/api-shield/"><u>API Shield</u></a><b> </b>provides API Security and abuse detection features with a strong focus on data-driven approaches.</p></li><li><p><a href="https://www.cloudflare.com/developer-platform/products/r2/"><u>R2</u></a><b> </b>provides <a href="https://www.cloudflare.com/learning/cloud/what-is-object-storage/">object storage</a> for large amounts of unstructured data without costly egress bandwidth fees.</p></li><li><p><a href="https://developers.cloudflare.com/cache/advanced-configuration/cache-reserve/"><u>Cache Reserve</u></a> is a large, persistent data store implemented on top of R2. </p></li><li><p><a href="https://developers.cloudflare.com/cloudflare-one/applications/casb/"><u>Cloud Access Security Broker (CASB)</u></a> connects, scans, and monitors SaaS applications for security issues. It is part of Cloudflare’s Zero Trust platform, which uses API-driven and easy-to-use tools to protect data and users across SaaS apps. Cloudflare CASB can detect and prevent data leaks, compliance violations, shadow IT, misconfigurations, and risky data sharing.</p></li></ul><p>We’re also looking forward to introducing two new Cloudflare Products into our FedRAMP Moderate scope in 2025:</p><ul><li><p><a href="https://developers.cloudflare.com/hyperdrive/"><u>Hyperdrive</u></a> accelerates queries made to existing databases, making it faster to access data from across the globe, irrespective of user location.</p></li><li><p><a href="https://developers.cloudflare.com/images/"><u>Cloudflare Images</u></a> is a robust, cloud-native image pipeline that ingests, stores, optimizes, and delivers images across our global network.</p></li></ul><p>As we pursue FedRAMP High, ENS, and IRAP, we are committed to certifying, and authorizing the entire range of Cloudflare products on our platform, not just point source solutions. Over the next several years, we will focus on making sure that all GA products at Cloudflare are able to run in the most regulatory complex environments. We are excited about bringing products like <a href="https://developers.cloudflare.com/email-security/"><u>Email Security</u></a>, <a href="https://developers.cloudflare.com/calls/"><u>Cloudflare Calls</u></a>, and <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-infrastructure-access/"><u>Access for Infrastructure</u></a> into Cloudflare for Government.</p><p>As discussed above, Cloudflare’s scale is one of many things that sets us apart from other cloud service providers. Currently operating in over 30 data centers across 10 cities in the United States, Cloudflare is expanding the Cloudflare for Government boundary to include <b>eight</b> <b>international data centers</b> <b>and</b> <b>four new US data centers in 2025</b>. Not only will this expansion enable Cloudflare to more quickly serve public sector customers outside the US, but it also reinforces our commitment to help protect and connect customers globally as the world’s first connectivity cloud. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/590gI6z903JkJF8fvbOJ7e/93886f0d22540e92a65bec9c426e946e/image2.png" />
          </figure>
    <div>
      <h2>Cloudflare is ready for the future of the public sector</h2>
      <a href="#cloudflare-is-ready-for-the-future-of-the-public-sector">
        
      </a>
    </div>
    
    <div>
      <h3>Promoting innovation and industry-recognized technologies </h3>
      <a href="#promoting-innovation-and-industry-recognized-technologies">
        
      </a>
    </div>
    <p>Cloudflare continues to be a leader in the <a href="https://blog.cloudflare.com/tag/post-quantum"><u>post-quantum cryptography (PQC)</u></a> space, and we believe that post-quantum security should be the new baseline for the Internet. We could not have achieved meaningful progress with the global rollout of <a href="https://csrc.nist.gov/pubs/fips/203/final"><u>ML-KEM</u></a> without our deep collaboration with <a href="https://csrc.nist.gov/projects/post-quantum-cryptography"><u>NIST</u></a> in the US. Our public-private collaboration has been immensely valuable. It has been key in getting these cryptographic algorithms adopted at Cloudflare, and with our standards partners, to help everyone defend against future attacks from quantum computers. Over the last two years, this collaboration has led to over one-third of Cloudflare’s eyeball traffic <a href="https://radar.cloudflare.com/adoption-and-usage#post-quantum-encryption-adoption"><u>being secured with PQC</u></a>.  </p><p>Our work in <a href="https://www.cloudflare.com/learning/ssl/quantum/what-is-post-quantum-cryptography/">PQC</a> demonstrates one of the many ways in which we remain committed to research and innovation at Cloudflare, aligning well to the goals articulated by NIST and our other government partners. Our collaboration enabled us to bring PQC to FIPS in early 2023. Empowering service providers like Cloudflare to innovate and use industry-recognized technologies strengthens both private and public sector systems.</p>
    <div>
      <h3>Spanish security certification </h3>
      <a href="#spanish-security-certification">
        
      </a>
    </div>
    <p>Over the last decade we have demonstrated our commitment to obtaining both international (such as PCI, SOC2, and ISO 27001) and country-specific security certifications /  authorizations. Today, Cloudflare is proud to announce that we have completed authorizations for <a href="https://ens.ccn.cni.es/en/"><u>Spain (ENS)</u></a>. </p>
    <div>
      <h3>Australian Infosec Registered Assessor Program </h3>
      <a href="#australian-infosec-registered-assessor-program">
        
      </a>
    </div>
    <p>In line with our public sector growth strategy, and to ensure we provide the Australia Government with the best security solutions, Cloudflare is currently being assessed against <a href="https://www.cyber.gov.au/irap"><u>IRAP PROTECTED</u></a>. This further demonstrates our commitment to contribute to the advancement of Public Sector security worldwide. What’s next for Cloudflare’s public sector compliance?</p><p>Two years of FedRAMP Moderate is just the beginning for our Cloudflare for Government journey. As we look into the new year, we can’t help but be excited about all that’s to come as we grow our public sector compliance program with FedRAMP High, IRAP, and ENS.</p><p>We invite all of our Cloudflare for Government public and private partners to learn more about our capabilities and work with us to develop solutions to meet the security demands required in complex environments. Please reach out to us at <a href="#"><u>publicsector@cloudflare.com</u></a> with any questions.</p><p>For more information on Cloudflare’s FedRAMP status, please visit the <a href="https://marketplace.fedramp.gov/products/FR2000863987"><u>FedRAMP Marketplace</u></a>.</p> ]]></content:encoded>
            <category><![CDATA[Compliance]]></category>
            <category><![CDATA[FedRAMP]]></category>
            <category><![CDATA[Public Sector]]></category>
            <guid isPermaLink="false">1lDDf8OlgEhZP1hFys0cd0</guid>
            <dc:creator>Wesley Evans</dc:creator>
            <dc:creator>Emily Bragaw</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare meets new Global Cross-Border Privacy (CBPR) standards]]></title>
            <link>https://blog.cloudflare.com/cloudflare-cbpr-a-global-privacy-first/</link>
            <pubDate>Tue, 28 Jan 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare is the first organization globally to announce having been successfully audited against the ‘Global Cross-Border Privacy Rules’ system and ‘Global Privacy Recognition for Processors’. ]]></description>
            <content:encoded><![CDATA[ <p>Cloudflare proudly leads the way with our approach to <a href="https://www.cloudflare.com/learning/privacy/what-is-data-privacy/">data privacy</a> and the protection of <a href="https://www.cloudflare.com/learning/privacy/what-is-personal-information/">personal information</a>, and we’ve been an ardent supporter of the need for the free flow of data across jurisdictional borders. So today, on Data Privacy Day (also known internationally as Data Protection Day), we’re happy to announce that we’re adding our fourth and fifth privacy validations, and this time, they are global firsts! Cloudflare is the first organisation to announce that we have been successfully audited against the brand new <a href="https://www.globalcbpr.org/privacy-certifications/"><u>Global Cross-Border Privacy Rules (Global CBPRs) for data controllers and the Global Privacy Recognition for Processors (Global PRP)</u></a>. These validations demonstrate our support and adherence to global standards that provide for privacy-respecting data flows across jurisdictions. Organizations that have been successfully audited will be formally certified when the certifications officially launch, which we expect to happen later in 2025. </p><p>Our participation in the Global CBPRs and Global PRP joins our roster of privacy validations: we were one of the first cybersecurity organizations to certify to the international privacy standard <a href="https://blog.cloudflare.com/iso-27701-privacy-certification/"><u>ISO 27701:2019</u></a> when it was published, and in 2022 we also certified to the cloud privacy certification, <a href="https://www.cloudflare.com/trust-hub/compliance-resources/iso-certifications/"><u>ISO 27018:2019</u></a>. In 2023, we added our third privacy validation, undergoing a review by an independent monitoring body in the European Union (EU) and declared to be adherent to the first official GDPR code of conduct — <i>the </i><a href="https://blog.cloudflare.com/cloudflare-official-gdpr-code-of-conduct/"><i><u>EU Cloud Code of Conduct</u></i></a>.</p>
    <div>
      <h3>Why this matters to Cloudflare customers</h3>
      <a href="#why-this-matters-to-cloudflare-customers">
        
      </a>
    </div>
    <p>Taking these privacy certifications together, Cloudflare demonstrates that we are meeting key official privacy validations in 39 jurisdictions around the world, from Australia and Austria to Sweden and the United States. An additional four jurisdictions (United Kingdom, Bermuda, Mauritius, and the Dubai International Finance Centre) are also in the process of joining and recognising the Global CBPR certifications. That's important for Cloudflare customers as it provides reassurance that the privacy practices we have built are recognised by governments around the world.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2RFlkr3Wht9Gu34lv2xxN9/8f3c8e5dc23963614d275dab085cd8ce/unnamed.png" />
          </figure>
    <div>
      <h3>What is the Global CBPR System?</h3>
      <a href="#what-is-the-global-cbpr-system">
        
      </a>
    </div>
    <p>In the last three years, governments across the world have been busy preparing two brand-new international privacy standards. A major milestone was achieved on April 30, 2024 when <a href="https://www.globalcbpr.org/global-cbpr-forum-announces-the-establishment-of-the-global-cbpr-and-global-prp-systems-and-welcomes-new-global-cape-participants/"><u>the Global CBPR System was established</u></a>. The CBPRs are a voluntary, enforceable, international, accountability-based system that facilitates privacy-respecting data flows among members’ economies. They provide a baseline level of privacy protection for consumers through a set of rules on how to handle people’s personal information. This facilitates the free flow of data by upholding consumer privacy across participating members, despite each jurisdiction having their own individual data protection laws.</p><p>The CBPR System was developed by the <a href="https://www.globalcbpr.org/about/membership/"><u>Global CBPR Forum</u></a>, an intergovernmental forum between the governments of Australia, Canada, Japan, Republic of Korea, Mexico, Philippines, Singapore, Chinese Taipei, and the United States. The United Kingdom is also an associate member of the CBPR Forum, as are Bermuda, Mauritius, and the Dubai IFC, signifying their intent to join as full members in the future.</p><p>Over the last year, we have been busy preparing for the launch of the Global CBPR System. On May 1, 2024 — the very first day after the establishment of the system — Cloudflare applied to join. And we have now achieved the major milestone of successfully completing audits against the requirements, meaning we expect to be the first organization in the world to be newly certified to the Global CBPR system, as well as the related Global Privacy Recognition for Processors, when companies can officially be certified, which is expected later in 2025.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5F7HXXU071UJtx68KHGn41/0228087d6420c26802d77c13fafe935c/image1.png" />
          </figure>
    <div>
      <h3>What the Global CBPR System covers</h3>
      <a href="#what-the-global-cbpr-system-covers">
        
      </a>
    </div>
    <p>The Global CBPR System contains a detailed list of fifty requirements that organizations must meet in order to be certified under the scheme. The requirements derive from the nine <b>Global CBPR Privacy Principles</b>, which are consistent with the core principles of the <a href="https://www.oecd.org/"><u>Organisation for Economic Co-operation and Development (OECD)</u></a> <a href="https://www.oecd.org/en/publications/2002/02/oecd-guidelines-on-the-protection-of-privacy-and-transborder-flows-of-personal-data_g1gh255f.html"><u>Guidelines on the Protection of Privacy and Trans-Border Flows of Personal Data</u></a>. The fifty requirements cover how organizations should collect, manage, and safeguard personal information in their custody. Organizations must meet every one of the fifty requirements in order to be Global CBPR certified. The nine principles underlying the requirements are:</p><table><tr><td><p>Preventing Harm</p></td><td><p>Notice</p></td><td><p>Collection Limitation</p></td></tr><tr><td><p>Uses of Personal Information</p></td><td><p>Choice</p></td><td><p>Integrity of Personal Information</p></td></tr><tr><td><p>Security Safeguards</p></td><td><p>Access and Correction</p></td><td><p>Accountability</p></td></tr></table><p><sup><i>The nine Global CBPR Privacy Principles</i></sup></p><p>The Global CBPR certification covers the handling of personal information controlled by the organization, such as the personal details of customers, employees, and job applicants. For Cloudflare, this also includes network information — our observations about how our global cloud platform handles server, network, or traffic data generated by Cloudflare in the course of providing our services.</p><p>The related Global Privacy Recognition for Processors (PRP) certification covers the handling of personal information processed by the organization on behalf of a different organization, usually their customer. The eighteen requirements of the PRP relate to the two privacy principles most relevant when processing this information on behalf of another organization: <i>Security Safeguards and Accountability</i>. For Cloudflare, this covers the processing of data pursuant to the <a href="https://www.cloudflare.com/cloudflare-customer-dpa/"><u>Data Processing Addendum</u></a> we sign with all of our customers, chiefly, the Customer Content flowing across our network and the Customer Logs generated by those data flows. Organizations must meet every one of the eighteen requirements in order to be Global PRP certified.</p>
    <div>
      <h3>A deeper dive into some of the requirements of the Global CBPRs</h3>
      <a href="#a-deeper-dive-into-some-of-the-requirements-of-the-global-cbprs">
        
