
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Sun, 05 Apr 2026 16:40:06 GMT</lastBuildDate>
        <item>
            <title><![CDATA[Moving from license plates to badges: the Gateway Authorization Proxy]]></title>
            <link>https://blog.cloudflare.com/gateway-authorization-proxy-identity-aware-policies/</link>
            <pubDate>Wed, 04 Mar 2026 06:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare’s Gateway Authorization Proxy adds support for identity-aware policies for clientless devices, securing virtual desktops, and guest networks without a device client. ]]></description>
            <content:encoded><![CDATA[ <p>We often talk about the "ideal" state, one where every device has a managed client like the <a href="https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/warp/"><u>Cloudflare One Client</u></a> installed, providing deep visibility and seamless protection. However, reality often gets in the way.</p><p>Sometimes you are dealing with a company acquisition, managing virtual desktops, or working in a highly regulated environment where you simply cannot install software on an endpoint. You still need to protect that traffic, even when you don’t fully manage the device.</p><p>Closing this gap requires moving the identity challenge from the device to the network itself. By combining the browser’s native proxy capabilities with our global network, we can verify users and enforce granular policies on any device that can reach the Internet. We’ve built the <a href="https://developers.cloudflare.com/cloudflare-one/networks/resolvers-and-proxies/proxy-endpoints/"><u>Gateway Authorization Proxy</u></a> and <a href="https://developers.cloudflare.com/cloudflare-one/networks/resolvers-and-proxies/proxy-endpoints/best-practices/"><u>Proxy Auto-Configuration (PAC) File Hosting</u></a> to automate this authentication and simplify how unmanaged devices connect to Cloudflare.</p>
    <div>
      <h3><b>The problem: sometimes IP addresses aren't enough</b></h3>
      <a href="#the-problem-sometimes-ip-addresses-arent-enough">
        
      </a>
    </div>
    <p>Back in 2022, we released <a href="https://developers.cloudflare.com/cloudflare-one/networks/resolvers-and-proxies/proxy-endpoints/#source-ip-endpoint"><u>proxy endpoints</u></a> that allowed you to route traffic through Cloudflare to apply filtering rules. It solved the immediate need for access, but it had a significant "identity crisis."</p><p>Because that system relied on static IP addresses to identify users, it was a bit like a security guard who only recognizes cars, not the people inside them. If a car (a specific IP) showed up, it was let in. But if the driver switched cars or worked from a different location, the guard got confused. This created a few major headaches:</p><ul><li><p><b>Anonymous Logs:</b> We knew the IP address, but we didn’t know the person.</p></li><li><p><b>Brittle Policies:</b> If a user moved to a new home or office, the endpoint broke or required an update.</p></li><li><p><b>Manual Maintenance:</b> You had to host your own PAC file (the "GPS" that tells your browser where the proxy is) — one more thing for your team to manage.</p></li></ul>
    <div>
      <h3><b>The solution: the Authorization Proxy</b></h3>
      <a href="#the-solution-the-authorization-proxy">
        
      </a>
    </div>
    
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4keaUmegcmKUc2WxgcbTym/50b4a5fd446a7ad5a3bd0e12d2d2fb8d/image2.png" />
          </figure><p><i>Authorization proxy Access policy setup page</i></p><p>The new <a href="https://developers.cloudflare.com/cloudflare-one/networks/resolvers-and-proxies/proxy-endpoints/"><u>Gateway Authorization Proxy</u></a> adds a "badge reader" at the entrance. Instead of just looking at where the traffic is coming from, we now use a Cloudflare Access-style login to verify who the user is, before enforcing Gateway filtering.</p><p>Think of this as moving from a guest list based on license plates, to a system where everyone has their own badge. This brings several massive benefits:</p><ul><li><p><b>True identity integration:</b> Your logs related to proxy endpoints now show exactly which user is accessing which site. You can write specific rules like "only the Finance team can access this accounting tool," even without a client installed on the device.</p></li><li><p><b>Multiple identity providers:</b> This is a superpower for large companies or those undergoing M&amp;A. You can choose which identity providers to show your users. You can display one or multiple login methods (like Okta and Azure AD) at the same time. This is a level of flexibility that competitors don't currently offer.</p></li><li><p><b>Simplified billing:</b> Each user simply occupies a "seat," exactly like they do with the Cloudflare One Client. There are no complicated new metrics to track.</p></li></ul><p>To make this possible, we had to overcome the technical hurdle of associating a user’s identity with every request, and without a device client. Read on to see how it works.</p>
    <div>
      <h3><b>How Authorization Proxy tracks identity</b></h3>
      <a href="#how-authorization-proxy-tracks-identity">
        
      </a>
    </div>
    <p>The Authorization Proxy uses signed JWT cookies to maintain identity, but there's a catch: when you first visit a new domain through the proxy, there's no cookie yet. Think of it like showing your badge at each new building you enter.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4ImFMDkJWfn6lAva3NtTzg/82d646b89e851e0826493e2a71f7c8fc/image3.png" />
          </figure><p>The flowchart above illustrates exactly how this authentication process works:</p><ul><li><p><b>First visit to a domain</b>: When you navigate to a new domain, the Gateway Authorization Proxy checks if a domain identity cookie is present. If not, you're redirected to Cloudflare Access, which then checks for an existing Cloudflare Access identity cookie. If you're already authenticated with Cloudflare Access, we generate a secure token specifically for that domain. If you're not, we redirect you to login with your identity provider(s).</p></li><li><p><b>Invisible to users</b>: This entire process happens in milliseconds thanks to Cloudflare's global edge network. The redirect is so fast that users don't notice it — they simply see their page load normally.</p></li><li><p><b>Repeat visits are instant</b>: Once the cookie is set, all subsequent requests to that domain (and its subdomains) are immediately authorized. No more redirects needed.</p></li></ul><p>Because of this approach, we can log and filter traffic per person across all domains they access, and revoke access in an instant when needed — all without requiring any software installation on the user's device.</p>
    <div>
      <h3><b>No more hosting your own PAC files</b></h3>
      <a href="#no-more-hosting-your-own-pac-files">
        
      </a>
    </div>
    <p>We are also taking the "homework" out of the setup process. You can now host your PAC files directly on Cloudflare, using <a href="https://developers.cloudflare.com/cloudflare-one/networks/resolvers-and-proxies/proxy-endpoints/best-practices/"><u>Proxy Auto-Configuration (PAC) File Hosting</u></a>.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4KnkVcR1Kq6BbFxPbLezRO/89c6a69adc62105b9c9344c24df69a36/image4.png" />
          </figure><p><i>PAC file configuration page</i></p><p>To make it easy, we have included starter templates to get you up and running in minutes. We have also integrated our AI assistant, Cloudy, to provide summaries that help you understand exactly what your PAC file is doing, without having to read through lines of code.</p>
    <div>
      <h3><b>Is this right for your team?</b></h3>
      <a href="#is-this-right-for-your-team">
        
      </a>
    </div>
    <p>While we still recommend the Cloudflare One Client for greater control and the best user experience, the Auth Proxy is the perfect fit for specific scenarios:</p><ul><li><p><b>Virtual desktops (VDI):</b> Environments where users log into a virtual machine and use a browser to reach the Internet.</p></li><li><p><b>Mergers and acquisitions:</b> When you need to bring two different companies under one security umbrella quickly.</p></li><li><p><b>Compliance constraints:</b> When you are legally or technically prohibited from installing software on an endpoint.</p></li></ul>
    <div>
      <h3><b>What’s next?</b></h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>This expands our clientless security options to connect to Cloudflare One, and we are already working on expanding our supported identity methods related to Authorization Endpoints. Look out for Kerberos, mTLS, and traditional username/password authentication to give you even more flexibility in how you authenticate your users.</p><p>The <a href="https://developers.cloudflare.com/cloudflare-one/networks/resolvers-and-proxies/proxy-endpoints/#authorization-endpoint"><u>Gateway Authorization Proxy</u></a> and <a href="https://developers.cloudflare.com/cloudflare-one/networks/resolvers-and-proxies/proxy-endpoints/best-practices/"><u>PAC File Hosting</u></a> are available in open beta today for all account types. You can get started by going to the "Resolvers and Proxies" section of your Cloudflare dashboard.</p> ]]></content:encoded>
            <category><![CDATA[SASE]]></category>
            <category><![CDATA[Secure Web Gateway]]></category>
            <category><![CDATA[Cloudflare Gateway]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <guid isPermaLink="false">2K6ieiC5putSKvW7Jg65kR</guid>
            <dc:creator>Ankur Aggarwal</dc:creator>
            <dc:creator>Alex Holland</dc:creator>
        </item>
        <item>
            <title><![CDATA[Introducing simple and secure egress policies by hostname in Cloudflare’s SASE platform]]></title>
            <link>https://blog.cloudflare.com/egress-policies-by-hostname/</link>
            <pubDate>Mon, 07 Jul 2025 13:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare's SASE platform now offers egress policies by hostname, domain, content category, and application in open beta. ]]></description>
            <content:encoded><![CDATA[ <p>Cloudflare’s <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/"><u>SASE</u></a> platform is on a mission to strengthen our platform-wide support for hostname- and domain-based policies. This mission is being driven by enthusiastic demands from our customers, and boosted along the way by several interesting engineering challenges. Today, we’re taking a deep dive into the first milestone of this mission, which we recently released in open beta: <a href="https://developers.cloudflare.com/cloudflare-one/policies/gateway/egress-policies/"><u>egress policies</u></a> by hostname, domain, <a href="https://developers.cloudflare.com/cloudflare-one/policies/gateway/domain-categories/#content-categories"><u>content category</u></a>, and <a href="https://developers.cloudflare.com/cloudflare-one/policies/gateway/application-app-types/"><u>application</u></a>. Let’s dive right in! </p>
    <div>
      <h2>Egress policies and IP ACLs</h2>
      <a href="#egress-policies-and-ip-acls">
        
      </a>
    </div>
    <p>Customers use our <a href="https://developers.cloudflare.com/learning-paths/secure-internet-traffic/build-egress-policies/"><u>egress policies</u></a> to control how their organization's Internet traffic connects to external services. An egress policy allows a customer to control the source IP address their traffic uses, as well as the geographic location that their traffic uses to egress onto the public Internet. Control of the source IP address is especially useful when accessing external services that apply policies to traffic based on source IPs, using IP Access Control Lists (ACLs). Some services use IP ACLs because they improve security, while others use them because they are explicitly required by regulation or compliance frameworks. </p><p>(That said, it's important to clarify that we do not recommend relying on IP ACLs as the only security mechanism used to gate access to a resource. Instead, IP ACLs should be used in combination with strong authentication like <a href="https://www.cloudflare.com/learning/access-management/what-is-sso/"><u>Single Sign On (SSO)</u></a>, <a href="https://www.cloudflare.com/learning/access-management/what-is-multi-factor-authentication/"><u>Multi Factor Authentication (MFA)</u></a>, <a href="https://fidoalliance.org/passkeys/"><u>passkeys</u></a>, etc.).</p><p>Let’s make the use case for egress policies more concrete with an example. </p><p>Imagine that Acme Co is a company that has purchased its own <a href="https://developers.cloudflare.com/cloudflare-one/policies/gateway/egress-policies/dedicated-egress-ips/"><u>dedicated egress</u></a> IP address <code>203.0.113.9</code> from Cloudflare. Meanwhile, imagine a regulated banking application (<code>https://bank.example.com</code><u>)</u> that only grants access to the corporate account for Acme Co when traffic originates from source IP address <code>203.0.113.9</code>. Any traffic with a different source IP will be prevented from accessing Acme Co’s corporate account. In this way, the banking application uses IP ACLs to ensure that only employees from Acme Co can access Acme Co’s corporate account. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7KwZQRJksemP5QwXzT0S2P/2a45d3ac7581da31485a6d15c5ba6b03/image3.png" />
          </figure>
    <div>
      <h2>Egress policies by hostname</h2>
      <a href="#egress-policies-by-hostname">
        
      </a>
    </div>
    <p>Continuing our example, suppose that Acme Co wants to ensure that the banking application is off limits to all of its employees except those on its finance team. To accomplish this, Acme Co wants to write an egress policy that allows members of the finance team to egress from <code>203.0.113.9</code> when accessing <code>https://bank.example.com</code>, but employees outside of finance will not egress from <code>203.0.113.9</code> when attempting to access <code>https://bank.example.com</code>.  </p><p>As shown in the figure above, the combination of the banking application's IP ACLs and Acme Co’s egress policies ensures that <code>https://bank.example.com</code> is only accessible to its finance employees at Acme Co. </p><p>While this all sounds great, until now, this scenario was fairly difficult to achieve on <a href="https://www.cloudflare.com/zero-trust/products/"><u>Cloudflare’s SASE platform</u></a>. While we have long supported <a href="https://developers.cloudflare.com/cloudflare-one/policies/gateway/egress-policies/"><u>egress policies</u></a> by user groups and other user attributes, we did not support writing egress policies by hostname. Instead, customers had to resort to writing egress policies by destination IP addresses.</p><p>To understand why customers have been clamoring for egress policies by hostname, let’s return to our example: </p><p>In our example, Acme Co wants to write a policy that allows only the finance team to access <code>https://bank.example.com</code>. In the past, in the absence of egress policies by hostname, Acme Co would need to write its egress policy in terms of the destination IP address of the banking application. </p><p>But how does Acme Co know the destination IP address of this banking application? The first problem is that the destination IP address belongs to an external service that is not controlled by Acme Co, and the second problem is that this IP address could change frequently, especially if the banking application uses <a href="https://en.wikipedia.org/wiki/Ephemeral_architecture"><u>ephemeral infrastructure</u></a> or sits behind a <a href="https://www.cloudflare.com/learning/cdn/glossary/reverse-proxy/"><u>reverse proxy</u></a> or <a href="https://www.cloudflare.com/learning/cdn/what-is-a-cdn/"><u>CDN</u></a>. Keeping up with changes to the destination IP address of an external service led some of our customers to write their own homegrown scripts that continuously update destination <a href="https://developers.cloudflare.com/cloudflare-one/policies/gateway/lists/"><u>IP Lists</u></a> which are then fed to our egress policies using Cloudflare’s <a href="https://developers.cloudflare.com/api/resources/zero_trust/"><u>API</u></a>.</p><p>With this new feature, we do away with all these complications and simply allow our customers to write egress policies by hostname. </p>
    <div>
      <h2>Egress policies by domains, categories and applications too</h2>
      <a href="#egress-policies-by-domains-categories-and-applications-too">
        
      </a>
    </div>
    <p>Before we continue, we should note that this new feature also supports writing egress policies by:</p><ul><li><p>Domain: For example, we can now write an egress policy for <code>*.bank.example.com</code>, rather than an individual policy for each hostname (<code>bank.example.com</code>, <code>app.acmeco.bank.example.com</code>, <code>auth.bank.example.com</code>, etc.)</p></li><li><p>Category: For example, we can now write a single egress policy to control the egress IP address that employees use when accessing a site in the Cryptocurrency content category, rather than an individual policy for every Cryptocurrency website.</p></li><li><p>Application: For example, we can write a single egress policy for Slack, without needing to know all the different host and domain names (e.g. <code>app.slack.com</code>, <code>slack.com</code>, <code>acmeco.slack.com</code>, <code>slack-edge.com</code>) that Slack uses to serve its application.</p></li></ul><p>Here’s an example of writing an egress policy by application:</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1so8jKsDbeWSfJAxh3yE9V/176e682aa1b0617fde4dd90732930460/image6.png" />
          </figure><p><sup><i>A view of the Cloudflare </i></sup><a href="https://dash.cloudflare.com/"><sup><i><u>dashboard</u></i></sup></a><sup><i> showing how to write an egress policy for a set of users and Applications. The policy is applied to users in the “finance” user group when accessing Applications including Microsoft Team, Slack, BambooHR and Progressive, and it determines the source IP that traffic uses when it egresses to the public Internet.</i></sup></p>
    <div>
      <h2>Why was this so hard to build?</h2>
      <a href="#why-was-this-so-hard-to-build">
        
      </a>
    </div>
    <p>Now let’s get into the engineering challenges behind this feature.</p><p>Egress polices are part of<a href="https://www.cloudflare.com/products/zero-trust/gateway/"> <u>Cloudflare Gateway</u></a>. Cloudflare Gateway is a<a href="https://www.cloudflare.com/learning/access-management/what-is-a-secure-web-gateway/"> <u>Secure Web Gateway (SWG)</u></a> that operates as both a <a href="https://www.cloudflare.com/learning/ddos/glossary/open-systems-interconnection-model-osi/"><u>layer 4 (L4)</u></a> and <a href="https://www.cloudflare.com/learning/ddos/glossary/open-systems-interconnection-model-osi/"><u>layer 7 (L7)</u></a> <a href="https://developers.cloudflare.com/learning-paths/replace-vpn/configure-device-agent/enable-proxy/"><u>proxy</u></a>. In other words, Cloudflare Gateway intercepts traffic by inspecting it at the transport layer (layer 4, including TCP and UDP), as well as at the application layer (layer 7, including HTTP).</p><p>The problem is that egress policies must necessarily be evaluated at layer 4, rather than at layer 7. Why? Because egress policies are used to select the source IP address for network traffic, and Cloudflare Gateway must select the source IP address for traffic <i>before</i> it creates the connection to the external service <code>bank.example.com</code>. If Gateway changes the source IP address in the middle of the connection, the connection will be broken. Therefore, Gateway must apply egress policies before it sends the very first packet in the connection. For instance, Gateway must apply egress policies before it sends the TCP SYN, which of course happens well before it sends any layer 7 information (e.g. HTTP). (See <a href="https://developers.cloudflare.com/cloudflare-one/policies/gateway/order-of-enforcement/"><u>here</u></a> for more information on Gateway’s order of enforcement for its policies.)</p><p>The bottom line is that Gateway has no other information to use when applying the egress policy, other than the information in the IP header and the L4 (e.g. TCP) header of an IP packet. As you can see for the TCP/IPv4 packet below, a destination hostname is not part of the IP or TCP header in a packet. That's why we previously were not able to support egress policies by hostname, and instead required administrators to write egress policies by destination IP address.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5LS9YhSoRJzwBG18wt55Fa/e0a7251ef8a7fe15c9c3ccc42b0e7fb6/image4.png" />
          </figure>
    <div>
      <h2>So how did we build the feature?</h2>
      <a href="#so-how-did-we-build-the-feature">
        
