
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Tue, 14 Apr 2026 22:45:47 GMT</lastBuildDate>
        <item>
            <title><![CDATA[Moving from license plates to badges: the Gateway Authorization Proxy]]></title>
            <link>https://blog.cloudflare.com/gateway-authorization-proxy-identity-aware-policies/</link>
            <pubDate>Wed, 04 Mar 2026 06:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare’s Gateway Authorization Proxy adds support for identity-aware policies for clientless devices, securing virtual desktops, and guest networks without a device client. ]]></description>
            <content:encoded><![CDATA[ <p>We often talk about the "ideal" state, one where every device has a managed client like the <a href="https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/warp/"><u>Cloudflare One Client</u></a> installed, providing deep visibility and seamless protection. However, reality often gets in the way.</p><p>Sometimes you are dealing with a company acquisition, managing virtual desktops, or working in a highly regulated environment where you simply cannot install software on an endpoint. You still need to protect that traffic, even when you don’t fully manage the device.</p><p>Closing this gap requires moving the identity challenge from the device to the network itself. By combining the browser’s native proxy capabilities with our global network, we can verify users and enforce granular policies on any device that can reach the Internet. We’ve built the <a href="https://developers.cloudflare.com/cloudflare-one/networks/resolvers-and-proxies/proxy-endpoints/"><u>Gateway Authorization Proxy</u></a> and <a href="https://developers.cloudflare.com/cloudflare-one/networks/resolvers-and-proxies/proxy-endpoints/best-practices/"><u>Proxy Auto-Configuration (PAC) File Hosting</u></a> to automate this authentication and simplify how unmanaged devices connect to Cloudflare.</p>
    <div>
      <h3><b>The problem: sometimes IP addresses aren't enough</b></h3>
      <a href="#the-problem-sometimes-ip-addresses-arent-enough">
        
      </a>
    </div>
    <p>Back in 2022, we released <a href="https://developers.cloudflare.com/cloudflare-one/networks/resolvers-and-proxies/proxy-endpoints/#source-ip-endpoint"><u>proxy endpoints</u></a> that allowed you to route traffic through Cloudflare to apply filtering rules. It solved the immediate need for access, but it had a significant "identity crisis."</p><p>Because that system relied on static IP addresses to identify users, it was a bit like a security guard who only recognizes cars, not the people inside them. If a car (a specific IP) showed up, it was let in. But if the driver switched cars or worked from a different location, the guard got confused. This created a few major headaches:</p><ul><li><p><b>Anonymous Logs:</b> We knew the IP address, but we didn’t know the person.</p></li><li><p><b>Brittle Policies:</b> If a user moved to a new home or office, the endpoint broke or required an update.</p></li><li><p><b>Manual Maintenance:</b> You had to host your own PAC file (the "GPS" that tells your browser where the proxy is) — one more thing for your team to manage.</p></li></ul>
    <div>
      <h3><b>The solution: the Authorization Proxy</b></h3>
      <a href="#the-solution-the-authorization-proxy">
        
      </a>
    </div>
    
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4keaUmegcmKUc2WxgcbTym/50b4a5fd446a7ad5a3bd0e12d2d2fb8d/image2.png" />
          </figure><p><i>Authorization proxy Access policy setup page</i></p><p>The new <a href="https://developers.cloudflare.com/cloudflare-one/networks/resolvers-and-proxies/proxy-endpoints/"><u>Gateway Authorization Proxy</u></a> adds a "badge reader" at the entrance. Instead of just looking at where the traffic is coming from, we now use a Cloudflare Access-style login to verify who the user is, before enforcing Gateway filtering.</p><p>Think of this as moving from a guest list based on license plates, to a system where everyone has their own badge. This brings several massive benefits:</p><ul><li><p><b>True identity integration:</b> Your logs related to proxy endpoints now show exactly which user is accessing which site. You can write specific rules like "only the Finance team can access this accounting tool," even without a client installed on the device.</p></li><li><p><b>Multiple identity providers:</b> This is a superpower for large companies or those undergoing M&amp;A. You can choose which identity providers to show your users. You can display one or multiple login methods (like Okta and Azure AD) at the same time. This is a level of flexibility that competitors don't currently offer.</p></li><li><p><b>Simplified billing:</b> Each user simply occupies a "seat," exactly like they do with the Cloudflare One Client. There are no complicated new metrics to track.</p></li></ul><p>To make this possible, we had to overcome the technical hurdle of associating a user’s identity with every request, and without a device client. Read on to see how it works.</p>
    <div>
      <h3><b>How Authorization Proxy tracks identity</b></h3>
      <a href="#how-authorization-proxy-tracks-identity">
        
      </a>
    </div>
    <p>The Authorization Proxy uses signed JWT cookies to maintain identity, but there's a catch: when you first visit a new domain through the proxy, there's no cookie yet. Think of it like showing your badge at each new building you enter.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4ImFMDkJWfn6lAva3NtTzg/82d646b89e851e0826493e2a71f7c8fc/image3.png" />
          </figure><p>The flowchart above illustrates exactly how this authentication process works:</p><ul><li><p><b>First visit to a domain</b>: When you navigate to a new domain, the Gateway Authorization Proxy checks if a domain identity cookie is present. If not, you're redirected to Cloudflare Access, which then checks for an existing Cloudflare Access identity cookie. If you're already authenticated with Cloudflare Access, we generate a secure token specifically for that domain. If you're not, we redirect you to login with your identity provider(s).</p></li><li><p><b>Invisible to users</b>: This entire process happens in milliseconds thanks to Cloudflare's global edge network. The redirect is so fast that users don't notice it — they simply see their page load normally.</p></li><li><p><b>Repeat visits are instant</b>: Once the cookie is set, all subsequent requests to that domain (and its subdomains) are immediately authorized. No more redirects needed.</p></li></ul><p>Because of this approach, we can log and filter traffic per person across all domains they access, and revoke access in an instant when needed — all without requiring any software installation on the user's device.</p>
    <div>
      <h3><b>No more hosting your own PAC files</b></h3>
      <a href="#no-more-hosting-your-own-pac-files">
        
      </a>
    </div>
    <p>We are also taking the "homework" out of the setup process. You can now host your PAC files directly on Cloudflare, using <a href="https://developers.cloudflare.com/cloudflare-one/networks/resolvers-and-proxies/proxy-endpoints/best-practices/"><u>Proxy Auto-Configuration (PAC) File Hosting</u></a>.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4KnkVcR1Kq6BbFxPbLezRO/89c6a69adc62105b9c9344c24df69a36/image4.png" />
          </figure><p><i>PAC file configuration page</i></p><p>To make it easy, we have included starter templates to get you up and running in minutes. We have also integrated our AI assistant, Cloudy, to provide summaries that help you understand exactly what your PAC file is doing, without having to read through lines of code.</p>
    <div>
      <h3><b>Is this right for your team?</b></h3>
      <a href="#is-this-right-for-your-team">
        
      </a>
    </div>
    <p>While we still recommend the Cloudflare One Client for greater control and the best user experience, the Auth Proxy is the perfect fit for specific scenarios:</p><ul><li><p><b>Virtual desktops (VDI):</b> Environments where users log into a virtual machine and use a browser to reach the Internet.</p></li><li><p><b>Mergers and acquisitions:</b> When you need to bring two different companies under one security umbrella quickly.</p></li><li><p><b>Compliance constraints:</b> When you are legally or technically prohibited from installing software on an endpoint.</p></li></ul>
    <div>
      <h3><b>What’s next?</b></h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>This expands our clientless security options to connect to Cloudflare One, and we are already working on expanding our supported identity methods related to Authorization Endpoints. Look out for Kerberos, mTLS, and traditional username/password authentication to give you even more flexibility in how you authenticate your users.</p><p>The <a href="https://developers.cloudflare.com/cloudflare-one/networks/resolvers-and-proxies/proxy-endpoints/#authorization-endpoint"><u>Gateway Authorization Proxy</u></a> and <a href="https://developers.cloudflare.com/cloudflare-one/networks/resolvers-and-proxies/proxy-endpoints/best-practices/"><u>PAC File Hosting</u></a> are available in open beta today for all account types. You can get started by going to the "Resolvers and Proxies" section of your Cloudflare dashboard.</p> ]]></content:encoded>
            <category><![CDATA[SASE]]></category>
            <category><![CDATA[Secure Web Gateway]]></category>
            <category><![CDATA[Cloudflare Gateway]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <guid isPermaLink="false">2K6ieiC5putSKvW7Jg65kR</guid>
            <dc:creator>Ankur Aggarwal</dc:creator>
            <dc:creator>Alex Holland</dc:creator>
        </item>
        <item>
            <title><![CDATA[Unmasking the Unseen: Your Guide to Taming Shadow AI with Cloudflare One]]></title>
            <link>https://blog.cloudflare.com/shadow-AI-analytics/</link>
            <pubDate>Mon, 25 Aug 2025 14:05:00 GMT</pubDate>
            <description><![CDATA[ Don't let "Shadow AI" silently leak your data to unsanctioned AI. This new threat requires a new defense. Learn how to gain visibility and control without sacrificing innovation. ]]></description>
            <content:encoded><![CDATA[ <p>The digital landscape of corporate environments has always been a battleground between efficiency and security. For years, this played out in the form of "<a href="https://www.cloudflare.com/learning/access-management/what-is-shadow-it/"><u>Shadow IT</u></a>" — employees using unsanctioned laptops or cloud services to get their jobs done faster. Security teams became masters at hunting these rogue systems, setting up firewalls and policies to bring order to the chaos.</p><p>But the new frontier is different, and arguably far more subtle and dangerous.</p><p>Imagine a team of engineers, deep into the development of a groundbreaking new product. They're on a tight deadline, and a junior engineer, trying to optimize his workflow, pastes a snippet of a proprietary algorithm into a popular public AI chatbot, asking it to refactor the code for better performance. The tool quickly returns the revised code, and the engineer, pleased with the result, checks it in. What they don't realize is that their query, and the snippet of code, is now part of the AI service’s training data, or perhaps logged and stored by the provider. Without anyone noticing, a critical piece of the company's intellectual property has just been sent outside the organization's control, a silent and unmonitored data leak.</p><p>This isn't a hypothetical scenario. It's the new reality. Employees, empowered by these incredibly powerful AI tools, are now using them for everything from summarizing confidential documents to generating marketing copy and, yes, even writing code. The data leaving the company in these interactions is often invisible to traditional security tools, which were never built to understand the nuances of a browser tab interacting with a large language model. This quiet, unmanaged usage is "Shadow AI," and it represents a new, high-stakes security blind spot.</p><p>To combat this, we need a new approach—one that provides visibility into this new class of applications and gives <a href="https://blog.cloudflare.com/best-practices-sase-for-ai/">security teams the control they need</a>, without impeding the innovation that makes these tools so valuable.</p>
    <div>
      <h3><b>Shadow AI reporting</b></h3>
      <a href="#shadow-ai-reporting">
        
      </a>
    </div>
    <p>This is where the Cloudflare Shadow IT Report comes in. It’s not a list of threats to be blocked, but rather a visibility and analytics tool designed to help you understand the problem before it becomes a crisis. Instead of relying on guesswork or trying to manually hunt down every unsanctioned application, Cloudflare One customers can use the insights from their traffic to gain a clear, data-driven picture of their organization's application usage.</p><p>The report provides a detailed, categorized view of your application activity, and is easily narrowed down to AI activity. We’ve leveraged our network and threat intelligence capabilities to identify and classify AI services, identifying general-purpose models like ChatGPT, code-generation assistants like GitHub Copilot, and specialized tools used for marketing, data analysis, or other content creation, like Leonardo.ai. This granular view allows security teams to see not just <i>that</i> an employee is using an AI app, but <i>which</i> AI app, and what users are accessing it.</p>
    <div>
      <h3><b>How we built it</b></h3>
      <a href="#how-we-built-it">
        