      </a>
    </div>
    <p>As noted, the key requirements of the Global CBPRs and the Global PRP cover the well-known data protection principles of notice, choice, collection limitation (data minimization), the right of data subject access and correction, providing adequate security, preventing harm, integrity of personal information, accountability, and uses of personal information. There are dozens of requirements that cover these principles, so we’ll just touch on a few of them here.</p><p>Let’s first look at the principle of notice. One of the more obvious requirements from the CBPRs is question 1:</p><p><i>Do you provide clear and easily accessible statements about your practices and policies that govern the personal information described above (a privacy statement)?</i></p><p>Being transparent about the collection and use of personal information is a key principle of privacy and data protection, and transparency is one of Cloudflare’s core commitments. Documenting our practices and policies in regard to how we use personal information allows individuals to decide if they want to provide their information, and that’s why it’s best practice for the privacy notice to be available and visible at the time the information is being collected. Indeed, this concept of providing notice is clear from <a href="https://eur-lex.europa.eu/eli/reg/2016/679/oj/eng#art_13"><u>Article 13 of the EU’s GDPR</u></a>. Cloudflare meets this CBPR requirement by providing a clear and accessible privacy notice visible from the footer of each page on our website. We also provide a link to the notice when we collect personal data such as through a form on a webpage.</p><p>In terms of how we use personal information, question 8 asks:</p><p><i>Do you limit the use of the personal information you collect (whether directly or through the use of third parties acting on your behalf) as identified in your privacy statement?</i></p><p>It has long been a commitment of Cloudflare’s that we only use the personal information we collect for the purposes of providing the services we offer. Our business is built on providing customers with the tools to protect their network applications and to make them faster, more secure, more reliable, and more private. In our <a href="https://www.cloudflare.com/privacypolicy/"><u>Privacy Policy</u></a>, we commit that we will “only share or otherwise disclose your personal information as necessary to provide our Services or as otherwise described in this Policy, except in cases where we first provide you with notice and the opportunity to consent.” And we maintain internal documentation (in keeping with the CBPR’s accountability principle) to document the data we are processing and the purposes for which we process it.</p><p>Another key set of requirements in both the Global CBPRs and the Global PRP have to do with security safeguards. CBPR requirement question 27 asks:</p><p><i>Describe the physical, technical and administrative safeguards you have implemented to protect personal information against risks such as loss or unauthorized access, destruction, use, modification or disclosure of information or other misuses?</i></p><p>The similar requirement in the Global PRP is question 2: </p><p><i>Describe the physical, technical and administrative safeguards that implement your organization’s information security policy.</i></p><p>Cloudflare has implemented an information security program in accordance with the ISO/IEC 27000 family of standards. Details of Cloudflare’s security program are documented in Annex 2 (“Technical and Organizational Security Measures”) of Cloudflare's <a href="https://www.cloudflare.com/cloudflare-customer-dpa/"><u>Customer Data Processing Addendum</u></a>, including the physical, technical and administrative safeguards implemented to protect personal information.</p><p>Related to the Accountability principle, question 46 asks:</p><p><i>Do you have mechanisms in place with personal information processors, agents, contractors, or other service providers pertaining to personal information they process on your behalf, to ensure that your obligations to the individual will be met? </i></p><p>When we have vendors who handle any of our, or our customers’, personal information, we require them to sign a Data Processing Addendum with us. This ensures the commitments we make to our customers in our customer agreements in turn flow through to our vendors, including the security requirements — holding them, and us, accountable.</p>
    <div>
      <h3>More information</h3>
      <a href="#more-information">
        
      </a>
    </div>
    <p>We are excited about the launch of the Global CBPR certifications, expected later in 2025, and we are proud that on this Data Privacy Day, we can yet again demonstrate our commitment to universally held principles for protecting the privacy of personal data.</p><p>You can find more about the Global CBPR System, the Global PRP, download a full copy of the requirements, and keep up to date with related news at <a href="https://www.globalcbpr.org/"><u>globalcbpr.org</u></a>.</p><p>For the latest information about our certifications, please visit our <a href="https://www.cloudflare.com/trust-hub/compliance-resources/"><u>Trust Hub</u></a>. Customers can also find out how to download a copy of Cloudflare’s certifications and reports from the <a href="https://developers.cloudflare.com/fundamentals/get-started/basic-tasks/access-compliance-docs/"><u>Cloudflare dashboard</u></a>.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/36LV7CkbF5b5IuXN4ZVXZC/77775c3e2791418d87c36d46e755fbbc/image2.png" />
          </figure><p></p> ]]></content:encoded>
            <category><![CDATA[Certification]]></category>
            <category><![CDATA[Privacy]]></category>
            <category><![CDATA[Compliance]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Policy & Legal]]></category>
            <guid isPermaLink="false">63yGQGTniOUOFneFLwTb7a</guid>
            <dc:creator>Rory Malone</dc:creator>
            <dc:creator>Emily Hancock</dc:creator>
        </item>
        <item>
            <title><![CDATA[Fearless SSH: short-lived certificates bring Zero Trust to infrastructure]]></title>
            <link>https://blog.cloudflare.com/intro-access-for-infrastructure-ssh/</link>
            <pubDate>Wed, 23 Oct 2024 13:00:00 GMT</pubDate>
            <description><![CDATA[ Access for Infrastructure, BastionZero’s integration into Cloudflare One, will enable organizations to apply Zero Trust controls to their servers, databases, Kubernetes clusters, and more. Today we’re announcing short-lived SSH access as the first available feature of this integration.
 ]]></description>
            <content:encoded><![CDATA[ <p><a href="https://blog.cloudflare.com/cloudflare-acquires-bastionzero"><u>BastionZero joined Cloudflare</u></a> in May 2024. We are thrilled to announce Access for Infrastructure as BastionZero’s native integration into our <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/"><u>SASE</u></a> platform, Cloudflare One. Access for Infrastructure will enable organizations to apply Zero Trust controls in front of their servers, databases, network devices, Kubernetes clusters, and more. Today, we’re announcing <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-infrastructure-access/#_top"><u>short-lived SSH access</u></a> as the first available feature. Over the coming months we will announce support for other popular infrastructure access target types like <a href="https://www.cloudflare.com/learning/access-management/what-is-the-remote-desktop-protocol/"><u>Remote Desktop Protocol (RDP)</u></a>, Kubernetes, and databases.</p>
    <div>
      <h2>Applying Zero Trust principles to infrastructure</h2>
      <a href="#applying-zero-trust-principles-to-infrastructure">
        
      </a>
    </div>
    <p>Organizations have embraced <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/"><u>Zero Trust</u></a> initiatives that modernize secure access to web applications and networks, but often the strategies they use to manage privileged access to their infrastructure can be siloed, overcomplicated, or ineffective. When we speak to customers about their infrastructure access solution, we see common themes and pain points:</p><ul><li><p><b>Too risky:</b> Long-lived credentials and shared keys get passed around and inflate the risk of compromise, excessive permissions, and lateral movement</p></li><li><p><b>Too clunky</b>: Manual credential rotations and poor visibility into infrastructure access slow down incident response and compliance efforts</p></li></ul><p>Some organizations have dealt with the problem of privileged access to their infrastructure by purchasing a <a href="https://en.wikipedia.org/wiki/Privileged_access_management"><u>Privileged Access Management (PAM)</u></a> solution or by building a homegrown key management tool. Traditional PAM solutions introduce audit logging and session recording features that capture user interactions with their servers and other infrastructure and/or centralized vaults that rotate keys and passwords for infrastructure every time a key is used. But this centralization can introduce performance bottlenecks, harm usability, and come with a significant price tag. Meanwhile, homegrown solutions are built from primitives provided by cloud providers or custom infrastructure-as-code solutions, and can be costly and tiresome to build out and maintain. </p><p>We believe that organizations should apply Zero Trust principles to their most sensitive corporate resources, which naturally includes their infrastructure. That’s why we’re augmenting Cloudflare’s <a href="https://www.cloudflare.com/learning/access-management/what-is-ztna/"><u>Zero Trust Network Access (ZTNA)</u></a> service with <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-infrastructure-access/#_top"><u>Access to Infrastructure</u></a> to support privileged access to sensitive infrastructure, and offering features that will look somewhat similar to those found in a PAM solution:</p><ul><li><p><b>Access</b>: Connect remote users to infrastructure targets via Cloudflare’s global network.</p></li><li><p><b>Authentication</b>: Eliminate the management of credentials for servers, containers, clusters, and databases and replace them with <a href="https://www.cloudflare.com/learning/access-management/what-is-sso/"><u>SSO</u></a>, <a href="https://www.cloudflare.com/learning/access-management/what-is-multi-factor-authentication/"><u>MFA</u></a>, and <a href="https://blog.cloudflare.com/6-new-ways-to-validate-device-posture/"><u>device posture</u></a>. </p></li><li><p><b>Authorization</b>: Use policy-based access control to determine who can access what target, when, and under what role. </p></li><li><p><b>Auditing</b>: Provide command logs and session recordings to allow administrators to audit and replay their developers’ interactions with the organization’s infrastructure.</p></li></ul><p>At Cloudflare, we are big believers that unified experiences produce the best security outcomes, and because of that, we are natively rebuilding each BastionZero feature into Cloudflare’s ZTNA service. Today, we will cover the recently-released feature for short-lived SSH access.</p>
    <div>
      <h2>Secure Shell (SSH) and its security risks</h2>
      <a href="#secure-shell-ssh-and-its-security-risks">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/learning/access-management/what-is-ssh/"><u>SSH</u></a> (Secure Shell) is a protocol that is commonly used by developers or system administrators to secure the connections used to remotely administer and manage (usually Linux/Unix) servers. SSH access to a server often comes with elevated privileges, including the ability to delete or <a href="https://www.cloudflare.com/learning/security/what-is-data-exfiltration/">exfiltrate</a> data or to install or remove applications on the server. </p><p>Modern enterprises can have tens, hundreds, or even thousands of SSH targets. Servers accessible via SSH can be targeted in <a href="https://thehackernews.com/2023/12/warning-poorly-secured-linux-ssh.html"><u>cryptojacking</u></a> or <a href="https://thehackernews.com/2023/06/cybercriminals-hijacking-vulnerable-ssh.html"><u>proxyjacking</u></a> attacks. Manually tracking, rotating, and validating SSH credentials that grant access is a chore that is often left undone, which creates risks that these long-lived credentials could be compromised. There’s nothing stopping users from copying SSH credentials and sharing them with other users or transferring them to unauthorized devices.</p><p>Although many organizations will gate access to their servers to users that are inside their corporate network, this is no longer enough to protect against modern attackers. Today, the principles of Zero Trust demand that an organization also tracks who exactly is accessing their servers with SSH, and what commands they are running on those servers once they have access. In fact, the elevated privileges that come along with SSH access mean that compliance frameworks like <a href="https://www.cloudflare.com/en-gb/trust-hub/compliance-resources/soc-2/"><u>SOC2</u></a>, <a href="https://www.cloudflare.com/en-gb/trust-hub/compliance-resources/iso-certifications/"><u>ISO27001</u></a>, <a href="https://www.cloudflare.com/en-gb/trust-hub/compliance-resources/fedramp/"><u>FedRAMP</u></a> and others have criteria that require monitoring who has access with SSH and what exactly they are doing with that access. </p>
    <div>
      <h2>Introducing SSH with Access for Infrastructure</h2>
      <a href="#introducing-ssh-with-access-for-infrastructure">
        
      </a>
    </div>
    <p>We’ve introduced<a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-infrastructure-access/#_top"><u> SSH with Access for Infrastructure</u></a> to provide customers with granular control over privileged access to servers via SSH. The feature provides improved visibility into who accessed what service and what they did during their SSH session, while also eliminating the risk and overhead associated with managing SSH credentials. Specifically, this feature enables organizations to:</p><ul><li><p>Eliminate security risk and overhead of managing SSH keys and instead use short-lived SSH certificates issued by a Cloudflare-managed certificate authority (CA).</p></li><li><p>Author fine-grained policy to govern who can SSH to your servers and through which SSH user(s) they can log in as.</p></li><li><p>Monitor infrastructure access with Access and SSH command logs, supporting regulatory compliance and providing visibility in case of security breach.</p></li><li><p>Avoid changing end-user workflows. SSH with Access for Infrastructure supports whatever native SSH clients end users happen to be using. </p></li></ul><p>SSH with Access for Infrastructure is supported through one of the most common deployment models of Cloudflare One customers. Users can connect using our device client (WARP), and targets are made accessible using Cloudflare Tunnel (cloudflared or the WARP connector). This architecture allows customers with existing Cloudflare One deployments to enable this feature with little to no effort. The only additional setup will be configuring your target server to accept a Cloudflare SSH certificate.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4msjrxXyhuuh7rUmB0zn8c/3e24a431820aee57651bad1d57e57ec5/BLOG-2604_2.png" />
          </figure><p>Cloudflare One already offers multiple ways to secure organizations' SSH traffic through network controls. This new SSH with Access for Infrastructure aims to incorporate the strengths of those existing solutions together with additional controls to authorize ports, protocols, and specific users as well as a much improved deployment workflow and audit logging capabilities.</p>
    <div>
      <h2>Eliminating SSH credentials using an SSH CA</h2>
      <a href="#eliminating-ssh-credentials-using-an-ssh-ca">
        
      </a>
    </div>
    <p>How does Access for Infrastructure eliminate your SSH credentials? This is done by replacing SSH password and SSH keys with an SSH Certificate Authority (CA) that is managed by Cloudflare. Generally speaking, a CA’s job is to issue certificates that bind an entity to an entity’s public key. Cloudflare’s SSH CA has a secret key that is used to sign certificates that authorize access to a target (server) via SSH, and a public key that is used by the target (server) to cryptographically validate these certificates. The public key for the SSH CA can be obtained by <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-infrastructure-access/#generate-a-cloudflare-ssh-ca"><u>querying the Cloudflare API</u></a>. And the secret key for the SSH CA is kept secure by Cloudflare and never exposed to anyone. </p><p>To use SSH with Access for Infrastructure to grant access via SSH to a set of targets (i.e. servers), you need to <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-infrastructure-access/#modify-your-sshd-config"><u>instruct those servers to trust the Cloudflare SSH CA</u></a>. Those servers will then grant access via SSH whenever they are presented with an SSH certificate that is validly signed by the Cloudflare SSH CA.</p><p>The same Cloudflare SSH CA is used to support SSH access for all of your developers and engineers to all your target servers. This greatly simplifies key management. You no longer need to manage long-lived SSH keys and passwords for individual end users, because access to targets with SSH is granted via certificates that are dynamically issued by the Cloudflare SSH CA. And, because the Cloudflare SSH CA issued short-lived SSH certificates that expire after 3 minutes, you also don’t have to worry about creating or managing long-lived SSH credentials that could be stolen by attackers. </p><p>The 3-minute time window on the SSH certificate only applies to the time window during which the user has to authenticate to the target server; it does not apply to the length of the SSH session, which can be arbitrarily longer than 3 minutes. This 3-minute window was chosen because it was short enough to reduce the risk of security compromise and long enough to ensure that we don’t miss the time window of the user’s authentication to the server, especially if the user is on a slow connection.</p>
    <div>
      <h2>Centrally managing policies down to the specific Linux user</h2>
      <a href="#centrally-managing-policies-down-to-the-specific-linux-user">
        