      </a>
    </div>
    <p>We took advantage of the fact that <a href="https://developers.cloudflare.com/cloudflare-one/policies/gateway/"><u>Cloudflare Gateway</u></a> also operates its own <a href="https://www.cloudflare.com/learning/access-management/what-is-dns-filtering/"><u>DNS resolver</u></a>. Every time an end user wants to access a destination hostname, the Gateway resolver first receives a DNS query for that hostname before sending its network traffic to the destination hostname. </p><p>To support egress policies by hostname, Gateway associates the DNS query for the hostname with the IP address  and TCP/UDP information in the network connection to the hostname. Specifically, Gateway will map the destination IP address in the end-user’s network connection to the hostname in the DNS query using a “synthetic IP” mechanism that is best explained using a diagram:</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4cyJ0nD9cpXDqmo7FQJ0Ew/f9d93a8721645845c2036021dad57c27/image2.png" />
          </figure><p>Let’s walk through the flow:</p><p>1. When the end user makes a DNS query for <code>bank.example.com</code>, that DNS query is sent to the Gateway resolver.</p><p>2. The Gateway resolver does a public DNS lookup to associate bank.example.com to its destination IP address, which is <code>96.7.128.198</code>.</p><p>3. However, the Gateway resolver will not respond to the DNS query using the real destination IP <code>96.7.128.198</code>. Instead, it responds with an <i>initial resolved IP address</i> of <code>100.80.10.10</code>. This is not the real IP address for <code>bank.example.com</code>; instead, it acts as a tag that allows Gateway to identify network traffic destined to <code>bank.example.com</code>.  The initial resolved IP is randomly selected and temporarily assigned from one of the two IP address ranges below, which correspond to the Carrier Grade Network Address Translation (CGNAT) IP address spaces as defined in <a href="https://datatracker.ietf.org/doc/html/rfc6598"><u>RFC 6598</u></a> and <a href="https://datatracker.ietf.org/doc/rfc6264/"><u>RFC 6264</u></a>, respectively.</p><p>IPv4: 100.80.0.0/16</p><p>IPv6: 2606:4700:0cf1:4000::/64 </p><p>4. Gateway has now associated the initial resolved IP address <code>100.80.10.10</code>, with the hostname <code>bank.example.com</code>. Thus, when Gateway now sees network traffic to destination IP address <code>100.80.10.10</code>, Gateway recognizes it and applies the egress policy for bank.example.com. </p><p>5. After applying the egress policy, Gateway will rewrite the initially resolved address IP <code>100.80.10.10</code>, on the network traffic with the actual IP address <code>96.7.128.198</code> for <code>bank.example.com</code>, and send it out the egress IP address so that it can reach its destination.</p><p>The network traffic now has the correct destination IP address, and egresses according to the policy for bank.example.com, and all is well! </p>
    <div>
      <h2>Making it work for domains, categories and applications</h2>
      <a href="#making-it-work-for-domains-categories-and-applications">
        
      </a>
    </div>
    <p>So far, we’ve seen how the mechanism works with individual hostnames (i.e. Fully Qualified Domain Names (FQDNs) like <code>bank.example.com</code><u>)</u>. What about egress policies for domains and subdomains like <code>*.bank.example.com</code>? What about <a href="https://developers.cloudflare.com/cloudflare-one/policies/gateway/domain-categories/#content-categories"><u>content categories</u></a> and <a href="https://developers.cloudflare.com/cloudflare-one/policies/gateway/application-app-types/"><u>applications</u></a>, which are essentially sets of hostnames grouped together?</p><p>We are able to support these use cases because (returning to our example above) Gateway temporarily assigns the initial resolved IP address <code>100.80.10.10</code> to the hostname <code>bank.example.com</code> for a short period of time. After this short time period, the initial resolved IP address is released and returned into the pool of available addresses (in <code>100.80.0.0/16</code>), where it can be assigned to another hostname in the future.</p><p>In other words, we use a random dynamic assignment of initial resolved IP addresses, rather than statically associating a single initial resolved IP address with a single hostname. The result is that we can apply IPv4 egress policies to a very large number of hostnames, rather than being limited by the 65,536 IP addresses available in the <code>100.80.0.0/16</code> IPv4 address block.</p><p>Randomly assigning the initial resolved IP address also means that we can apply a single egress policy for a wildcard like <code>*.bank.example.com</code> to any traffic we happen to come across, such as traffic for <code>acmeco.bank.example.com</code> or <code>auth.bank.example.com</code>. A static mapping would require the customer to write a different policy for each individual hostname, which is clunkier and more difficult to manage.</p><p>Thus, by using dynamic assignments of initial resolved IP addresses, we simplify our customers’ egress policies and all is well!</p><p>Actually, not quite. There’s one other problem we need to solve.</p>
    <div>
      <h2>Landing on the same server</h2>
      <a href="#landing-on-the-same-server">
        
      </a>
    </div>
    <p>Cloudflare has an <a href="https://www.cloudflare.com/network"><u>extensive global network</u></a>, with servers running our software stack in over 330 cities in 125 countries. Our architecture is such that sharing strongly-consistent storage across those servers (even within a single data center) comes with some performance and reliability costs. For this reason, we decided to build this feature under the assumption that state could not be shared between any Cloudflare servers, even servers in the same data center.</p><p>This assumption created an interesting challenge for us. Let’s see why.</p><p>Returning to our running example, suppose that the end user’s DNS traffic lands on one Cloudflare server while the end user’s network traffic lands on a different Cloudflare server. Those servers do not share state.  Thus, it’s not possible to associate the mapping from hostname to its actual destination IP address (<code>bank.example.com</code> = <code>96.7.128.198</code>) which was obtained from the DNS traffic, with the initial resolved IP that is used by the network traffic (i.e. <code>100.80.10.10</code>). Our mechanism would break down and traffic would be dropped, as shown in the figure below.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/76uOsvToz6PnHVjprOKYGy/d978576f2a1d8b6a246431035ecf7a30/Landing_on_the_same_server.png" />
          </figure><p>We solve this problem by ensuring that DNS traffic and network traffic land on the same Cloudflare server. In particular, we require DNS traffic to go into the same tunnel as network traffic so that both traffic flows land on the same Cloudflare server. For this reason, egress policies by hostname are only supported when end users connect to the Cloudflare network using one of the following on-ramps:</p><ul><li><p>The WARP client (which we recently <a href="https://developers.cloudflare.com/cloudflare-one/changelog/warp/#2025-05-14"><u>upgraded</u></a> to send <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/warp-architecture/#overview"><u>DNS traffic inside the WARP tunnel</u></a>)</p></li><li><p>PAC files</p></li><li><p>Browser Isolation</p></li></ul><p>We are actively working to expand support of this feature to more onramps. </p>
    <div>
      <h2>What’s next?</h2>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>There’s a lot more coming. Besides expanding support for more onramps, we also plan to extend this support to hostname-based rulesets in more parts of Cloudflare’s SASE. Stand by for more updates from us on this topic. All of these new features will rely on the “initial resolved IP” mechanism that we described above, empowering our customers to simplify their rulesets and enforce tighter security policies in their Cloudflare SASE deployments.</p><p>Don't wait to gain granular control over your network traffic: log in to your Cloudflare <a href="https://dash.cloudflare.com/"><u>dashboard</u></a> to explore the beta release of <a href="https://developers.cloudflare.com/cloudflare-one/policies/gateway/egress-policies/"><u>egress policies</u></a> by hostname / domain / category / application and bolster your security strategy with <a href="https://developers.cloudflare.com/reference-architecture/diagrams/sase/"><u>Cloudflare SASE</u></a>.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare Gateway]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Egress]]></category>
            <category><![CDATA[SASE]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Access Control Lists (ACLs)]]></category>
            <category><![CDATA[Categories]]></category>
            <category><![CDATA[Hostnames]]></category>
            <guid isPermaLink="false">1NxtPefzr7flsiIe8gZ43L</guid>
            <dc:creator>Ankur Aggarwal</dc:creator>
            <dc:creator>Sharon Goldberg</dc:creator>
            <dc:creator>João Paiva</dc:creator>
            <dc:creator>Alyssa Wang</dc:creator>
        </item>
        <item>
            <title><![CDATA[Security Week 2024 wrap up]]></title>
            <link>https://blog.cloudflare.com/security-week-2024-wrap-up/</link>
            <pubDate>Mon, 11 Mar 2024 14:00:05 GMT</pubDate>
            <description><![CDATA[ A summary of the blog posts and product announcements released during Security Week 2024 ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1ziJdd54D7lhcTnOu7hPK1/a2aac4fd6b20f12106e557a8e4579a42/image2-29.png" />
            
            </figure><p>The next 12 months have the potential to reshape the global political landscape with elections occurring in more than 80 nations, in 2024, while new technologies, such as AI, capture our imagination and pose new security challenges.</p><p>Against this backdrop, the role of CISOs has never been more important. <a href="/why-i-joined-cloudflare-as-chief-security-officer">Grant Bourzikas</a>, Cloudflare’s Chief Security Officer, shared his views on what the biggest challenges currently facing the security industry are in the Security Week opening <a href="/welcome-to-security-week-2024">blog</a>.</p><p>Over the past week, we announced a number of new products and features that align with what we believe are <a href="https://www.cloudflare.com/ciso/">the most crucial challenges for CISOs</a> around the globe. We released features that span Cloudflare’s product portfolio, ranging from application security to securing employees and cloud infrastructure. We have also published a few stories on how we take a Customer Zero approach to using Cloudflare services to manage security at Cloudflare.</p><p>We hope you find these stories interesting and are excited by the new Cloudflare products. In case you missed any of these announcements, here is a recap of <a href="https://www.cloudflare.com/security-week/">Security Week</a>:</p>
    <div>
      <h3>Responding to opportunity and risk from AI</h3>
      <a href="#responding-to-opportunity-and-risk-from-ai">
        
      </a>
    </div>
    
<table>
<thead>
  <tr>
    <th><span>Title</span></th>
    <th><span>Excerpt</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/firewall-for-ai/"><span>Cloudflare announces Firewall for AI</span></a></td>
    <td><span>Cloudflare announced the development of Firewall for AI, a protection layer that can be deployed in front of Large Language Models (LLMs) to identify abuses and attacks. </span></td>
  </tr>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/defensive-ai/"><span>Defensive AI: Cloudflare’s framework for defending against next-gen threats</span></a></td>
    <td><span>Defensive AI is the framework Cloudflare uses when integrating intelligent systems into its solutions. Cloudflare’s AI models look at customer traffic patterns, providing that organization with a tailored defense strategy unique to their environment. </span></td>
  </tr>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/security-analytics-ai-assistant/"><span>Cloudflare launches AI Assistant for Security Analytics </span></a></td>
    <td><span>We released a natural language assistant as part of Security Analytics. Now it is easier than ever to get powerful insights about your applications by exploring log and security events using the new natural language query interface.</span></td>
  </tr>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/dispelling-the-generative-ai-fear-how-cloudflare-secures-inboxes-against-ai-enhanced-phishing/"><span>Dispelling the Generative AI fear: how Cloudflare secures inboxes against AI-enhanced phishing</span></a></td>
    <td><span>Generative AI is being used by malicious actors to make phishing attacks much more convincing. Learn how Cloudflare’s email security systems are able to see past the deception using advanced machine learning models.</span></td>
  </tr>
</tbody>
</table>
    <div>
      <h3>Maintaining visibility and control as applications and clouds change</h3>
      <a href="#maintaining-visibility-and-control-as-applications-and-clouds-change">
        
      </a>
    </div>
    
<table>
<thead>
  <tr>
    <th><span>Title</span></th>
    <th><span>Excerpt</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/introducing-magic-cloud-networking"><span>Magic Cloud Networking simplifies security, connectivity, and management of public clouds</span></a></td>
    <td><span>Introducing Magic Cloud Networking, a new set of capabilities to visualize and automate cloud networks to give our customers easy, secure, and seamless connection to public cloud environments.</span></td>
  </tr>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/security-insights-quick-ciso-view/"><span>Secure your unprotected assets with Security Center: quick view for CISOs</span></a></td>
    <td><span>Security Center now includes new tools to address a common challenge: ensuring comprehensive deployment of Cloudflare products across your infrastructure. Gain precise insights into where and how to optimize your security posture.</span></td>
  </tr>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/dlp-ocr-sourcecode/"><span>Announcing two highly requested DLP enhancements: Optical Character Recognition (OCR) and Source Code Detections</span></a></td>
    <td><span>Cloudflare One now supports Optical Character Recognition and detects source code as part of its Data Loss Prevention service. These two features make it easier for organizations to protect their sensitive data and reduce the risks of breaches.</span></td>
  </tr>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/cf1-user-risk-score/"><span>Introducing behavior-based user risk scoring in Cloudflare One</span></a></td>
    <td><span>We are introducing user risk scoring as part of Cloudflare One, a new set of capabilities to detect risk based on user behavior, so that you can improve security posture across your organization.</span></td>
  </tr>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/eliminate-vpn-vulnerabilities-with-cloudflare-one/"><span>Eliminate VPN vulnerabilities with Cloudflare One</span></a></td>
    <td><span>The Cybersecurity &amp; Infrastructure Security Agency issued an Emergency Directive due to the Ivanti Connect Secure and Policy Secure vulnerabilities. In this post, we discuss the threat actor tactics exploiting these vulnerabilities and how Cloudflare One can mitigate these risks. </span></td>
  </tr>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/zero-trust-warp-with-a-masque/"><span>Zero Trust WARP: tunneling with a MASQUE</span></a></td>
    <td><span>This blog discusses the introduction of MASQUE to Zero Trust WARP and how Cloudflare One customers will benefit from this modern protocol. </span></td>
  </tr>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/collect-all-your-cookies-in-one-jar/"><span>Collect all your cookies in one jar with Page Shield Cookie Monitor</span></a></td>
    <td><span>Protecting online privacy starts with knowing what cookies are used by your websites. Our client-side security solution, Page Shield, extends transparent monitoring to HTTP cookies.</span></td>
  </tr>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/gatway-protocol-detection"><span>Protocol detection with Cloudflare Gateway</span></a><span> </span></td>
    <td><span>Cloudflare Secure Web Gateway now supports the detection, logging, and filtering of network protocols using packet payloads without the need for inspection. </span></td>
  </tr>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/threat-intel-rfi-pir/"><span>Introducing Requests for Information (RFIs) and Priority Intelligence Requirements (PIRs) for threat intelligence teams</span></a></td>
    <td><span>Our Security Center now houses Requests for Information and Priority Intelligence Requirements. These features are available via API as well and Cloudforce One customers can start leveraging them today for enhanced security analysis. </span></td>
  </tr>
</tbody>
</table>
    <div>
      <h3>Consolidating to drive down costs</h3>
      <a href="#consolidating-to-drive-down-costs">
        
      </a>
    </div>
    
<table>
<thead>
  <tr>
    <th><span>Title</span></th>
    <th><span>Excerpt</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/log-explorer/"><span>Log Explorer: monitor security events without third-party storage</span></a></td>
    <td><span>With the combined power of Security Analytics and Log Explorer, security teams can analyze, investigate, and monitor logs natively within Cloudflare, reducing time to resolution and overall cost of ownership by eliminating the need of third-party logging systems.</span></td>
  </tr>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/deskope-program-and-asdp-for-descaler/"><span>Simpler migration from Netskope and Zscaler to Cloudflare: introducing Deskope and a Descaler partner update</span></a></td>
    <td><span>Cloudflare expands the Descaler program to Authorized Service Delivery Partners (ASDPs). Cloudflare is also launching Deskope, a new set of tooling to help migrate existing Netskope customers to Cloudflare One.</span></td>
  </tr>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/protecting-apis-with-jwt-validation/"><span>Protecting APIs with JWT Validation</span></a></td>
    <td><span>Cloudflare customers can now protect their APIs from broken authentication attacks by validating incoming JSON Web Tokens with API Gateway.</span></td>
  </tr>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/announcing-express-cni"><span>Simplifying how enterprises connect to Cloudflare with Express Cloudflare Network Interconnect</span></a></td>
    <td><span>Express Cloudflare Network Interconnect makes it fast and easy to connect your network to Cloudflare. Customers can now order Express CNIs directly from the Cloudflare dashboard.</span></td>
  </tr>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/treating-sase-anxiety/"><span>Cloudflare treats SASE anxiety for VeloCloud customers</span></a></td>
    <td><span>The turbulence in the SASE market is driving many customers to seek help. We’re doing our part to help VeloCloud customers who are caught in the crosshairs of shifting strategies.</span></td>
  </tr>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/free-network-monitoring-for-enterprise"><span>Free network flow monitoring for all enterprise customers</span></a></td>
    <td><span>Announcing a free version of Cloudflare’s network flow monitoring product, Magic Network Monitoring. Now available to all Enterprise customers.</span></td>
  </tr>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/guide-to-cloudflare-pages-and-turnstile-plugin/"><span>Building secure websites: a guide to Cloudflare Pages and Turnstile Plugin</span></a></td>
    <td><span>Learn how to use Cloudflare Pages and Turnstile to deploy your website quickly and easily while protecting it from bots, without compromising user experience. </span></td>
  </tr>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/waf-content-scanning-for-malware-detection/"><span>General availability for WAF Content Scanning for file malware protection</span></a></td>
    <td><span>Announcing the General Availability of WAF Content Scanning, protecting your web applications and APIs from malware by scanning files in-transit.</span></td>
  </tr>
</tbody>
</table>
    <div>
      <h3>How can we help make the Internet better?</h3>
      <a href="#how-can-we-help-make-the-internet-better">
        