      </a>
    </div>
    <p>Sharp eyed users may have noticed that we’ve had a <a href="https://www.cloudflare.com/learning/access-management/what-is-shadow-it/"><u>shadow IT</u></a> feature for a while — so what changed? While Cloudflare Gateway, our <a href="https://www.cloudflare.com/learning/access-management/what-is-a-secure-web-gateway/"><u>secure web gateway (SWG)</u></a>, has recorded some of this data for some time, users have wanted deeper insights and reporting into their organization's application usage. Cloudflare Gateway processes hundreds of millions of rows of app usage data for our biggest users daily, and that scale was causing issues with queries into larger time windows. Additionally, the original implementation lacked the filtering and customization capabilities to properly investigate the usage of AI applications. We knew this was information that our customers loved, but we weren’t doing a good enough job of showing it to them.</p><p>Solving this was a cross-team effort requiring a complete overhaul by our analytics and reporting engineers. You may have seen our work recently in <a href="https://blog.cloudflare.com/timescaledb-art/"><u>this July 2025 blog post </u></a>detailing how we adopted TimescaleDB to support our analytics platform, unlocking our analytics, allowing us to aggregate and compress long term data to drastically improve query performance. This solves the issue we originally faced around our scale, letting our biggest customers query their data for long time periods. Our crawler collects the original HTTP traffic data from Gateway, which we store into a Timescale database.</p><p>Once the data are in our database, we built specific, materialized views in our database around the Shadow IT and AI use case to support analytics for this feature. Whereas the existing HTTP analytics we built are centered around the HTTP requests on an account, these specific views are centered around the information relevant to applications, for example: Which of my users are going to unapproved applications? How much bandwidth are they consuming? Is there an end-user in an unexpected geographical location interacting with an unreviewed application? What devices are using the most bandwidth?</p><p>Over the past year, the team has defined a set framework for the analytics we surface. Our timeseries graphs and top-n graphs are all filterable by duration and the relevant data points shown, allowing users to drill down to specific data points and see the details of their corporate traffic. We overhauled Shadow IT by examining the data we had and researching how AI applications were presenting visibility challenges for customers. From there we leveraged our existing framework and built the Shadow IT dashboard. This delivered the application-level visibility that we know our customers needed.</p>
    <div>
      <h3><b>How to use it</b></h3>
      <a href="#how-to-use-it">
        
      </a>
    </div>
    
    <div>
      <h4><b>1. Proxy your traffic with Gateway</b></h4>
      <a href="#1-proxy-your-traffic-with-gateway">
        
      </a>
    </div>
    <p>The core of the system is <b>Cloudflare Gateway</b>, an in-line filter and proxy for all your organization's Internet traffic, regardless of where your users are. When an employee tries to access an AI application, their traffic flows through Cloudflare’s global network. Cloudflare can inspect the traffic, including the hostname, and map the traffic to our application definitions. <a href="https://developers.cloudflare.com/learning-paths/secure-internet-traffic/build-http-policies/tls-inspection/"><u>TLS inspection</u></a> is optional for Gateway customers, but it is required for ShadowIT analytics.</p><p>Interactions are logged and tied to user identity, device posture, bandwidth consumed and even the geographic location. This rich context is crucial for understanding who is using which AI tools, when, and from where.</p>
    <div>
      <h4><b>2. Review application use</b></h4>
      <a href="#2-review-application-use">
        
      </a>
    </div>
    <p>All this granular data is then presented in an our <b>Shadow IT Report</b> within your Cloudflare One dashboard. Simply filter for AI applications so you can:</p><ul><li><p><b>High-Level Overview:</b> Get an immediate sense of your organization's AI adoption. See the top AI applications in use, overall usage trends, and the volume of data being processed. This will help you identify and target your security and governance efforts.</p></li><li><p><b>Granular Drill-Downs:</b> Need more detail? Click on any AI application to see specific users or groups accessing it, their usage frequency, location, and the amount of data transferred. This detail helps you pinpoint teams using AI around the company, as well as how much data is flowing to those applications.</p></li></ul>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/13FSCu9Bn8ZZhybqyJdmt8/d9782da02555de7fca7010e0c5d83ed0/BLOG-2884_2.png" />
          </figure><p><sub><i>ShadowIT analytics dashboard</i></sub></p>
    <div>
      <h4><b>3. Mark application approval statuses</b></h4>
      <a href="#3-mark-application-approval-statuses">
        
      </a>
    </div>
    <p>We understand that not all AI tools are created equal, and your organization's comfort level will vary. The Shadow AI Report introduces a flexible framework for <b>Application Approval Status</b>, allowing you to formally categorize each detected AI application:</p><ul><li><p><b>Approved:</b> These are the AI applications that have passed your internal security vetting, comply with your policies, and are officially sanctioned for use. </p></li><li><p><b>Unapproved:</b> These are the red-light applications. Perhaps they have concerning data privacy policies, a history of vulnerabilities, or simply don’t align with your business objectives.</p></li><li><p><b>In Review:</b> For those gray-area applications, or newly discovered tools, this status lets your teams acknowledge their usage while conducting thorough due diligence. It buys you time to make an informed decision without immediate disruption.</p></li></ul>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/70NE2YxZSd3NQMSg63ltCc/981b6ae2241434120668431a13b1495b/BLOG-2884_3.png" />
          </figure><p><sup><i>Review and mark application statuses in the dashboard</i></sup></p>
    <div>
      <h4><b>4. Enforce policies</b></h4>
      <a href="#4-enforce-policies">
        
      </a>
    </div>
    <p>These approval statuses come alive when integrated with <b>Cloudflare Gateway policies</b>. This allows you to automatically enforce your AI decisions at the edge of Cloudflare’s network, ensuring consistent security for every employee, anywhere they work.</p><p>Here’s how you can translate your decisions into inline protection:</p><ul><li><p><b>Block unapproved AI:</b> The simplest and most direct action. Create a Gateway HTTP policy that blocks all traffic to any AI application marked as "Unapproved." This immediately shuts down risky data exfiltration.</p></li><li><p><b>Limit "In Review" exposure:</b> For applications still being assessed, you might not want a hard block, but rather a soft limit on potential risks:</p></li><li><p><b>Data Loss Prevention (DLP):</b> Cloudflare <a href="https://www.cloudflare.com/zero-trust/products/dlp/"><u>DLP</u></a> inspects and analyzes traffic for indicators of sensitive data (e.g., credit card numbers, PII, internal project names, source code) and can then block the transfer. By applying DLP to "In Review" AI applications, you can prevent AI prompts containing this proprietary data, as well as notify the user why the prompt was blocked. This could have saved our poor junior engineer from their well-intended mistake.. </p></li><li><p><b>Restrict Specific Actions:</b> Block only file uploads allowing basic interaction but preventing mass data egress. </p></li><li><p><b>Isolate Risky Sessions:</b> Route traffic for "In Review" applications through <b>Cloudflare's Browser Isolation</b>. <a href="https://www.cloudflare.com/zero-trust/products/browser-isolation/"><u>Browser Isolation</u></a> executes the browser session in a secure, remote container, isolating all data interactions from your corporate network. With it, you can control file uploads, clipboard actions, reduce keyboard inputs and more, reducing interaction with the application while you review it.</p></li><li><p><b>Audit "Approved" usage:</b> Even for AI tools you trust, you might want to log all interactions for compliance auditing or apply specific data handling rules to ensure ongoing adherence to internal policies.</p></li></ul><p>This workflow enables your team to consistently audit your organization’s AI usage and easily update policies to quickly and <a href="https://www.cloudflare.com/ai-security/">easily reduce security risk</a>.</p>
    <div>
      <h3><b>Forensics with Cloudflare Log Explorer</b></h3>
      <a href="#forensics-with-cloudflare-log-explorer">
        
      </a>
    </div>
    <p>While the Shadow AI Report provides excellent insights, security teams often need to perform deeper forensic investigations. For these advanced scenarios, we offer <a href="https://blog.cloudflare.com/logexplorer-ga/"><b><u>Cloudflare Log Explorer</u></b></a>.</p><p>Log Explorer allows you to store and query your Cloudflare logs directly within the Cloudflare dashboard or via API, eliminating the need to send massive log volumes to third-party <a href="https://www.cloudflare.com/learning/security/what-is-siem/"><u>SIEMs</u></a> for every investigation. It provides raw, unsampled log data with full context, enabling rapid and detailed analysis.</p><p>Log Explorer customers can dive into Shadow AI logs with pre-populated SQL queries from <a href="https://www.cloudflare.com/application-services/products/analytics/"><u>Cloudflare Analytics</u></a>, enabling deeper investigations into AI usage:</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1gnzmDIkhlSxmV4sJwHSjh/403151b70be25e43886db973617a6a14/BLOG-2884_4.png" />
          </figure><p><sub><i>Log Search’s SQL query interface</i></sub></p><p><b>How to investigate Shadow AI with Log Explorer:</b></p><ul><li><p><b>Trace Specific User Activity:</b> If the Shadow AI Report flags a user with high activity on an "In Review" or "Unapproved" AI app, you can jump into Log Explorer and query by user, application category, or specific AI services. </p></li><li><p><b>Analyze Data Exfiltration Attempts:</b> If you have DLP policies configured, you can search for DLP matches in conjunction with AI application categories. This helps identify attempts to upload sensitive data to AI applications and pinpoint exactly what data was being transmitted.</p></li><li><p><b>Identify Anomalous AI Usage:</b> The Shadow AI Report might show a spike in usage for a particular AI application. In Log Explorer, you can filter by application status (In Review or Unapproved) for a specific time range. Then, look for unusual patterns, such as a high number of requests from a single source IP address, or unexpected geographic origins, which could indicate compromised accounts or policy evasion attempts.</p></li></ul><p>If <a href="https://www.cloudflare.com/ai-security/">AI visibility</a> is a challenge for your organization, the Shadow AI Report is available now for Cloudflare One customers, as part of our broader shadow IT discovery capabilities. Log in to <a href="https://dash.cloudflare.com/login"><u>your dashboard</u></a> to start regaining visibility and shaping your AI governance strategy today. </p><p>Ready to modernize how you secure access to AI apps? <a href="https://www.cloudflare.com/products/zero-trust/plans/enterprise/?utm_medium=referral&amp;utm_source=blog&amp;utm_campaign=2025-q3-acq-gbl-connectivity-ge-ge-general-ai_week_blog"><u>Reach out for a consultation</u></a> with our Cloudflare One security experts about how to regain visibility and control. </p><p>Or if you’re not ready to talk to someone yet,  nearly every feature in Cloudflare One is available at no cost for up to 50 users. Many of our largest enterprise customers start by exploring the products themselves on our free plan, and <a href="https://dash.cloudflare.com/sign-up/teams"><u>you can get started here</u></a>.</p><p>If you’ve got feedback or want to help shape how Cloudflare enhances visibility across shadow AI, <a href="https://www.cloudflare.com/lp/ai-security-user-research-program-2025"><u>please consider joining our user research program</u></a>. </p><div>
  