      </a>
    </div>
    <p>One of the problems with traditional SSH is that once a user has an SSH key or password installed on a server, they will have access to that server forever — unless an administrator somehow remembers to remove their SSH key or password from the server in question. This leads to <i>privilege creep,</i> where too many people have standing access to too many servers, creating a security risk if an SSH key or password is ever stolen or leaked.</p><p>Instead, SSH with Access for Infrastructure allows you to centrally write policies in the Cloudflare dashboard specifying exactly what (set of) users has access to what (set of) servers. Users may be authenticated by SSO, MFA, device posture, location, and more, which provides better security than just authenticating them via long-lived SSH keys or passwords that could be stolen by attackers.</p><p>Moreover, the SSH certificates issued by the Cloudflare CA include a field called <i>valid_principals</i> which indicates the specific Linux user (e.g. <i>root</i>, <i>read-only</i>, <i>ubuntu</i>, <i>ec2-user</i>) that can be assumed by the SSH connection. As such, you can write policies that specify the (set of) Linux users that a given (set of) end users may access on a given (set of) servers, as shown in the figure below. This allows you to centrally control the privileges that a given end user has when accessing a given target server. (The one caveat here is that the server must also be pre-configured to already know about the specific Linux user (e.g. <i>root) </i>that is specified in the policies and presented in the SSH certificate. Cloudflare is NOT managing the Linux users on your Linux servers.)</p><p>As shown below, you could write a policy that says users in Canada, the UK, and Australia that are authenticated with MFA and face recognition can access the <i>root </i>and <i>ec2-user </i>Linux users on a given set of servers in AWS.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4D580wfY5DxQ9iSNhflztJ/a97eea9e68b0a44ea2b9c544d1cf3bda/BLOG-2604_3.png" />
          </figure>
    <div>
      <h2>How does Cloudflare capture SSH command logs?</h2>
      <a href="#how-does-cloudflare-capture-ssh-command-logs">
        
      </a>
    </div>
    <p>Cloudflare captures SSH command logs because we built an SSH proxy that intercepts the SSH connections. The SSH proxy establishes one SSH connection between itself and the end user’s SSH client, and another SSH connection between itself and the target (server). The SSH proxy can therefore inspect the SSH commands and log them. </p><p>SSH commands are encrypted at rest using a public key that the customer uploads via the Cloudflare API. Cloudflare cannot read SSH command logs at rest, but they can be extracted (in encrypted form) from the Cloudflare API and decrypted by the customer (who holds the corresponding private key). Instructions for uploading the <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-infrastructure-access/#enable-ssh-command-logging"><u>encryption public key are available in our developer documentation</u></a>.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1KvuPqP9XfUn5M6sE5Qvw4/c8eb24587b4301d4ca9bfad0b2037ee1/Log_for_digital-ocean.png" />
          </figure>
    <div>
      <h2>How the SSH interception works under the hood</h2>
      <a href="#how-the-ssh-interception-works-under-the-hood">
        
      </a>
    </div>
    
    <div>
      <h3>How does generic SSH work?</h3>
      <a href="#how-does-generic-ssh-work">
        
      </a>
    </div>
    <p>To understand how Cloudflare’s SSH proxy works, we first must review how a generic SSH connection is established.</p><p>First off, SSH runs over TCP, so to establish an SSH connection, we first need to complete a TCP handshake. Then, once the TCP handshake is complete, an SSH key exchange is needed to establish an ephemeral symmetric key between the client and the server that will be used to encrypt and authenticate their SSH traffic. The SSH key exchange is based on the server public key, also known as the <i>hostkey. </i>If you’ve ever used SSH, you’ve probably seen this message — that is the SSH server telling your SSH client to trust this hostkey for all future SSH interactions. (This is also known as TOFU or Trust On First Use.)</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3rjmLTfw8CauXPT0kumYyw/7cbfe372a00f7c7b1f6957743113b20a/BLOG-2604_5.png" />
          </figure><p>Finally, the client needs to authenticate itself to the server. This can be done using SSH passwords, SSH keys, or SSH certificates (as described above). SSH also has a mode called <i>none</i>, which means that the client does NOT need to authenticate itself to the server at all.</p>
    <div>
      <h3>So how does Cloudflare’s SSH proxy work? </h3>
      <a href="#so-how-does-cloudflares-ssh-proxy-work">
        
      </a>
    </div>
    
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6znMxrzjyakDF3KBqEWUHX/c12a50ef7ef6c77d4bbacaac3ee8ec60/BLOG-2604_6.png" />
          </figure><p>To understand this, we note that whenever you set up SSH with Access for Infrastructure in the Cloudflare dashboard, you first need to create the set of targets (i.e. servers) that you want to make accessible via SSH. Targets can be defined by IP address or hostname. You then create an Access for Infrastructure application that captures the TCP ports (e.g. port 22) that SSH runs over for those targets, and write policies for those SSH connections, as we already described above and <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-infrastructure-access/#5-add-an-infrastructure-application"><u>in our developer documentation</u></a>.</p><p>This setup allows Cloudflare to know the set of IP addresses and ports for which it must intercept SSH traffic. Thus, whenever Cloudflare sees a TCP handshake with an IP address and port that must be intercepted, it sends traffic for that TCP connection to the SSH proxy. </p><p>The SSH proxy leverages the client’s already authenticated identity from the WARP client, and enforces the configured Access for Infrastructure policies against it. If the policies do not allow the identity to connect to the target under the requested Linux user (e.g. <i>root)</i>, the SSH proxy will reject the connection and log an <b><i>Access denied</i></b><b> </b>event to the Access logs. Otherwise, if policies do allow the identity to connect, the the SSH proxy will establish the following two SSH connections: </p><ol><li><p>SSH connection from SSH proxy to target</p></li><li><p>SSH connection from end user’s SSH client (via Cloudflare’s WARP client) to SSH proxy</p></li></ol><p>Let’s take a look at each of these SSH connections, and the cryptographic material used to set them up. </p><p><b>To establish the SSH connection from SSH proxy to the target</b>, the SSH proxy acts as a client in the SSH key exchange between itself and the target server. The handshake uses the target server’s <i>hostkey</i> to establish an ephemeral symmetric key between the client and the server that will encrypt and authenticate their SSH traffic. Next, the SSH proxy must authenticate itself to the target server. This is done by presenting the server with a short-lived SSH certificate, issued by the Cloudflare SSH CA, for the specified Linux user that is requested for this connection as we already described above. Because the target server has been configured to trust the Cloudflare SSH CA, the target server will be able to successfully validate the certificate and the SSH connection will be established.</p><p><b>To establish the SSH connection from the end-user's SSH client to SSH proxy</b>, the SSH proxy acts as a server in the SSH key exchange between itself and the end-user’s SSH client. </p><p>To do this, the SSH proxy needs to inform the end user’s SSH client about the <i>hostkey</i> that will be used to establish this connection. But what <i>hostkey</i> should be used? We cannot use the same <i>hostkey </i>used by the target server, because that <i>hostkey </i>is the public key that corresponds to a private key that is known only to the target server, and not known to the SSH proxy. So, Cloudflare’s SSH proxy needs to generate its own <i>hostkey</i>. We don’t want the end user to randomly see warnings like the one shown below, so the SSH proxy should provide the same <i>hostkey </i>each time the user wants to access a given target server. But, if something does change with the <i>hostkey </i>of the target server, we do want the warning below to be shown. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3VBYjkE9DOpN7A5IjLSN0H/bfbc9e3a65cb81abc6fe4eb5c5780b39/BLOG-2604_7.png" />
          </figure><p>To achieve the desired behavior, the SSH proxy generates a <i>hostkey </i>and its corresponding private key by hashing together (a) a fixed secret value valid that associated with the customer account, along with (b) the <i>hostkey</i> that was provided by this target server (in the connection from SSH proxy to target server). This part of the design ensures that the end user only needs to see the TOFU notification the very first time it connects to the target server via WARP, because the same <i>hostkey</i> is used for all future connections to that target. And, if the <i>hostkey</i> of the target server does change as a result of a Monster-In-The-Middle attack, the warning above will be shown to the user.</p><p>Finally, during the SSH key exchange handshake from WARP client to SSH proxy, the SSH proxy informs that end user’s native SSH client that it is using <i>none</i> for client authentication. This means that the SSH client does NOT need to authenticate itself to the server at all. This part of the design ensures that the user need not enter any SSH passwords or store any SSH keys in its SSH configuration in order to connect to the target server via WARP. Also, this does not compromise security, because the SSH proxy has already authenticated the end user via Cloudflare’s WARP client and thus does not need to use the native SSH client authentication in the native SSH client.</p><p>Put this all together, and we have accomplished our goal of having end users authenticate to target servers without any SSH keys or passwords, using Cloudflare’s SSH CA instead. Moreover, we also preserve the desired behaviors of the TOFU notifications and warnings built into native SSH clients!</p>
    <div>
      <h2>All the keys</h2>
      <a href="#all-the-keys">
        
      </a>
    </div>
    <p>Before we wrap up, let’s review the cryptographic keys you need in order to deploy SSH with Access for Infrastructure. There are two keys:</p><ol><li><p><b>Public key of the SSH CA. </b>The private key of the SSH CA is only known to Cloudflare and not shared with anyone. The public key of the <a href="https://ranbel-infrastructure-access.cloudflare-docs-7ou.pages.dev/cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-infrastructure-access/#generate-a-cloudflare-ssh-ca"><u>SSH CA is obtained from the Cloudflare API</u></a> and must be <a href="https://ranbel-infrastructure-access.cloudflare-docs-7ou.pages.dev/cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-infrastructure-access/#generate-a-cloudflare-ssh-ca"><u>installed</u></a> on all your target servers. The same public key is used for all of your targets. This public key does not need to be kept secret.</p></li><li><p><b>Private key for SSH command log encryption. </b>To obtain logs of SSH commands, you need to generate a <a href="https://ranbel-infrastructure-access.cloudflare-docs-7ou.pages.dev/cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-infrastructure-access/#generate-a-cloudflare-ssh-ca"><u>public-private key pair, and upload the public key to Cloudflare</u></a>. The public key will be used to encrypt your SSH commands logs at REST. You need to keep the private key secret, and you can use it to <a href="https://ranbel-infrastructure-access.cloudflare-docs-7ou.pages.dev/cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-infrastructure-access/#view-ssh-logs"><u>decrypt</u></a> your SSH command logs. </p></li></ol><p>That’s it! No other keys, passwords, or credentials to manage!</p>
    <div>
      <h2>Try it out today</h2>
      <a href="#try-it-out-today">
        
      </a>
    </div>
    <p>At Cloudflare, we are committed to providing the most comprehensive solution for ZTNA, which now also includes privileged access to sensitive infrastructure like servers accessed over SSH.</p><p>Organizations can now treat SSH like any other Access application and enforce strong MFA, device context, and policy-based access prior to granting user access. This allows organizations to consolidate their infrastructure access policies into their broader <a href="https://www.cloudflare.com/learning/access-management/security-service-edge-sse/">SSE</a> or SASE architecture.</p><p>You can try out Access for Infrastructure today by following <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-networks/use-cases/ssh/ssh-infrastructure-access/#_top"><u>these instructions in our developer documentation</u></a>. Access for Infrastructure is currently available free to teams of under 50 users, and at no extra cost to existing pay-as-you-go and Contract plan customers through an Access or Zero Trust subscription. Expect to hear about a lot more features from us as we continue to natively rebuild <a href="https://blog.cloudflare.com/cloudflare-acquires-bastionzero/"><u>BastionZero</u></a>’s technology into Cloudflare’s Access for Infrastructure service!</p> ]]></content:encoded>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Acquisitions]]></category>
            <category><![CDATA[SSH]]></category>
            <category><![CDATA[Cloudflare Access]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Compliance]]></category>
            <guid isPermaLink="false">KUIHP5Rgyl2H3pGVE6m99</guid>
            <dc:creator>Sharon Goldberg</dc:creator>
            <dc:creator>Ann Ming Samborski</dc:creator>
            <dc:creator>Sebby Lipman</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare Area 1 earns SOC 2 report]]></title>
            <link>https://blog.cloudflare.com/area-1-earns-soc-2-report/</link>
            <pubDate>Thu, 08 Jun 2023 14:00:06 GMT</pubDate>
            <description><![CDATA[ Many customers want assurance that the sensitive information they send to us can be kept safe. One of the best ways to provide this assurance is a SOC 2 Type II report ]]></description>
            <content:encoded><![CDATA[ <p></p><p><a href="https://www.cloudflare.com/zero-trust/products/email-security/">Cloudflare Area 1</a> is a cloud-native <a href="https://www.cloudflare.com/zero-trust/solutions/email-security-services/">email security service</a> that identifies and blocks attacks before they hit user inboxes, enabling more effective protection against <a href="https://www.cloudflare.com/learning/access-management/spear-phishing/">spear phishing</a>, <a href="https://www.cloudflare.com/learning/email-security/business-email-compromise-bec/">Business Email Compromise</a> (BEC), and other advanced threats. Cloudflare Area 1 is part of the <a href="https://www.cloudflare.com/en-gb/zero-trust-hub/">Cloudflare Zero Trust platform</a> and an essential component of a modern security and compliance strategy, helping organizations to reduce their attackers surface, detect and respond to threats faster, and improve compliance with industry regulations and security standards.</p><p>This announcement is another step in our commitment to remaining strong in our security posture.</p>
    <div>
      <h2>Our SOC 2 Journey</h2>
      <a href="#our-soc-2-journey">
        
      </a>
    </div>
    <p>Many customers want assurance that the sensitive information they send to us can be kept safe. One of the best ways to provide this assurance is a <a href="https://us.aicpa.org/interestareas/frc/assuranceadvisoryservices/serviceorganization-smanagement">SOC 2 Type II report</a>. We decided to obtain the report as it is the best way for us to demonstrate the controls we have in place to keep Cloudflare Area 1 and its infrastructure secure and available.  </p><p>Cloudflare Area 1’s SOC 2 Type II report covers a 3 month period from 1 January 2023 to 31 March 2023. Our auditors assessed the operating effectiveness of the 70 controls we’ve implemented to meet the <a href="https://www.aicpa-cima.com/resources/download/2017-trust-services-criteria-with-revised-points-of-focus-2022">Trust Services Criteria</a> for Security, Confidentiality, and Availability.</p><p>We anticipate that the next ask from our customers will be for a SOC 2 Type II report that covers a longer reporting period, so we’ve decided to expand our scope for the Cloudflare Global Cloud Platform SOC 2 Type II report to be inclusive of Cloudflare Area 1 later on this year.</p><p>We are thrilled to reach this milestone and will continue to stay committed to be one of the most trusted platforms.</p><p>For a copy of Cloudflare Area 1’s SOC 2 Type II report, existing customers can obtain one through the <a href="https://developers.cloudflare.com/fundamentals/get-started/basic-tasks/access-compliance-docs/">Cloudflare Dashboard</a>; new customers may also request a copy from your sales representative. For the latest information about our certifications and reports, please visit <a href="https://www.cloudflare.com/trust-hub/compliance-resources/">our Trust Hub</a>.</p> ]]></content:encoded>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Compliance]]></category>
            <category><![CDATA[Certification]]></category>
            <category><![CDATA[Area 1 Security]]></category>
            <category><![CDATA[Cloud Email Security]]></category>
            <category><![CDATA[Email Security]]></category>
            <guid isPermaLink="false">3fXSrjEi1CSSNf11nivFJ</guid>
            <dc:creator>Samuel Vieira</dc:creator>
            <dc:creator>Paul East</dc:creator>
        </item>
        <item>
            <title><![CDATA[Helping protect personal information in the cloud, all across the world]]></title>
            <link>https://blog.cloudflare.com/cloudflare-official-gdpr-code-of-conduct/</link>
            <pubDate>Thu, 30 Mar 2023 10:46:56 GMT</pubDate>
            <description><![CDATA[ Helping protect personal information in the cloud, all across the world ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4CLjGktaHTkh4wu7VLAQGz/1cec68335a9c9a90cb13a9cd1178bd57/image1-58.png" />
            