      </a>
    </div>
    
<table>
<thead>
  <tr>
    <th><span>Title</span></th>
    <th><span>Excerpt</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/protecting-global-democracy-against-threats-from-emerging-technology"><span>Cloudflare protects global democracy against threats from emerging technology during the 2024 voting season</span></a></td>
    <td><span>At Cloudflare, we’re actively supporting a range of players in the election space by providing security, performance, and reliability tools to help facilitate the democratic process.</span></td>
  </tr>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/navigating-the-maze-of-magecart/"><span>Navigating the maze of Magecart: a cautionary tale of a Magecart impacted website</span></a></td>
    <td><span>Learn how a sophisticated Magecart attack was behind a campaign against e-commerce websites. This incident underscores the critical need for a strong client side security posture.</span></td>
  </tr>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/building-urlscanner/"><span>Cloudflare’s URL Scanner, new features, and the story of how we built it</span></a></td>
    <td><span>Discover the enhanced URL Scanner API, now integrated with the Security Center Investigate Portal. Enjoy unlisted scans, multi-device screenshots, and seamless integration with the Cloudflare ecosystem. </span></td>
  </tr>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/secure-by-design-principles/"><span>Changing the industry with CISA’s Secure by Design principles</span></a></td>
    <td><span>Security considerations should be an integral part of software’s design, not an afterthought. Explore how Cloudflare adheres to Cybersecurity &amp; Infrastructure Security Agency’s Secure by Design principles to shift the industry.</span></td>
  </tr>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/pq-2024/"><span>The state of the post-quantum Internet</span></a></td>
    <td><span>Nearly two percent of all TLS 1.3 connections established with Cloudflare are secured with post-quantum cryptography. In this blog post we discuss where we are now in early 2024, what to expect for the coming years, and what you can do today.</span></td>
  </tr>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/advanced-dns-protection/"><span>Advanced DNS Protection: mitigating sophisticated DNS DDoS attacks</span></a></td>
    <td><span>Introducing the Advanced DNS Protection system, a robust defense mechanism designed to protect against the most sophisticated DNS-based DDoS attacks.</span></td>
  </tr>
</tbody>
</table>
    <div>
      <h3>Sharing the Cloudflare way</h3>
      <a href="#sharing-the-cloudflare-way">
        
      </a>
    </div>
    
<table>
<thead>
  <tr>
    <th><span>Title</span></th>
    <th><span>Excerpt</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/linux-kernel-hardening/"><span>Linux kernel security tunables everyone should consider adopting</span></a></td>
    <td><span>This post illustrates some of the Linux kernel features that are helping Cloudflare keep its production systems more secure. We do a deep dive into how they work and why you should consider enabling them.</span></td>
  </tr>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/securing-cloudflare-with-cloudflare-zero-trust"><span>Securing Cloudflare with Cloudflare: a Zero Trust journey</span></a></td>
    <td><span>A deep dive into how we have deployed Zero Trust at Cloudflare while maintaining user privacy.</span></td>
  </tr>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/network-performance-update-security-week-2024"><span>Network performance update: Security Week 2024</span></a><span> </span></td>
    <td><span>Cloudflare is the fastest provider for 95th percentile connection time in 44% of networks around the world. We dig into the data and talk about how we do it.</span></td>
  </tr>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/harnessing-office-chaos"><span>Harnessing chaos in Cloudflare offices</span></a><span> </span></td>
    <td><span>This blog discusses the new sources of “chaos” that have been added to LavaRand and how you can make use of that harnessed chaos in your next application.</span></td>
  </tr>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/email-security-insights-on-cloudflare-radar"><span>Launching email security insights on Cloudflare Radar</span></a><span> </span></td>
    <td><span>The new Email Security section on Cloudflare Radar provides insights into the latest trends around threats found in malicious email, sources of spam and malicious email, and the adoption of technologies designed to prevent abuse of email.</span></td>
  </tr>
</tbody>
</table>
    <div>
      <h3>A final word</h3>
      <a href="#a-final-word">
        
      </a>
    </div>
    <p>Thanks for joining us this week, and stay tuned for our next Innovation Week in early April, focused on the developer community.</p>
    <div>
      <h3>Watch on Cloudflare TV</h3>
      <a href="#watch-on-cloudflare-tv">
        
      </a>
    </div>
    <div>
  
</div>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3S3nnZ6qfB6QnJAe9OwthD/05721dea96b2b756c5ab1989660293e3/image1-31.png" />
            
            </figure><p></p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Application Security]]></category>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[AI]]></category>
            <guid isPermaLink="false">19BXuTqacKLPSyjHFzhyxF</guid>
            <dc:creator>Daniele Molteni</dc:creator>
            <dc:creator>Ankur Aggarwal</dc:creator>
        </item>
        <item>
            <title><![CDATA[Protocol detection with Cloudflare Gateway]]></title>
            <link>https://blog.cloudflare.com/gatway-protocol-detection/</link>
            <pubDate>Fri, 08 Mar 2024 14:00:58 GMT</pubDate>
            <description><![CDATA[ Cloudflare Gateway, our secure web gateway (SWG), now supports the detection, logging, and filtering of network protocols using packet payloads without the need for inspection ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/55wa5i6QrEIUbPOPVGFSaA/c84972174ed2baa556c2dc9053377639/image3-26.png" />
            
            </figure><p><a href="https://www.cloudflare.com/zero-trust/products/gateway/">Cloudflare Gateway</a>, our <a href="https://www.cloudflare.com/learning/access-management/what-is-a-secure-web-gateway/">secure web gateway</a> (SWG), now supports the detection, logging, and filtering of network protocols regardless of their source or destination port. <a href="https://developers.cloudflare.com/cloudflare-one/policies/gateway/network-policies/protocol-detection/">Protocol detection</a> makes it easier to set precise policies without having to rely on the well known port and without the risk of over/under-filtering activity that could disrupt your users’ work. For example, you can filter all SSH traffic on your network by simply choosing the protocol.</p><p>Today, protocol detection is available to any Enterprise user of Gateway and supports a growing list of protocols including HTTP, HTTPS, SSH, TLS, DCE/RPC, MQTT, and TPKT.</p>
    <div>
      <h3>Why is this needed?</h3>
      <a href="#why-is-this-needed">
        
      </a>
    </div>
    <p>As many configuration planes move to using RESTful APIs, and now even GraphQL, there is still a need to manage devices via protocols like SSH. Whether it is the only management protocol available on a new third party device, or one of the first ways we learned to connect to and manage a server, SSH is still extensively used.</p><p>With other legacy SWG and firewall tools, the process of blocking traffic by specifying only the well known port number (for example, port 22 for SSH) can be both insecure and inconvenient. For example, if you used SSH over any other port it would not be filtered properly, or if you tried using another protocol over a well known port, such as port 22, it would be blocked. An argument could also be made to lock down the destinations to only allow incoming connections over certain ports, but companies don’t often control their destination devices.</p><p>With so many steps, there are risks of over-blocking legitimate traffic, which potentially prevents users from reaching the resources they need to stay productive and leads to a large volume of support tickets for your administrators. Alternatively, you could underblock and miss out on filtering your intended traffic, creating security risks for your organization.</p>
    <div>
      <h3>How we built it</h3>
      <a href="#how-we-built-it">
        
      </a>
    </div>
    <p>To build a performant protocol detection and filtering capability we had to make sure it could be applied in the same place Gateway policies are being applied. To meet this requirement we added a new TCP socket pre-read hook to <a href="/introducing-oxy">OXY</a>, our Rust-based policy framework, to buffer the first few bytes of the data stream. This buffer, then, allows Gateway to compare the bytes to our protocol signature database and apply the correct next step. And since this is all built into OXY, if the policy is set to Block, the connection will be closed; if it’s set to Allow, the connection will be proxied or progressed to establish the TLS session.</p>
    <div>
      <h3>How to set up Gateway protocol filtering</h3>
      <a href="#how-to-set-up-gateway-protocol-filtering">
        
      </a>
    </div>
    <p>Cloudflare Gateway’s protocol detection simplifies this process by allowing you to specify the protocol within a Gateway Network policy. To get started navigate to the Settings section on the Zero Trust dashboard and then select the Network tile. Under the Firewall section you’ll see a toggle for protocol detection and once enabled you’ll be able to create network policies.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/538WCkzBOxvjqsxPUPK8BD/59656702104c937c38783b364d777f60/pasted-image-0-5.png" />
            
            </figure><p>Next, go to the Firewall Policies section of your Zero Trust Gateway dashboard and then click ‘+ Add a policy’. There you can create a policy such as the one below to block SSH for all users within the Sales department.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7LZ9YqjrkB8RFalnn0XU1t/1debd4a0cefdb993a1c0d4b2161312b8/pasted-image-0--1--2.png" />
            
            </figure><p>This will prevent members of the sales team from initiating an outgoing or incoming SSH session.</p>
    <div>
      <h3>Get started</h3>
      <a href="#get-started">
        
      </a>
    </div>
    <p>Customers with a Cloudflare One Enterprise account will find this functionality in their Gateway dashboard today. We plan to make it available to Pay-as-you-go and Free customer accounts soon, as well as expanding the list of protocols.</p><p>If you’re interested in using protocol detection or ready to explore more broadly how Cloudflare can help you modernize your security, <a href="https://www.cloudflare.com/products/zero-trust/plans/enterprise">request a workshop</a> or contact your account manager.</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Cloudflare Gateway]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <guid isPermaLink="false">6YAn1AAnAdlIRoE6jdYru4</guid>
            <dc:creator>Ankur Aggarwal</dc:creator>
        </item>
        <item>
            <title><![CDATA[Securing Cloudflare with Cloudflare: a Zero Trust journey]]></title>
            <link>https://blog.cloudflare.com/securing-cloudflare-with-cloudflare-zero-trust/</link>
            <pubDate>Tue, 05 Mar 2024 14:00:51 GMT</pubDate>
            <description><![CDATA[ A deep dive into how we have deployed Zero Trust at Cloudflare while maintaining user privacy ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4r1CIssX038rlnrx4n00m8/5893d5cb949bc417ad6eb899c88ebb75/image1-8.png" />
            
            </figure><p>Cloudflare is committed to providing our customers with industry-leading <a href="https://www.cloudflare.com/network-security/">network security solutions</a>. At the same time, we recognize that establishing robust security measures involves identifying potential threats by using processes that may involve scrutinizing sensitive or personal data, which in turn can pose a risk to privacy. As a result, we work hard to balance privacy and security by building privacy-first security solutions that we offer to our customers and use for our own network.</p><p>In this post, we'll walk through how we deployed Cloudflare products like Access and our Zero Trust Agent in a privacy-focused way for employees who use the Cloudflare network. Even though global legal regimes generally afford employees a lower level of privacy protection on corporate networks, we work hard to make sure our employees understand their privacy choices because Cloudflare has a strong culture and history of respecting and furthering user privacy on the Internet. We’ve found that many of our customers feel similarly about ensuring that they are protecting privacy while also securing their networks.</p><p>So how do we balance our commitment to privacy with ensuring the security of our internal corporate environment using Cloudflare products and services? We start with the basics: We only retain the minimum amount of data needed, we de-identify personal data where we can, we communicate transparently with employees about the security measures we have in place on corporate systems and their privacy choices, and we retain necessary information for the shortest time period needed.</p>
    <div>
      <h2>How we secure Cloudflare using Cloudflare</h2>
      <a href="#how-we-secure-cloudflare-using-cloudflare">
        
      </a>
    </div>
    <p>We take a comprehensive approach to securing our globally distributed hybrid workforce with both organizational controls and technological solutions. Our organizational approach includes a number of measures, such as a company-wide Acceptable Use Policy, employee privacy notices tailored by jurisdiction, required annual and new-hire privacy and security trainings, role-based access controls (<a href="https://www.cloudflare.com/learning/access-management/role-based-access-control-rbac/">RBAC</a>), and least privilege principles. These organizational controls allow us to communicate expectations for both the company and the employees that we can implement with technological controls and that we enforce through logging and other mechanisms.</p><p>Our technological controls are rooted in <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust best practices</a> and start with a focus on our Cloudflare One services to secure our workforce as described below.</p>
    <div>
      <h3>Securing access to applications</h3>
      <a href="#securing-access-to-applications">
        
      </a>
    </div>
    <p>Cloudflare <a href="https://www.cloudflare.com/application-services/solutions/">secures access to self-hosted and SaaS applications</a> for our workforce, whether remote or in-office, using our own <a href="https://www.cloudflare.com/learning/access-management/what-is-ztna/">Zero Trust Network Access</a> (ZTNA) service, Cloudflare Access, to verify identity, <a href="/how-cloudflare-implemented-fido2-and-zero-trust/">enforce multi-factor authentication with security keys</a>, and evaluate device posture using the Zero Trust client for every request. This approach evolved over several years and has enabled Cloudflare to more effectively protect our growing workforce.</p>
    <div>
      <h3>Defending against cyber threats</h3>
      <a href="#defending-against-cyber-threats">
        
      </a>
    </div>
    <p>Cloudflare leverages <a href="https://www.cloudflare.com/network-services/products/magic-wan/">Cloudflare Magic WAN</a> to secure our office networks and <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/">the Cloudflare Zero Trust agent</a> to secure our workforce. We use both of these technologies as an onramp to our own <a href="https://www.cloudflare.com/zero-trust/products/gateway/">Secure Web Gateway (also known as Gateway)</a> to secure our workforce from a rise in online threats.</p><p>As we have evolved our hybrid work and office configurations, our security teams have benefited from additional controls and visibility for forward-proxied Internet traffic, including:</p><ul><li><p><b>Granular HTTP controls</b>: Our security teams <a href="https://www.cloudflare.com/learning/security/what-is-https-inspection/">inspect HTTPS traffic</a> to block access to specific websites identified as malicious by our security team, conduct <a href="https://developers.cloudflare.com/cloudflare-one/policies/gateway/http-policies/antivirus-scanning/">antivirus scanning</a>, and apply identity-aware browsing policies.</p></li><li><p><b>Selectively isolating Internet browsing</b>: With <a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">remote browser isolated (RBI)</a> sessions, all web code is run on Cloudflare’s network far from local devices, insulating users from any untrusted and malicious content. Today, Cloudflare isolates social media, news outlets, personal email, and other potentially risky Internet categories, and we have set up feedback loops for our employees to help us fine-tune these categories.</p></li><li><p><b>Geography-based logging</b>: Seeing where outbound requests originate helps our security teams understand the geographic distribution of our workforce, including our presence in high-risk areas.</p></li><li><p><b>Data Loss Prevention:</b> To keep sensitive data inside our corporate network, this tool allows us to identify data we’ve flagged as sensitive in outbound HTTP/S traffic and prevent it from leaving the network.</p></li><li><p><b>Cloud Access Security Broker:</b> This tool allows us to monitor our SaaS apps for misconfigurations and sensitive data that is potentially exposed or shared too broadly.</p></li></ul>
    <div>
      <h3>Protecting inboxes with cloud email security</h3>
      <a href="#protecting-inboxes-with-cloud-email-security">
        
      </a>
    </div>
    <p>Additionally, we have deployed our <a href="https://www.cloudflare.com/zero-trust/products/email-security/">Cloud Email Security</a> solution to protect our workforce from increased phishing and <a href="https://www.cloudflare.com/learning/email-security/business-email-compromise-bec/">business email compromise</a> attacks that we have not only seen directed against our employees, but that are <a href="/2023-phishing-report">plaguing organizations globally</a>. One key feature we use is <a href="/safe-email-links/">email link isolation</a>, which uses RBI and email security functionality to open potentially suspicious links in an isolated browser. This allows us to be slightly more relaxed with blocking suspicious links without compromising security. This is a big win for productivity for our employees and the security team, as both sets of employees aren’t having to deal with large volumes of false positives.</p><p>More details on our implementation can be found in our <a href="https://www.cloudflare.com/case-studies/cloudflare-one/">Securing Cloudflare with Cloudflare One</a> case study.</p>
    <div>
      <h2>How we respect privacy</h2>
      <a href="#how-we-respect-privacy">
        
      </a>
    </div>
    <p>The very nature of these powerful security technologies Cloudflare has created and deployed underscores the responsibility we have to use privacy-first principles in handling this data, and to recognize that the data should be respected and protected at all times.</p><p>The journey to respecting privacy starts with the products themselves. We develop products that have privacy controls built in at their foundation. To achieve this, our product teams work closely with Cloudflare’s product and privacy counsels to practice privacy by design. A great example of this collaboration is the ability to manage personally identifiable information (PII) in the Secure Web Gateway logs. You can choose to <a href="https://developers.cloudflare.com/cloudflare-one/insights/logs/gateway-logs/manage-pii/#exclude-pii">exclude PII from Gateway logs</a> entirely or <a href="https://developers.cloudflare.com/cloudflare-one/insights/logs/gateway-logs/manage-pii/#redact-pii">redact PII from the logs</a> and gain granular control over access to PII with the <a href="https://developers.cloudflare.com/cloudflare-one/roles-permissions/#cloudflare-zero-trust-pii">Zero Trust PII Role</a>.</p><p>In addition to building privacy-first security products, we are also committed to communicating transparently with Cloudflare employees about how these security products work and what they can – and can’t – see about traffic on our internal systems. This empowers employees to see themselves as part of the security solution, rather than set up an “us vs. them” mentality around employee use of company systems.</p><p>For example, while our employee privacy policies and our Acceptable Use Policy provide broad notice to our employees about what happens to data when they use the company’s systems, we thought it was important to provide even more detail. As a result, our security team collaborated with our privacy team to create an internal wiki page that plainly explains the data our security tools collect and why. We also describe the privacy choices available to our employees. This is particularly important for the “bring your own device” (BYOD) employees who have opted for the convenience of using their personal mobile device for work. BYOD employees must install endpoint management (provided by a third party) and Cloudflare’s Zero trust client on their devices if they want to access Cloudflare systems. We described clearly to our employees what this means about what traffic on their devices can be seen by Cloudflare teams, and we explained how they can take steps to protect their privacy when they are using their devices for purely personal purposes.</p><p>For the teams that develop for and support our <a href="https://www.cloudflare.com/zero-trust/solutions/">Zero Trust services</a>, we ensure that data is available only on a strict, need-to-know basis and is restricted to Cloudflare team members that require access as an essential part of their job. The set of people with access are required to take training that reminds them of their responsibility to respect this data and provides them with best practices for handling sensitive data. Additionally, to ensure we have full auditability, we log all the queries run against this database and by whom they are run.</p><p>Cloudflare has also made it easy for our employees to express any concerns they may have about how their data is handled or what it is used for. We have mechanisms in place that allow employees to ask questions or express concerns about the use of Zero Trust Security on Cloudflare’s network.</p><p>In addition, we make it easy for employees to reach out directly to the leaders responsible for these tools. All of these efforts have helped our employees better understand what information we collect and why. This has helped to expand our strong foundation for security and privacy at Cloudflare.</p>
    <div>
      <h2>Encouraging privacy-first security for all</h2>
      <a href="#encouraging-privacy-first-security-for-all">
        