</div><p></p> ]]></content:encoded>
            <category><![CDATA[AI Week]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[AI]]></category>
            <category><![CDATA[SASE]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Secure Web Gateway]]></category>
            <category><![CDATA[SAAS Security]]></category>
            <category><![CDATA[Analytics]]></category>
            <guid isPermaLink="false">71P5BbZ24GopRdhNUMLD7P</guid>
            <dc:creator>Noelle Kagan</dc:creator>
            <dc:creator>Joey Steinberger</dc:creator>
        </item>
        <item>
            <title><![CDATA[Introducing Cloudy, Cloudflare’s AI agent for simplifying complex configurations]]></title>
            <link>https://blog.cloudflare.com/introducing-ai-agent/</link>
            <pubDate>Thu, 20 Mar 2025 13:10:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare’s first AI agent, Cloudy, helps make complicated configurations easy to understand for Cloudflare administrators. ]]></description>
            <content:encoded><![CDATA[ <p>It’s a big day here at Cloudflare! Not only is it Security Week, but today marks Cloudflare’s first step into a completely new area of functionality, intended to improve how our users both interact with, and get value from, all of our products.</p><p>We’re excited to share a first glance of how we’re embedding <a href="https://www.cloudflare.com/learning/ai/what-is-artificial-intelligence/">AI</a> features into the management of Cloudflare products you know and love. Our first mission? Focus on security and streamline the rule and policy management experience. The goal is to automate away the time-consuming task of manually reviewing and contextualizing Custom Rules in <a href="https://www.cloudflare.com/application-services/products/waf/">Cloudflare WAF</a>, and Gateway policies in Cloudflare One, so you can instantly understand what each policy does, what gaps they have, and what you need to do to fix them.</p>
    <div>
      <h3>Meet Cloudy, Cloudflare’s first AI agent</h3>
      <a href="#meet-cloudy-cloudflares-first-ai-agent">
        
      </a>
    </div>
    <p>Our initial step toward a fully AI-enabled product experience is the introduction of <i>Cloudy</i>, the first version of Cloudflare AI agents, assistant-like functionality designed to help users quickly understand and improve their Cloudflare configurations in multiple areas of the product suite. You’ll start to see Cloudy functionality seamlessly embedded into two Cloudflare products across the dashboard, which we’ll talk about below.</p><p>And while the name <i>Cloudy</i> may be fun and light-hearted, our goals are more serious: Bring Cloudy and AI-powered functionality to every corner of Cloudflare, and optimize how our users operate and manage their favorite Cloudflare products. Let’s start with two places where Cloudy is now live and available to all customers using the WAF and Gateway products.</p>
    <div>
      <h3>WAF Custom Rules</h3>
      <a href="#waf-custom-rules">
        
      </a>
    </div>
    <p>Let’s begin with AI-powered overviews of <a href="https://developers.cloudflare.com/waf/custom-rules/"><u>WAF Custom Rules</u></a>. For those unfamiliar, Cloudflare’s Web Application Firewall (WAF) helps protect web applications from attacks like <a href="https://www.cloudflare.com/learning/security/threats/sql-injection/">SQL injection</a>, <a href="https://www.cloudflare.com/learning/security/threats/cross-site-scripting/">cross-site scripting (XSS)</a>, and other vulnerabilities. </p><p>One specific feature of the WAF is the ability to create WAF Custom Rules. These allow users to tailor security policies to block, challenge, or allow traffic based on specific attributes or security criteria.</p><p>However, for customers with dozens or even hundreds of rules deployed across their organization, it can be challenging to maintain a clear understanding of their security posture. Rule configurations evolve over time, often managed by different team members, leading to potential inefficiencies and security gaps. What better problem for Cloudy to solve?</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4zcFRfhRWGQWhoza9TolDu/25e1357540db32e59150609e6eddd1e0/BLOG-2692_2.png" />
          </figure><p>Powered by <a href="https://developers.cloudflare.com/workers-ai/"><u>Workers AI</u></a>, today we’ll share how Cloudy will help review your WAF Custom Rules and provide a summary of what's configured across them. Cloudy will also help you identify and solve issues such as:</p><ul><li><p><b>Identifying redundant rules</b>: Identify when multiple rules are performing the same function, or using similar fields, helping you streamline your configuration.</p></li><li><p><b>Optimising execution order</b>: Spot cases where rules ordering affects functionality, such as when a terminating rule (block/challenge action) prevents subsequent rules from executing.</p></li><li><p><b>Analysing conflicting rules</b>: Detect when rules counteract each other, such as one rule blocking traffic that another rule is designed to allow or log.</p></li><li><p><b>Identifying disabled rules</b>: Highlight potentially important security rules that are in a disabled state, helping ensure that critical protections are not accidentally left inactive.</p></li></ul><p>Cloudy won't just summarize your rules, either. It will analyze the relationships and interactions between rules to provide actionable recommendations. For security teams managing complex sets of Custom Rules, this means less time spent auditing configurations and more confidence in your security coverage.</p><p>Available to all users, we’re excited to show how Cloudflare AI Agents can enhance the usability of our products, starting with WAF Custom Rules. But this is just the beginning.</p>
    <div>
      <h3>Cloudflare One Firewall policies</h3>
      <a href="#cloudflare-one-firewall-policies">
        
      </a>
    </div>
    
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4CXHQVlO3GGqwp6DGyOklJ/3068c434c4a303cf22c328c302947fcb/BLOG-2692_3.png" />
          </figure><p>We've also added Cloudy to <a href="https://www.cloudflare.com/static/e9ea5dfaa69c554cc1cbaa7f3e441acf/Cloudflare_One_at_a_glance.pdf"><u>Cloudflare One</u></a>, our SASE platform, where enterprises manage the security of their employees and tools from a single dashboard.</p><p>In <a href="https://www.cloudflare.com/zero-trust/products/gateway/"><u>Cloudflare Gateway</u></a>, our Secure Web Gateway offering, customers can configure policies to manage how employees do their jobs on the Internet. These Gateway policies can block access to malicious sites, prevent data loss violations, and control user access, among other things.</p><p>But similar to WAF Custom Rules, Gateway policy configurations can become overcomplicated and bogged down over time, with old, forgotten policies that do who-knows-what. Multiple selectors and operators working in counterintuitive ways. Some blocking traffic, others allowing it. Policies that include several user groups, but carve out specific employees. We’ve even seen policies that block hundreds of URLs in a single step. All to say, managing years of Gateway policies can become overwhelming.</p><p>So, why not have Cloudy summarize Gateway policies in a way that makes their purpose clear and concise?</p><p>Available to all Cloudflare Gateway users (create a free Cloudflare One account <a href="https://www.cloudflare.com/zero-trust/products/"><u>here</u></a>), Cloudy will now provide a quick summary of any Gateway policy you view. It’s now easier than ever to get a clear understanding of each policy at a glance, allowing admins to spot misconfigurations, redundant controls, or other areas for improvement, and move on with confidence.</p>
    <div>
      <h3>Built on Workers AI</h3>
      <a href="#built-on-workers-ai">
        
      </a>
    </div>
    <p>At the heart of our new functionality is <a href="https://www.cloudflare.com/developer-platform/products/workers-ai/"><u>Cloudflare Workers AI</u></a> (yes, the same version that everyone uses!) that leverages advanced <a href="https://www.cloudflare.com/learning/ai/what-is-large-language-model/">large language models (LLMs) </a>to process vast amounts of information; in this case, policy and rules data. Traditionally, manually reviewing and contextualizing complex configurations is a daunting task for any security team. With Workers AI, we automate that process, turning raw configuration data into consistent, clear summaries and actionable recommendations.</p>
    <div>
      <h4><b>How it works</b></h4>
      <a href="#how-it-works">
        
      </a>
    </div>
    <p>Cloudflare Workers AI ingests policy and rule configurations from your Cloudflare setup and combines them with a purpose-built LLM prompt. We leverage the same <a href="https://developers.cloudflare.com/workers-ai/models/"><u>publicly-available LLM models</u></a> that we offer our customers, and then further enrich the prompt with some additional data to provide it with context. For this specific task of analyzing and summarizing policy and rule data, we provided the LLM:</p><ul><li><p><b>Policy &amp; rule data</b>: This is the primary data itself, including the current configuration of policies/rules for Cloudy to summarize and provide suggestions against.</p></li><li><p><b>Documentation on product abilities:</b> We provide the model with additional technical details on the policy/rule configurations that are possible with each product, so that the model knows what kind of recommendations are within its bounds.</p></li><li><p><b>Enriched datasets</b>: Where WAF Custom Rules or CF1 Gateway policies leverage other ‘lists’ (e.g., a WAF rule referencing multiple countries, a Gateway policy leveraging a specific content category), the list item(s) selected must be first translated from an ID to plain-text wording so that the LLM can interpret which policy/rule values are actually being used.</p></li><li><p><b>Output instructions</b>: We specify to the model which format we’d like to receive the output in. In this case, we use JSON for easiest handling.</p></li><li><p><b>Additional clarifications</b>: Lastly, we explicitly instruct the LLM to be sure about its output, valuing that aspect above all else. Doing this helps us ensure that no hallucinations make it to the final output.</p></li></ul><p>By automating the analysis of your WAF Custom Rules and Gateway policies, Cloudflare Workers AI not only saves you time but also enhances security by reducing the risk of human error. You get clear, actionable insights that allow you to streamline your configurations, quickly spot anomalies, and maintain a strong security posture—all without the need for labor-intensive manual reviews.</p>
    <div>
      <h4>What’s next for Cloudy</h4>
      <a href="#whats-next-for-cloudy">
        
      </a>
    </div>
    <p>Beta previews of Cloudy are live for all Cloudflare customers today. But this is just the beginning of what we envision for AI-powered functionality across our entire product suite.</p><p>Throughout the rest of 2025, we plan to roll out additional <a href="https://www.cloudflare.com/learning/ai/what-is-agentic-ai/">AI agent capabilities</a> across other areas of Cloudflare. These new features won’t just help customers manage security more efficiently, but they’ll also provide intelligent recommendations for optimizing performance, streamlining operations, and enhancing overall user experience.</p><p>We’re excited to hear your thoughts as you get to meet Cloudy and try out these new AI features – send feedback to us at <a href="#"><u>cloudyfeedback@cloudflare.com</u></a>, or post your thoughts on X, LinkedIn, or Mastodon tagged with #SecurityWeek! Your feedback will help shape our roadmap for AI enhancement, and bring our users smarter, more efficient tooling that helps everyone get more secure.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5gGseiyO6pbddpdSVQ5wfJ/ae1d0d5a2f8ec01f571de7a85b655370/BLOG-2692_4.png" />
          </figure>
    <div>
      <h3>Watch on Cloudflare TV</h3>
      <a href="#watch-on-cloudflare-tv">
        