            </figure><p><i>Cloudflare has achieved a new EU Cloud Code of Conduct privacy validation, demonstrating GDPR compliance to strengthen trust in cloud services</i></p><p>Internet privacy laws around the globe differ, and in recent years there’s been much written about cross-border data transfers. Many regulations require adequate protections to be in place before personal information flows around the world, as with the European General Data Protection Regulation (GDPR). The law rightly sets a high bar for how organizations must carefully handle personal information, and in drafting the regulation lawmakers anticipated personal data crossing-borders: <a href="https://eur-lex.europa.eu/eli/reg/2016/679/oj#d1e4227-1-1">Chapter V</a> of the regulation covers those transfers specifically.</p><p>Whilst transparency on <i>where</i> personal information is stored is important, it’s also critically important <i>how</i> personal information is handled, and <i>how</i> it is kept safe and secure. At Cloudflare, we believe in <a href="/investing-in-security-to-protect-data-privacy/">protecting the privacy of personal information</a> across the world, and we give our customers <a href="/dls-2022/">the tools and the choice</a> on how and where to process their data. Put simply, we require that data is handled and protected in the same, secure, and careful way, whether our customers choose to transfer data across the world, or for it to remain in one country.</p><p>And today we are proud to announce that we have successfully completed our assessment journey and received the EU Cloud Code of Conduct compliance mark as a demonstration of our compliance with the GDPR, protecting personal data in the cloud, all across the world.</p>
    <div>
      <h2>It matters how personal information is handled – not just where in the world it is saved</h2>
      <a href="#it-matters-how-personal-information-is-handled-not-just-where-in-the-world-it-is-saved">
        
      </a>
    </div>
    <p>The same GDPR lawmakers also anticipated that organizations would want to handle and protect personal information in a consistent, transparent, and safe way too. Article 40, called ‘<i>Codes of Conduct</i>’ starts:</p><blockquote><p><i>“The Member States, the supervisory authorities, the Board and the Commission shall encourage the drawing up of codes of conduct intended to contribute to the proper application of this Regulation, taking account of the specific features of the various processing sectors and the specific needs of micro, small and medium-sized enterprises.”</i></p></blockquote><p>Using codes of conduct to demonstrate compliance with privacy law has a longer history, too. Like the GDPR, the pioneering 1995 EU Data Protection Directive, officially <a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:31995L0046">Directive 95/46/EC</a>, also included provision for draft community codes to be submitted to national authorities, and for those codes to be formally approved by an official body of the European Union.</p>
    <div>
      <h2>An official GDPR Code of Conduct</h2>
      <a href="#an-official-gdpr-code-of-conduct">
        
      </a>
    </div>
    <p>It took a full five years after the GDPR was adopted in 2016 for the first code of conduct to be officially approved. Finally in May 2021, the European Data Protection Board, a group composed of representatives of all the national data protection authorities across the union, <a href="https://edpb.europa.eu/system/files/2021-05/edpb_opinion_202116_eucloudcode_en.pdf">approved</a> the “<i>EU Data Protection Code of Conduct for Cloud Service Providers</i>” – the EU Cloud Code of Conduct (or ‘EU Cloud CoC’ for short) as the first official GDPR code of conduct. The EU Cloud CoC was brought to the board by the Belgian supervisory authority on behalf of SCOPE Europe, the organization who collaborated to develop the code over a number of years, including with input from the European Commission, members of the cloud computing community, and European data protection authorities.</p><p>The code is a framework for buyers and providers of cloud services. Buyers can understand in a straightforward way how a provider of cloud services will handle personal information. Providers of cloud services undergo an independent assessment to demonstrate to the buyers of their cloud services that they will handle personal information in a safe and codified way. In the case of the EU Cloud CoC and <i>only because</i> the code has received formal approval, buyers of cloud services compliant with code will know that the cloud provider handled customer personal information in a way that is compliant with the GDPR.</p>
    <div>
      <h3>What the code covers</h3>
      <a href="#what-the-code-covers">
        
      </a>
    </div>
    <p>The code defines clear requirements for providers of cloud services to implement Article 28 of the GDPR (“Processor”) and related articles. The framework covers data protection policies, as well as technical and organizational security measures. There are sections covering providers' terms and conditions, confidentiality and recordkeeping, the audit rights of the customer, how to handle potential data breaches, and how the provider approaches subprocessing – when a third-party is subcontracted to process personal data alongside the main data processor – and more.</p><p>The framework also covers how personal data may be legitimately transferred internationally, although whilst the EU Cloud CoC covers ensuring this is done in a legally-compliant way, the code itself is not a ‘safeguard’ or a tool for third country transfers. A future update to the code may expand into that with an additional module, but as of March 2023 that is still under development.</p>
    <div>
      <h3>Let us do a deeper dive into some of the requirements of the EU Cloud CoC and how it can demonstrate compliance with the GDPR</h3>
      <a href="#let-us-do-a-deeper-dive-into-some-of-the-requirements-of-the-eu-cloud-coc-and-how-it-can-demonstrate-compliance-with-the-gdpr">
        
      </a>
    </div>
    <p><b><i>Example one</i></b>One requirement in the code is to have documented procedures in place to assist customers with their ‘data protection impact assessments’. According to the GDPR, these are:</p><blockquote><p><i>“...an assessment of the impact of the envisaged processing operationson the protection of personal data.” - Article 35.1, GDPR</i></p></blockquote><p>So a cloud service provider should have a written process in place to support customers as they undertake their own assessments. In supporting the customer, the service provider is demonstrating their commitment to the rigorous data protection standards of the GDPR too. Cloudflare meets this requirement, and further supports transparency by <a href="https://www.cloudflare.com/gdpr/subprocessors/">publishing details of sub-processors</a> used in the processing of personal data, and directing customers to <a href="https://developers.cloudflare.com/fundamentals/get-started/basic-tasks/access-compliance-docs/">audit reports available</a> in the Cloudflare dashboard.</p><p>There's also another reference in the GDPR to codes of conduct in the context of data protection impact assessments too:</p><blockquote><p>“<i>Compliance with approved codes of conduct… shall be taken into due account in assessing the impact of the processing operations performed… in particular for the purposes of a data protection impact assessment.</i>” - Article 35.8, GDPR</p></blockquote><p>So when preparing an impact assessment, a cloud customer shall take into account that a service provider complies with an approved code of conduct. Another way that both customers and cloud providers benefit from using codes of conduct!</p><p><b><i>Example two</i></b>Another example of a requirement of the code is that when cloud service providers provide encryption capabilities, they shall be implemented effectively. The requirement clarifies further that this should be undertaken by following strong and trusted encryption techniques, by taking into account the state-of-the-art, and by adequately preventing abusive access to customer personal data. Encryption is critical to protecting personal data in the cloud; without encryption, or with weakened or outdated encryption, privacy and security are not possible. So in using and reviewing encryption appropriately, cloud services providers help meet the requirements of the GDPR in protecting their customers’ personal data.</p><p>At Cloudflare, we are particularly proud of our <a href="/introducing-universal-ssl/">track</a> <a href="/introducing-universal-dnssec/">record</a>: we <a href="/esni/">make</a> <a href="/introducing-tls-1-3/">effective</a> <a href="/dns-encryption-explained/">encryption</a> <a href="/encrypted-client-hello/">available</a>, for free, to all our customers. We help our customers <a href="https://www.cloudflare.com/learning/ssl/what-is-encryption/">understand</a> <a href="https://www.cloudflare.com/learning/privacy/encryption-and-privacy/">encryption</a>, and most importantly, we use strong and trusted encryption algorithms and techniques ourselves to protect customer personal data. We have a formal <a href="https://research.cloudflare.com/">Research Team</a>, including academic researchers and cryptographers who <a href="/post-quantum-for-all/">design and deploy</a> <a href="https://www.cloudflare.com/insights-quantum-computing/">state-of-the-art encryption protocols</a> designed to provide effective protection against active and passive attacks, including with resources known to be available to public authorities; and we use trustworthy public-key certification authorities and infrastructure. Most recently this month, we <a href="/post-quantum-crypto-should-be-free/">announced that post-quantum crypto should be free</a>, and so we are including it for free, forever.</p><p><b><i>More information</i></b>The code contains requirements described in 87 statements, called controls. You can find more about the EU Cloud CoC, download a full copy of the code, and keep up to date with news at <a href="https://eucoc.cloud/en/home">https://eucoc.cloud/en/home</a></p>
    <div>
      <h2>Why this matters to Cloudflare customers</h2>
      <a href="#why-this-matters-to-cloudflare-customers">
        
      </a>
    </div>
    <p>Cloudflare joined the EU Cloud Code of Conduct’s General Assembly last May. Members of the General Assembly undertake an assessment journey which includes declaring named cloud services compliant with the EU Cloud Code, and after completing an independent assessment process by SCOPE Europe, the accredited monitoring body, receive the EU Cloud Code of Conduct compliance mark.</p><p>Cloudflare has completed the assessment process and been verified for 47 cloud services.</p>
    <div>
      <h3>Cloudflare services that are in scope for EU Cloud Code of Conduct:</h3>
      <a href="#cloudflare-services-that-are-in-scope-for-eu-cloud-code-of-conduct">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2jWc6aa32nenRMEBpIxakA/0136e17484e8122f9104c9efd878dc9f/Screenshot-2023-03-30-at-11.38.15.png" />
            
            </figure><p>EU Cloud CoC Verification-ID: 2023LVL02SCOPE4316.</p><p>Services are verified compliant with the EU Cloud Code of Conduct,Verification-ID: 2023LVL02SCOPE4316.For further information please visit <a href="https://eucoc.cloud/en/public-register">https://eucoc.cloud/en/public-register</a></p>
    <div>
      <h2>And we’re not done yet…</h2>
      <a href="#and-were-not-done-yet">
        
      </a>
    </div>
    <p>The EU Cloud Code of Conduct is the newest privacy validation to add to our growing list of privacy certifications. Two years ago, Cloudflare <a href="/iso-27701-privacy-certification/">was one of the first organisations</a> in our industry to have received the new ISO privacy certification, ISO/IEC 27701:2019, and the first Internet performance &amp; security company to be certified to it. Last year, Cloudflare <a href="/iso-27018-second-privacy-certification-and-c5/">certified to a second international privacy standard</a> related to the processing of personal data, ISO/IEC 27018:2019. Most recently, in January this year Cloudflare completed our annual ISO audit with third-party auditor Schellman; and our new certificate, covering ISO 27001:2013, ISO 27018:2019, and ISO 27701:2019 is now available for customers to <a href="https://support.cloudflare.com/hc/en-us/articles/4412661740941-Access-Compliance-Documentation">download from the Cloudflare dashboard</a>.</p><p>And there’s more to come! As we blogged about in <a href="/towards-a-global-framework-for-cross-border-data-flows-and-privacy-protection/">January for Data Privacy Day</a>, we’re following the progress of the emerging Global Cross Border Privacy Rules (CBPR) certification with interest. This proposed single global certification could suffice for participating companies to safely transfer personal data between participating countries worldwide, and having already been supported by several governments from North America and Asia, looks very promising in this regard.</p>
    <div>
      <h2>Cloudflare certifications</h2>
      <a href="#cloudflare-certifications">
        
      </a>
    </div>
    <p>Find out how existing customers may download a copy of Cloudflare’s certifications and reports from the <a href="https://developers.cloudflare.com/fundamentals/get-started/basic-tasks/access-compliance-docs/">Cloudflare dashboard</a>; new customers may also request these from your sales representative.</p><p>For the latest information about our certifications and reports, please visit <a href="https://www.cloudflare.com/trust-hub/compliance-resources/">our Trust Hub</a>.</p> ]]></content:encoded>
            <category><![CDATA[Privacy]]></category>
            <category><![CDATA[Certification]]></category>
            <category><![CDATA[Compliance]]></category>
            <category><![CDATA[GDPR]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">1K8KnhvhOJh8LItVXjnbnK</guid>
            <dc:creator>Rory Malone</dc:creator>
        </item>
        <item>
            <title><![CDATA[One-click ISO 27001 certified deployment of Regional Services in the EU]]></title>
            <link>https://blog.cloudflare.com/one-click-iso-27001-deployment/</link>
            <pubDate>Sat, 18 Mar 2023 15:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare announces one-click ISO certified region, a super easy way for customers to limit where traffic is serviced to ISO 27001 certified data centers inside the European Union ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6aVTJdGy7JkjPxS0Z827zC/93d84cd6fc8321a8ecdb60b48f476041/Regional-Services-one-click-limit-traffic-to-ISO-27001-certified-colos-only.png" />
            
            </figure><p>Today, we’re very happy to announce the general availability of a new region for Regional Services that allows you to limit your traffic to only <a href="https://www.iso.org/isoiec-27001-information-security.html">ISO 27001</a> certified data centers inside the EU. This helps customers that have very strict requirements surrounding which data centers are allowed to decrypt and service traffic. Enabling this feature is a one-click operation right on the Cloudflare dashboard.</p>
    <div>
      <h3>Regional Services - a recap</h3>
      <a href="#regional-services-a-recap">
        
      </a>
    </div>
    <p>In 2020, we saw an increase in prospects asking about data localization. Specifically, increased regulatory pressure limited them from using vendors that operated at global scale. We launched <a href="/introducing-regional-services/">Regional Services</a>, a new way for customers to use the Cloudflare network. With Regional Services, we put customers back in control over which data centers are used to service traffic. Regional Services operates by limiting exactly which data centers are used to decrypt and service HTTPS traffic. For example, a customer may want to use only data centers inside the European Union to service traffic. Regional Services operates by leveraging our global network for DDoS protection but only decrypting traffic and applying Layer 7 products inside data centers that are located inside the European Union.</p><p>We later followed up with the <a href="https://www.cloudflare.com/data-localization/">Data Localization Suite</a> and additional regions: <a href="/regional-services-comes-to-apac/">India, Japan, and Australia</a>.</p><p>With Regional Services, customers get the best of both worlds: we empower them to use our global network for volumetric DDoS protection whilst limiting where traffic is serviced. We do that by accepting the raw TCP connection at the closest data center but forwarding it on to a data center in-region for decryption. That means that only machines of the customer’s choosing actually see the raw HTTP request, which could contain sensitive data such as a customer’s bank account or medical information.</p>
    <div>
      <h3>A new region and a new UI</h3>
      <a href="#a-new-region-and-a-new-ui">
        