      </a>
    </div>
    <p>We believe firmly that great security is critical for ensuring data privacy, and that privacy and security can co-exist harmoniously. We also know that it is possible to secure a corporate network in a way that respects the employees using those systems.</p><p>For anyone looking to secure a corporate network, we encourage focusing on network security products and solutions that build in personal data protections, like our Zero Trust suite of products. If you are curious to explore <a href="https://www.cloudflare.com/learning/access-management/how-to-implement-zero-trust/">how to implement</a> these Cloudflare services in your own organizations, <a href="https://www.cloudflare.com/products/zero-trust/plans/enterprise/">request a consultation on Zero Trust here</a>.</p><p>We also urge organizations to make sure they communicate clearly with their users. In addition to making sure company policies are transparent and accessible, it is important to help employees understand their privacy choices. Under the laws of almost every jurisdiction globally, individuals have a lower level of privacy on a company device or a company’s systems than they do on their own personal accounts or devices, so it’s important to communicate clearly to help employees understand the difference. If an organization has privacy champions, works councils, or other employee representation groups, it is critical to communicate early and often with these groups to help employees understand what controls they can exercise over their data.</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[API Gateway]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Privacy]]></category>
            <guid isPermaLink="false">6l7ydA66mxLvZMpnAgzEhD</guid>
            <dc:creator>Derek Pitts</dc:creator>
            <dc:creator>Ankur Aggarwal</dc:creator>
            <dc:creator>Emily Hancock</dc:creator>
        </item>
        <item>
            <title><![CDATA[Defensive AI: Cloudflare’s framework for defending against next-gen threats]]></title>
            <link>https://blog.cloudflare.com/defensive-ai/</link>
            <pubDate>Mon, 04 Mar 2024 14:00:24 GMT</pubDate>
            <description><![CDATA[ From identifying phishing attempts to protect applications and APIs, Cloudflare uses AI to improve the effectiveness of its security solutions to fight against new and more sophisticated attacks ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/xVD4cmhSUcJddNAFw2AJc/6fb1537ad293d5d4eee9059aae0eec9b/Personalized-defensive-AI.png" />
            
            </figure><p>Generative AI has captured the imagination of the world by being able to produce poetry, screenplays, or imagery. These tools can be used to improve human productivity for good causes, but they can also be employed by malicious actors to carry out sophisticated attacks.</p><p>We are witnessing phishing attacks and social engineering becoming more sophisticated as attackers tap into powerful new tools to generate credible content or interact with humans as if it was a real person. Attackers can use AI to build boutique tooling made for attacking specific sites with the intent of harvesting proprietary data and taking over user accounts.</p><p>To protect against these new challenges, we need new and more sophisticated security tools: this is how Defensive AI was born. Defensive AI is the framework Cloudflare uses when thinking about how intelligent systems can improve the effectiveness of our security solutions. The key to Defensive AI is data generated by Cloudflare’s vast network, whether generally across our entire network or specific to individual customer traffic.</p><p>At Cloudflare, we use AI to increase the level of protection across all security areas, ranging from <a href="https://www.cloudflare.com/application-services/solutions/">application security</a> to email security and our <a href="https://www.cloudflare.com/zero-trust/solutions/">Zero Trust platform</a>. This includes creating customized protection for every customer for API or email security, or using our huge amount of attack data to train models to detect application attacks that haven’t been discovered yet.</p><p>In the following sections, we will provide examples of how we designed the latest generation of security products that leverage AI to secure against AI-powered attacks.</p>
    <div>
      <h3>Protecting APIs with anomaly detection</h3>
      <a href="#protecting-apis-with-anomaly-detection">
        
      </a>
    </div>
    <p>APIs power the modern Web, comprising <a href="/2024-api-security-report/">57% of dynamic traffic</a> across the Cloudflare network, up from 52% in 2021. While APIs aren’t a new technology, securing them differs from securing a traditional web application. Because APIs offer easy programmatic access by design and are growing in popularity, fraudsters and threat actors have pivoted to targeting APIs. Security teams must now counter this rising threat. Importantly, each API is usually unique in its purpose and usage, and therefore <a href="https://www.cloudflare.com/application-services/solutions/api-security/">securing APIs</a> can take an inordinate amount of time.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5ojHc36uSFsnCBr870kK38/f4b7df6df5c60ffb087255ffb442e5e3/Screenshot-2024-03-01-at-1.39.29-PM.png" />
            
            </figure><p>Cloudflare is announcing the development of API Anomaly Detection for <a href="/api-gateway/">API Gateway</a> to protect APIs from attacks designed to damage applications, take over accounts, or <a href="https://www.cloudflare.com/learning/security/what-is-data-exfiltration/">exfiltrate data</a>. API Gateway provides a layer of protection between your hosted APIs and every device that interfaces with them, giving you the visibility, control, and security tools you need to manage your APIs.</p><p>API Anomaly Detection is an upcoming, ML-powered feature in our API Gateway product suite and a natural successor to <a href="/api-sequence-analytics">Sequence Analytics</a>. In order to protect APIs at scale, API Anomaly Detection learns an application’s business logic by analyzing client API request sequences. It then builds a model of what a sequence of expected requests looks like for that application. The resulting traffic model is used to identify attacks that deviate from the expected client behavior. As a result, API Gateway can use its <a href="https://developers.cloudflare.com/api-shield/security/sequence-mitigation/">Sequence Mitigation</a> functionality to enforce the learned model of the application’s intended business logic, stopping attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/edeVw346MG6dZbjaDt97L/263e9c18c51f5320ce6e0c1d9ab957df/Screenshot-2024-03-01-at-2.01.25-PM-1.png" />
            
            </figure><p>While we’re still developing API Anomaly Detection, API Gateway customers can sign up <a href="https://www.cloudflare.com/lp/api-anomaly-detection/">here</a> to be included in the beta for API Anomaly Detection. Today, customers can get started with Sequence Analytics and Sequence Mitigation by reviewing the <a href="https://developers.cloudflare.com/api-shield/security/">docs</a>. Enterprise customers that haven’t purchased API Gateway can <a href="http://dash.cloudflare.com/?to=/:account/:zone/security/api-shield">self-start a trial</a> in the Cloudflare Dashboard, or contact their account manager for more information.</p>
    <div>
      <h3>Identifying unknown application vulnerabilities</h3>
      <a href="#identifying-unknown-application-vulnerabilities">
        
      </a>
    </div>
    <p>Another area where AI improves security is in our <a href="https://www.cloudflare.com/en-gb/learning/ddos/glossary/web-application-firewall-waf/">Web Application Firewall (WAF)</a>. Cloudflare processes 55 million HTTP requests per second on average and has an unparalleled visibility into attacks and exploits across the world targeting a wide range of applications.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3oTIWUwe5Em3tD4ACksp6b/0036dcdf5af715f4095ffb14ae9b3769/Screenshot-2024-03-01-at-1.41.23-PM.png" />
            
            </figure><p>One of the big challenges with the WAF is adding protections for new vulnerabilities and false positives. A WAF is a collection of rules designed to identify attacks directed at web applications. New vulnerabilities are discovered daily and at Cloudflare we have a team of security analysts that create new rules when vulnerabilities are discovered. However, manually creating rules takes time — usually hours — leaving applications potentially vulnerable until a protection is in place. The other problem is that attackers continuously evolve and mutate existing attack payloads that can potentially bypass existing rules.</p><p>This is why Cloudflare has, for years, leveraged machine learning models that constantly learn from the latest attacks, deploying mitigations without the need for manual rule creation. This can be seen, for example, in our <a href="/stop-attacks-before-they-are-known-making-the-cloudflare-waf-smarter/">WAF Attack Score</a> solution. WAF Attack Score is based on an ML model trained on attack traffic identified on the Cloudflare network. The resulting classifier allows us to identify variations and bypasses of existing attacks as well as extending the protection to <a href="/how-cloudflares-ai-waf-proactively-detected-ivanti-connect-secure-critical-zero-day-vulnerability">new and undiscovered attacks</a>. Recently, we have made Attack Score <a href="/waf-attack-score-for-business-plan">available to all Enterprise and Business plans</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/25Jw91tB0o7lKhsgzvbqPV/748a7365c126ba03e2382b3eff988c37/Screenshot-2024-03-01-at-18.16.22.png" />
            
            </figure><p><i>Attack Score uses AI to classify each HTTP request based on the likelihood that it’s malicious</i></p><p>While the contribution of security analysts is indispensable, in the era of AI and rapidly evolving attack payloads, a <a href="https://www.cloudflare.com/cybersecurity-risk-management/">robust security posture</a> demands solutions that do not rely on human operators to write rules for each novel threat. Combining Attack Score with traditional signature-based rules is an example of how intelligent systems can support tasks carried out by humans. Attack Score identifies new malicious payloads which can be used by analysts to optimize rules that, in turn, provide better training data for our AI models. This creates a reinforcing positive feedback loop improving the overall protection and response time of our WAF.</p><p>Long term, we will adapt the AI model to account for customer-specific traffic characteristics to better identify deviations from normal and benign traffic.</p>
    <div>
      <h3>Using AI to fight phishing</h3>
      <a href="#using-ai-to-fight-phishing">
        
      </a>
    </div>
    <p>Email is one of the most effective vectors leveraged by bad actors with the US Cybersecurity and Infrastructure Security Agency (<a href="https://www.cisa.gov/stopransomware/general-information">CISA</a>) reporting that 90% of cyber attacks start with phishing and Cloudflare Email Security <a href="https://radar.cloudflare.com/year-in-review/2023#malicious-emails">marking 2.6% of 2023's emails as malicious</a>. The rise of AI-enhanced attacks are making traditional email security providers obsolete, as threat actors can now craft phishing emails that are more credible than ever with little to no language errors.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/27B73JPLutOrg6shC9gZnh/3e49607d69ce330333204c3d061d9fa5/Screenshot-2024-03-01-at-1.41.30-PM.png" />
            
            </figure><p>Cloudflare <a href="https://developers.cloudflare.com/email-security/">Email Security</a> is a cloud-native service that stops phishing attacks across all threat vectors. Cloudflare’s email security product continues to protect customers with its AI models, even as trends like Generative AI continue to evolve. Cloudflare’s models analyze all parts of a phishing attack to determine the risk posed to the end user. Some of our AI models are personalized for each customer while others are trained holistically. Privacy is paramount at Cloudflare, so only non-personally identifiable information is used by our tools for training. In 2023, <a href="/2023-phishing-report">Cloudflare processed approximately 13 billion</a>, and blocked 3.4 billion, emails, providing the email security product a rich dataset that can be used to train AI models.</p><p>Two detections that are part of our portfolio are Honeycomb and Labyrinth.</p><ul><li><p><i>Honeycomb</i> is a patented email sender domain reputation model. This service builds a graph of who is sending messages and builds a model to determine risk. Models are trained on specific customer traffic patterns, so every customer has AI models trained on what their good traffic looks like.</p></li><li><p><i>Labyrinth</i> uses ML to protect on a per-customer basis. Actors attempt to spoof emails from our clients’ valid partner companies.  We can gather a list with statistics of known &amp; good email senders for each of our clients. We can then detect the spoof attempts when the email is sent by someone from an unverified domain, but the domain mentioned in the email itself is a reference/verified domain.</p></li></ul><p>AI remains at the core of our email security product, and we are constantly improving the ways we leverage it within our product. If you want to get more information about how we are using our AI models to stop AI enhanced phishing attacks check out our blog post here.</p>
    <div>
      <h3>Zero-Trust security protected and powered by AI</h3>
      <a href="#zero-trust-security-protected-and-powered-by-ai">
        
      </a>
    </div>
    <p>Cloudflare <a href="https://www.cloudflare.com/en-gb/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> provides administrators the tools to protect access to their IT infrastructure by enforcing strict identity verification for every person and device regardless of whether they are sitting within or outside the network perimeter.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/qpOOjCeP6yqWtYrSgJdCu/4693906c9faf833a57db45672472f23d/Cloudflare-One-User-Risk-Scores_b.png" />
            
            </figure><p>One of the big challenges is to enforce strict access control while reducing the friction introduced by frequent verifications. Existing solutions also put pressure on IT teams that need to analyze log data to track how risk is evolving within their infrastructure. Sifting through a huge amount of data to find rare attacks requires large teams and substantial budgets.</p><p>Cloudflare simplifies this process by introducing behavior-based user risk scoring. Leveraging AI, we analyze real-time data to identify anomalies in the users’ behavior and signals that could lead to harms to the organization. This provides administrators with recommendations on how to tailor the security posture based on user behavior.</p><p>Zero Trust user risk scoring detects user activity and behaviors that could introduce risk to your organizations, systems, and data and assigns a score of Low, Medium, or High to the user involved. This approach is sometimes referred to as <a href="https://www.cloudflare.com/learning/security/what-is-ueba/">user and entity behavior analytics (UEBA)</a> and enables teams to detect and remediate possible account compromise, company policy violations, and other risky activity.</p><p>The first contextual behavior we are launching is “impossible travel”, which helps identify if a user’s credentials are being used in two locations that the user could not have traveled to in that period of time. These risk scores can be further extended in the future to highlight personalized behavior risks based on contextual information such as time of day usage patterns and access patterns to flag any anomalous behavior. Since all traffic would be proxying through your SWG, this can also be extended to resources which are being accessed, like an internal company repo.</p><p>We have an exciting launch during security week. <a href="/cf1-user-risk-score/">Check out this blog to learn more</a>.</p>
    <div>
      <h3>Conclusion</h3>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>From application and email security to <a href="https://www.cloudflare.com/network-security/">network security</a> and Zero Trust, we are witnessing attackers leveraging new technologies to be more effective in achieving their goals. In the last few years, multiple Cloudflare product and engineering teams have adopted intelligent systems to better identify abuses and <a href="https://www.cloudflare.com/products/zero-trust/threat-defense/">increase protection</a>.</p><p>Besides the generative AI craze, AI is already a crucial part of how we defend digital assets against attacks and how we discourage bad actors.</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[AI]]></category>
            <category><![CDATA[Machine Learning]]></category>
            <category><![CDATA[Phishing]]></category>
            <category><![CDATA[Cloud Email Security]]></category>
            <category><![CDATA[API Security]]></category>
            <category><![CDATA[SASE]]></category>
            <guid isPermaLink="false">76ClOKhWKWuLLPML351f39</guid>
            <dc:creator>Daniele Molteni</dc:creator>
            <dc:creator>John Cosgrove</dc:creator>
            <dc:creator>Ayush Kumar</dc:creator>
            <dc:creator>Ankur Aggarwal</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare’s tenant platform in action: Meter deploys DNS filtering at scale]]></title>
            <link>https://blog.cloudflare.com/gateway-managed-service-provider-meter/</link>
            <pubDate>Tue, 29 Aug 2023 13:00:30 GMT</pubDate>
            <description><![CDATA[ Today, we're excited to showcase Meter, a provider of Internet infrastructure, is leveraging the Tenant API integration for DNS filtering to help their clients enforce acceptable Internet use policies ]]></description>
            <content:encoded><![CDATA[ <p>In January 2023, we <a href="/gateway-managed-service-provider/">announced</a> support for Managed Service Providers (MSPs) and other businesses to create 'parent-child' and account-level policy configurations when deploying Cloudflare for <a href="https://www.cloudflare.com/learning/access-management/what-is-dns-filtering/">DNS filtering</a>. Specifically, organizations leverage the integration between our <a href="https://developers.cloudflare.com/tenant/">Tenant API</a> and <a href="https://www.cloudflare.com/products/zero-trust/gateway/">Cloudflare Gateway</a>, our Secure Web Gateway (SWG) to protect their remote or office end users with web filtering and inspection. Already, customers like the <a href="/gateway-managed-service-provider/">US federal government, MalwareBytes, and a large global ISP</a> take advantage of this integration to enable simpler, more flexible policy management across larger deployments across their end customers</p><p>Today, we're excited to showcase another similar story: <a href="https://www.meter.com/">Meter</a>, a provider of Internet infrastructure, is leveraging the Tenant API integration for DNS filtering to help their clients enforce acceptable Internet use policies.</p>
    <div>
      <h3>How Meter deploys Cloudflare to secure Internet browsing</h3>
      <a href="#how-meter-deploys-cloudflare-to-secure-internet-browsing">
        