      </a>
    </div>
    <div>
  
</div><p></p> ]]></content:encoded>
            <category><![CDATA[Workers AI]]></category>
            <category><![CDATA[Cloudflare Workers]]></category>
            <category><![CDATA[Developer Platform]]></category>
            <category><![CDATA[Developers]]></category>
            <category><![CDATA[LLM]]></category>
            <category><![CDATA[WAF]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[SASE]]></category>
            <category><![CDATA[Secure Web Gateway]]></category>
            <category><![CDATA[Beta]]></category>
            <category><![CDATA[Network Services]]></category>
            <guid isPermaLink="false">7ywSxti5U7fxjKbqmVXpGW</guid>
            <dc:creator>Alex Dunbrack</dc:creator>
            <dc:creator>Harsh Saxena</dc:creator>
        </item>
        <item>
            <title><![CDATA[A wild week in phishing, and what it means for you]]></title>
            <link>https://blog.cloudflare.com/a-wild-week-in-phishing-and-what-it-means-for-you/</link>
            <pubDate>Fri, 16 Aug 2024 18:34:00 GMT</pubDate>
            <description><![CDATA[ From the U.S. elections and geopolitical conflict to tens of millions in corporate dollars lost, phishing remains the root cause of cyber damages. Learn why a comprehensive solution is the best way to stay protected. ]]></description>
            <content:encoded><![CDATA[ 
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7qPKUuIGbxmn5I3oGZ7W1E/9bd8faa76cc25b6d2ef1cb81ad920ddd/2504-1-Hero.png" />
          </figure><p>Being a bad guy on the Internet is a really good business. In more than 90% of cybersecurity incidents, phishing is the root cause of the attack, and during this third week of August phishing attacks were reported <a href="https://apnews.com/article/trump-campaign-hacking-iran-769d8411d9a13ef9a0e039c0b6c3b032"><u>against the U.S. elections</u></a>, in the <a href="https://blog.google/threat-analysis-group/iranian-backed-group-steps-up-phishing-campaigns-against-israel-us/"><u>geopolitical conflict</u></a> between the U.S., Israel, and Iran, and to cause <a href="https://www.sec.gov/Archives/edgar/data/1609804/000095014224002170/eh240519238_8k.htm"><u>$60M in corporate losses</u></a>.</p><p>You might think that after 30 years of email being the top vector for attack and risk we are helpless to do anything about it, but that would be giving too much credit to bad actors, and a misunderstanding of how defenders focused on detections can take control and win. </p><p>Phishing isn’t about email exclusively, or any specific protocol for that matter. Simply put, it is an attempt to get a person, like you or me, to take an action that unwittingly leads to damages. These attacks work because they appear to be authentic, <a href="https://blog.cloudflare.com/50-most-impersonated-brands-protect-phishing"><u>visually</u></a> or organizationally, such as pretending to be the CEO or CFO of your company, and when you break it down they are <a href="https://blog.cloudflare.com/2023-phishing-report"><u>three main attack vectors that Cloudflare has seen most impactfu</u></a>l from the bad emails we protect our customers from: 1. Clicking links (deceptive links are 35.6% of threat indicators) 2. Downloading files or malware  (malicious attachments are 1.9% of threat indicators) 3. Business email compromise (BEC) phishing that elicits money or intellectual property with no links or files (0.5% of threat indicators).</p><p>Today, we at Cloudflare see an increase in what we’ve termed multi-channel phishing. What other channels are there to send links, files and elicit BEC actions? There’s <a href="https://en.wikipedia.org/wiki/SMS"><u>SMS</u></a> (text messaging) and public and private messaging applications, which are increasingly common attack vectors that take advantage of the ability to send links over those channels, and also how people consume information and work. There’s cloud collaboration, where attackers rely on links, files, and BEC phishing on commonly used collaboration tools like Google Workspace, Atlassian, and Microsoft Office 365. And finally, there’s web and social phishing targeting people on LinkedIn and X. Ultimately, any attempt to stop phishing needs to be comprehensive enough to detect and protect against these different vectors.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/79OaEpiIHsCnTgkj7k89Yi/6f7f413ec1bca40e6e00b60863ee2e4e/2504-2.png" />
          </figure><p><sub><i>Learn more about these technologies and products </i></sub><a href="https://www.cloudflare.com/zero-trust/products/"><sub><i><u>here</u></i></sub></a><sub></sub></p>
    <div>
      <h3>A real example</h3>
      <a href="#a-real-example">
        
      </a>
    </div>
    <p>It’s one thing to tell you this, but we’d love to give you an example of how a multi-channel phish plays out with a sophisticated attacker.</p><p>Here’s an email message that an executive notices is in their junk folder. That’s because our <a href="https://www.cloudflare.com/zero-trust/products/email-security/"><u>Email Security</u></a> product noticed there’s something off about it and moved it there, but it relates to a project the executive is working on, so the executive thinks it’s legitimate. There’s a request for a company org chart, and the attacker knows that this is the kind of thing that’s going to be caught if they continue on email, so they include a link to a real Google form:</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3RyRiXtEtUg4PsZZ7yoEpY/c0a09b8d47d09b3b306b99d4cc5b667b/2504-3.png" />
          </figure><ul><li><p>The executive clicks the link, and because it is a legitimate Google form, it displays the following:</p></li></ul>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2szWX4dGovtdUjDzcRMQxt/6e0e5414ed84cac77c17667e668933a1/2504-4.png" />
          </figure><ul><li><p>There’s a request to upload the org chart here, and that’s what they try to do:</p></li></ul><div>
  
</div><ul><li><p>The executive drags it in, but it doesn’t finish uploading because in the document there is an “internal only” watermark that our <a href="https://www.cloudflare.com/zero-trust/products/gateway/"><u>Gateway</u></a> and <a href="https://www.cloudflare.com/zero-trust/products/dlp/"><u>digital loss prevention (DLP)</u></a> engine detected, which in turn prevented the upload.</p></li><li><p>Sophisticated attackers use urgency to drive better outcomes. Here, the attackers know the executive has an upcoming deadline for the consultant to report back to the CEO. Unable to upload the document, they respond back to the attacker. The attacker suggests that they try another method of upload or, in the worst case scenario, send the document on WhatsApp. </p></li></ul>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1nbwpRTramjxvyjgNzYQam/3e1d75596edd0c5b4fcf8323feb242e4/2504-5.png" />
          </figure><ul><li><p>The executive attempts to upload the org chart to the website they were provided in the second email, not knowing that this site would have loaded malware, but because it was loaded in Cloudflare’s <a href="https://www.cloudflare.com/zero-trust/products/browser-isolation/"><u>Browser Isolation</u></a>, it kept the executive’s device safe. Most importantly, when trying to upload sensitive company documents, the action is stopped again:</p></li></ul><div>
  
</div><ul><li><p>Finally they try WhatsApp, and again, we block it:</p></li></ul><div>
  
</div>

    <div>
      <h3>Ease of use</h3>
      <a href="#ease-of-use">
        
      </a>
    </div>
    <p>Setting up a security solution and maintaining it is critical to long term protection. However, having IT administration teams constantly tweak each product, configuration, and monitor each users’ needs is not only costly but risky as well, as it puts a large amount of overhead on these teams. </p><p>Protecting the executive in the example above required just four steps:</p><ol><li><p>Install and login to Cloudflare’s device agent for protection 
</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4jy0exbLu47wyT9AvqdTDb/17b48aaf93df0631a48b24aac58cc727/2504-6.png" />
          </figure><p>
With just a few clicks, anyone with the device agent client can be protected against multi-channel phish, making it easy for end users and administrators. For organizations that don’t allow clients to be installed, an <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/agentless/"><u>agentless deployment</u></a> is also available.  </p></li><li><p>Configure policies that apply to all your user traffic routed through our secure web gateway. These policies can block access outright to high risk sites, such as those known to participate in phishing campaigns. For sites that may be suspicious, such as newly registered domains, isolated browser access allows users to access the website, but limits their interaction.
</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/43DsyYCbb0prLm14DHN8GA/4f67cd52ff31b3eee121898ca7b4e89f/2504-7.png" />
          </figure><p>The executive was also unable to upload the org chart to a free cloud storage service because their organization is using Cloudflare One’s <a href="https://www.cloudflare.com/zero-trust/products/gateway/"><u>Gateway</u></a> and <a href="https://developers.cloudflare.com/cloudflare-one/policies/browser-isolation/setup/"><u>Browser Isolation</u></a> solutions that were configured to load any free cloud storage websites in a remote isolated environment, which not only prevented the upload but also removed the ability to copy and paste information as well.

Also, while the executive was able to converse with the bad actor over WhatsApp, their files were blocked because of Cloudflare One’s Gateway solution, configured by the administrator to block all uploads and downloads on WhatsApp. </p></li><li><p>Set up DLP policies based on what shouldn’t be uploaded, typed, or copied and pasted.
</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4qeRPgGDjHHli36PXUrxm1/492df3aa3f132e05ffc365937c9e22a4/2504-8.png" />
          </figure><p>The executive was unable to upload the org chart to the Google form because the organization is using Cloudflare One’s Gateway and DLP solutions. This protection is implemented by configuring <a href="https://developers.cloudflare.com/cloudflare-one/policies/gateway/"><u>Gateway</u></a> to block any <a href="https://developers.cloudflare.com/cloudflare-one/policies/data-loss-prevention/dlp-profiles/"><u>DLP</u></a> infraction, even on a valid website like Google.</p></li><li><p>Deploy Email Security and set up auto-move rules based on the types of emails detected.
</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/19E5AjXPzOqi4u2wY6AvWA/da3e58b7dcc3d33684a3900f85aeab50/2504-9.png" />
          </figure></li></ol><p></p><p>In the example above, the executive never received any of the multiple malicious emails that were sent to them because Cloudflare’s Email Security was protecting their inbox. The phishing emails that did arrive were put into their Junk folder because the email was impersonating someone that didn’t match the signature in the email, and the configuration in Email Security automatically moved it there because of a <a href="https://developers.cloudflare.com/email-security/email-configuration/retract-settings/"><u>one-click configuration</u></a> set by the executive’s IT administrator.</p><p>But even with best-in-class detections, it goes without saying that it is important to have the ability to drill down on any metric to learn about individual users that are being impacted by an ongoing attack. Below is a mockup of our upcoming improved email security monitoring dashboard.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3JyRhqVbppIpAQAIGkVGil/67e3d44df3353b26ec1190dde4a915ff/2504-10.png" />
          </figure><p></p>
    <div>
      <h3>What’s next</h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>While phishing, despite being around for three decades, continues to be a clear and present danger, effective detections in a seamless and comprehensive solution are really the only way to stay protected these days. </p><p>If you’re simply thinking about purchasing email security by itself, you can see why that just isn’t enough. Multi-layered protection is absolutely necessary to protect modern workforces, because work and data don’t just sit in email. They’re everywhere and on every device. Your phishing protection needs to be as well.</p><p>While you can do this by stitching together multiple vendors, it just won’t all work together. And besides the cost, a multi-vendor approach also usually increases overhead for investigation, maintenance, and uniformity for IT teams that are already stretched thin.</p><p>Whether or not you are at the start of your journey with Cloudflare, you can see how getting different parts of the Cloudflare One product suite can help holistically with phishing. And if you are already deep in your journey with Cloudflare, and are looking for 99.99% effective email detections trusted by the Fortune 500, global organizations, and even government entities, you can see how our Email Security helps. </p><p>If you’re running Office 365, and you’d like to see what we can catch that your current provider cannot, you can start right now with <a href="https://developers.cloudflare.com/email-security/deployment/api/setup/email-retro-scan/"><u>Retro Scan</u></a>.</p><p>And if you are using our Email Security solution already, you can learn more about our comprehensive protection <a href="https://www.cloudflare.com/zero-trust/products/"><u>here</u></a>.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Remote Browser Isolation]]></category>
            <category><![CDATA[DLP]]></category>
            <category><![CDATA[Secure Web Gateway]]></category>
            <category><![CDATA[Phishing]]></category>
            <guid isPermaLink="false">12yQcvcZoP7GDmh89iFg24</guid>
            <dc:creator>Pete Pang</dc:creator>
        </item>
        <item>
            <title><![CDATA[Announcing Custom DLP profiles]]></title>
            <link>https://blog.cloudflare.com/custom-dlp-profiles/</link>
            <pubDate>Tue, 10 Jan 2023 14:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare Data Loss Prevention now offers the ability to create custom detections. ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7qJZd1dizqFIdaPcbY7Xxo/c285a34ed84c8120f86801f516037e27/image5-4.png" />
            