      </a>
    </div>
    <p>Traditionally we’ve seen requests for data localization largely center around countries or geographic areas. Many types of regulations require companies to make promises about working only with vendors that are capable of restricting where their traffic is serviced geographically. Organizations can have many reasons for being limited in their choices, but they generally fall into two buckets: compliance and contractual commitments.</p><p>More recently, we are seeing that more and more companies are asking about security requirements. An often asked question about security in IT is: how do you ensure that something is safe? For instance, for a data center you might be wondering how physical access is managed. Or how often security policies are reviewed and updated. This is where certifications come in. A common certification in IT is the <a href="https://en.wikipedia.org/wiki/ISO/IEC_27001">ISO 27001 certification</a>:</p><p>Per the <a href="https://www.iso.org/isoiec-27001-information-security.html">ISO.org</a>:</p><blockquote><p><i>“ISO/IEC 27001 is the world’s best-known standard for information security management systems (ISMS) and their requirements. Additional best practice in data protection and cyber resilience are covered by more than a dozen standards in the ISO/IEC 27000 family. Together, they enable organizations of all sectors and sizes to manage the security of assets such as financial information, intellectual property, employee data and information entrusted by third parties.”</i></p></blockquote><p>In short, ISO 27001 is a certification that a data center can achieve that ensures that they maintain a set of security standards to keep the data center secure. With the new Regional Services region, HTTPS traffic will only be decrypted in data centers that hold the ISO 27001 certification. Products such as WAF, Bot Management and Workers will only be applied in those relevant data centers.</p><p>The other update we’re excited to announce is a brand new User Interface for configuring the Data Localization Suite. The previous UI was limited in that customers had to preconfigure a region for an entire zone: you couldn’t mix and match regions. The new UI allows you to do just that: each individual hostname can be configured for a different region, directly on the DNS tab:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/60Ech3V5DIBzcXCKC79TU3/2e16686487cbbad51c77a3f896d9be87/pasted-image-0--5--3.png" />
            
            </figure><p>Configuring a region for a particular hostname is now just a single click away. Changes take effect within seconds, making this the easiest way to configure data localization yet. For customers using the Metadata Boundary, we’ve also launched a self-serve UI that allows you to configure where logs flow:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/62faVgbaj8GXkZtHrCX5xR/717d4b892a5f1f78c4b8c503a549c65c/image-13.png" />
            
            </figure><p>We’re excited about these new updates that give customers more flexibility in choosing which of Cloudflare’s data centers to use as well as making it easier than ever to configure them. The new region and existing regions are now a one-click configuration option right from the dashboard. As always, we love getting feedback, especially on what new regions you’d like to see us add in the future. In the meantime, if you’re interested in using the Data Localization Suite, please reach out to your account team.</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Data Localization]]></category>
            <category><![CDATA[Compliance]]></category>
            <category><![CDATA[Certification]]></category>
            <category><![CDATA[Regional Services]]></category>
            <category><![CDATA[Product News]]></category>
            <guid isPermaLink="false">4eu3YHNrghYyABVfdr9okM</guid>
            <dc:creator>Achiel van der Mandele</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare achieves key cloud computing certifications — and there’s more to come]]></title>
            <link>https://blog.cloudflare.com/iso-27018-second-privacy-certification-and-c5/</link>
            <pubDate>Mon, 23 May 2022 06:59:57 GMT</pubDate>
            <description><![CDATA[ Cloudflare now has a second major international privacy certification, as well as C5 attestation — and we’re not done yet. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Back in the early days of the Internet, you could physically see the hardware where your data was stored. You knew where your data was and what kind of locks and security protections you had in place. Fast-forward a few decades, and data is all “in the cloud”. Now, you have to trust that your cloud services provider is putting security precautions in place just as you would have if your data was still sitting on your hardware. The good news is, you don’t have to merely trust your provider anymore. There are a number of ways a cloud services provider can prove it has robust privacy and security protections in place.</p><p>Today, we are excited to announce that Cloudflare has taken three major steps forward in proving the security and privacy protections we provide to customers of our cloud services: we achieved a key cloud services certification, ISO/IEC 27018:2019; we completed our independent audit and received our <i>Cloud Computing Compliance Criteria Catalog</i> (“C5”) attestation; and we have joined the EU Cloud Code of Conduct General Assembly to help increase the impact of the trusted cloud ecosystem and encourage more organizations to adopt GDPR-compliant cloud services.</p><p>Cloudflare has been committed to data privacy and security since our founding, and it is important to us that we can demonstrate these commitments. Certification provides assurance to our customers that a third party has independently verified that Cloudflare meets the requirements set out in the standard.</p>
    <div>
      <h3>ISO/IEC 27018:2019 - Cloud Services Certification</h3>
      <a href="#iso-iec-27018-2019-cloud-services-certification">
        
      </a>
    </div>
    <p>2022 has been a big year for people who like the number ‘two’. February marked the second when the 22nd Feb 2022 20:22:02 passed: the second second of the twenty-second minute of the twentieth hour of the twenty-second day of the second month, of the year twenty-twenty-two! As well as the date being a palindrome — something that reads the same forwards and backwards — on an vintage ‘80s LCD clock, the date and time could be written as an ambigram too — something that can be read upside down as well as the right way up:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/ydaKkhuLuQSxB01PuW3nX/31ea35337e0dd78b20aefe9abd6db3ef/image3-38.png" />
            
            </figure><p>When we hit 2022 02 22, our team was busy completing our second annual audit to certify to ISO/IEC 27701:2019, having been one of the first organizations in our industry to have achieved this <a href="/iso-27701-privacy-certification/">new ISO privacy certification</a> in 2021, and the first Internet performance &amp; security company to be certified to it. And now Cloudflare has now been certified to a second international privacy standard related to the processing of personal data — ISO/IEC 27018:2019.<sup>1</sup></p><p>ISO 27018 is a privacy extension to the widespread industry standards ISO/IEC 27001 and ISO/IEC 27002, which describe how to establish and run an Information Security Management System. ISO 27018 extends the standards into a code of practice for <a href="https://www.cloudflare.com/learning/security/what-is-information-security/">how any personal information should be protected</a> when processed in a public cloud, such as Cloudflare’s.</p><p><i>What does ISO 27018 mean for Cloudflare customers?</i></p><p>Put simply, with Cloudflare’s certifications to both ISO 27701 and ISO 27018, customers can be assured that Cloudflare both has a privacy program that meets GDPR-aligned industry standards and also that Cloudflare protects the personal data processed in our network as part of that privacy program.</p><p>These certifications, in addition to the <a href="https://www.cloudflare.com/cloudflare-customer-dpa/">Data Processing Addendum</a> (“DPA”) we make available to our customers, offer our customers multiple layers of assurance that any personal data that Cloudflare processes on their behalf will be handled in a way that meets the GDPR’s requirements.</p><p>The ISO 27018 standard contains enhancements to existing ISO 27002 controls and an additional set of 25 controls identified for organizations that are personal data processors. Controls are essentially a set of best practices that processors must meet in terms of data handling practices and transparency about those practices, protecting and encrypting the personal data processed, and handling data subject rights, among others. As an example, one of the ISO 27018 requirements is:</p><blockquote><p>Where the organization is contracted to process personal data, that personal data may not be used for the purpose of marketing and advertising without establishing that prior consent was obtained from the appropriate data subject. Such consent shall not be a condition for receiving the service.</p></blockquote><p>When Cloudflare acts as a data processor for our customers’ data, that data (and any personal data it may contain) belongs to our customers, not to us. Cloudflare does not track our customers’ end users for marketing or advertising purposes, and we never will. We even went beyond what the ISO control required and added this commitment to our customer DPA:</p><blockquote><p>“... Cloudflare shall not use the Personal Data for the purposes of marketing or advertising…”- 3.1(b), Cloudflare Data Processing Addendum</p></blockquote><p><i>Cloudflare achieves ISO 27018:2019 Certification</i></p><p>For ISO 27018, Cloudflare was assessed by a third-party auditor, Schellman, between December 2021 and February 2022. Certifying to an ISO privacy standard is a multi-step process that includes an internal and an external audit, before finally being certified against the standard by the independent auditor. Cloudflare’s new single joint certificate, covering ISO 27001:2013, ISO 27018:2019, and ISO 27701:2019 is now available to download from the <a href="https://support.cloudflare.com/hc/en-us/articles/4412661740941-Access-Compliance-Documentation">Cloudflare Dashboard</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6zLfSmaUz5kwF372DJ4cCw/a165c386d9e27b23126fc636924e33bf/image2-52.png" />
            
            </figure>
    <div>
      <h3>C5:2020 – Cloud Computing Compliance Criteria Catalog</h3>
      <a href="#c5-2020-cloud-computing-compliance-criteria-catalog">
        
      </a>
    </div>
    <p>ISO 27018 isn’t all we’re announcing: as we <a href="/bsig-audit-and-beyond/">blogged in February</a>, Cloudflare has also been undergoing a separate independent audit for the <i>Cloud Computing Compliance Criteria Catalog</i> certification — also known as C5 — which was introduced by the German government’s <a href="https://www.bsi.bund.de/">Federal Office for Information Security</a> (“BSI”) in 2016 and updated in 2020. C5 evaluates an organization’s security program against a standard of robust cloud security controls. Both German government agencies and private companies place a high level of importance on aligning their cloud computing requirements with these standards. Learn more about C5 <a href="https://www.bsi.bund.de/EN/Topics/CloudComputing/Compliance_Criteria_Catalogue/Compliance_Criteria_Catalogue_node.html">here</a>.</p><p>Today, we’re excited to announce that we have completed our independent audit and received our C5 attestation from our third-party auditors. The C5 attestation report is now available  to download from the <a href="https://support.cloudflare.com/hc/en-us/articles/4412661740941-Access-Compliance-Documentation">Cloudflare Dashboard</a>.</p>
    <div>
      <h3>And we’re not done yet…</h3>
      <a href="#and-were-not-done-yet">
        
      </a>
    </div>
    <p>When the European Union’s benchmark-setting General Data Protection Regulation (“GDPR”) was adopted four years ago this week, Article 40 encouraged:</p><blockquote><p>“...the drawing up of codes of conduct intended to contribute to the proper application of this Regulation, taking account of the specific features of the various processing sectors and the specific needs of micro, small and medium-sized enterprises.”</p></blockquote><p>The first code officially approved as GDPR-compliant by the EU one year ago this past weekend is ‘<i>The EU Cloud Code of Conduct’</i>. This code is designed to help cloud service providers demonstrate the protections they provide for the personal data they process on behalf of their customers. It covers all cloud service layers, and its compliance is overseen by accredited monitoring body <a href="https://scope-europe.eu/en/home">SCOPE Europe</a>. Initially, cloud service providers join as members of the code’s General Assembly, and then the second step is to undergo an audit to validate their adherence to the code.</p><p>Today, we are pleased to announce today that Cloudflare has joined the General Assembly of the EU Cloud Code of Conduct. We look forward to the second stage in this process, undertaking our audit and publicly affirming our compliance to the GDPR as a processor of personal data.</p>
    <div>
      <h3>Cloudflare Certifications</h3>
      <a href="#cloudflare-certifications">
        
      </a>
    </div>
    <p>Customers may now download a copy of Cloudflare’s certifications and reports from the <a href="https://support.cloudflare.com/hc/en-us/articles/4412661740941-Access-Compliance-Documentation">Cloudflare Dashboard</a>; new customers may request these from your sales representative. For the latest information about our certifications and reports, please visit <a href="https://www.cloudflare.com/trust-hub">our</a> <a href="https://www.cloudflare.com/trust-hub/compliance-resources/">Trust Hub</a>.</p><p>...</p><p><sup>1</sup>The International Organization for Standardization (“ISO”) is an international, nongovernmental organization made up of national standards bodies that develops and publishes a wide range of proprietary, industrial, and commercial standards.</p> ]]></content:encoded>
            <category><![CDATA[Privacy]]></category>
            <category><![CDATA[Certification]]></category>
            <category><![CDATA[Compliance]]></category>
            <category><![CDATA[GDPR]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">kqAJ0iyNw4RHzA6hfdxAj</guid>
            <dc:creator>Rory Malone</dc:creator>
        </item>
        <item>
            <title><![CDATA[Commitment to Customer Security]]></title>
            <link>https://blog.cloudflare.com/our-commitment-to-customer-security/</link>
            <pubDate>Fri, 18 Mar 2022 18:58:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare has been hooked on securing customers globally since its inception. Our services protect customer traffic and data as well as our own, and we are continuously improving and expanding those services to respond to the changing threat landscape of the Internet ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Cloudflare has been hooked on securing customers globally since its inception. Our services protect customer traffic and data as well as our own, and we are continuously improving and expanding those services to respond to the changing threat landscape of the Internet. Proving that commitment is a multi-faceted venture, the Security Team focuses on people, proof, and transparency to ensure every touchpoint with our products and company feels dependable.</p>
    <div>
      <h3>People</h3>
      <a href="#people">
        
      </a>
    </div>
    <p>The breadth of knowledge of the Security Team is wide and bleeding edge. Working as a security team at a security company means being highly technical, <a href="https://cloudflare.tv/event/3tghdguhftXYpoWDqilFFC">diverse</a>, <a href="/dogfooding-from-home/">willing to test any and all products on ourselves</a>, and sharing our knowledge with our local and global communities through industry groups and <a href="https://bsides.berlin/">presenting at conferences worldwide</a>. Connecting with our customers and counterparts through meetups and conferences lets us share problems, learn about upcoming industry trends, and share feedback to make improvements to the customer experience. In addition to running a formally documented, risk-based security program for Cloudflare, team members drive continuous improvement efforts across our Product and Infrastructure teams by reviewing and advising on changes, identifying and treating vulnerabilities, controlling authorization and access to systems and data, encrypting data in transit and at rest, and by detecting and responding to threats and incidents.</p>
    <div>
      <h3>Proof</h3>
      <a href="#proof">
        