      </a>
    </div>
    <p>Meter, headquartered in San Francisco and founded in 2015, provides Internet infrastructure that includes routing, switching, wireless, and applications. They help deliver faster, more efficient, more secure networking experiences for a diverse range of corporate spaces, including offices, warehouses, retail, manufacturing, biotech, and education institutions.</p><p>Meter integrates with the Cloudflare Tenant API to provide DNS filtering to their customers. With the Meter dashboard, Meter customers can set policies to block or allow Internet traffic to domains, categorized by security risks (phishing, malware, DGA, etc.) or content theme (adult, gambling, shopping, etc.)</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/ZToFJklGmoULrPD0YjB3q/a5f4ce799068aa802142fb7ae0913248/image2-10.png" />
            
            </figure><p>Across this customer base, having parent-child relationships in security policies is often critical. For example, specific schools within an overall district may have different policies about what Internet browsing is or is not acceptable.</p><p>Cloudflare’s parent-child configurability means that Meter administrators are equipped to set differential, granular policies for specific offices, retail locations, or warehouses (‘child accounts’) within a larger business (‘parent account’). DNS queries are first filtered against parent account policies before filtering against more specific child account policies.</p><p>At a more technical level, each “child” customer account can have its own users and tokens to manage accounts. Customers of Meter can set up their DNS endpoints via Gateway locations and may be defined as IPv4, IPv6, DoH, and DoT endpoints. DNS policies can be defined for these Gateway locations. In addition to this, each customer of Meter can customize their block page and even upload their own certificates to serve their custom block page.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6rVlJUsx4rKoAoGWz8xevY/6dd4780f0125a6a91cc5e5f5d7f8271a/image1-15.png" />
            
            </figure>
    <div>
      <h3>What’s next</h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>MSPs and infrastructure companies like Meter play a vital role in bringing cybersecurity solutions to customers of all sizes and needs. Cloudflare will continue to invest in our tenant architecture to equip MSPs with the flexibility and simplicity they need to serve their end customers.</p><p>DNS filtering to protect users on the Internet is a valuable solution for MSPs to deliver with Cloudflare. But DNS filtering is just the first of several Zero Trust services that Cloudflare intends to support via our tenant platform, so stay tuned for more.</p><p>If you are an MSP or an Infrastructure company looking to deliver Cloudflare security for your end customers, <a href="https://www.cloudflare.com/partners/services">learn more here</a>.</p> ]]></content:encoded>
            <category><![CDATA[DNS Filtering]]></category>
            <category><![CDATA[Customers]]></category>
            <guid isPermaLink="false">6acGwTp5CBHQ3rr0OwP4ml</guid>
            <dc:creator>Mythili Prabhu</dc:creator>
            <dc:creator>Ankur Aggarwal</dc:creator>
            <dc:creator>Sean Rose (Guest Author)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Manage and control the use of dedicated egress IPs with Cloudflare Zero Trust]]></title>
            <link>https://blog.cloudflare.com/gateway-egress-policies/</link>
            <pubDate>Fri, 03 Feb 2023 14:00:00 GMT</pubDate>
            <description><![CDATA[ Administrators can now use Gateway traffic egress policies to determine which egress IPs are used when. ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/n2EL5cxGe6DoEC8l0uIfO/4f37f5248a6bdb58b8ac88ab7912f301/image5-1.png" />
            
            </figure><p>Before identity-driven Zero Trust rules, some SaaS applications on the public Internet relied on the IP address of a connecting user as a security model. Users would connect from known office locations, with fixed IP address ranges, and the SaaS application would check their address in addition to their login credentials.</p><p>Many systems still offer that second factor method. Customers of Cloudflare One can use a dedicated egress IP for this purpose as part of their journey to a <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust model</a>. Unlike other solutions, customers using this option do not need to deploy any infrastructure of their own. However, not all traffic needs to use those dedicated egress IPs.</p><p>Today, we are announcing policies that give administrators control over when Cloudflare uses their dedicated egress IPs. Specifically, administrators can use a rule builder in the Cloudflare dashboard to determine which egress IP is used and when, based on attributes like identity, application, IP address, and geolocation. This capability is available to any enterprise-contracted customer that adds on dedicated egress IPs to their Zero Trust subscription.</p>
    <div>
      <h3>Why did we build this?</h3>
      <a href="#why-did-we-build-this">
        
      </a>
    </div>
    <p>In today’s hybrid work environment, organizations aspire for more consistent security and IT experiences to manage their employees’ traffic egressing from offices, data centers, and roaming users. To deliver a more streamlined experience, many organizations are adopting modern, cloud-delivered proxy services like <a href="https://www.cloudflare.com/learning/access-management/what-is-a-secure-web-gateway/">secure web gateways</a> (SWGs) and deprecating their complex mix of on-premise appliances.</p><p>One traditional convenience of these legacy tools has been the ability to create allowlist policies based on static source IPs. When users were primarily in one place, verifying traffic based on egress location was easy and reliable enough. Many organizations want or are required to maintain this method of traffic validation even as their users have moved beyond being in one place.</p><p>So far, Cloudflare has supported these organizations by providing dedicated egress IPs as an add-on to our proxy <a href="https://www.cloudflare.com/products/zero-trust/">Zero Trust services</a>. Unlike the default egress IPs, these dedicated egress IPs are not shared amongst any other Gateway accounts and are only used to egress proxied traffic for the designated account.</p><p>As <a href="/gateway-dedicated-egress-policies/">discussed in a previous blog post</a>, customers are already using Cloudflare’s dedicated egress IPs to deprecate their VPN use by using them to identify their users proxied traffic or to add these to allow lists on third party providers. These organizations benefit from the simplicity of still using fixed, known IPs, and their traffic avoids the bottlenecks and backhauling of traditional on-premise appliances.</p>
    <div>
      <h3>When to use egress policies</h3>
      <a href="#when-to-use-egress-policies">
        
      </a>
    </div>
    <p>The Gateway Egress policy builder empowers administrators with enhanced flexibility and specificity to egress traffic based on the user’s identity, device posture, source/destination IP address, and more.</p><p>Traffic egressing from specific geolocations to provide geo-specific experiences (e.g. language format, regional page differences) for select user groups is a common use case. For example, Cloudflare is currently working with the marketing department of a global media conglomerate. Their designers and web experts based in India often need to verify the layout of advertisements and websites that are running in different countries.</p><p>However, those websites restrict or change access based on the geolocation of the source IP address of the user. This required the team to use an additional VPN service for just this purpose. With egress policies, administrators can create a rule to match the domain IP address or destination country IP geolocation and marketing employees to egress traffic from a dedicated egress IP geo-located to the country where they need to verify the domain. This allows their security team to rest easy as they no longer have to maintain this hole in their perimeter defense, another VPN service just for marketing, and can enforce all of their other filtering capabilities to this traffic.</p><p>Another example use case is allowlisting access to applications or services maintained by a third party. While security administrators can control how their teams access their resources and even apply filtering to their traffic they often can’t change the security controls enforced by third parties. For example, while working with a large credit processor they used a third party service to verify the riskiness of transactions routed through their Zero Trust network. This third party required them to allowlist their source IPs.</p><p>To meet this goal, this customer could have just used dedicated egress IPs and called it a day, but this means that all of their traffic is now being routed through the data center with their dedicated egress IPs. So if a user wanted to browse any other sites they would receive a subpar experience since their traffic may not be taking the most efficient path to the upstream. But now with egress policies this customer can now only apply this dedicated egress IP to this third party provider traffic and let all other user traffic egress via the default Gateway egress IPs.</p>
    <div>
      <h3>Building egress policies</h3>
      <a href="#building-egress-policies">
        
      </a>
    </div>
    <p>To <a href="https://www.cloudflare.com/products/zero-trust/interactive-demo/">demonstrate</a> how easy it is for an administrator to configure a policy let’s walk through the last scenario. My organization uses a third-party service and in addition to a username/password login they require us to use a static source IP or network range to access their domain.</p><p>To set this up, I just have to navigate to Egress Policies under Gateway on the Zero Trust dashboard. Once there I can hit ‘Create egress policy’:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/yuJg8Ppn8asHZyfbw1L9R/ae805efe79147a7df6b61e04cbf6d0e6/image3-1.png" />
            
            </figure><p>For my organization most of my users accessing this third-party service are located in Portugal so I’ll use my dedicated egress IPs that are assigned to Montijo, Portugal. The users will access example.com hosted on 203.0.113.10 so I’ll use the destination IP selector to match all traffic to this site; policy configuration below:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/xfip4X6BAuf5PVeo0wDYE/18556fb7fc1620e4e621aaa9ec13fb6d/image2.png" />
            
            </figure><p>Once my policy is created, I’ll add in one more as a catch-all for my organization to make sure they don’t use any dedicated egress IPs for destinations not associated with this third-party service. This is key to add in because it makes sure my users receive the most performant network experience while still maintaining their privacy by egress via our shared Enterprise pool of IPs; policy configuration below:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6pybWxPAfzFcURsoGQ3MC5/9201edcdad977b2698ae8a11e87fadd4/image4.png" />
            
            </figure><p>Taking a look at the egress policy list we can see both policies are enabled and now when my users try to access example.com they will be using either the primary or secondary dedicated IPv4 or the IPv6 range as the egress IP. And for all other traffic, the default Cloudflare egress IPs will be used.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7nW6c0Qx8QXR4tZT1IMNLH/dfec617aadbd186f79b4f6f5e3445463/image1-3.png" />
            
            </figure>
    <div>
      <h3>Next steps</h3>
      <a href="#next-steps">
        
      </a>
    </div>
    <p>We recognize that as organizations migrate away from on-premise appliances, they want continued simplicity and control as they proxy more traffic through their cloud security stack. With Gateway egress policies administrators will now be able to control traffic flows for their increasingly distributed workforces.</p><p>If you are interested in building policies around Cloudflare’s dedicated egress IPs, you can add them onto a <a href="https://www.cloudflare.com/lp/cio-week-2023-cloudflare-one-contact-us/">Cloudflare Zero Trust Enterprise plan</a> or contact your account manager.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Cloudflare Gateway]]></category>
            <guid isPermaLink="false">30tNAkm8l8BZhgtLo3fWmK</guid>
            <dc:creator>Ankur Aggarwal</dc:creator>
            <dc:creator>James Chang</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare Zero Trust for managed service providers]]></title>
            <link>https://blog.cloudflare.com/gateway-managed-service-provider/</link>
            <pubDate>Fri, 13 Jan 2023 14:00:00 GMT</pubDate>
            <description><![CDATA[ Adding new features to Cloudflare Zero Trust for Managed Service Providers using Gateway DNS. ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1LupcKjKO1teV5gGz3OTTC/b5aaa97d1513793e8ff2eaef519e8ef7/image4-18.png" />
            
            </figure><p>As part of CIO week, we are announcing a new integration between our DNS Filtering solution and our Partner Tenant platform that supports parent-child policy requirements for our partner ecosystem and our direct customers. Our <a href="https://developers.cloudflare.com/tenant/">Tenant platform</a>, launched in <a href="/announcing-the-new-cloudflare-partner-platform/">2019</a>, has allowed Cloudflare partners to easily integrate Cloudflare solutions across millions of customer accounts. <a href="https://www.cloudflare.com/products/zero-trust/gateway/">Cloudflare Gateway</a>, introduced in <a href="/protect-your-team-with-cloudflare-gateway/">2020</a>, has grown from protecting personal networks to <a href="https://www.cloudflare.com/case-studies/fortune-500-telecommunications-provider/">Fortune 500</a> enterprises in just a few short years. With the integration between these two solutions, we can now help Managed Service Providers (MSPs) support large, multi-tenant deployments with parent-child policy configurations and account-level policy overrides that seamlessly <a href="https://www.cloudflare.com/products/zero-trust/threat-defense/">protect global employees from threats online</a>.</p>
    <div>
      <h2>Why work with Managed Service Providers?</h2>
      <a href="#why-work-with-managed-service-providers">
        
      </a>
    </div>
    <p>Managed Service Providers (MSPs) are a critical part of the <a href="https://www.cloudflare.com/cio/">toolkit</a> of many CIOs. In the age of disruptive technology, hybrid work, and shifting business models, outsourcing IT and <a href="https://www.cloudflare.com/soc-as-a-service/">security operations</a> can be a fundamental decision that drives strategic goals and ensures business success across organizations of all sizes. An MSP is a third-party company that remotely manages a customer's information technology (IT) infrastructure and end-user systems. MSPs promise deep technical knowledge, threat insights, and tenured expertise across a variety of security solutions to protect from <a href="https://www.cloudflare.com/learning/security/ransomware/how-to-prevent-ransomware/">ransomware</a>, malware, and other online threats. The decision to partner with an MSP can allow internal teams to focus on more strategic initiatives while providing access to easily deployable, competitively priced IT and security solutions. Cloudflare has been making it easier for our customers to work with MSPs to <a href="https://www.cloudflare.com/learning/insights-roadmap-zerotrust/">deploy and manage a complete Zero Trust transformation</a>.</p><p>One decision criteria for selecting an appropriate MSP is the provider’s ability to keep the partner’s best technology, security and cost interests in mind. An MSP should be leveraging innovative and lower cost security solutions whenever possible to drive the best value to your organization. Out of date technology can quickly incur higher implementation and maintenance costs compared to more modern and purpose-built solutions given the broader attack surface brought about by hybrid work. In a developing space like <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a>, an effective MSP should be able to support vendors that can be deployed globally, managed at scale, and effectively enforce global corporate policy across business units. Cloudflare has worked with many MSPs, some of which we will highlight today, that <a href="https://www.cloudflare.com/learning/access-management/how-to-implement-zero-trust/">implement and manage Zero Trust security policies</a> cost-effectively at scale.</p><p>The MSPs we are highlighting have started to deploy Cloudflare Gateway DNS Filtering to complement their portfolio as part of a Zero Trust <a href="https://www.cloudflare.com/learning/access-management/what-is-access-control/">access control strategy</a>. DNS filtering provides quick time-to-value for organizations seeking protection from ransomware, malware, phishing, and other Internet threats. DNS filtering is the process of using the <a href="https://www.cloudflare.com/learning/dns/what-is-dns/">Domain Name System</a> to block malicious websites and prevent users from reaching harmful or inappropriate content on the Internet. This ensures that company data remains secure and allows companies to have control over what their employees can access on company-managed networks and devices.</p><p>Filtering policies are often set by the Organization with consultation from the service provider. In some cases, these policies also need to be managed independently at the account or business unit level by either the MSP or the customer. This means it is very common for a parent-child relationship to be required to balance the deployment of corporate level rules from customization across devices, office locations, or business units. This structure is vital for MSPs that are deploying access policies across millions of devices and accounts.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7g8ziSiEwRjBARMwm1MBd0/b55638156897fa355ccc805035391df4/image2-29.png" />
            
            </figure>
    <div>
      <h2>Better together: Zero Trust ❤️ Tenant Platform</h2>
      <a href="#better-together-zero-trust-tenant-platform">
        
      </a>
    </div>
    <p>To make it easier for MSPs to manage millions of accounts with appropriate access controls and policy management, we integrated Cloudflare Gateway with our existing Tenant platform with a new feature that provides parent-child configurations. This allows MSP partners to create and manage accounts, set global corporate security policies, and allow appropriate management or overrides at the individual business unit or team level.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4xsI2eVC17cv93aRq4zwoO/3f1810292d6182496e7c557b2c56dc51/image1-39.png" />
            
            </figure><p>The Tenant platform allows MSPs ability to create millions of end customer accounts at their discretion to support their specific onboarding and configurations. This also ensures proper separation of ownership between customers and allows end customers to access the Cloudflare dashboard directly, if required.</p><p>Each account created is a separate container of subscribed resources (zero trust policies, zones, workers, etc.) for each of the MSPs end customers. Customer administrators can be invited to each account as necessary for self-service management, while the MSP retains control of the capabilities enabled for each account.</p><p>With MSPs now able to set up and manage accounts at scale, we’ll explore how the integration with Cloudflare Gateway lets them manage scaled DNS filtering policies for these accounts.</p>
    <div>
      <h2>Tiered Zero Trust accounts</h2>
      <a href="#tiered-zero-trust-accounts">
        
      </a>
    </div>
    <p>With individual accounts for each MSP end customer in place, MSPs can either fully manage the deployment or provide a self-service portal backed by Cloudflare configuration APIs. Supporting a configuration portal also means you would never want your end users to block access to this domain, so the MSP can add a hidden policy to all of its end customer accounts when they onboard which would be a simple one time API call. Although issues start to arise anytime they need to push an update to said policy, this now means they have to update the policy once for each and every MSP end customer and for some MSPs that can mean over 1 million API calls.</p><p>To help turn this into a single API call, we introduced the concept of a top level account aka parent account. This parent account allows MSPs to set global policies which are applied to all DNS queries before the subsequent MSP end customer policies aka child account policies. This structure helps ensure MSPs can set their own global policies for all of their child accounts while each child account can further filter their DNS queries to meet their needs without impacting any other child account.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5GTw6mxoNZyAHbq7a5xlT6/dee6e9c8307254ed3de33df9dab562e2/image3-25.png" />
            
            </figure><p>This extends further than just policies as well, each child account can create their own custom block page, <a href="/bring-your-certificates-cloudflare-gateway/">upload their own certificates</a> to display these block pages, and set up their own DNS endpoints (IPv4, IPv6, DoH, and DoT) via Gateway locations. Also, because these are the exact same as non-MSP Gateway accounts, there aren’t any lower limits when it comes to the default limits on the number policies, locations, or lists per parent or child account.</p>
    <div>
      <h2>Managed Service Provider integrations</h2>
      <a href="#managed-service-provider-integrations">
        
      </a>
    </div>
    <p>To help bring this to life, below are real-world examples of how Cloudflare customers are using this new managed service provider feature to help protect their organizations.</p>
    <div>
      <h3>US federal government</h3>
      <a href="#us-federal-government">
        