            </figure>
    <div>
      <h3>Introduction</h3>
      <a href="#introduction">
        
      </a>
    </div>
    <p>Where does sensitive data live? Who has access to that data? How do I know if that data has been improperly shared or leaked? These questions keep many IT and security administrators up at night. The goal of <a href="https://www.cloudflare.com/learning/access-management/what-is-dlp/">data loss prevention (DLP)</a> is to give administrators the desired visibility and control over their sensitive data.</p><p>We shipped the <a href="/inline-dlp-ga/">general availability of DLP</a> in September 2022, offering Cloudflare One customers better protection of their sensitive data. With DLP, customers can identify sensitive data in their corporate traffic, evaluate the intended destination of the data, and then allow or block it accordingly -- with details logged as permitted by your privacy and sovereignty requirements. We began by offering customers predefined detections for identifier numbers (e.g. Social Security #s) and financial information (e.g. credit card #s). Since then, nearly every customer has asked:</p><blockquote><p>“When can I build my own detections?”</p></blockquote><p>Most organizations care about credit card numbers, which use standard patterns that are easily detectable. But the data patterns of intellectual property or trade secrets vary widely between industries and companies, so customers need a way to detect the loss of their unique data. This can include internal project names, unreleased product names, or unannounced partner names.</p><p>As of today, your organization can build custom detections to identify these types of sensitive data using Cloudflare One. That’s right, today you are able to build Custom DLP Profile using the same regular expression approach that is used in policy building across our platform.</p>
    <div>
      <h3>How to use it</h3>
      <a href="#how-to-use-it">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/products/zero-trust/dlp/">Cloudflare’s DLP</a> is embedded in our <a href="https://www.cloudflare.com/learning/access-management/what-is-a-secure-web-gateway/">secure web gateway (SWG)</a> product, <a href="https://www.cloudflare.com/products/zero-trust/gateway/">Cloudflare Gatewa</a>y, which routes your corporate traffic through Cloudflare for fast, safe Internet browsing. As your traffic passes through Cloudflare, you can inspect that HTTP traffic for sensitive data and apply DLP policies.</p><p>Building DLP custom profiles follows the same intuitive approach you’ve come to expect from Cloudflare.</p><p>First, once within the Zero Trust dashboard, navigate to the DLP Profiles tab under Gateway:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3kfzsPRGyGAS35yu7A0uC9/e02371cee6289fe92c38b0dacbbccef1/image2-13.png" />
            
            </figure><p>Here you will find any available DLP profiles, either predefined or custom:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/199ahBcyglz52Lpsofvl1F/0ef3b17dd0a17ffc290db20d735bdc98/image1-20.png" />
            
            </figure><p>Select to <b>Create Profile</b> to begin a new one.  After providing a name and description, select <b>Add detection entry</b> to add a custom regular expression. A <a href="https://en.wikipedia.org/wiki/Regular_expression">regular expression</a>, or regex, is a sequence of characters that specifies a search pattern in text, and is a standard way for administrators to achieve the flexibility and granularity they need in policy building.</p><p>Cloudflare Gateway currently supports regexes in HTTP policies using the <a href="https://docs.rs/regex/latest/regex/#syntax">Rust regex crate</a>. For consistency, we used the same crate to offer custom DLP detections. For documentation on our regex support, see <a href="https://developers.cloudflare.com/cloudflare-one/policies/filtering/http-policies/data-loss-prevention/#build-a-custom-profile">our documentation</a>.</p><p>Regular expressions can be used to build custom PII detections of your choosing, such as email addresses, or to detect keywords for sensitive intellectual property.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6KclkjaZOxF6PMVkY0L2yM/9b327971802a650d2ffc7977fcd712c0/image3-9.png" />
            
            </figure><p>Provide a name and a regex of your choosing. Every entry in a DLP profile is a new detection that you can scan for in your corporate traffic. Our <a href="https://developers.cloudflare.com/cloudflare-one/policies/filtering/http-policies/data-loss-prevention/#build-a-custom-profile">documentation</a> provides resources to help you create and test Rust regexes.</p><p>Below is an example of regex to detect a simple email address:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4QUMf9IdSNh6i81pYWdzUb/b4295e07168c644dce339715c493bb43/image7-1.png" />
            
            </figure><p>When you are done, you will see the entry in your profile.  You can turn entries on and off in the <b>Status</b> field for easier testing.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3XCjno9mGXiEPz3oCv8BwL/96c7075d1516f4e8fb6484ba5f01fbfc/image4-5.png" />
            
            </figure><p>The custom profile can then be applied to traffic using an HTTP policy, just like a predefined profile. Here both a predefined and custom profile are used in the same policy, blocking sensitive traffic to dlptest.com:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6cUsE6rB7AcS5oQMQVicXs/b5858d4f1aff7a7295d1c04edbe9000c/image6.png" />
            
            </figure>
    <div>
      <h3>Our DLP roadmap</h3>
      <a href="#our-dlp-roadmap">
        
      </a>
    </div>
    <p>This is just the start of our DLP journey, and we aim to grow the product exponentially in the coming quarters. In Q4 we delivered:</p><ul><li><p>Expanded Predefined DLP Profiles</p></li><li><p>Custom DLP Profiles</p></li><li><p>PDF scanning support</p></li><li><p>Upgraded file name logging</p></li></ul><p>Over the next quarters, we will add a number of features, including:</p><ul><li><p>Data at rest scanning with Cloudflare CASB</p></li><li><p>Minimum DLP match counts</p></li><li><p>Microsoft Sensitivity Label support</p></li><li><p>Exact Data Match (EDM)</p></li><li><p>Context analysis</p></li><li><p>Optical Character Recognition (OCR)</p></li><li><p>Even more predefined DLP detections</p></li><li><p>DLP analytics</p></li><li><p>Many more!</p></li></ul><p>Each of these features will offer you new data visibility and control solutions, and we are excited to bring these features to customers very soon.</p>
    <div>
      <h3>How do I get started?</h3>
      <a href="#how-do-i-get-started">
        
      </a>
    </div>
    <p>DLP is part of Cloudflare One, our <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> <a href="/custom-dlp-profiles/edit">network-as-a-service</a> platform that connects users to enterprise resources. Our <a href="/inline-dlp-ga/">GA blog announcement</a> provides more detail about using Cloudflare One to onboard traffic to DLP.</p><p>To get access to DLP via Cloudflare One, <a href="https://www.cloudflare.com/lp/cio-week-2023-cloudflare-one-contact-us/">reach out for a consultation</a>, or contact your account manager.</p> ]]></content:encoded>
            <category><![CDATA[CIO Week]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Data Loss Prevention]]></category>
            <category><![CDATA[DLP]]></category>
            <category><![CDATA[Secure Web Gateway]]></category>
            <guid isPermaLink="false">YVG5VxqbfYehlg0rqucXP</guid>
            <dc:creator>Adam Chalmers</dc:creator>
            <dc:creator>Noelle Kagan</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare Data Loss Prevention now Generally Available]]></title>
            <link>https://blog.cloudflare.com/inline-dlp-ga/</link>
            <pubDate>Tue, 20 Sep 2022 13:00:00 GMT</pubDate>
            <description><![CDATA[ Data Loss Prevention is now available for Cloudflare contract customers, giving customers more options to protect their sensitive data ]]></description>
            <content:encoded><![CDATA[ <p></p><p>In July 2022, we <a href="/inline-data-loss-prevention/">announced</a> beta access to our newest Zero Trust product, Data Loss Prevention (DLP). Today, we are even more excited to announce that DLP is Generally Available to customers! Any customer can now get visibility and control of sensitive data moving into, out of, and around their corporate network. If you are interested, check out the bottom of this post.</p>
    <div>
      <h3>What is DLP?</h3>
      <a href="#what-is-dlp">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/learning/access-management/what-is-dlp/">Data Loss Prevention</a> helps you overcome one of their biggest challenges: identifying and protecting sensitive data. The migration to the cloud has made tracking and controlling sensitive information more difficult than ever. Employees are using an ever-growing list of tools to manipulate a vast amount of data. Meanwhile, IT and security managers struggle to identify who should have access to sensitive data, how that data is stored, and where that data is allowed to go.</p><p>Data Loss Prevention enables you to protect your data based on its characteristics, such as keywords or patterns. As traffic moves into and out of corporate infrastructure, the traffic is inspected for indicators of sensitive data. If the indicators are found, the traffic is allowed or blocked based on the customers’ rules.</p><p>The most common use for DLP is the protection of Personally Identifiable Information (PII), but many customers are interested in protecting intellectual property, source code, corporate financial information, or any other information vital to the business. Proper data usage can include who used the data, where the data was sent, and how the data is stored.</p>
    <div>
      <h3>How does DLP see my corporate traffic?</h3>
      <a href="#how-does-dlp-see-my-corporate-traffic">
        
      </a>
    </div>
    <p>DLP is part of Cloudflare One, our <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> <a href="https://www.cloudflare.com/learning/network-layer/network-as-a-service-naas/">network-as-a-service</a> platform that connects users to enterprise resources. Cloudflare One runs traffic from data centers, offices, and remote users, through the Cloudflare network. This offers a wide variety of opportunities to secure the traffic, including validating identity and device posture, filtering corporate traffic to protect from malware and phishing, checking the configurations on SaaS applications, and using Browser Isolation to make web surfing safer for employees. All of this is done with the performance of our global network and managed with one control plane.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/69LEhrzNB3qO19DcQSDxIC/b8c83b53d142ab6bd27f083c13b8290e/image5-5.png" />
            
            </figure>
    <div>
      <h3>How does it work?</h3>
      <a href="#how-does-it-work">
        
      </a>
    </div>
    <p>DLP leverages the HTTP filtering abilities of Cloudflare One. As your traffic runs through our network, you can apply rules and route traffic based on information in the HTTP request. There are a wide variety of options for filtering, such as domain, URL, application, HTTP method, and many more. You can use these options to segment the traffic you wish to DLP inspect.</p><p>When DLP is applied, the relevant HTTP requests are decompressed, decoded, and scanned for regex matches. Numeric regex matches are then algorithmically validated when possible, such as with checksum calculations or <a href="https://en.wikipedia.org/wiki/Luhn_algorithm">Luhn’s algorithm</a>. However, some numeric detections do not adhere to algorithmic validation, such as US Social Security numbers.</p><p>If sensitive data is identified by the detection, the data transfer can be allowed or blocked according to the customer’s ruleset.</p>
    <div>
      <h3>How do I use it?</h3>
      <a href="#how-do-i-use-it">
        
      </a>
    </div>
    <p>Let’s dive further in to see how this all actually comes to life. To use DLP in the Zero Trust Dashboard, navigate to the DLP Profiles tab under Gateway:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5EQnaB7V1Akwzwysxv4XyF/c9c42b926e2d5ef38ef1f33b6d029b2b/image2-14.png" />
            