      </a>
    </div>
    <p>Security claims are all well and good, but how can a customer be sure we are doing what we say we do? We do it by undergoing several audits a year, proving that our security practices meet industry standards. To date, Cloudflare has regularly assessed and maintained compliance with PCI DSS (as a merchant and a service provider), SOC 2 Type II, ISO 27001 and ISO 27701 standards. No matter where our customers are in the world, they will likely need to rely on at least one of these standards to protect their customers’ information. We honor the responsibility of being the backbone of that <a href="https://www.cloudflare.com/trust-hub/compliance-resources/">trust</a>.</p><p>As Cloudflare’s customer base continues to grow into more regulated industries with complex and rigorous requirements, we've decided to assess our global network against three additional standards this year:</p><ul><li><p><a href="https://www.cloudflare.com/learning/privacy/what-is-fedramp/">FedRAMP</a>, the US Federal Risk and Authorization Management Program, which evaluates our systems and practices against the standard for protection of US agency data in cloud computing environments. Cloudflare is listed on the <a href="https://marketplace.fedramp.gov/#!/product/cloudflare-federal?sort=productName&amp;productNameSearch=cloudflare">FedRAMP Marketplace</a> as “In Process” for an agency authorization at a Moderate impact level. We’re in the final steps of concluding our security assessment report from our auditors and on target to receive an authorization to operate in 2022.</p></li><li><p>ISO 27018, which examines our practices to protect personally identifiable information (PII) as a cloud provider. This extension to the ISO 27001 standard ensures that our information security management system (ISMS) manages the risks associated with processing PII. We’ve completed the third-party assessment, and we’re waiting for our certification in the upcoming month.</p></li><li><p>C5, Cloud Computing Compliance Criteria Catalog, introduced by <a href="https://www.bsi.bund.de/DE/Home/home_node.html">the Federal Office for Information Security</a> (The BSI) in Germany, is a validation against a defined baseline security level for cloud computing. Cloudflare is currently in the process of being assessed against the catalog by third-party auditors. Learn about our journey <a href="/bsig-audit-and-beyond/">here</a>.</p></li></ul>
    <div>
      <h3>Transparency</h3>
      <a href="#transparency">
        
      </a>
    </div>
    <p>Our commitment to security for our customers and business means we have to be super transparent. When a security incident is being contained, we have in our response plan to not only bring in our legal, compliance and communications teams to determine notification strategy, but we also start outlining a detailed overview of how we are responding, even if we are still in the process of remediating.</p><p>We know firsthand how frustrating it can be when your critical vendors stay silent during a security incident and provide nothing more than a one sentence legal response which fails to reveal how they were impacted by the security vulnerability or incident. Here at Cloudflare, it is in our DNA to be transparent. You can see it with the blogs (<a href="/about-the-march-8-9-2021-verkada-camera-hack/">Verkada Incident</a>, <a href="/how-cloudflare-security-responded-to-log4j2-vulnerability/">Log4j</a>) we write and how quickly we show our customers how we’ve responded and what we’re doing to fix the issue.</p><p>One of the most frequent questions we get from our customers regarding incidents is if our third-parties were impacted. Supply chain vulnerabilities, like Solarwinds and Log4j, have driven us to create efficiencies, such as automated inquiries, to all of our critical vendors at once. During the Containment phase of our security incident response process, our third-party risk team is quickly able to identify the impacted vendors and prioritize our production and security vendors. Our tooling allows us to trigger inquiries to third parties immediately, and our team is integrated into the incident response process to ensure effective communication. Any information that we receive from our vendors, we share with our Security Compliance forums to ensure that other companies who are also inquiring with their vendors don’t have to duplicate their work.</p>
    <div>
      <h3>Value</h3>
      <a href="#value">
        
      </a>
    </div>
    <p>These recurring audits and assessments are not simple website badges. Our Security team doesn’t produce evidence only to pass audits; our process includes identifying risks, forming controls and processes to address those risks, continuous operation of those processes, evaluation of the effectiveness of (in the form of internal and external audits and tests) those processes, and making improvements to the ISMS based on those evaluations. Some things on our process that set us apart include the following:</p><ul><li><p>Many companies do not contact vendors or have this process baked into their incident response procedures. For log4j, our Vendor Security Team was on calls with the response team and providing regular updates on vendor responses as soon as the incident was identified.</p></li><li><p>Many companies do not proactively communicate to customers like we do. We communicate even when we are not legally required to do so because we feel it’s the right thing to do regardless of the requirement.</p></li><li><p>The tools in this space also are not usually flexible enough to send custom questionnaires quickly out to vendors. We have automation in place to get these out in bulk right away and tailor questions to the vulnerabilities at hand.</p></li></ul><p>The final step is communicating the resulting picture of our security posture to our customers. Our security certifications and assessment results are available to our customers via download from their Cloudflare Dashboards, or by request to their account team. For the latest information about our certifications and reports, please visit <a href="https://www.cloudflare.com/trust-hub">our</a> <a href="https://www.cloudflare.com/trust-hub/compliance-resources/">Trust Hub</a>.</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Compliance]]></category>
            <guid isPermaLink="false">2JMe5N3c4arpvGb4eNcd3l</guid>
            <dc:creator>Ling Wu</dc:creator>
            <dc:creator>Matt Gallagher</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare re-enforces commitment to security in Germany via BSIG audit]]></title>
            <link>https://blog.cloudflare.com/bsig-audit-and-beyond/</link>
            <pubDate>Thu, 24 Feb 2022 17:30:16 GMT</pubDate>
            <description><![CDATA[ As Cloudflare expands globally, Rebecca Rogers, Manager of Security Validations, discusses an exciting update to Cloudflare’s commitment to customer security for our German customers ]]></description>
            <content:encoded><![CDATA[ <p></p><p>As a large data processing country, Germany is at the forefront of security and privacy regulation in Europe and sets the tone for other countries to follow. Analyzing and meeting the requirements to participate in Germany’s cloud security industry requires adherence to international, regional, and country-specific standards. Cloudflare is pleased to announce that we have taken appropriate organizational and technical precautions to prevent disruptions to the availability, integrity, authenticity, and confidentiality of Cloudflare’s production systems in accordance with BSI-KritisV. TÜViT, the auditing body tasked with auditing Cloudflare and providing the evidence to BSI every two years. Completion of this audit allows us to comply with the NIS Directive within Germany.</p>
    <div>
      <h3>Why do cloud companies operating in Germany need to go through a BSI audit?</h3>
      <a href="#why-do-cloud-companies-operating-in-germany-need-to-go-through-a-bsi-audit">
        
      </a>
    </div>
    <p>In 2019, Cloudflare registered as an Operator of Essential Services’ under the EU Directive on Security of Network and Information Systems (NIS Directive). The NIS Directive is cybersecurity legislation with the goal to enhance <a href="https://www.cloudflare.com/learning/security/what-is-cyber-security/">cybersecurity</a> across the EU. Every member state has started to adopt national legislation for the NIS Directive and the criteria for compliance is set individually by each country. As an ‘Operator of Essential Services’ in Germany, Cloudflare is regulated by the <a href="https://www.bsi.bund.de/DE/Home/home_node.html">Federal Office for Information Security</a> (The BSI) and must adhere to the requirements set by The BSI.</p>
    <div>
      <h3>What does the audit prove?</h3>
      <a href="#what-does-the-audit-prove">
        
      </a>
    </div>
    <p>This audit includes a thorough review of Cloudflare’s security controls in the following areas:</p><ul><li><p>Asset Management</p></li><li><p>Risk Analysis</p></li><li><p>Business Continuity and Disaster Recovery</p></li><li><p>Personnel and Organizational Security</p></li><li><p>Encryption</p></li><li><p>Network Security</p></li><li><p>Security Authentication</p></li><li><p>Incident Response</p></li><li><p>Vendor Security</p></li><li><p>Physical Security</p></li></ul><p>In addition to an audit of Cloudflare’s security controls in the aforementioned areas, TÜViT also conducted a thorough review of Cloudflare’s Information Security Management System (ISMS).</p><p>By having these areas audited, German customers can rest assured that Cloudflare respects the requirements put forth by the governing bodies tasked with protecting their data.</p>
    <div>
      <h3>Are there any additional German-specific audits on the horizon?</h3>
      <a href="#are-there-any-additional-german-specific-audits-on-the-horizon">
        
      </a>
    </div>
    <p>Yes. Cloudflare is currently undergoing an independent third-party audit for the Cloud Computing Compliance Criteria Catalog (C5) certification. The C5 was introduced by BSI Germany in 2016 and reviews operational security within cloud services. Industries that place a high level of importance on C5 include cloud computing and German federal agencies. Learn more <a href="https://www.bsi.bund.de/EN/Topics/CloudComputing/Compliance_Criteria_Catalogue/Compliance_Criteria_Catalogue_node.html">here</a>.</p>
    <div>
      <h3>What other certifications does Cloudflare hold that demonstrate its dedication to privacy and security?</h3>
      <a href="#what-other-certifications-does-cloudflare-hold-that-demonstrate-its-dedication-to-privacy-and-security">
        
      </a>
    </div>
    <p>Different certifications measure different elements of a company’s security or privacy posture. Cloudflare has met the requirements of the following standards:</p><ul><li><p><b>ISO 27001 -</b> Cloudflare has been ISO 27001 certified since 2019. Customers can be assured that Cloudflare has a formal information security management program that adheres to a globally recognized standard.</p></li><li><p><b>SOC2 Type II</b> - Cloudflare maintains SOC reports that include the security, confidentiality, and availability trust principles.</p></li><li><p><a href="https://www.cloudflare.com/learning/privacy/what-is-pci-dss-compliance/"><b>PCI DSS</b></a><b> -</b> Cloudflare engages with a QSA (Qualified Security Assessor) on an annual basis to evaluate us as a Level 1 Merchant and a Service Provider.</p></li><li><p><b>ISO 27701</b> - Cloudflare was one of the first companies in the industry to achieve ISO 27701 certification as both a data processor and controller. The certification provides assurance to our customers that we have a formal privacy program that is aligned to GDPR.</p></li><li><p><b>FedRAMP In Process</b> - Cloudflare hit a major milestone by being listed on the <a href="https://marketplace.fedramp.gov/#!/product/cloudflare-federal?sort=productName">FedRAMP Marketplace</a> as ‘In Process’ for receiving an <a href="https://www.cloudflare.com/learning/privacy/what-is-fedramp/">agency authorization</a> at a moderate baseline. Once an Authorization to Operate (ATO) is granted, it will allow agencies and other cloud service providers to leverage our product and services in a public sector capacity.</p></li></ul><p>Pro, Business, and Enterprise customers now have the ability to obtain a copy of Cloudflare’s certifications, reports, and overview through the <a href="https://support.cloudflare.com/hc/en-us/articles/4412661740941-Access-Compliance-Documentation">Cloudflare Dashboard</a>. For the latest information about our certifications and reports, please visit <a href="https://www.cloudflare.com/trust-hub">our</a> <a href="https://www.cloudflare.com/trust-hub/compliance-resources/">Trust Hub</a>.</p> ]]></content:encoded>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Compliance]]></category>
            <category><![CDATA[Germany]]></category>
            <guid isPermaLink="false">3HT4Z1ecBFLF022fEGO0lz</guid>
            <dc:creator>Rebecca Rogers</dc:creator>
        </item>
        <item>
            <title><![CDATA[Introducing the Customer Metadata Boundary]]></title>
            <link>https://blog.cloudflare.com/introducing-the-customer-metadata-boundary/</link>
            <pubDate>Tue, 07 Dec 2021 13:59:15 GMT</pubDate>
            <description><![CDATA[ Cloudflare’s Data Localisation Suite now helps customers localise metadata about their HTTP traffic. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Data localisation has gotten a lot of attention in recent years because a number of countries see it as a way of controlling or protecting their citizens’ data. Countries such as Australia, China, India, Brazil, and South Korea have or are currently considering regulations that assert <a href="https://www.cloudflare.com/learning/privacy/what-is-data-sovereignty/">legal sovereignty over their citizens’ personal data</a> in some fashion — health care data must be stored locally; public institutions may only contract with local service providers, etc.</p><p>In the EU, the recent “Schrems II” decision resulted in additional requirements for companies that transfer personal data outside the EU. And a number of highly regulated industries require that specific types of personal data stay within the EU’s borders.</p><p>Cloudflare is committed to helping our customers keep personal data in the EU. Last year, we introduced the <a href="/introducing-the-cloudflare-data-localization-suite/">Data Localisation Suite</a>, which gives customers control over where their data is inspected and stored.</p><p>Today, we’re excited to introduce the Customer Metadata Boundary, which expands the Data Localisation Suite to ensure that a customer’s end user traffic metadata stays in the EU.</p>
    <div>
      <h3>Metadata: a primer</h3>
      <a href="#metadata-a-primer">
        
      </a>
    </div>
    <p>“Metadata” can be a scary term, but it’s a simple concept — it just means “data about data.” In other words, it’s a description of activity that happened on our network. Every service on the Internet collects metadata in some form, and it’s vital to user safety and network availability.</p><p>At Cloudflare, we collect metadata about the usage of our products for several purposes:</p><ul><li><p>Serving analytics via our dashboards and APIs</p></li><li><p>Sharing logs with customers</p></li><li><p>Stopping security threats such as bot or DDoS attacks</p></li><li><p>Improving the performance of our network</p></li><li><p>Maintaining the reliability and resiliency of our network</p></li></ul><p>What does that collection look like in practice at Cloudflare? Our network consists of dozens of services: our Firewall, Cache, DNS Resolver, DDoS protection systems, Workers runtime, and more. Each service emits structured log messages, which contain fields like timestamps, URLs, usage of Cloudflare features, and the identifier of the customer’s account and zone.</p><p>These messages do not contain the <i>contents</i> of customer traffic, and so they do <b>not</b> contain things like usernames, passwords, personal information, and other private details of customers’ end users. However, these logs may contain end-user IP addresses, which is considered personal data in the EU.</p>
    <div>
      <h3>Data Localisation in the EU</h3>
      <a href="#data-localisation-in-the-eu">
        