      </a>
    </div>
    <p>The US federal government requires many of the same services to support a protective DNS service for their 100+ civilian agencies, and they often outsource many of their IT and security operations to service providers like Accenture Federal Services (AFS).</p><p><a href="/helping-keep-governments-safe-and-secure/">In 2022</a>, Cloudflare and AFS were selected by Cybersecurity and Infrastructure Security Agency (CISA) with the Department of Homeland Security (DHS) to develop a joint solution to help the federal government defend itself against cyberattacks. The solution consists of Cloudflare’s protective DNS resolver which will filter DNS queries from offices and locations of the federal government and stream events directly to Accenture’s platform to provide unified administration and log storage.</p><p>Accenture Federal Services is providing a central interface to each department that allows them to adjust their DNS filtering policies. This interface works with Cloudflare’s Tenant platform and Gateway client APIs to provide a seamless customer experience for government employees managing their security policies using our new parent-child configurations. CISA, as the parent account, can set their own global policies, while allowing agencies, child accounts, to bypass select global policies, and set their own default block pages.</p><p>In conjunction with our parent-child structure we provided a few improvements to our DNS location matching and filtering defaults. Currently, all Gateway accounts can purchase a dedicated IPv4 resolver IP address(es) and these are great for situations where a customer doesn’t have a static source IP address or wants their own IPv4 address to host the solution.</p><p>For CISA, they wanted not only a dedicated IPv4 address but to assign that same address from their parent account to their child accounts. This would allow them to have their own default IPv4 addresses for all agencies easing the burden of onboarding. Next they also want the ability to fail closed, which means if a DNS query did not match any location (which must have a source IPv4 address/network configured) it would be dropped. This allows CISA to ensure only configured IPv4 networks had access to their protective services. Lasty, we didn’t have to address this with IPv6, DoH, and DoT DNS endpoints as those are custom with each and every DNS location created.</p>
    <div>
      <h3>Malwarebytes</h3>
      <a href="#malwarebytes">
        
      </a>
    </div>
    <p><a href="https://www.malwarebytes.com/">Malwarebytes</a>, a global leader in real-time cyber protection, recently integrated with Cloudflare to provide a DNS filtering module within their Nebula platform. The Nebula platform is a cloud-hosted security operations solution that manages control of any malware or ransomware incident—from alert to fix. This new module allows Malwarebytes customers to filter on content categories and add policy rules for groups of devices. A key need was the ability to easily integrate with their current device client, provide individual account management, and provide room for future expansion across additional Zero Trust services like <a href="https://www.cloudflare.com/products/zero-trust/browser-isolation/">Cloudflare Browser Isolation</a>.</p><p>Cloudflare was able to provide a comprehensive solution that was easily integrated into the Malwarebytes platform. This included using <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/agentless/dns/dns-over-https/">DNS-over-HTTP (DoH)</a> to segment users across unique locations and adding a <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/agentless/dns/dns-over-https/#filter-doh-requests-by-user">unique token per device</a> to properly track the device ID and apply the correct DNS policies. And lastly, the integration was completed using the Cloudflare <a href="https://developers.cloudflare.com/tenant/">Tenant API</a> which allowed seamless integration with their current workflow and platform. This combination of our Zero Trust services and Tenant platform let Malwarebytes quickly go to market for new segments within their business.</p><p>“It’s challenging for organizations today to manage access to malicious sites and keep their end users safe and productive. Malwarebytes’ DNS Filtering module extends our cloud-based security platform to web protection. After evaluating other Zero Trust providers it was clear to us that Cloudflare could offer the comprehensive solution IT and security teams need while providing lightning fast performance at the same time. Now, IT and security teams can block whole categories of sites, take advantage of an extensive database of pre-defined scores on known, suspicious web domains, protect core web-based applications and manage specific site restrictions, removing the headache from overseeing site access.” - <a href="https://press.malwarebytes.com/2022/06/08/malwarebytes-continues-to-expand-endpoint-protection-platform-with-dns-filtering-module%EF%BF%BC/">Mark Strassman, Chief Product Officer, Malwarebytes</a></p>
    <div>
      <h3>Large global ISP</h3>
      <a href="#large-global-isp">
        
      </a>
    </div>
    <p>We’ve been working with a large global ISP recently to support DNS filtering which is a part of a larger security solution offered for families for over one million accounts in just the first year! The ISP leverages our Tenant and Gateway APIs to seamlessly integrate into their current platform and user experience with minimal engineering effort. We look forward to sharing more detail around this implementation in the coming months.</p>
    <div>
      <h2>What’s next</h2>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>As the previous stories highlight, MSPs play a key role in securing today’s diverse ecosystem of organizations, of all sizes and maturities. Companies of all sizes find themselves squaring off against the same complex threat landscape and are challenged to <a href="https://www.cloudflare.com/cybersecurity-risk-management/">maintain a proper security posture and manage risk</a> with constrained resources and limited security tooling. MSPs provide the additional resources, expertise and advanced security tooling that can help reduce the risk profile for these companies. Cloudflare is committed to making it easier for MSPs to be effective in delivering <a href="https://www.cloudflare.com/zero-trust/solutions/">Zero Trust solutions</a> to their customers.</p><p>Given the importance of MSPs for our customers and the continued growth of our partner network, we plan to launch quite a few features in 2023 and beyond that better support our MSP partners. First, a key item on our roadmap is the development of a refreshed tenant management dashboard for improved account and user management. Second, we want to extend our multi-tenant configurations across our entire Zero Trust solution set to make it easier for MSPs to implement secure hybrid work solutions at scale.</p><p>Lastly, to better support hierarchical access, we plan to expand the user roles and access model currently available to MSP partners to allow their teams to more easily support and manage their various accounts. Cloudflare has always prided itself on its ease of use, and our goal is to make Cloudflare the Zero Trust platform of choice for service and security providers globally.</p><p>Throughout CIO week, we’ve touched on how our partners are helping modernize the security posture for their customers to align with a world transformed by hybrid work and hybrid multi-cloud infrastructures. Ultimately, the power of Cloudflare Zero Trust comes from its existence as a composable, unified platform that draws strength from its combination of products, features, and our partner network.</p><ul><li><p>If you’d like to learn more about becoming an MSP partner, you can read more here: <a href="https://www.cloudflare.com/partners/services">https://www.cloudflare.com/partners/services</a></p></li><li><p>If you’d like to learn more about improving your security with DNS Filtering and Zero Trust, or would like to get started today, test the platform yourself with 50 free seats by <a href="https://dash.cloudflare.com/sign-up/teams">signing up here</a>.</p></li></ul><p></p> ]]></content:encoded>
            <category><![CDATA[CIO Week]]></category>
            <category><![CDATA[Cloudflare Gateway]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Connectivity Cloud]]></category>
            <guid isPermaLink="false">1ZjH3lDdN67ZykIJ2Poclf</guid>
            <dc:creator>Ankur Aggarwal</dc:creator>
            <dc:creator>Dan Hollinger</dc:creator>
            <dc:creator>Teddy Solano</dc:creator>
        </item>
        <item>
            <title><![CDATA[Announcing SCIM support for Cloudflare Access & Gateway]]></title>
            <link>https://blog.cloudflare.com/access-and-gateway-with-scim/</link>
            <pubDate>Thu, 12 Jan 2023 14:02:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare Access & Gateway now support the System for Cross-domain Identity Management (SCIM) protocol. ]]></description>
            <content:encoded><![CDATA[ <p><i></i></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4Y4UCjZkqF4azsX8qbM3tY/e879ee99b9444f02f87b1b9ba0af5995/image5-11.png" />
            
            </figure><p>Today, we're excited to announce that Cloudflare Access and Gateway now support the System for Cross-domain Identity Management (SCIM) protocol. Before we dive into what this means, let's take a step back and review what SCIM, Access, and Gateway are.</p><p><a href="https://www.rfc-editor.org/rfc/rfc7642.txt">SCIM</a> is a protocol that enables organizations to manage user identities and access to resources across multiple systems and domains. It is often used to automate the process of creating, updating, and deleting user accounts and permissions, and to keep these accounts and permissions in sync across different systems.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5lfFQAyAoj4oKdZhkqtyct/37735dd182557095960ce8aaaf57b307/Access-SCIM-integration.png" />
            
            </figure><p>For example, most organizations have an identity provider, such as Okta or Azure Active Directory, that stores information about its employees, such as names, addresses, and job titles. The organization also likely uses cloud-based applications for collaboration. In order to access the cloud-based application, employees need to create an account and log in with a username and password. Instead of manually creating and managing these accounts, the organization can use SCIM to automate the process. Both the on-premise system and the cloud-based application are configured to support SCIM.</p><p>When a new employee is added to, or removed from, the identity provider, SCIM automatically creates an account for that employee in the cloud-based application, using the information from the on-premises system. If an employee's information is updated in the identity provider, such as a change in job title, SCIM automatically updates the corresponding information in the cloud-based application. If an employee leaves the organization, their account can be deleted from both systems using SCIM.</p><p>SCIM helps organizations efficiently manage user identities and access across multiple systems, reducing the need for manual intervention and ensuring that user information is accurate and up to date.</p><p>Cloudflare Access provides secure access to your internal applications and resources. It integrates with your existing identity provider to enforce strong authentication for users and ensure that only authorized users have access to your organization's resources. After a user successfully authenticates via the identity provider, Access initiates a session for that user. Once the session has expired, Access will redirect the user back to the identity provider.</p><p>Similarly, Cloudflare Gateway is a comprehensive <a href="https://www.cloudflare.com/learning/access-management/what-is-a-secure-web-gateway/">secure web gateway (SWG)</a> which leverages the same identity provider configurations as Access to allow administrators to build DNS, Network, and HTTP inspection policies based on identity. Once a user logs in using WARP client via the identity provider, their identity is logged and evaluated against any policies created by their organization's administrator.</p>
    <div>
      <h3>Challenges before SCIM</h3>
      <a href="#challenges-before-scim">
        
      </a>
    </div>
    <p>Before SCIM, if a user needed to be deprovisioned (e.g. leaving the business, a security breach or other factors) an administrator needed to remove access for the user in both the identity provider and Access. This was because a user’s Cloudflare Zero Trust session would stay active until they attempted to log in via the identity provider again. This was time-consuming and error-prone, and it leaves room for security vulnerabilities if a user's access is not removed in a timely manner.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6gPO5LyeJTlK6wBCGaPvKe/51ad34a222b30ddc27ea0511819bbdd6/1_2x.png" />
            
            </figure><p>Another challenge with Cloudflare Access and Gateway was that identity provider groups had to be manually entered. This meant that if an identity provider group changed, an administrator had to manually update the value within the Cloudflare Zero trust dashboard to reflect those changes. This was tedious and time-consuming, and led to inconsistencies if the updates were not made promptly. Additionally, it required additional resources and expertise to manage this process effectively.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/43e51HTYQXmgvlrnMXXECn/1790f7100e8a1f33319c55570ffbd3c5/pasted-image-0.png" />
            
            </figure>
    <div>
      <h3>SCIM for Access &amp; Gateway</h3>
      <a href="#scim-for-access-gateway">
        
      </a>
    </div>
    <p>Now, with the integration of SCIM, Access and Gateway can automatically deprovision users after they are deactivated in an identity provider and synchronize identity provider groups. This ensures that only active users, in the right group, have access to your organization's resources, improving the security of your network.</p><p>User deprovisioning via SCIM listens for any user deactivation events in the identity provider and then revokes all active sessions for that user. This immediately cuts off their access to any application protected by Access and their session via WARP for Gateway.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1THRxHewCusYYYlA9ctsDj/3f05354ac1ee932106dd2ca8fe58b9d0/pasted-image-0--1-.png" />
            
            </figure><p>Additionally, the integration of SCIM allows for the synchronization of identity provider group information in Access and Gateway policies. This means that all identity provider groups will automatically be available in both the Access and Gateway policy builders. There is also an option to automatically force a user to reauthenticate if their group membership changes.</p><p>For example, if you wanted to create an Access policy that only applied to users with emails associated with example.com and apart from the risky user group, you would be able to build a policy as show below by simply selecting the risky user group from a drop-down:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7d6q2DKIWv6psiD9iES762/dc03b70383e935e0198a9c3d70a2fd1b/pasted-image-0--2-.png" />
            
            </figure><p>Similarly, if you wanted to create a Gateway policy to block example.com and all of its subdomains for these same users you could create the policy below:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/28Kn8u1iqObCiaRzjs52Ii/53a43ddf65f96a894b83bc1e88524b74/pasted-image-0--3-.png" />
            
            </figure>
    <div>
      <h3>What’s next</h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>Today, SCIM support is available for Azure Active Directory and Okta for Self-Hosted Access applications. In the future, we plan to extend support for more Identity Providers and to Access for SaaS.</p>
    <div>
      <h3>Try it now </h3>
      <a href="#try-it-now">
        
      </a>
    </div>
    <p>SCIM is available for all Zero Trust customers today and can be used to improve operations and overall security. Try out <a href="https://one.dash.cloudflare.com/">SCIM for Access and Gateway</a> yourself today.</p> ]]></content:encoded>
            <category><![CDATA[CIO Week]]></category>
            <category><![CDATA[Cloudflare Access]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <guid isPermaLink="false">2BUD3Ek49Fs0kBopENTn1y</guid>
            <dc:creator>Kenny Johnson</dc:creator>
            <dc:creator>Ankur Aggarwal</dc:creator>
        </item>
        <item>
            <title><![CDATA[Bring your own certificates to Cloudflare Gateway]]></title>
            <link>https://blog.cloudflare.com/bring-your-certificates-cloudflare-gateway/</link>
            <pubDate>Mon, 09 Jan 2023 14:00:00 GMT</pubDate>
            <description><![CDATA[ Security and IT administrators can now bring their own custom certificates to encrypt user side connections for Zero Trust ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Today, we’re announcing support for customer provided certificates to give flexibility and ease of deployment options when using <a href="https://www.cloudflare.com/products/zero-trust/">Cloudflare’s Zero Trust platform</a>. Using custom certificates, IT and Security administrators can now “bring-their-own” certificates instead of being required to use a Cloudflare-provided certificate to apply HTTP, DNS, <a href="https://www.cloudflare.com/learning/access-management/what-is-a-casb/">CASB</a>, DLP, RBI and other filtering policies.</p><p>The new custom certificate approach will exist alongside the method Cloudflare Zero Trust administrators are already used to: installing Cloudflare’s own certificate to enable traffic inspection and forward proxy controls. Both approaches have advantages, but providing them both enables organizations to find the path to security modernization that makes the most sense for them.</p>
    <div>
      <h2>Custom user side certificates</h2>
      <a href="#custom-user-side-certificates">
        
      </a>
    </div>
    <p>When deploying new security services, organizations may prefer to use their own custom certificates for a few common reasons. Some value the privacy of controlling which certificates are deployed. Others have already deployed custom certificates to their device fleet because they may bind user attributes to these certificates or use them for internal-only domains.</p><p>So, it can be easier and faster to apply additional security controls around what administrators have deployed already–versus installing additional certificates.</p><p>To get started using your own certificate first upload your root certificates via API to Cloudflare.</p>
            <pre><code>curl -X POST "https://api.cloudflare.com/client/v4/accounts/&lt;ACCOUNT_ID&gt;/mtls_certificates"\
    -H "X-Auth-Email: &lt;EMAIL&gt;" \
    -H "X-Auth-Key: &lt;API_KEY&gt;" \
    -H "Content-Type: application/json" \
    --data '{
        "name":"example_ca_cert",
        "certificates":"&lt;ROOT_CERTIFICATE&gt;",
        "private_key":"&lt;PRIVATE_KEY&gt;",
        "ca":true
        }'</code></pre>
            <p>The root certificate will be stored across all of Cloudflare’s secure servers, designed to protect against unauthorized access. Once uploaded each certificate will receive an identifier in the form of a UUID (e.g. <code>2458ce5a-0c35-4c7f-82c7-8e9487d3ff60</code>) . This UUID can then be used with your Zero Trust account ID to associate and enable it for your account.</p>
            <pre><code>curl -X PUT "https://api.cloudflare.com/client/v4/accounts/&lt;ACCOUNT_ID&gt;/gateway/configuration"\
    -H "X-Auth-Email: &lt;EMAIL&gt;" \
    -H "X-Auth-Key: &lt;API_KEY&gt;" \
    -H "Content-Type: application/json" \
    --data '{
        "settings":
        {
            "antivirus": {...},
            "block_page": {...},
            "custom_certificate":
            {
                "enabled": true,
                "id": "2458ce5a-0c35-4c7f-82c7-8e9487d3ff60"
            }
            "tls_decrypt": {...},
            "activity_log": {...},
            "browser_isolation": {...},
            "fips": {...},
        }
    }'</code></pre>
            <p>From there it takes approximately one minute and all new HTTPS connections for your organization's users will be secured using your custom certificate. For even more details check out our <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/user-side-certificates/custom-certificate/">developer documentation</a>.</p><p>An additional benefit of this fast propagation time is zero maintenance downtimes. If you’re transitioning from the Cloudflare provided certificate or a custom certificate, all new HTTPS connections will use the new certificate without impacting any current connections.</p>
    <div>
      <h2>Or, install Cloudflare’s own certificates</h2>
      <a href="#or-install-cloudflares-own-certificates">
        