            </figure><p>Decide on the type of data you want to protect. We currently detect credit card numbers and US Social Security numbers, but this is where we intend to grow a robust library of DLP detections.  Our next steps are custom and additional predefined detections, including more international identifiers and financial record numbers, which will be arriving soon.</p><p>When you have decided, select Configure to enable detections:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7ohWjYF6CSnHW9c3clXCg9/5fcb59d40da56942b5610bf04a1e9a01/image6-2.png" />
            
            </figure><p>Enable the detections you want to use. As described above, these card number detections are made using regexes and validated with Luhn’s algorithm. You can make numeric detections for card numbers or detect strings matching card names, such as “American Express.”</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6eUqmagXBJcZiQ6N8DASD6/be655b80c0b59bb6657395dea5259d6a/image3-10.png" />
            
            </figure><p>Then apply the detections to a Gateway <a href="https://developers.cloudflare.com/cloudflare-one/policies/filtering/http-policies/">HTTP policy</a> on the traffic of your choosing. Here we applied DLP to Google Drive traffic. This policy will block uploads and downloads to Google Drive that contain US Social Security Numbers.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5es1X7XImRbyrAgxm7jaOW/525a16426f263bb04ecb850aac80f8c3/image4-6.png" />
            
            </figure>
    <div>
      <h3>Holistic data protection with Cloudflare Zero Trust</h3>
      <a href="#holistic-data-protection-with-cloudflare-zero-trust">
        
      </a>
    </div>
    <p>Inspecting HTTP traffic for the presence of sensitive data with DLP is one critical way organizations can reduce the risk of data exfiltration, strengthen regulatory compliance, and improve overall data governance.</p><p>Implementing DLP is just one step towards a more holistic approach to securing data.</p><p>To that end, our <a href="https://www.cloudflare.com/products/zero-trust/">Cloudflare Zero Trust</a> platform offers more comprehensive controls over how any user on any device accesses and interacts with data – all from a single management interface:</p><ul><li><p>To protect data in transit, administrators can enforce identity-aware, granular access policies with our <a href="https://www.cloudflare.com/learning/access-management/what-is-ztna/">Zero Trust Network Access (ZTNA)</a> service or leverage our <a href="https://www.cloudflare.com/learning/access-management/what-is-a-secure-web-gateway/">in-line Secure Web Gateway (SWG)</a> to apply corporate tenant controls per application.</p></li><li><p>Our <a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">Remote Browser Isolation (RBI)</a> service can control how users interact with data used within a browser – for example, restricting the downloading, the copy/pasting, and printing of data onto local devices.</p></li><li><p>For data at rest, our API-based <a href="https://www.cloudflare.com/learning/access-management/what-is-a-casb/">Cloud Access Security Broker (CASB)</a> – <a href="/casb-ga">announced as generally available today!</a> – detects if misconfigurations in SaaS applications can lead to data leakage.</p></li></ul><p>We have architected our DLP service to work seamlessly with these ZTNA, SWG, CASB, and other security services. As we continue to deepen our DLP capabilities, this platform approach uniquely equips us to address our customers’ needs with flexibility.</p>
    <div>
      <h3>Get Access to Data Loss Prevention</h3>
      <a href="#get-access-to-data-loss-prevention">
        
      </a>
    </div>
    <p>To get access to DLP, reach out for a <a href="https://www.cloudflare.com/cloudflare-one/">consultation</a>, or contact your account manager.</p> ]]></content:encoded>
            <category><![CDATA[GA Week]]></category>
            <category><![CDATA[General Availability]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Secure Web Gateway]]></category>
            <category><![CDATA[Data Loss Prevention]]></category>
            <guid isPermaLink="false">53LGtCAyuJdZdcStSZOSx</guid>
            <dc:creator>Noelle Kagan</dc:creator>
        </item>
        <item>
            <title><![CDATA[Announcing Gateway + CASB]]></title>
            <link>https://blog.cloudflare.com/announcing-gateway-and-casb/</link>
            <pubDate>Fri, 24 Jun 2022 13:00:04 GMT</pubDate>
            <description><![CDATA[ Find and fix shadow IT with Cloudflare’s Secure Web Gateway and API-driven Cloud Access Security Broker (CASB) ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Shadow IT and managing access to sanctioned or unsanctioned SaaS applications remain one of the biggest pain points for IT administrators in the era of the cloud.</p><p>We're excited to announce that starting soon, Cloudflare’s <a href="https://www.cloudflare.com/learning/access-management/what-is-a-secure-web-gateway/">Secure Web Gateway</a> and our new API-driven Cloud Access Security Broker (CASB) work seamlessly together to help IT and security teams go from finding Shadow IT to fixing it in minutes.</p>
    <div>
      <h3>Detect security issues within SaaS applications</h3>
      <a href="#detect-security-issues-within-saas-applications">
        
      </a>
    </div>
    <p>Cloudflare's API-driven [CASB](API-driven CASB starts) starts by providing comprehensive visibility into SaaS applications, so you can easily <a href="https://www.cloudflare.com/learning/access-management/what-is-dlp/">prevent data leaks</a> and compliance violations. Setup takes just a few clicks to integrate with your organization's SaaS services, like Google Workspace and Microsoft 365. From there, IT and security teams can see what applications and services their users are logging into and how company data is being shared.</p><p>So you’ve found the issues. But what happens next?</p>
    <div>
      <h3>Identify and detect, but then what?</h3>
      <a href="#identify-and-detect-but-then-what">
        
      </a>
    </div>
    <p>Customer feedback from the API-driven CASB beta has followed a similar theme: <i>it was super easy to set up and detect all my security issues, but how do I fix this stuff?</i></p><p>Almost immediately after investigating the most critical issues, it makes sense to want to start taking action. Whether it be detecting an unknown application being used for Shadow IT or wanting to limit functionality, access, or behaviors to a known but unapproved application, remediation is front of mind.</p><p>This led to customers feeling like they had a bunch of useful data in front of them, but no clear action to take to get started on fixing them.</p>
    <div>
      <h3>Create Gateway policies from CASB security findings</h3>
      <a href="#create-gateway-policies-from-casb-security-findings">
        
      </a>
    </div>
    <p>To solve this problem, we’re allowing you to easily create Gateway policies from CASB <a href="https://developers.cloudflare.com/cloudflare-one/applications/scan-apps/#view-security-findings">security findings</a>. Security findings are issues detected within SaaS applications that involve users, data at rest, and settings that are assigned a Low, Medium, High or Critical severity per integration.</p><p>Using the security findings from CASB allows for fine-grained Gateway policies which prevent future unwanted behavior while still allowing usage that aligns to company security policy. This means going from viewing a CASB security issue, like the use of an unapproved SaaS application, to preventing or controlling access in minutes. This seamless cross-product experience all happens from a single, unified platform.</p><p>For example, take the CASB Google Workspace <a href="https://developers.cloudflare.com/cloudflare-one/applications/scan-apps/casb-integrations/google-workspace/#third-party-apps">security finding around third-party apps</a> which detects sign-ins or other permission sharing from a user's account. In just a few clicks, you can create a Gateway policy to block some or all of the activity, like uploads or downloads, to the detected SaaS application. This policy can be applied to some or all users, based on what access has been granted to the user’s account.</p><p>By surfacing the exact behavior with CASB, you can take swift and targeted action to better protect your organization with Gateway.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/yn5pqqYDDAvwF5IN25dEj/9b603887cb14e1f7f01ff25dbaf66acf/image1-44.png" />
            
            </figure>
    <div>
      <h3>Get started today with the Cloudflare One</h3>
      <a href="#get-started-today-with-the-cloudflare-one">
        
      </a>
    </div>
    <p>This post highlights one of the many ways the Cloudflare One suite of solutions work seamlessly together as a unified platform to find and fix security issues across SaaS applications.</p><p>Get started now with Cloudflare’s Secure Web Gateway by <a href="https://dash.cloudflare.com/sign-up/teams">signing up here</a>. Cloudflare’s API-driven CASB is in closed beta with new customers being onboarded each week. You can <a href="https://www.cloudflare.com/products/zero-trust/lp/casb-beta/">request access here</a> to try out this exciting new cross-product feature.</p><p>To learn more about simplifying the way you protect SaaS applications, <a href="https://cfl.re/saas-security-whitepaper">read our whitepaper</a>.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare One Week]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[CASB]]></category>
            <category><![CDATA[Secure Web Gateway]]></category>
            <category><![CDATA[Connectivity Cloud]]></category>
            <guid isPermaLink="false">6kEpWG201kBCnNMiW0zTBW</guid>
            <dc:creator>Corey Mahan</dc:creator>
        </item>
        <item>
            <title><![CDATA[Launching In-Line Data Loss Prevention]]></title>
            <link>https://blog.cloudflare.com/inline-data-loss-prevention/</link>
            <pubDate>Mon, 20 Jun 2022 13:44:28 GMT</pubDate>
            <description><![CDATA[ In-line Data Loss Prevention is launching in the Cloudflare platform. Customers will be able to scan traffic to identify and protect sensitive data ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Data Loss Prevention (DLP) enables you to protect your data based on its characteristics — or <i>what it is</i>. Today, we are very excited to announce that Data Loss Prevention is arriving as a native part of the Cloudflare One platform. If you’re interested in early access, please see the bottom of this post!</p><p>In the process of building Cloudflare One's DLP solution, we talked to customers of all sizes and across dozens of industries. We focused on learning about their experiences, what products they are using, and what solutions they lack. The answers revealed significant customer challenges and frustrations. We are excited to deliver a product to put those problems in the past — and to do so as part of a comprehensive <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> solution.</p>
    <div>
      <h2>Customers are struggling to understand their data flow</h2>
      <a href="#customers-are-struggling-to-understand-their-data-flow">
        
      </a>
    </div>
    <p>Some customers have been using DLP solutions in their organizations for many years. They have deployed endpoint agents, crafted custom rulesets, and created incident response pipelines. Some built homemade tools to trace credit card numbers on the corporate network or rulesets to track hundreds of thousands of exact data match hashes.</p><p>Meanwhile, other customers are brand new to the space. They have small, scrappy teams supporting many IT and security functions. They do not have readily available resources to allocate to DLP and do not want to deprioritize other work to get started.</p><p>Still, many told the same story: the meteoric rise of SaaS tools left them unsure of where their data is moving and living. The migration of data off of corporate servers and into the cloud resulted in a loss of visibility and control. Even teams with established data protection programs strive for better visibility on the network. They are all asking the same types of questions:</p><ul><li><p>Where is the data going?</p></li><li><p>Are uploads and downloads moving to and from corporate or personal SaaS instances?</p></li><li><p>What applications are storing sensitive data?</p></li><li><p>Who has access to those applications?</p></li><li><p>Can we see and block large downloads from file repositories?</p></li></ul><p>Many customers seem to feel as though they have fallen behind because they haven't solved these problems — and yet many customers are reporting the exact same story. However, these struggles do not mean anyone is behind — just that a better solution is needed. This told us that building a DLP product was the right choice, but why build it within Cloudflare One?</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6ls1ret5yfTS7hcmorDTKD/231da9ba097568b5b12f68ecfad3603b/image2-20.png" />
            
            </figure>
    <div>
      <h2>How Data Loss Prevention ties in to Zero Trust</h2>
      <a href="#how-data-loss-prevention-ties-in-to-zero-trust">
        