      </a>
    </div>
    <p>The EU’s General Data Protection Regulation, or GDPR, is one of the world’s most comprehensive (and well known) data privacy laws. The GDPR does <i>not</i>, however, insist that personal data must stay in Europe. Instead, it provides a number of legal mechanisms to ensure that GDPR-level protections are available for EU personal data if it is transferred outside the EU to a third country like the United States. Data transfers from the EU to the US were, until recently, permitted under an agreement called the <a href="https://www.privacyshield.gov/welcome">EU-U.S. Privacy Shield Framework</a>.</p><p>Shortly after the GDPR went into effect, a privacy activist named <a href="https://en.wikipedia.org/wiki/Max_Schrems">Max Schrems</a> filed suit against Facebook for their data collection practices. In July 2020, the Court of Justice of the EU issued the “Schrems II” ruling — which, among other things, invalidated the Privacy Shield framework. However, the court upheld other valid transfer mechanisms that ensure EU personal data won’t be accessed by U.S. government authorities in a way that violates the GDPR.</p><p>Since the Schrems II decision, many customers have asked us how we’re protecting EU citizens’ data. Fortunately, Cloudflare has had <a href="https://www.cloudflare.com/gdpr/introduction/">data protection safeguards</a> in place since well before the Schrems II case, such as our <a href="https://assets.ctfassets.net/slt3lc6tev37/2RM2ZAb5XJiudjz4QHvth4/b3df347d8a7a629ccd5cadd4f7cfd2f3/BDES-1406_Privacy_Day_Whitepaper_2021.pdf">industry-leading commitments</a> on government data requests. In response to Schrems II in particular, we updated our customer <a href="https://www.cloudflare.com/cloudflare-customer-dpa/">Data Processing Addendum</a> (DPA). We incorporated the latest <a href="https://www.cloudflare.com/cloudflare-customer-scc/">Standard Contractual Clauses</a>, which are legal agreements approved by the EU Commission that enable data transfer. We also added additional safeguards as outlined in the <a href="https://edpb.europa.eu/news/news/2021/edpb-adopts-final-version-recommendations-supplementary-measures-letter-eu_en">EDPB’s June 2021 Recommendations on Supplementary Measures</a>. Finally, Cloudflare’s services are certified under the ISO 27701 standard, which maps to the GDPR’s requirements.</p><p>In light of these measures, we believe that our EU customers can use Cloudflare’s services in a manner consistent with GDPR and the Schrems II decision. Still, we recognize that many of our customers want their EU personal data to stay in the EU. For example, some of our customers in industries like healthcare, law, and finance may have additional requirements.  For that reason, we have developed an optional suite of services to address those requirements. We call this our Data Localisation Suite.</p>
    <div>
      <h3>How the Data Localisation Suite helps today</h3>
      <a href="#how-the-data-localisation-suite-helps-today">
        
      </a>
    </div>
    <p>Data Localisation is challenging for customers because of the volume and variety of data they handle. When it comes to their Cloudflare traffic, we’ve found that customers are primarily concerned about three areas:</p><ol><li><p>How do I ensure my encryption keys stay in the EU?</p></li><li><p>How can I ensure that services like caching and <a href="https://www.cloudflare.com/learning/ddos/glossary/web-application-firewall-waf/">WAF</a> only run in the EU?</p></li><li><p>How can ensure that metadata is never transferred outside the EU?</p></li></ol><p>To address the first concern, Cloudflare has long offered <a href="https://www.cloudflare.com/ssl/keyless-ssl/">Keyless SSL</a> and <a href="/introducing-cloudflare-geo-key-manager/">Geo Key Manager</a>, which ensure that private SSL/TLS key material never leaves the EU. Keyless SSL ensures that Cloudflare never has possession of the private key material at all; Geo Key Manager uses Keyless SSL under the hood to ensure the keys never leave the specified region.</p><p>Last year we addressed the second concern with <a href="/introducing-regional-services/">Regional Services</a>, which ensures that Cloudflare will only be able to decrypt and inspect the content of HTTP traffic inside the EU. In other words, SSL connections will only be terminated in the EU, and all of our layer 7 security and performance services will only run in our EU data centers.</p><p>Today, we’re enabling customers to address the third and final concern, and keep metadata local as well.</p>
    <div>
      <h3>How the Metadata Boundary Works</h3>
      <a href="#how-the-metadata-boundary-works">
        
      </a>
    </div>
    <p>The Customer Metadata Boundary ensures, simply, that end user traffic metadata that can identify a customer stays in the EU. This includes all the logs and analytics that a customer sees.</p><p>How are we able to do this? All the metadata that can identify a customer flows through a single service at our edge, before being forwarded to one of our core data centers.</p><p>When the Metadata Boundary is enabled for a customer, our edge ensures that any log message that identifies that customer (that is, contains that customer's Account ID) is not sent outside the EU. It will only be sent to our core data center in the EU, and not our core data center in the US.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/12lcx2Efei67w6jfteXoMN/d3c2c22e54af6bf25d549067e559dae8/image2-14.png" />
            
            </figure>
    <div>
      <h3>What’s next</h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>Today our Data Localisation Suite is focused on helping our customers in the EU localise data for their inbound HTTP traffic. This includes our Cache, Firewall, <a href="https://www.cloudflare.com/ddos/">DDoS protection</a>, and Bot Management products.</p><p>We’ve heard from customers that they want data localisation for more products and more regions. This means making all of our Data Localisation Products, including Geo Key Manager and Regional Services, work globally. We’re also working on expanding the Metadata Boundary to include our Zero Trust products like Cloudflare for Teams. Stay tuned!</p> ]]></content:encoded>
            <category><![CDATA[CIO Week]]></category>
            <category><![CDATA[Privacy]]></category>
            <category><![CDATA[Compliance]]></category>
            <category><![CDATA[Data]]></category>
            <category><![CDATA[Europe]]></category>
            <category><![CDATA[Policy & Legal]]></category>
            <guid isPermaLink="false">74am2210Vl5UqONcLXY00k</guid>
            <dc:creator>Jon Levine</dc:creator>
            <dc:creator>Emily Hancock</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare obtains new ISO/IEC 27701:2019 privacy certification and what that means for you]]></title>
            <link>https://blog.cloudflare.com/iso-27701-privacy-certification/</link>
            <pubDate>Wed, 21 Apr 2021 13:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare is one of the first organisations in our industry to have achieved ISO/IEC 27701:2019 certification, and the first web performance & security company to be certified to the new ISO privacy standard as both a data processor and controller. ]]></description>
            <content:encoded><![CDATA[ <p></p><p><i>Cloudflare is one of the first organizations in our industry to have achieved ISO/IEC 27701:2019 certification, and the first web performance &amp; security company to be certified to the new ISO privacy standard as both a data processor and controller.</i></p><p>Providing transparency into our privacy practices has always been a priority for us. We think it is important that we do more than talk about our commitment to privacy — we are continually looking for ways to demonstrate that commitment. For example, after we launched the Internet's <a href="https://www.dnsperf.com/#!dns-resolvers">fastest</a>, privacy-first public DNS resolver, 1.1.1.1, we didn’t just publish our commitments to our public resolver users, we engaged an independent firm to make sure we were meeting our commitments, and we blogged about it, publishing <a href="https://www.cloudflare.com/compliance/">their report</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3FlwTPYxCLY4MaxDc4Z3LO/06eadd15c0e93acce0cd9ee2c804dca6/image1-32.png" />
            
            </figure><p>Following in that tradition, today we’re excited to announce that Cloudflare has been certified to a new international privacy standard for protecting and managing the processing of personal data — ISO/IEC 27701:2019. The standard is designed such that the requirements organizations must meet to become certified are very closely aligned to the requirements in the EU’s General Data Protection Regulation (“GDPR”). So this certification provides assurance to our customers that a third party has independently verified that Cloudflare’s privacy program meets GDPR-aligned industry standards.</p>
    <div>
      <h3>What is ISO/IEC 27701:2019?</h3>
      <a href="#what-is-iso-iec-27701-2019">
        
      </a>
    </div>
    <p>The International Organization for Standardization (“ISO”) is an international, nongovernmental organization made up of national standards bodies that develops and publishes a wide range of proprietary, industrial, and commercial standards. In August 2019, ISO published <a href="https://www.iso.org/standard/71670.html">ISO/IEC 27701:2019</a> (“ISO 27701”), a new international privacy standard about protecting and managing the processing of personal data.</p><p>This new standard is a privacy extension to the existing and widespread industry standards ISO/IEC 27001 and ISO/IEC 27002, which were first published by ISO in 2005. They describe how to establish and run an Information Security Management System (“ISMS”), and <a href="https://www.iso.org/the-iso-survey.html">ISO now reports</a> that over 36,000 organizations in 131 countries are currently independently certified as meeting ISO/IEC 27001. Audited ISO certifications are awarded to organizations that have been assessed by an independent, external auditor to meet a specific, published standard. Auditors are also accredited themselves — with the ISO 27000 series of certifications, to published international ISO standards, too.</p><p>The ISO 27701 extension to the ISO/IEC 27001 and ISO/IEC 27002 standards is less than two years old and adapts the ISMS management system concept into the creation of a Privacy Information Management System (“PIMS”). There are requirements to make sure this privacy management system is robust and is also continually improving to meet its defined objectives.</p><p>We are excited about this new certification because ISO 27701 maps to the requirements of the GDPR, the EU’s benchmark-setting, comprehensive data protection regulation. Article 42 of the GDPR encourages:</p><blockquote><p><i>...the establishment of data protection certification mechanisms and of data protection seals and marks, for the purpose of demonstrating compliance with this Regulation of processing operations by controllers and processors.</i></p></blockquote><p>While Article 42 calls for the development of GDPR certifications, no such official certifications exist yet because none have been approved by either of the official bodies — the European Data Protection Board in the EU, or the UK’s Information Commissioner’s Office in respect of the UK GDPR. However, when the ISO 27701 standard was published, it contained an Annex D detailing how the standard maps to the GDPR:</p><blockquote><p><i>This annex gives an indicative mapping between provisions of this document and Articles 5 to 49 except 43 of the General Data Protection Regulation of the European Union. It shows how compliance to requirements and controls of this document can be relevant to fulfil obligations of GDPR.</i></p></blockquote><p>ISO standards often map to — and frequently reference — other international ISO standards, but it’s unusual for them to map to non-ISO standards, especially to one particular region’s regulations. So until the GDPR regulatory bodies adopt an official certification mechanism, ISO 27701 provides an excellent way to demonstrate externally-audited compliance with the regulation.</p>
    <div>
      <h3>What does ISO 27701 mean to Cloudflare customers?</h3>
      <a href="#what-does-iso-27701-mean-to-cloudflare-customers">
        
      </a>
    </div>
    <p>Put simply, the ISO 27701 certification provides assurance to our customers that we have a privacy program that has been assessed by a third party to meet an international industry standard aligned to the GDPR, and that requires us to keep our privacy program under continuous compliance. This certification, in addition to the <a href="https://www.cloudflare.com/resources/assets/slt3lc6tev37/1M1j5uuFDuLTYiZJJDPBag/bda8d591447971b3df2bccf5aa4e0916/Customer_DPA_v.3_1_-_en_1_Oct_2020.pdf">Data Processing Addendum</a> (“DPA”) we make available to our customers in the dashboard, offers our customers multiple layers of assurance that any personal data that Cloudflare processes will be handled in a way that meets the GDPR’s requirements.</p><p><i>Let us do a deeper dive into some of the requirements under ISO 27701</i>The standard contains 31 controls identified for organizations that are personal data controllers, and 18 additional controls identified for organizations that are personal data processors. As Cloudflare’s scope is certifying as both a personal data controller and as a personal data processor of customer information, we had to meet all 49 of these controls.</p><p>The controls are essentially a set of best practices that data controllers and processors must meet in terms of data handling practices and transparency about those practices, documenting a legal basis for processing and for transfer of data to third countries (outside the EU), and handling data subject rights, among others.</p><blockquote><p>Example Requirement 1:<i>Organizations should maintain policy and document specific procedures related to the international transfer of personal data.</i></p></blockquote><p>Cloudflare has implemented this requirement by maintaining an internal policy restricting the transfer of personal data between jurisdictions unless that transfer meets defined criteria. Customers, whether free or paid, enter into a standard Data Processing Addendum with Cloudflare which is available on the <a href="https://dash.cloudflare.com/login">Cloudflare Customer Dashboard</a> and which sets out the restrictions we must adhere to when processing personal data on behalf of customers, including when transferring personal data between jurisdictions. Additionally, Cloudflare publishes <a href="https://www.cloudflare.com/gdpr/subprocessors/">a list of sub-processors</a> that we may use when processing personal data, and in which countries or jurisdictions that processing may take place.</p><blockquote><p>Example Requirement 2:<i>Organizations should maintain documented personal data minimization objectives, including what mechanisms are used to meet those objectives.</i></p></blockquote><p>Cloudflare maintains internal policies on how we manage data throughout its full lifecycle, including data minimization objectives. In fact, our commitment to privacy starts with the objective of minimizing personal data. That’s why, if we don’t have to collect certain personal data in order to deliver our service to customers, we’d prefer not to collect it at all in the first place. Where we do have to, we collect the minimum amount necessary to achieve the identified purpose and process it for the minimum amount necessary, transparently documenting the processing in our public <a href="https://www.cloudflare.com/privacypolicy/">privacy policy</a>.</p><p>We’re also proud to have developed a Privacy by Design policy, which rigorously sets out the high-standards and evaluations that must be undertaken if products and services are to collect and process personal data. We use these mechanisms to ensure our collection and use of personal data is limited and <a href="https://www.cloudflare.com/gdpr/introduction/">transparently documented</a>.</p>
    <div>
      <h3>Cloudflare achieves ISO 27701:2019 Certification</h3>
      <a href="#cloudflare-achieves-iso-27701-2019-certification">
        
      </a>
    </div>
    <p>Cloudflare’s PIMS was assessed by a third-party auditor, A-LIGN in March 2021. Certifying to the ISO 27701 privacy standard is a multi-step process that includes:</p><ul><li><p>understanding and planning for the standard;</p></li><li><p>identifying and adapting the controls the organisation will implement;</p></li><li><p>internally auditing against the requirements;  and</p></li><li><p>externally auditing against the standard (itself a two-stage process)</p></li></ul><p>before finally being certified against the standard by the independent auditor. Once certified, the privacy management system is continually evaluated and improved, with internal and external audits on an ongoing annual basis.</p><p>Cloudflare has been certified as both a data processor and as a data controller of customer information.[¹] This means that Cloudflare is one of the first organisations in our industry to have achieved this standard, and the first web performance &amp; security company to be certified to ISO 27701 as both a data controller and processor. Alongside Cloudflare’s existing ISO 27001:2013 certificate, Cloudflare’s new ISO 27701:2019 certificate is now available for customers to request from their sales representative.</p>
    <div>
      <h3>Cloudflare Certifications</h3>
      <a href="#cloudflare-certifications">
        
      </a>
    </div>
    <p>For more information about our certifications and reports, please visit our privacy and compliance pages — <a href="http://www.cloudflare.com/compliance">www.cloudflare.com/compliance</a>. You can also reach us at <a href="#">compliance@cloudflare.com</a> for any questions.</p>
    <div>
      <h3>Watch on Cloudflare TV</h3>
      <a href="#watch-on-cloudflare-tv">
        