      </a>
    </div>
    <p>In addition to the above API-based method for custom certificates, Cloudflare also makes it easy for organizations to install Cloudflare’s own root certificate on devices to support HTTP filtering policies. Many organizations prefer offloading certificate management to Cloudflare to reduce administrative overhead. Plus, root certificate installation can be easily automated during managed deployments of <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/">Cloudflare’s device client</a>, which is critical to forward proxy traffic.</p><p>Installing Cloudflare’s root certificate on devices takes only a few steps, and administrators can choose which file type they want to use–either a .pem or .crt file–depending on their use cases. Take a look at our <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/install-cloudflare-cert/">developer documentation</a> for further details on the process across operating systems and applications.</p>
    <div>
      <h2>What’s next?</h2>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>Whether an organization uses a custom certificate or the Cloudflare maintained certificate, the goal is the same. To apply traffic inspection to help protect against malicious activity and provide robust data protection controls to keep users safe. Cloudflare’s priority is equipping those organizations with the flexibility to achieve their risk reduction goal as swiftly as possible.</p><p>In the coming quarters we will be focused on delivering a new UI to upload and manage user side certificates as well as refreshing the HTTP policy builder to let admins determine what happens when accessing origins not signed with a public certificate.</p><p>If you want to know where <a href="https://www.cloudflare.com/learning/access-management/what-is-a-secure-web-gateway/">SWG</a>, RBI, DLP, and other threat and data protection services can fit into your overall security modernization initiatives, explore Cloudflare’s <a href="https://zerotrustroadmap.org/">prescriptive roadmap to Zero Trust.</a>If you and your enterprise are ready to get started protecting your users, devices, and data with HTTP inspection, then <a href="https://www.cloudflare.com/lp/cio-week-2023-cloudflare-one-contact-us/">reach out to Cloudflare to learn more</a>.</p> ]]></content:encoded>
            <category><![CDATA[CIO Week]]></category>
            <category><![CDATA[Cloudflare Gateway]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <guid isPermaLink="false">5VzMJbOJsexp0BTaEOUx2C</guid>
            <dc:creator>Ankur Aggarwal</dc:creator>
        </item>
        <item>
            <title><![CDATA[HTTP/3 inspection on Cloudflare Gateway]]></title>
            <link>https://blog.cloudflare.com/cloudflare-gateway-http3-inspection/</link>
            <pubDate>Fri, 24 Jun 2022 13:30:05 GMT</pubDate>
            <description><![CDATA[ Today we’re excited to announce the ability for administrators to apply Zero Trust inspection policies to HTTP/3 traffic ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7bX5Iv8MoIXNxPcE67Ki4c/0d0b18fe43468e09e23536cf549acfef/pasted-image-0--1-.png" />
            
            </figure><p>Today, we’re excited to announce upcoming support for <a href="https://www.cloudflare.com/learning/performance/what-is-http3/">HTTP/3</a> inspection through Cloudflare Gateway, our comprehensive <a href="https://www.cloudflare.com/learning/access-management/what-is-a-secure-web-gateway/">secure web gateway</a>. HTTP/3 currently powers 25% of the Internet and delivers a faster browsing experience, without compromising security. Until now, administrators seeking to filter and inspect HTTP/3-enabled websites or APIs needed to either compromise on performance by falling back to HTTP/2 or lose visibility by bypassing inspection. With HTTP/3 support in Cloudflare Gateway, you can have full visibility on all traffic and provide the fastest browsing experience for your users.</p>
    <div>
      <h3>Why is the web moving to HTTP/3?</h3>
      <a href="#why-is-the-web-moving-to-http-3">
        
      </a>
    </div>
    <p>HTTP is one of the oldest technologies that powers the Internet. All the way back in 1996, security and performance were afterthoughts and encryption was left to the transport layer to manage. This model doesn’t scale to the performance needs of the modern Internet and has led to HTTP being <a href="/http3-the-past-present-and-future/">upgraded to HTTP/2 and now HTTP/3</a>.</p><p>HTTP/3 accelerates browsing activity by using QUIC, a modern transport protocol that is always encrypted by default. This delivers faster performance by reducing round-trips between the user and the web server and is more performant for users with unreliable connections. For further information about HTTP/3’s performance advantages take a look at our previous blog <a href="/http-3-vs-http-2/">here</a>.</p>
    <div>
      <h3>HTTP/3 development and adoption</h3>
      <a href="#http-3-development-and-adoption">
        
      </a>
    </div>
    <p>Cloudflare’s mission is to help build a better Internet. We see HTTP/3 as an important building block to make the Internet faster and more secure. We worked closely with the IETF to iterate on the HTTP/3 and QUIC standards documents. These efforts combined with progress made by popular browsers like Chrome and Firefox to enable QUIC by default have translated into HTTP/3 now being used by over 25% of all websites and for an even more thorough <a href="/cloudflare-view-http3-usage/">analysis</a>.</p><p>We’ve advocated for HTTP/3 extensively over the past few years. We first introduced support for the underlying transport layer QUIC in <a href="/the-quicening/">September 2018</a> and then from there worked to introduce HTTP/3 support for our reverse proxy services the following year in <a href="/http3-the-past-present-and-future/">September of 2019</a>. Since then our efforts haven’t slowed down and today we support the latest revision of HTTP/3, using the final “h3” identifier matching RFC 9114.</p>
    <div>
      <h3>HTTP/3 inspection hurdles</h3>
      <a href="#http-3-inspection-hurdles">
        
      </a>
    </div>
    <p>But while there are many advantages to HTTP/3, its introduction has created deployment complexity and security tradeoffs for administrators seeking to filter and inspect HTTP traffic on their networks. HTTP/3 offers familiar HTTP request and response semantics, but the use of QUIC changes how it looks and behaves "on the wire". Since QUIC runs atop UDP, it  is architecturally distinct from legacy TCP-based protocols and has poor support from legacy secure web gateways. The combination of these two factors has made it challenging for administrators to keep up with the evolving technological landscape while maintaining the users’ performance expectations and ensuring visibility and control over Internet traffic.</p><p>Without proper secure web gateway support for HTTP/3, administrators have needed to choose whether to compromise on security and/or performance for their users. Security tradeoffs include not inspecting UDP traffic, or even worse forgoing critical security capabilities such as inline anti-virus scanning, data-loss prevention, <a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">browser isolation</a> and/or traffic logging. Naturally, for any security conscious organization discarding security and visibility is not an acceptable approach and this has led administrators to proactively disable HTTP/3 on their end user devices. This introduces deployment complexity and sacrifices performance as it requires disabling QUIC-support within the users web browsers.</p>
    <div>
      <h3>How to enable HTTP/3 Inspection</h3>
      <a href="#how-to-enable-http-3-inspection">
        
      </a>
    </div>
    <p>Once support for HTTP/3 inspection is available for select browsers later this year, you’ll be able to enable HTTP/3 inspection through the dashboard. Once logged into the Zero Trust dashboard you will need to toggle on proxying, click the box for UDP traffic, and enable TLS decryption under <b>Settings &gt; Network &gt; Firewall.</b> Once these settings have been enabled; AV-scanning, remote browser isolation, DLP, and HTTP filtering can be applied via HTTP policies to all of your organization’s proxied HTTP traffic.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4OeWgTcKJHjJoKJ7GmCJC5/2af6f099a4b93c9d396507ee2734b186/pasted-image-0--2-.png" />
            
            </figure>
    <div>
      <h3>What’s next</h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>Administrators will no longer need to make security tradeoffs based on the evolving technological landscape and can focus on protecting their organization and teams. We’ll reach out to all Cloudflare One customers once HTTP/3 inspection is available and are excited to simplify secure web gateway deployments for administrators.</p><p>HTTP/3 traffic inspection will be available to all administrators of all plan types; if you have not signed up already <a href="https://dash.cloudflare.com/sign-up/teams">click here</a> to get started.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare One Week]]></category>
            <category><![CDATA[Cloudflare Gateway]]></category>
            <category><![CDATA[HTTP3]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <guid isPermaLink="false">63ahcyUqUmiwPyDOIZFyi8</guid>
            <dc:creator>Ankur Aggarwal</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare Gateway dedicated egress and egress policies]]></title>
            <link>https://blog.cloudflare.com/gateway-dedicated-egress-policies/</link>
            <pubDate>Thu, 23 Jun 2022 13:27:35 GMT</pubDate>
            <description><![CDATA[ Cloudflare Gateway customers can now utilize dedicated egress IPs and soon will be able to control how these IPs are applied via egress policies ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2ieRNok92g8GFFvha3iB5a/98615d1ecc4215a46842d1c0142e2c67/image1-37.png" />
            
            </figure><p>Today, we are highlighting how Cloudflare enables administrators to create security policies while using dedicated source IPs. With on-premise appliances like legacy VPNs, firewalls, and <a href="https://www.cloudflare.com/learning/access-management/what-is-a-secure-web-gateway/">secure web gateways (SWGs)</a>, it has been convenient for organizations to rely on allowlist policies based on static source IPs. But these hardware appliances are hard to manage/scale, come with inherent vulnerabilities, and struggle to support globally distributed traffic from remote workers.</p><p>Throughout this week, we’ve <a href="https://www.cloudflare.com/cloudflare-one-week/">written</a> about how to transition away from these legacy tools towards Internet-native <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust security</a> offered by services like Cloudflare Gateway, our <a href="https://www.cloudflare.com/products/zero-trust/gateway/">SWG</a>. As a critical service natively integrated with the rest of our broader Zero Trust platform, Cloudflare Gateway also enables traffic filtering and routing for recursive DNS, <a href="https://www.cloudflare.com/learning/access-management/what-is-ztna/">Zero Trust network access</a>, <a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">remote browser isolation</a>, and inline <a href="https://www.cloudflare.com/learning/access-management/what-is-a-casb/">CASB</a>, among other functions.</p><p>Nevertheless, we recognize that administrators want to maintain the convenience of source IPs as organizations transition to cloud-based proxy services. In this blog, we describe our approach to offering dedicated IPs for egressing traffic and share some upcoming functionality to empower administrators with even greater control.</p>
    <div>
      <h3>Cloudflare’s dedicated egress IPs</h3>
      <a href="#cloudflares-dedicated-egress-ips">
        
      </a>
    </div>
    <p>Source IPs are still a popular method of verifying that traffic originates from a known organization/user when accessing applications and third party destinations on the Internet. When organizations use Cloudflare as a secure web gateway, user traffic is proxied through our global network, where we apply filtering and routing policies at the closest data center to the user. This is especially powerful for globally distributed workforces or roaming users. Administrators do not have to make updates to static IP lists as users travel, and no single location becomes a bottleneck for user traffic.</p><p>Today the source IP for proxied traffic is one of two options:</p><ul><li><p>Device client (WARP) Proxy IP – Cloudflare forward proxies traffic from the user using an IP from the default IP range shared across all Zero Trust accounts</p></li><li><p>Dedicated egress IP – Cloudflare provides customers with a dedicated IP (IPv4 and IPv6) or range of IPs geolocated to one or more Cloudflare network locations</p></li></ul><p>The WARP Proxy IP range is the default egress method for all Cloudflare Zero Trust customers. It is a great way to preserve the privacy of your organization as user traffic is sent to the nearest Cloudflare network location which ensures the most performant Internet experience. But setting source IP security policies based on this default IP range does not provide the granularity that admins often require to filter their user traffic.</p><p>Dedicated egress IPs are useful in situations where administrators want to allowlist traffic based on a persistent identifier. As their name suggests, these dedicated egress IPs are exclusively available to the assigned customer—and not used by any other customers routing traffic through Cloudflare’s network.</p><p>Additionally, leasing these dedicated egress IPs from Cloudflare helps avoid any privacy concerns which arise when carving them out from an organization’s own IP ranges. And furthermore, alleviates the need to protect your any of the IP ranges that are assigned to your on-premise VPN appliance from DDoS attacks or otherwise.</p><p>Dedicated egress IPs are available as add-on to for any Cloudflare Zero Trust enterprise-contracted customer. Contract customers can select the specific Cloudflare data centers used for their dedicated egress, and all subscribing customers receive at least two IPs to start, so user traffic is always routed to the closest dedicated egress data center for performance and resiliency. Finally, organizations can egress their traffic through Cloudflare’s dedicated IPs via their preferred on-ramps. These include Cloudflare’s device client (WARP), proxy endpoints, GRE and IPsec on-ramps, or any of our 1600+ peering network locations, including major ISPs, cloud providers, and enterprises.</p>
    <div>
      <h3>Customer use cases today</h3>
      <a href="#customer-use-cases-today">
        
      </a>
    </div>
    <p>Cloudflare customers around the world are taking advantage of Gateway dedicated egress IPs to streamline application access. Below are three most common use cases we’ve seen deployed by customers of varying sizes and across industries:</p><ul><li><p><b>Allowlisting access to apps from third parties:</b> Users often need to access tools controlled by suppliers, partners, and other third party organizations. Many of those external organizations still rely on source IP to authenticate traffic. Dedicated egress IPs make it easy for those third parties to fit within these existing constraints.</p></li><li><p><b>Allowlisting access to SaaS apps:</b> Source IPs are still commonly used as a defense-in-depth layer for how users access SaaS apps, alongside other more advanced measures like <a href="https://www.cloudflare.com/learning/access-management/what-is-multi-factor-authentication/">multi-factor authentication</a> and <a href="https://www.cloudflare.com/learning/access-management/what-is-an-identity-provider/">identity provider checks</a>.</p></li><li><p><b>Deprecating VPN usage:</b> Often hosted VPNs will be allocated IPs within the customers advertised IP range. The security flaws, performance limitations, and administrative complexities of VPNs are well-documented in our <a href="/how-to-augment-or-replace-your-vpn">recent Cloudflare blog</a>. To ease customer migration, users will often choose to maintain any IP allowlist processes in place today.</p></li></ul><p>Through this, administrators are able to maintain the convenience of building policies with fixed, known IPs, while accelerating performance for end users by routing through Cloudflare’s global network.</p>
    <div>
      <h3>Cloudflare Zero Trust egress policies</h3>
      <a href="#cloudflare-zero-trust-egress-policies">
        
      </a>
    </div>
    <p>Today, we are excited to announce an upcoming way to build more granular policies using Cloudflare’s dedicated egress IPs. With a forthcoming egress IP policy builder in the Cloudflare Zero Trust dashboard, administrators can specify which IP is used for egress traffic based on identity, application, network and geolocation attributes.</p><p>Administrators often want to route only certain traffic through dedicated egress IPs—whether for certain applications, certain Internet destinations, and certain user groups. Soon, administrators can set their preferred egress method based on a wide variety of selectors such as application, content category, domain, user group, destination IP, and more. This flexibility helps organizations take a layered approach to security, while also maintaining high performance (often via dedicated IPs) to the most critical destinations.</p><p>Furthermore, administrators will be able to use the egress IP policy builder to geolocate traffic to any country or region where Cloudflare has a presence. This geolocation capability is particularly useful for globally distributed teams which require geo-specific experiences.</p><p>For example, a large media conglomerate has marketing teams that would verify the layouts of digital advertisements running across multiple regions. Prior to partnering with Cloudflare, these teams had clunky, manual processes to verify their ads were displaying as expected in local markets: either they had to ask colleagues in those local markets to check, or they had to spin up a VPN service to proxy traffic to the region. With an egress policy these teams would simply be able to match a custom test domain for each region and egress using their dedicated IP deployed there.</p>
    <div>
      <h3>What’s Next</h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>You can take advantage of Cloudflare’s dedicated egress IPs by adding them onto a Cloudflare Zero Trust <a href="https://www.cloudflare.com/products/zero-trust/plans/enterprise/">Enterprise plan</a> or contacting your account team. If you would like to be contacted when we release the Gateway egress policy builder, <a href="http://www.cloudflare.com/zero-trust/lp/egress-policies-beta">join the waitlist here</a>.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare One Week]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Cloudflare Gateway]]></category>
            <category><![CDATA[Egress]]></category>
            <guid isPermaLink="false">4eW5y859iFlWmPFC0ENX2b</guid>
            <dc:creator>Ankur Aggarwal</dc:creator>
            <dc:creator>James Chang</dc:creator>
        </item>
        <item>
            <title><![CDATA[Introducing SSH command logging]]></title>
            <link>https://blog.cloudflare.com/ssh-command-logging/</link>
            <pubDate>Fri, 18 Mar 2022 13:00:36 GMT</pubDate>
            <description><![CDATA[ We built SSH command logging into Cloudflare Zero Trust to provide SSH visibility at a network layer instead of relying on software on individual machines ]]></description>
            <content:encoded><![CDATA[ <p></p><p><a href="https://www.cloudflare.com/learning/access-management/what-is-ssh/">SSH (Secure Shell Protocol)</a> is an important protocol for managing remote machines. It provides a way for infrastructure teams to remotely and securely manage their fleet of machines. SSH was a step-up in security from other protocols like telnet. It ensures encrypted traffic and enforces per user controls over access to a particular machine. However, it can still introduce a significant security risk. SSH, especially root access, is destructive in the wrong hands (think <code>rm -r *</code>) and can be difficult to track. Logging and securing user actions via SSH typically requires custom development or restrictive software deployments. We’re excited to announce SSH command logging as part of Cloudflare Zero Trust.</p>
    <div>
      <h3>Securing SSH access</h3>
      <a href="#securing-ssh-access">
        
      </a>
    </div>
    <p>Security teams put significant effort into securing SSH across their organization because of the negative impact it can have in the wrong hands. Traditional SSH security consists of strong authentication, like certificate based authentication, and tight controls on who has “root” access. Additionally, VPNs and IP allow lists are used to further protect a machine from being publicly accessible to the Internet. The security challenges that remain are visibility and <a href="https://www.cloudflare.com/learning/security/glossary/what-is-lateral-movement/">potential for lateral movement</a>.</p><p>SSH commands to a remote machine are end-to-end encrypted, which means that it is impossible to see what is being run by a particular user on a specific machine. Typically, logs can only be captured on the machine itself in log files, and a malicious user can delete log files as easily as any other command they’re running to cover their tracks. Solutions exist to send these logs to an external logging service, but this requires installing additional software on every machine that can be accessed using SSH. <a href="https://man.openbsd.org/ssh_config#ProxyJump">ProxyJump</a>, a common way to deploy a JumpHost model, further compounds this problem because a user can easily traverse a local network of machines once they gain access to a machine in the network.</p>
    <div>
      <h3>Introducing SSH command logging</h3>
      <a href="#introducing-ssh-command-logging">
        