      </a>
    </div>
    <p>A <a href="https://www.cloudflare.com/learning/access-management/what-is-ztna/">Zero Trust network architecture</a> is fundamentally designed to secure your data. By checking every attempt to access a protected app, machine, or remote desktop, your data is protected on the basis of identity and device posture. With DNS and HTTP filtering, your data is protected based on content category and reputation. By adding an API-driven <a href="https://www.cloudflare.com/learning/access-management/what-is-a-casb/">CASB</a>, your data is protected based on your applications’ configurations, too.</p><p>With each piece of the architecture, your data is protected based on a new identifier. The identifiers above help you understand: who accessed the data, who owned the device that accessed it, where the data went, and how the destination was configured. However, <i>what</i> was the data that was moved?</p><p><a href="https://www.cloudflare.com/learning/access-management/what-is-dlp/">Data Loss Prevention</a> enables you to protect your data based on its characteristics, or <i>what</i> it is. For example, sensitive or confidential data can be identified a number of ways, such as keywords, patterns, or file types. These indicators help you understand the information being transmitted across or out of the network.</p><p>With DLP embedded in Cloudflare One, you can combine these identifiers to create rules catered to your organization. You get to specify the who, how, where, and what that meets your needs. We aim to deliver a comprehensive, detailed understanding of your network and your data, as well as allow you to <a href="https://www.cloudflare.com/learning/access-management/how-to-implement-zero-trust/">easily implement protection</a>.</p>
    <div>
      <h2>How It Works</h2>
      <a href="#how-it-works">
        
      </a>
    </div>
    
    <div>
      <h3>First: Identify the Data</h3>
      <a href="#first-identify-the-data">
        
      </a>
    </div>
    <p>DLP Profiles are being added to the Zero Trust dashboard. These profiles are where you define what data you want to protect. You will be able to add keywords and craft regexes to identify the presence of sensitive data. Profiles for common detections, such as credit card numbers, will be provided by Cloudflare.</p>
    <div>
      <h3>Next: Create an HTTP Policy</h3>
      <a href="#next-create-an-http-policy">
        
      </a>
    </div>
    <p>After configuring a DLP Profile, you can then create a Cloudflare Gateway HTTP policy to allow or block the sensitive data from leaving your organization. Gateway will parse and scan your HTTP traffic for strings matching the keywords or regexes specified in the DLP profile.</p>
    <div>
      <h2>Why Cloudflare</h2>
      <a href="#why-cloudflare">
        
      </a>
    </div>
    <p>We know DLP is a big challenge to do comprehensively, and at scale. Those are the types of problems we excel at. Our network securely delivers traffic to 95% of the world’s Internet connected population within 50ms. It also supports our market leading <a href="https://www.cloudflare.com/zero-trust/solutions/">products</a> that send and protect customer traffic at unimaginable speed and scale. We are using that powerful network and our experience solving problems like this to take on Data Loss Prevention, and we’re very excited by our results</p>
    <div>
      <h2>Join the waitlist</h2>
      <a href="#join-the-waitlist">
        
      </a>
    </div>
    <p>We are launching a closed beta of our Data Loss Prevention product. If you’re interested in early access, you can join the waitlist today by filling out <a href="https://www.cloudflare.com/teams/lp/dlp/">this form</a>.</p>
    <div>
      <h2>What’s next?</h2>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>We’re just getting started with DLP! We already have many plans for growth and integration with other Cloudflare One products, such as Remote Browser Isolation.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare One Week]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Secure Web Gateway]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">1yHwA51prLzzToiLXe5wol</guid>
            <dc:creator>Noelle Kagan</dc:creator>
        </item>
        <item>
            <title><![CDATA[Announcing Cloudflare’s Data Loss Prevention platform]]></title>
            <link>https://blog.cloudflare.com/data-loss-prevention/</link>
            <pubDate>Wed, 24 Mar 2021 13:01:00 GMT</pubDate>
            <description><![CDATA[ Today, we’re excited to announce that your team can use Cloudflare’s network to build Zero Trust controls over the data in your enterprise - wherever it lives and however it moves. ]]></description>
            <content:encoded><![CDATA[ <p><i>This post is also available in </i><a href="/zh-cn/data-loss-prevention-zh-cn/"><i>简体中文</i></a><i>, </i><a href="/zh-tw/data-loss-prevention-zh-tw/"><i>繁體中文</i></a><i>, </i><a href="/ja-jp/data-loss-prevention-ja-jp/"><i>日本語</i></a><i>, </i><a href="/id-id/data-loss-prevention-id-id/"><i>Bahasa Indonesia</i></a><i>, </i><a href="/th-th/data-loss-prevention-th-th/"><i>ไทย</i></a><i>.</i></p><p>Today, we’re excited to announce that your team can use Cloudflare’s network to build Zero Trust controls over the data in your enterprise - wherever it lives and however it moves.</p><p>Stopping data loss is difficult for any team and that challenge has become harder as users have left offices and data has left on-premise storage centers. Enterprises can no longer build a simple castle-and-moat around their data. Users now connect from any location on the planet to applications that live in environments outside that enterprise’s control.</p><p>We have talked to hundreds of customers who have resorted to applying stopgap measures to try and maintain that castle-and-moat model in some form, but each of those band-aids slow down their users or drive up costs - or both. Almost all the short-term options available combine point solutions that ultimately force traffic to back haul through a central location.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3GoiSxQihfFMmceYtVmL0p/db7d2b668aaa8494f31d5f5e07c81906/Announcing-Cloudflare-s-Data-Loss-Prevention-platform-OG-blog-body-1.png" />
            
            </figure><p>Part of <a href="/cloudflare-one/">Cloudflare One</a>, Cloudflare’s approach to data loss prevention relies on the same infrastructure and global network that accelerates user traffic to the Internet to also perform inline inspection against all traffic regardless of how it arrives on our network.</p><p>We also know that enterprises need more than just scanning traffic for data strings. <a href="https://www.cloudflare.com/network-services/solutions/enterprise-network-security/">Keeping data safe</a> also requires having visibility into how it moves and being able to control who can reach it. Cloudflare One gives your team the ability to build <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> permissions in any workforce application and to log every request made to every data set without slowing users down.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4Byxdihnn3yuRbgGNiJuyo/783c15881f85516fbe7be7acec8a5fb5/image7-6.png" />
            
            </figure>
    <div>
      <h3>Step 1: Start with a complete audit trail</h3>
      <a href="#step-1-start-with-a-complete-audit-trail">
        
      </a>
    </div>
    <p>Visibility into a corporate network used to be easy. All of a company’s services lived in a private data center. Users connected from managed office networks or virtual private network (VPN) clients. Security teams could monitor every request because everything took place inside a corporate network that resembled a castle-and-moat.</p><p>When users left offices and applications shifted away from the data center, organizations lost visibility into the connections to sensitive data. Organizations who wanted to adopt an “assume breach” model struggled to determine what kind of data loss could even occur, so they threw every possible solution at the problem.</p><p>We talk to enterprises who purchase new scanning and filtering services, delivered in virtual appliances, for problems they are unsure they have. These deployments force users to back haul all traffic to the Internet, slowing down the experience for every team member, in an attempt to rebuild the visibility offered in that castle-and-moat model.</p><p>Over the last year, we launched the first phase of Cloudflare’s DLP solution to help teams solve that problem. You can now use Cloudflare’s network to capture and log every <a href="https://www.cloudflare.com/learning/dns/what-is-dns/">DNS query</a>, request, and file upload or download in your organization. Rather than slowing down your team, these features can accelerate how they can connect to both internally-managed and SaaS applications.</p><p>Building that level of visibility should not become a headache for administrators, either. Cloudflare’s DNS filter can be deployed to office networks and roaming devices in less than an hour. We built the DNS filtering solution on the same technology that powers 1.1.1.1, the world’s fastest DNS resolver, to accelerate end user experience too.</p><p>Next, teams can add context to all the traffic leaving their endpoints and devices by layering on Cloudflare’s <a href="https://www.cloudflare.com/learning/access-management/what-is-a-secure-web-gateway/">Secure Web Gateway</a> platform. Like the DNS filter and 1.1.1.1, we built our Gateway product after spending years improving a consumer equivalent, Cloudflare WARP.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2YQlauYlu7H6o5FWk9l0C/1acf3212ffa970a7463ea0cdf4b5b040/image3-28.png" />
            
            </figure><p>We also added new tools to help prevent cases where connections skip the DNS filter or Secure Web Gateway. Your team can capture the HTTP method, URL path, and other metadata about every request without on-premise appliances or traffic back haul.</p><p>Your team can <a href="/integrating-cloudflare-gateway-and-access/">build rules</a> that require every login to a SaaS application pass through Cloudflare’s network before a user signs in to your identity provider, ensuring you never have a blind spot over what data is being accessed. Finally, <a href="/integrating-cloudflare-gateway-and-access/">export</a> all DNS query and HTTP logs to the <a href="https://www.cloudflare.com/learning/security/what-is-siem/">SIEM</a> provider that your team already uses.</p>
    <div>
      <h3>Step 2: Add RBAC everywhere - even in the apps that lack it</h3>
      <a href="#step-2-add-rbac-everywhere-even-in-the-apps-that-lack-it">
        
      </a>
    </div>
    <p>Comprehensive logs help uncover potential breaches, but they also shine a light on how much data is available to everyone inside of your organization. We hear from customers who have information that lives in hundreds of applications and, in many cases, the default rule for most of those applications is to allow anyone in their team to reach any record.</p><p>With that rule as the default, every user account creates a larger attack surface for data loss - but the alternatives are hard or impossible. Configuring <a href="https://www.cloudflare.com/learning/access-management/role-based-access-control-rbac/">role-based access controls (RBAC)</a> in every application is tedious. Even worse, some applications lack the ability to create RBAC rules altogether.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5Vd0QP5jby3ZrqWFBfh1o5/8b6e83a5adab45d39f9d1966770b58e7/image6-14.png" />
            
            </figure><p>Today, you can deploy Cloudflare’s <a href="https://www.cloudflare.com/zero-trust/solutions/">Zero Trust platform</a> to build need-to-know rules in a single place - across all of your internally-managed and SaaS applications. In many cases, the first target for these rules is an organization’s  customer relationship management (CRM) system. A CRM contains data about buyers, accounts, and revenue. Some of those records are much more sensitive than others but users on other teams - marketing, legal, and finance, for instance -  can connect to anything in the application.</p><p>You can now use Cloudflare’s Secure Web Gateway to <a href="/gateway-swg-3/">create rules</a> that use your identity provider to restrict who can reach a specific part of any application, whether the application supports RBAC controls. If you want to allow team members to reach a record, but prevent users from downloading data, you can also <a href="https://developers.cloudflare.com/cloudflare-one/tutorials/block-uploads">control</a> who has permission to save data locally with file upload/download policies.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/9UkFcGLQ9Zvk9GbAvoF8G/3b74411e415de92b6f851873e48546b5/image4-28.png" />
            
            </figure><p>Some applications support this level of identity-based RBAC, but we also hear from customers who need more scrutiny for certain datasets. One example is the requirement of a hard key as a second factor method. You can also use Cloudflare’s Zero Trust platform to add additional requirements when a user connects to certain applications, like forcing a hard key or specifying allowed countries.</p><p>We know that URL paths are not always standard and that applications evolve. Coming soon, your team will be able to apply these same types of Zero Trust controls to the data sets in any application. Read on to learn more about what’s next and how these rules integrate with Cloudflare’s data inspection.</p>
    <div>
      <h3>Step 3: Build a data safety net for your external-facing applications</h3>
      <a href="#step-3-build-a-data-safety-net-for-your-external-facing-applications">
        