      </a>
    </div>
    <div></div><hr /><p>[1]The GDPR defines a “data controller” as the “natural or legal person . . . or other body which, alone or jointly with others, determines the purposes and means of the processing of personal data”; and a “data processor” as “a natural or legal person . . . which processes personal data on behalf of the controller.”</p> ]]></content:encoded>
            <category><![CDATA[Certification]]></category>
            <category><![CDATA[Privacy]]></category>
            <category><![CDATA[Compliance]]></category>
            <category><![CDATA[GDPR]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">4S1OVCOuwAARsUz5utLbFB</guid>
            <dc:creator>Rory Malone</dc:creator>
            <dc:creator>Emily Hancock</dc:creator>
        </item>
        <item>
            <title><![CDATA[Announcing Workplace Records for Cloudflare for Teams]]></title>
            <link>https://blog.cloudflare.com/work-jurisdiction-records-for-teams/</link>
            <pubDate>Thu, 10 Dec 2020 16:14:06 GMT</pubDate>
            <description><![CDATA[ Workplace Records uses Access and Gateway logs to provide the state and country from which employees are working. Workplace Records can be used to help finance, legal, and HR departments determine where payroll taxes are due and provide a record to defend those decisions. ]]></description>
            <content:encoded><![CDATA[ <p><b>Update 1/21/21:</b> Workplace Records are available in Cloudflare for Teams today! You can find country details in Access logs, and set country-specific rules within Access groups. Adding countries-by-day in the UI is in development and will be available later this quarter.</p><p>We wanted to close out Privacy &amp; Compliance Week by talking about something universal and certain: taxes. Businesses worldwide pay employment taxes based on where their employees do work. For most businesses and in normal times, where employees do work has been relatively easy to determine: it's where they come into the office. But 2020 has made everything more complicated, even taxes.</p><p>As businesses worldwide have shifted to remote work, employees have been working from "home" — wherever that may be. Some employees have taken this opportunity to venture further from where they usually are, sometimes crossing state and national borders.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6TwZjGkF8eO7yzI2rT8rmN/6d1fc61d676d92c005f2153644a4ba3a/facebook-shared-image.png" />
            
            </figure><p>In a lot of ways, it's gone better than expected. We're proud of helping provide technology solutions like Cloudflare for Teams that allow employees to work from anywhere and ensure they still have a <a href="https://www.cloudflare.com/products/zero-trust/remote-workforces/">fast, secure connection to their corporate resources</a>. But increasingly we've been hearing from the heads of the finance, legal, and HR departments of our customers with a concern: "If I don't know where my employees are, I have no idea where I need to pay taxes."</p><p>Today we're announcing the beta of a new feature for Cloudflare for Teams to help solve this problem: Workplace Records. Cloudflare for Teams uses Access and Gateway logs to provide the state and country from which employees are working. Workplace Records can be used to help finance, legal, and HR departments determine where payroll taxes are due and provide a record to defend those decisions.</p>
    <div>
      <h3>Every location became a potential workplace</h3>
      <a href="#every-location-became-a-potential-workplace">
        
      </a>
    </div>
    <p>Before 2020, employees who frequently traveled could manage tax jurisdiction reporting by gathering plane tickets or keeping manual logs of where they spent time. It was tedious, for employees and our payroll team, but manageable.</p><p>The COVID pandemic transformed that chore into a significant challenge for our finance, legal, and HR teams. Our entire organization was suddenly forced to work remotely. If we couldn't get comfortable that we knew where people were working, we worried we may be forced to impose somewhat draconian rules requiring employees to check-in. That didn't seem very Cloudflare-y.</p><p>The challenge impacts individual team members as well. Reporting mistakes can lead to tax penalties for employees or amendments during filing season. Our legal team started to field questions from employees stuck in new regions because of travel restrictions. Our payroll team prepared for a backlog of amendments.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3iLks5EvgwrxIDURV0oxNh/77d67b1e208b64c55a33b730c2bd96ce/facebook-shared-image-2.png" />
            
            </figure>
    <div>
      <h3>Logging jurisdiction without manual reporting</h3>
      <a href="#logging-jurisdiction-without-manual-reporting">
        
      </a>
    </div>
    <p>When team members open their corporate laptops and start a workday, they log in to <a href="https://www.cloudflare.com/teams/access/">Cloudflare Access</a> — our <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> tool that protects applications and data. Cloudflare Access checks their identity and other signals like <a href="/require-hard-key-auth-with-cloudflare-access/">multi-factor method</a>s to determine if they can proceed. Importantly, the process also logs their region so we can enforce country-specific rules.</p><p>Our finance, legal, and HR teams worked with our engineering teams to use that model to create Workplace Records. We now have the confidence to know we can meet our payroll tax obligations without imposing onerous limitations on team members. We’re able to prepare and adjust, in real-time, while confidentially supporting our employees as they work remotely for wherever is most comfortable and productive for them.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2BGwssXujsm48Sf8GCuRXJ/f055bd0b11339f334bf82239216ef77e/image3-36.png" />
            
            </figure>
    <div>
      <h3>Respecting team member privacy</h3>
      <a href="#respecting-team-member-privacy">
        
      </a>
    </div>
    <p>Workplace Records only provides resolution within a taxable jurisdiction, not a specific address. The goal is to give only the information that finance, legal, and HR departments need to ensure they can meet their compliance obligations.</p><p>The system also generates these reports by capturing team member logins to work applications on corporate devices. We use the location of that login to determine “this was a workday from Texas”. If a corporate laptop is closed or stored away for the weekend, we aren’t capturing location logs. We’d rather team members enjoy time off without connecting.</p>
    <div>
      <h3>Two clicks to enforce regional compliance</h3>
      <a href="#two-clicks-to-enforce-regional-compliance">
        
      </a>
    </div>
    <p>Workplace Records can also help ensure company policy compliance for a company's teams. For instance, companies may have policies about engineering teams only creating intellectual property in countries in which transfer agreements are in place. Workplace Records can help ensure that engineering work isn't being done in countries that may put the intellectual property at risk.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5Z1JAp8hRXT3BwDiNftA0d/2266c9ca3f7c3cdcccfe3a8ee932f974/image4-22.png" />
            
            </figure><p>Administrators can <a href="/two-clicks-to-enable-regional-zero-trust-compliance/">build rules</a> in Cloudflare Access to require that team members connect to internal or <a href="/cloudflare-access-for-saas/">SaaS applications</a> only from countries where they operate. Cloudflare’s network will check every request both for identity and the region from which they’re connecting.</p><p>We also heard from our own accounting teams that some regions enforce strict tax penalties when employees work without an incorporated office or entity. In the same way that you can require users to work only from certain countries, you can also block users from connecting to your applications from specific regions.</p>
    <div>
      <h3>No deciphering required</h3>
      <a href="#no-deciphering-required">
        
      </a>
    </div>
    <p>When we started planning Workplace Records, our payroll team asked us to please not send raw data that added more work on them to triage and sort.</p><p>Available today, you can view the country of each login to internal systems on a per-user basis. You can export this data to an external SIEM and you can build rules that <a href="https://www.cloudflare.com/learning/access-management/what-is-access-control/">control access</a> to systems by country.</p><p>Launching today in beta is a new UI that summarizes the working days spent in specific regions for each user. Workplace Records will add a company-wide report early in Q1. The service is available as a report for free to all Cloudflare for Teams customers.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2FCobU0EOFQtSPXHQEqRS5/83165b515680f30f45ee0f1261d774d5/image6-8.png" />
            
            </figure><p>Going forward, we plan to work with Human Capital Management (HCM), Human Resource Information Systems (HRIS), Human Resource Management Systems (HRMS), and Payroll providers to automatically integrate Workplace Records.</p>
    <div>
      <h3>What’s next?</h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>At Cloudflare, we know even after the pandemic we are going to be more tolerant of remote work than before. The more that we can allow our team to work remotely and ensure we are meeting our regulatory, compliance, and tax obligations, the more flexibility we will be able to provide.</p><p>Cloudflare for Teams with Workplace Records is helping solve a challenge for our finance, legal, and HR teams. Now with the launch of the beta, we hope we can help enable a more flexible and compliant work environment for all our Cloudflare for Teams customers.This feature will be available to all Cloudflare for Teams subscribers early next week. You can <a href="https://www.cloudflare.com/teams/">start using</a> Cloudflare for Teams today at no cost for up to 50 users, including the Workplace Records feature.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6YqInkXN6n1tJbD9p9JVOP/a92d7eb9b94e6292faf44612d50792be/facebook-shared-image-3-1.png" />
            
            </figure> ]]></content:encoded>
            <category><![CDATA[Privacy Week]]></category>
            <category><![CDATA[Cloudflare Access]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Compliance]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <guid isPermaLink="false">6hPBdpIx8tzAhCfUETfIDo</guid>
            <dc:creator>Matthew Prince</dc:creator>
            <dc:creator>Sam Rhea</dc:creator>
        </item>
        <item>
            <title><![CDATA[Security Compliance at Cloudflare]]></title>
            <link>https://blog.cloudflare.com/security-compliance-at-cloudflare/</link>
            <pubDate>Sun, 16 Jun 2019 13:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare believes trust is fundamental to helping build a better Internet. One way Cloudflare is helping our customers earn their users’ trust is through industry standard security compliance certifications and regulations.  ]]></description>
            <content:encoded><![CDATA[ <p>Cloudflare believes trust is fundamental to helping build a better Internet. One way Cloudflare is helping our customers earn their users’ trust is through industry standard security compliance certifications and regulations.</p><p>Security compliance certifications are reports created by independent, third-party auditors that validate  and document a company’s commitment to security. These external auditors will conduct a rigorous review of a company’s technical environment and evaluate whether there are thorough controls - or safeguards - in place to protect the security, confidentiality, and availability of information stored and processed in the environment. SOC 2 was established by the American Institute of CPAs and is important to many of our U.S. companies, as it is a standardized set of requirements a company must meet in order to comply. Additionally, PCI and ISO 27001 are international standards. Cloudflare cares about achieving certifications because our adherence to these standards creates confidence to customers across the globe that we are committed to security. So, the Security team has been hard at work obtaining these meaningful compliance certifications.</p><p>Since the beginning of this year, we have been renewing our PCI DSS certification in February, achieving SOC 2 Type 1 compliance in March, obtaining our ISO 27001 certification in April, and today we are proud to announce we are SOC 2 Type 2 compliant!</p>
    <div>
      <h3>Our SOC 2 Journey</h3>
      <a href="#our-soc-2-journey">
        
      </a>
    </div>
    <p>SOC 2 is a compliance certification that focuses on internal controls of an organization related to five trust services criteria. These criteria are: Security, Confidentiality, Availability, Processing Integrity, and Privacy. Each criterion presents a set of control standards that are established by the American Institute of Certified Public Accountants (AICPA) and are to be used to implement controls on the information systems of a company.</p><p>Cloudflare’s Security team made the decision to evaluate our companies’ controls around three of the five criteria. We determined to pursue our SOC 2 compliance by evaluating our controls around Security, Confidentiality, and Availability across our entire organization. We first worked across the company to design and implement strong controls that meet the requirements set forth by the AICPA. This took effort and collaboration between teams in Engineering, IT, Legal, and HR to create strong controls that also make sense to our environment. Our external auditors then performed an audit of Cloudflare’s controls, and determined our security controls were suitably designed as of January 31, 2019.</p><img src="http://staging.blog.mrk.cfdata.org/content/images/2019/06/21972-312_SOC_NonCPA.jpg" /><p>Three months after obtaining SOC 2 Type 1 compliance, the next step for Cloudflare was to demonstrate the controls we designed were actually operating effectively. Our SOC 2 Type 2 audit tested the operating effectiveness of Cloudflare’s security controls over this three-month period. Cloudflare’s SOC 2 Type 2 report can be available upon request and describes the design of Cloudflare’s internal control framework around security, confidentiality and availability and the products and services in-scope for our certification.</p>
    <div>
      <h3>What else?</h3>
      <a href="#what-else">
        
      </a>
    </div>
    
    <div>
      <h4>SOC 3</h4>
      <a href="#soc-3">
        
      </a>
    </div>
    <p>In addition to SOC 2 Type 2, Cloudflare also obtained our SOC 3 report from our independent external auditors. SOC 3 is a report for public consumption on the external auditor’s opinion and a narrative of Cloudflare’s control environment. Cloudflare’s Security team decided on obtaining our SOC 3 report so all customers and prospects could access our auditor’s opinion of our implementation of security, confidentiality, and availability controls.</p>
    <div>
      <h4>ISO/IEC 27001: 2013</h4>
      <a href="#iso-iec-27001-2013">
        
      </a>
    </div>
    <p>Prior to Cloudflare’s SOC audit, Cloudflare was working to mature our organizations’ Information Security Management System in order to obtain our ISO/IEC 27001: 2013 certification. ISO 27001 is an international management system standard developed by the International Organization for Standardization (ISO) and is an industry-wide accepted information security certification. Cloudflare’s commitment to achieving ISO/IEC 27001: 2013 certification was to demonstrate to our customers that we are committed to preserving the confidentiality, integrity, and availability of information on a global scale.</p><p>The primary focus of ISO 27001:2013 requirements is the focus on implementation of an Information Security Management System (ISMS) and a comprehensive risk management program.  Cloudflare worked across the organization to implement the ISMS to ensure sensitive company information remains secure.</p><img src="http://staging.blog.mrk.cfdata.org/content/images/2019/06/ISO-27001-Certified-Logo.PNG" /><p>Cloudflare’s ISMS was assessed by a third-party auditor, A-LIGN, and we received our ISO 27001: 2013 certification in April 2019. Cloudflare’s ISO 27001:2013 certificate is also available to customers upon request.</p>
    <div>
      <h4>PCI DSS v3.2.1</h4>
      <a href="#pci-dss-v3-2-1">
        
      </a>
    </div>
    <p>Although Cloudflare has been PCI certified as a Level 1 Service Provider since 2014, our latest certification adheres to the newest security standards. The Payment Card Industry Data Security Standard (PCI DSS) is a global financial information security standards that ensures customers’ credit card data is safe and secure.</p><p>Maintaining PCI DSS compliance is important for Cloudflare because not only are we evaluated as a merchant, but we are also a service provider. Cloudflare’s WAF product satisfies PCI requirement 6.6, and may be used by Cloudflare’s customers as a solution to prevent web-based attacks in front of public-facing web applications.</p><img src="http://staging.blog.mrk.cfdata.org/content/images/2019/06/pasted-image-0-1.png" /><p>Early in 2019, Cloudflare was audited by an independent Qualified Security Assessor to validate our adherence to the PCI DSS security requirements. Cloudflare’s latest PCI Attestation of Compliance (AOC) is available to customers upon request.</p>
    <div>
      <h3>Compliance Page on the Website</h3>
      <a href="#compliance-page-on-the-website">
        
      </a>
    </div>
    <p>Cloudflare is committed to helping our customers’ earn their user’s trust by ensuring our products are secure. The Security team is committed to adhering to security compliance certifications and regulations that maintain the security, confidentiality, and availability of company and client information.In order to help our customers keep track of the latest certifications, Cloudflare has launched our Compliance certification page - <a href="http://www.cloudflare.com/compliance">www.cloudflare.com/compliance</a>. Today, you can view our status on all compliance certifications and download our SOC 3 report.</p> ]]></content:encoded>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Compliance]]></category>
            <guid isPermaLink="false">33ZTrE0PrezuBlQ5H6WwTF</guid>
            <dc:creator>Rebecca Rogers</dc:creator>
        </item>
    </channel>
</rss>