      </a>
    </div>
    <p>Controlling who can reach sensitive data assumes that the applications you control are not leaking data through other channels. Organizations try to solve this by assembling a patchwork of point solutions and processes to prevent accidental data loss from a forgotten API endpoint or a weak and reused password. These solutions require manual configuration for each application and cumbersome development practices that get ignored.</p><p>As part of today’s announcement, we’re launching a new feature in Cloudflare’s <a href="https://www.cloudflare.com/learning/ddos/glossary/web-application-firewall-waf/">Web Application (WAF)</a> to help teams solve this problem. You can now protect your application from external attacks and oversharing. You can use Cloudflare’s network to scan and block responses that contain data you never intend to send out from your application.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7zc2slAORaBQwBBbI9720r/2aa9b17fa8b7d69f7dbec16792b7e162/image1-36.png" />
            
            </figure><p>Administrators will be able to apply these new types of rules to any web resource protected by Cloudflare’s reverse proxy with just a few clicks. Once enabled, when your application responds to a request, Cloudflare’s network will check to see if the response contains data that should not leave that resource.</p><p>Unlike the point solutions this replaces, we do not want to burden your team with more work to manually classify data. At launch, we’ll provide patterns like credit card and social security numbers that you can enable. We’ll continue to add new patterns and the ability to search for specific data.</p>
    <div>
      <h3>Step 4: Stop enterprise data from leaving in any direction</h3>
      <a href="#step-4-stop-enterprise-data-from-leaving-in-any-direction">
        
      </a>
    </div>
    <p>When applications and users left the walls of the <a href="https://www.cloudflare.com/learning/network-layer/enterprise-networking/">enterprise network</a>, security teams had to compromise on how to keep data itself safe. Those teams have been left with a few disappointing options:</p><ul><li><p>Back haul all traffic through on-premise hardware appliances that scan all traffic before sending it out to the Internet. Slow down the entire Internet for their teams.</p></li><li><p>Purchase an expensive, out-of-band solution hosted in a handful of cloud environments that also scan for data and also slow down the Internet.</p></li><li><p>Do nothing and let users and potentially any data set reach the Internet.</p></li></ul><p>We’re excited to announce that, coming soon, you will be able to use Cloudflare’s network to scan all traffic leaving devices and locations for data loss without compromising performance. Cloudflare’s DLP capabilities apply standard, consistent rules around what data can leave your organization regardless of how that traffic arrived in our network.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3MGxPrb211WXlxLfwV5mQz/6e409e072e3193393dceeff8a8d77c8f/DLP.png" />
            
            </figure><p>Build rules in a single place that check data against common patterns like PII, against exact data sets that contain specific information you want to control, and using data labels. You can also combine these rules with other Zero Trust rules. For example, create a policy that prevents users outside a specific group from uploading a file that contains certain key phrases to any location other than your corporate cloud storage provider.</p><p>Unlike legacy point solutions to data loss, Cloudflare’s DLP runs inline on the same hardware that accelerates your traffic to the rest of the Internet. Cloudflare should not just help your team move to the Internet as a corporate network, it should be faster than the Internet. Our network is carrier-agnostic, exceptionally well-connected and peered, and delivers the same set of services globally. In each of these on-ramps, we can add better routing based on our Argo Smart Routing technology, which has been shown to reduce latency by 30% or more in the real-world.</p><p>When your users connect to an application on the Internet, Cloudflare’s WARP agent or our Magic Transit on-ramp establishes a secure connection to a Cloudflare data center in 200 cities around the world. That same data center checks the traffic against rules that block security threats, logs the event, and scans the data for patterns or exact criteria before using our global private backbone to accelerate that connection to its destination.</p>
    <div>
      <h3>What’s next?</h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>Your team can begin logging every request and applying RBAC controls to any application today within <a href="https://www.cloudflare.com/teams-pricing/">Cloudflare for Teams</a>. Organizations on the Teams Free plan have every feature they need to get started for up to 50 users.</p><p>Interested in scanning all data flows? Data scanning will be added to Cloudflare for Teams later this year. Join the <a href="http://cloudflare.com/teams/lp/dlp">waitlist now</a> to get started.</p><p>Data loss is just one risk to your organization that we’re using Cloudflare’s network to help solve. Stay tuned this week for daily announcements of new features that help your team stay secure without compromising performance or buying more hardware.</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Data Loss Prevention]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Secure Web Gateway]]></category>
            <category><![CDATA[Cloudflare Access]]></category>
            <guid isPermaLink="false">2omYSiWsu6lcczNMFVCGKA</guid>
            <dc:creator>Sam Rhea</dc:creator>
        </item>
        <item>
            <title><![CDATA[Export logs from Cloudflare Gateway with Logpush]]></title>
            <link>https://blog.cloudflare.com/export-logs-from-cloudflare-gateway-with-logpush/</link>
            <pubDate>Fri, 29 May 2020 11:00:00 GMT</pubDate>
            <description><![CDATA[ Automatically export DNS query logs from Cloudflare Gateway to your SIEM. ]]></description>
            <content:encoded><![CDATA[ <p>Like many people, I have spent a lot more time at home in the last several weeks. I use the free version of Cloudflare Gateway, part of Cloudflare for Teams, to secure the Internet-connected devices on my WiFi network. In the last week, Gateway has processed about 114,000 DNS queries from those devices and blocked nearly 100 as potential security risks.</p><p>I can search those requests in the Cloudflare for Teams UI. The logs capture the hostname requested, the time of the request, and Gateway’s decision to allow or block. This works fine for one-off investigations into a block, but does not help if I want to analyze the data more thoroughly. The last thing I want to do is click through hundreds or thousands of pages.</p><p>That problem is even more difficult for organizations attempting to keep hundreds or thousands of users and their devices secure. Whether they secure roaming devices with DoH or a static IP address, or keep users safe as they return to offices, deployments at that scale need a better option for auditing tens or hundreds of millions of queries each week.</p><p>Starting today, you can configure the automatic export of logs from Cloudflare Gateway to third-party storage destinations or security information and event management (SIEM) tools. Once exported, your team can analyze and audit the data as needed. The feature builds on the same robust <a href="/cloudflare-logpush-the-easy-way-to-get-your-logs-to-your-cloud-storage/">Cloudflare Logpush Service</a> that powers data export from Cloudflare’s infrastructure products.</p>
    <div>
      <h3>Cloudflare Gateway</h3>
      <a href="#cloudflare-gateway">
        
      </a>
    </div>
    <p>Cloudflare Gateway is one-half of Cloudflare for Teams, Cloudflare’s platform for securing users, devices, and data. With Cloudflare for Teams, our global network becomes your team’s network, replacing on-premise appliances and security subscriptions with a single solution delivered closer to your users - wherever they work.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1JWEZSrQR7ulD8aQN6c39H/30072a7998e10e7463681dad6ffee6cb/YwO4JZYUemcjuBKu4nT3Q-StBRocPnnsJb-yQk9t4NgVLdWoKpmrfmaKxJHM1i0m-7EdVRdjuJOkQggh8Y0nEhNjKEs8febz0nooNgRdyg5UCtHekla6aZRuVQiv.png" />
            
            </figure><p>As part of that platform, Cloudflare Gateway blocks threats on the public Internet from becoming incidents inside your organization. Gateway’s <a href="/protect-your-team-with-cloudflare-gateway/">first release</a> added DNS security filtering and content blocking to the world’s fastest DNS resolver, Cloudflare’s 1.1.1.1.</p><p><a href="https://developers.cloudflare.com/gateway/locations/setup-instructions/router/">Deployment</a> takes less than 5 minutes. Teams can secure entire office networks and segment traffic reports by location. For distributed organizations, Gateway can be deployed via MDM on networks that support IPv6 or using a dedicated IPv4 as part of a <a href="https://www.cloudflare.com/plans/enterprise/">Cloudflare Enterprise</a> account.</p><p>With secure DNS filtering, administrators can click a single button to block known threats, like sources of malware or phishing sites. Policies can be extended to block specific categories, like gambling sites or social media. When users request a filtered site, Gateway stops the DNS query from resolving and prevents the device from connecting to a malicious destination or hostname with blocked material.</p>
    <div>
      <h3>Cloudflare Logpush</h3>
      <a href="#cloudflare-logpush">
        
      </a>
    </div>
    <p>The average user makes about 5,000 DNS queries each day. For an organization with 1,000 employees, that produces 5M rows of data daily. That data includes regular Internet traffic, but also potential trends like targeted phishing campaigns or the use of cloud storage tools that are not approved by your IT organization.</p><p>The Cloudflare for Teams UI presents some summary views of that data, but each organization has different needs for audit, retention, or analysis. The best way to let you investigate the data in any way you need is to give you all of it. However the volume of data and how often you might need to review it means that API calls or CSV downloads are not suitable. A real logging pipeline is required.</p><p>Cloudflare Logpush solves that challenge. Cloudflare’s <a href="https://developers.cloudflare.com/logs/logpush/">Logpush Service</a> exports the data captured by Cloudflare’s network to storage destinations that you control. Rather than requiring your team to build a system to call Cloudflare APIs and pull data, Logpush routinely exports data with fields that you configure.</p><p>Cloudflare’s data team built the Logpush pipeline to make it easy to integrate with popular storage providers. Logpush supports AWS S3, Google Cloud Storage, Sumo Logic, and Microsoft Azure out of the box. Administrators can choose a storage provider, validate they own the destination, and configure exports of logs that will send deltas every five minutes from that point onward.</p>
    <div>
      <h3>How it works</h3>
      <a href="#how-it-works">
        
      </a>
    </div>
    <p>When enabled, you can navigate to a new section of the Logs component in the Cloudflare for Teams UI, titled “Logpush”. Once there, you’ll be able to choose which fields you want to export from Cloudflare Gateway and the storage destination.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6Oprf36DuhfSZ8FgwLqisq/319316faa12fc11f3520f8fb9bde4c92/image2-9.png" />
            
            </figure><p>The Logpush wizard will walk you through validating that you own the destination and configuring how you want folders to be structured. When saved, Logpush will send updated logs every five minutes to that destination. You can configure multiple destinations and monitor for any issues by returning to this section of the Cloudflare for Teams UI.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6t415R9imvFz1P1j5DGcBx/6af644eb6ded4511a15da901b29f11fb/image1-9.png" />
            
            </figure>
    <div>
      <h3>What’s next?</h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>Cloudflare’s Logpush Service is only available to customers on a contract plan. If you are interested in upgrading, please let us know. All Cloudflare for Teams plans include 30-days of data that can be searched in the UI.</p><p>Cloudflare Access, the other half of Cloudflare for Teams, <a href="/log-every-request-to-corporate-apps-no-code-changes-required/">also supports</a> granular log export. You can configure Logpush for Access in the Cloudflare dashboard that houses Infrastructure features like the WAF and CDN. We plan to migrate that configuration to this UI in the near future.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Cloudflare Gateway]]></category>
            <category><![CDATA[SIEM]]></category>
            <category><![CDATA[Secure Web Gateway]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <guid isPermaLink="false">2RtDiCAAPHHmt84TrHLlnm</guid>
            <dc:creator>Sam Rhea</dc:creator>
        </item>
    </channel>
</rss>