      </a>
    </div>
    <p>We built SSH command logging into Cloudflare Zero Trust to provide SSH visibility at a network layer instead of relying on software on individual machines. Our first customer for this capability is the Cloudflare security team. SSH command logging provides a full replay of all commands run during an SSH session, including across multiple jump-hosts or bastions. This allows for a clear picture of what happened in the event of an accident, suspected breach, or attack.</p><p>SSH command logging was built as an extension of Cloudflare’s Secure Web Gateway. The <a href="https://www.cloudflare.com/learning/access-management/what-is-a-secure-web-gateway/">Secure Web Gateway</a> already performs secure TLS inspection of all traffic from a user device. Now, it also supports SSH inspection by bootstrapping a proxy server upon new connections. Administrators are able to configure <i>network policies</i> to allow SSH access and audit the specific commands run.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3hBeFNbgv24vOQOOGmHBoG/8b8547ddb74390c46625a2d7b930c4a6/image1-75.png" />
            
            </figure><p>This then exposes that machine for SSH access and proxies all SSH commands via Cloudflare’s global edge network. All commands are automatically captured without complex logging software installed on the machine and across all hosts. TTY traffic can also be recorded for a later full session replay.</p><p>As an added measure of security, all logs captured by Cloudflare are immediately encrypted via a public key provided by each customer, to ensure that only authorized security users can inspect SSH commands. Furthermore, we are launching this feature with an opt-in FIPS 140-2 mode to support <a href="https://www.cloudflare.com/learning/privacy/what-is-fedramp/">FedRAMP compliant </a>users.</p><p>All user authentication is performed via <a href="https://developers.cloudflare.com/cloudflare-one/identity/users/short-lived-certificates/">Cloudflare Short-Lived Certificates</a>. Once the client certificate is loaded onto a user machine, their SSH setup is complete and secure. This eliminates the need for tedious and tricky SSH key-pair management. This means no more key management on end user devices, all the need is the Cloudflare root CA, and they can access any machine they are entitled to, including using ProxyJump.</p>
    <div>
      <h3>What’s next</h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>This is only the beginning for SSH security in Cloudflare Zero Trust. In the future, we will integrate with popular <a href="https://www.cloudflare.com/learning/security/what-is-siem/">SIEM</a> tools and provide alerting for specific commands and risky behavior.</p><p>SSH command logging is in closed beta, and we will be opening this feature up to users in the coming weeks. Stay tuned for more updates when we announce general availability!</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[SSH]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <guid isPermaLink="false">kYiLR4zOyU5gHh6jMuJOg</guid>
            <dc:creator>Ankur Aggarwal</dc:creator>
            <dc:creator>Eduardo Gomes</dc:creator>
            <dc:creator>Kenny Johnson</dc:creator>
        </item>
        <item>
            <title><![CDATA[Replace your hardware firewalls with Cloudflare One]]></title>
            <link>https://blog.cloudflare.com/replace-your-hardware-firewalls-with-cloudflare-one/</link>
            <pubDate>Mon, 06 Dec 2021 14:00:01 GMT</pubDate>
            <description><![CDATA[ Today, we’re excited to announce new capabilities to help customers make the switch from hardware firewall appliances to a true cloud-native firewall built for next-generation networks. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Today, we’re excited to announce new capabilities to help customers make the switch from hardware firewall appliances to a true cloud-native firewall built for next-generation networks. Cloudflare One provides a secure, performant, and Zero Trust-enabled platform for administrators to apply consistent security policies across all of their users and resources. Best of all, it’s built on top of our global network, so you never need to worry about scaling, deploying, or maintaining your edge security hardware.</p><p>As part of this announcement, Cloudflare launched the <a href="http://cloudflare.com/oahu">Oahu</a> program today to help customers leave legacy hardware behind; in this post we’ll break down the new capabilities that solve the problems of previous firewall generations and save IT teams time and money.</p>
    <div>
      <h2>How did we get here?</h2>
      <a href="#how-did-we-get-here">
        
      </a>
    </div>
    <p>In order to understand where we are today, it’ll be helpful to start with a brief history of IP firewalls.</p>
    <div>
      <h3>Stateless packet filtering for private networks</h3>
      <a href="#stateless-packet-filtering-for-private-networks">
        
      </a>
    </div>
    <p>The first generation of network firewalls were designed mostly to meet the security requirements of private networks, which started with the castle and moat architecture we defined as Generation 1 in <a href="/welcome-to-cio-week/">our post yesterday</a>. Firewall administrators could build policies around signals available at layers 3 and 4 of the <a href="https://www.cloudflare.com/learning/ddos/glossary/open-systems-interconnection-model-osi/">OSI model</a> (primarily IPs and ports), which was perfect for (e.g.) enabling a group of employees on one floor of an office building to access servers on another via a LAN.</p><p>This packet filtering capability was sufficient until networks got more complicated, including by connecting to the Internet. IT teams began needing to protect their corporate network from bad actors on the outside, which required more sophisticated policies.</p>
    <div>
      <h3>Better protection with stateful &amp; deep packet inspection</h3>
      <a href="#better-protection-with-stateful-deep-packet-inspection">
        
      </a>
    </div>
    <p>Firewall hardware evolved to include stateful packet inspection and the beginnings of deep packet inspection, extending basic firewall concepts by tracking the state of connections passing through them. This enabled administrators to (e.g.) block all incoming packets not tied to an already present outgoing connection.</p><p>These new capabilities provided more sophisticated protection from attackers. But the advancement came at a cost: supporting this higher level of security required more compute and memory resources. These requirements meant that security and network teams had to get better at planning the capacity they’d need for each new appliance and make tradeoffs between cost and redundancy for their network.</p><p>In addition to cost tradeoffs, these new firewalls only provided some insight into how the network was used. You could tell users were accessing 198.51.100.10 on port 80, but to do a further investigation about what these users were accessing would require you to do a reverse lookup of the IP address. That alone would only land you at the front page of the provider, with no insight into what was accessed, reputation of the domain/host, or any other information to help answer “Is this a security event I need to investigate further?”. Determining the source would be difficult here as well, it would require correlating a private IP address handed out via DHCP with a device and then subsequently a user (if you remembered to set long lease times and never shared devices).</p>
    <div>
      <h3>Application awareness with next generation firewalls</h3>
      <a href="#application-awareness-with-next-generation-firewalls">
        
      </a>
    </div>
    <p>To accommodate these challenges, the industry introduced the <a href="https://www.cloudflare.com/learning/security/what-is-next-generation-firewall-ngfw/">Next Generation Firewall</a> (NGFW). These were the long reigning, and in some cases are still the industry standard, corporate edge security device. They adopted all the capabilities of previous generations while adding in application awareness to help administrators gain more control over what passed through their <a href="https://www.cloudflare.com/learning/access-management/what-is-the-network-perimeter/">security perimeter</a>. NGFWs introduced the concept of vendor-provided or externally-provided application intelligence, the ability to identify individual applications from traffic characteristics. Intelligence which could then be fed into policies defining what users could and couldn’t do with a given application.</p><p>As more applications moved to the cloud, NGFW vendors started to provide virtualized versions of their appliances. These allowed administrators to no longer worry about lead times for the next hardware version and allowed greater flexibility when deploying to multiple locations.</p><p>Over the years, as the threat landscape continued to evolve and networks became more complex, NGFWs started to build in additional security capabilities, some of which helped consolidate multiple appliances. Depending on the vendor, these included VPN Gateways, IDS/IPS, <a href="https://www.cloudflare.com/learning/ddos/glossary/web-application-firewall-waf/">Web Application Firewalls</a>, and even things like Bot Management and <a href="https://www.cloudflare.com/ddos/">DDoS protection</a>. But even with these features, NGFWs had their drawbacks — administrators still needed to spend time designing and configuring redundant (at least primary/secondary) appliances, as well as choosing which locations had firewalls and incurring performance penalties from backhauling traffic there from other locations. And even still, careful IP address management was required when creating policies to apply pseudo identity.</p>
    <div>
      <h3>Adding user-level controls to move toward Zero Trust</h3>
      <a href="#adding-user-level-controls-to-move-toward-zero-trust">
        
      </a>
    </div>
    <p>As firewall vendors added more sophisticated controls, in parallel, a paradigm shift for network architecture was introduced to address the security concerns introduced as applications and users left the organization’s “castle” for the Internet. <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust security</a> means that no one is trusted by default from inside or outside the network, and verification is required from everyone trying to gain access to resources on the network. Firewalls started incorporating Zero Trust principles by integrating with identity providers (IdPs) and allowing users to build policies around user groups — “only Finance and HR can access payroll systems” — enabling finer-grained control and reducing the need to rely on IP addresses to approximate identity.</p><p>These policies have helped organizations lock down their networks and get closer to Zero Trust, but CIOs are still left with problems: what happens when they need to integrate another organization’s identity provider? How do they safely grant access to corporate resources for contractors? And these new controls don’t address the fundamental problems with managing hardware, which still exist and are getting more complex as companies go through business changes like adding and removing locations or embracing hybrid forms of work. <a href="https://www.cloudflare.com/cio/">CIOs need a solution</a> that works for the future of corporate networks, instead of trying to duct tape together solutions that address only some aspects of what they need.</p>
    <div>
      <h2>The cloud-native firewall for next-generation networks</h2>
      <a href="#the-cloud-native-firewall-for-next-generation-networks">
        
      </a>
    </div>
    <p>Cloudflare is helping customers build the future of their corporate networks by unifying network connectivity and Zero Trust security. Customers who adopt the Cloudflare One platform can deprecate their hardware firewalls in favor of a cloud-native approach, making IT teams’ lives easier by solving the problems of previous generations.</p>
    <div>
      <h3>Connect any source or destination with flexible on-ramps</h3>
      <a href="#connect-any-source-or-destination-with-flexible-on-ramps">
        
      </a>
    </div>
    <p>Rather than managing different devices for different use cases, all traffic across your network — from data centers, offices, cloud properties, and user devices — should be able to flow through a single global firewall. Cloudflare One enables you to connect to the Cloudflare network with a variety of flexible on-ramp methods including network-layer (GRE or <a href="/anycast-ipsec/">IPsec</a> tunnels) or <a href="https://www.cloudflare.com/products/tunnel/">application-layer</a> tunnels, <a href="https://www.cloudflare.com/network-interconnect/">direct connections</a>, <a href="/bringing-your-own-ips-to-cloudflare-byoip/">BYOIP</a>, and a <a href="/warp-for-desktop/">device client</a>. Connectivity to Cloudflare means access to our entire global network, which eliminates many of the challenges with physical or virtualized hardware:</p><ul><li><p><b>No more capacity planning</b>: The capacity of your firewall is the capacity of Cloudflare’s global network (currently &gt;100Tbps and growing).</p></li><li><p><b>No more location planning:</b> Cloudflare’s Anycast network architecture enables traffic to connect automatically to the closest location to its source. No more picking regions or worrying about where your primary/backup appliances are — redundancy and failover are built in by default.</p></li><li><p><b>No maintenance downtimes:</b> Improvements to Cloudflare’s firewall capabilities, like all of our products, are deployed continuously across our global edge.</p></li><li><p><b>DDoS protection built in:</b> No need to worry about DoS attacks overwhelming your firewalls; Cloudflare’s network automatically blocks attacks close to their source and sends only the clean traffic on to its destination.</p></li></ul>
    <div>
      <h3>Configure comprehensive policies, from packet filtering to Zero Trust</h3>
      <a href="#configure-comprehensive-policies-from-packet-filtering-to-zero-trust">
        
      </a>
    </div>
    <p>Cloudflare One policies can be used to secure and route your organizations traffic across all the various traffic ramps. These policies can be crafted using all the same attributes available through a traditional NGFW while expanding to include <a href="https://developers.cloudflare.com/cloudflare-one/identity">Zero Trust attributes</a> as well. These Zero Trust attributes can include one or more IdPs or endpoint security providers.</p><p>When looking strictly at layers 3 through 5 of the OSI model, policies can be based on IP, port, protocol, and other attributes in both a <a href="https://developers.cloudflare.com/magic-firewall/reference/magic-firewall-fields">stateless</a> and <a href="https://developers.cloudflare.com/cloudflare-one/policies/filtering/network-policies#expressions">stateful</a> manner. These attributes can also be used to build your private network on Cloudflare when used in conjunction with any of the identity attributes and the Cloudflare device client.</p><p>Additionally, to help relieve the burden of managing IP allow/block lists, Cloudflare provides a set of managed lists that can be applied to both stateless and stateful policies. And on the more sophisticated end, you can also perform <a href="https://developers.cloudflare.com/magic-firewall/reference/magic-firewall-functions">deep packet inspection</a> and <a href="/programmable-packet-filtering-with-magic-firewall/">write programmable packet filters</a> to enforce a positive security model and thwart the largest of attacks.</p><p>Cloudflare’s intelligence helps power our application and content categories for our Layer 7 policies, which can be used to protect your users from security threats, prevent data exfiltration, and audit usage of company resources. This starts with our protected DNS resolver, which is built on top of our performance leading consumer 1.1.1.1 service. Protected DNS allows administrators to protect their users from navigating or resolving any known or potential <a href="https://developers.cloudflare.com/cloudflare-one/policies/filtering/dns-policies-builder/dns-categories">security risks</a>. Once a domain is resolved, administrators can apply HTTP policies to intercept, inspect, and filter a user's traffic. And if those web applications are self-hosted or SaaS enabled you can even protect them using a Cloudflare access policy, which acts as a web based identity proxy.</p><p>Last but not least, to help prevent data exfiltration, administrators can lock down access to external HTTP applications by utilizing <a href="https://developers.cloudflare.com/cloudflare-one/policies/browser-isolation">remote browser isolation</a>. And coming soon, administrators will be able to log and filter which commands a user can execute over an <a href="https://www.cloudflare.com/learning/access-management/what-is-ssh/">SSH session</a>.</p>
    <div>
      <h3>Simplify policy management: one click to propagate rules everywhere</h3>
      <a href="#simplify-policy-management-one-click-to-propagate-rules-everywhere">
        
      </a>
    </div>
    <p>Traditional firewalls required deploying policies on each device or configuring and maintaining an orchestration tool to help with this process. In contrast, Cloudflare allows you to manage policies across our entire network from a simple dashboard or API, or use Terraform to deploy infrastructure as code. Changes propagate across the edge in seconds thanks to our <a href="/introducing-quicksilver-configuration-distribution-at-internet-scale/">Quicksilver</a> technology. Users can get visibility into traffic flowing through the firewall with logs, which are <a href="/pii-and-selective-logging-controls-for-cloudflares-zero-trust-platform/">now configurable</a>.</p>
    <div>
      <h2>Consolidating multiple firewall use cases in one platform</h2>
      <a href="#consolidating-multiple-firewall-use-cases-in-one-platform">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/learning/security/what-is-a-firewall/">Firewalls</a> need to cover a myriad of traffic flows to satisfy different security needs, including blocking bad inbound traffic, filtering outbound connections to ensure employees and applications are only accessing safe resources, and inspecting internal (“East/West”) traffic flows to enforce Zero Trust. Different hardware often covers one or multiple use cases at different locations; we think it makes sense to consolidate these as much as possible to improve ease of use and establish a single source of truth for firewall policies. Let’s walk through some use cases that were traditionally satisfied with hardware firewalls and explain how IT teams can satisfy them with Cloudflare One.</p>
    <div>
      <h3>Protecting a branch office</h3>
      <a href="#protecting-a-branch-office">
        
      </a>
    </div>
    <p>Traditionally, IT teams needed to provision at least one hardware firewall per office location (multiple for redundancy). This involved forecasting the amount of traffic at a given branch and ordering, installing, and maintaining the appliance(s). Now, customers can connect branch office traffic to Cloudflare from whatever hardware they already have — any standard router that supports GRE or IPsec will work — and control filtering policies across all of that traffic from Cloudflare’s dashboard.</p><p><b>Step 1: Establish a GRE or IPsec tunnel</b>The majority of mainstream hardware providers support GRE and/or IPsec as tunneling methods. Cloudflare will provide an Anycast IP address to use as the tunnel endpoint on our side, and you configure a standard GRE or IPsec tunnel with no additional steps — the Anycast IP provides automatic connectivity to every Cloudflare data center.</p><p><b>Step 2: Configure network-layer firewall rules</b>All IP traffic can be filtered through Magic Firewall, which includes the ability to construct policies based on any packet characteristic — e.g., source or destination IP, port, protocol, country, or bit field match. Magic Firewall also integrates with <a href="/introducing-ip-lists/">IP Lists</a> and includes advanced capabilities like <a href="/programmable-packet-filtering-with-magic-firewall/">programmable packet filtering</a>.</p><p><b>Step 3: Upgrade traffic for application-level firewall rules</b>After it flows through Magic Firewall, TCP and UDP traffic can be “upgraded” for fine-grained filtering through Cloudflare Gateway. This upgrade unlocks a full suite of filtering capabilities including application and content awareness, identity enforcement, SSH/HTTP proxying, and DLP.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/15mxsEXJnTAjsD1goBIwn3/f00d5d46972d43a07b14e1d256b5493b/unnamed-2.png" />
            
            </figure>
    <div>
      <h3>Protecting a high-traffic data center or VPC</h3>
      <a href="#protecting-a-high-traffic-data-center-or-vpc">
        
      </a>
    </div>
    <p>Firewalls used for processing data at a high-traffic headquarters or data center location can be some of the largest capital expenditures in an IT team’s budget. Traditionally, data centers have been protected by beefy appliances that can handle high volumes gracefully, which comes at an increased cost. With Cloudflare’s architecture, because every server across our network can share the responsibility of processing customer traffic, no one device creates a bottleneck or requires expensive specialized components. Customers can on-ramp traffic to Cloudflare with BYOIP, a standard tunnel mechanism, or Cloudflare Network Interconnect, and process up to terabits per second of traffic through firewall rules smoothly.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5efjp1MCUcxTZfrszwZyKj/b2fc5a524ca4e7bd5269f1c08c975bfa/unnamed--1--1.png" />
            
            </figure>
    <div>
      <h3>Protecting a roaming or hybrid workforce</h3>
      <a href="#protecting-a-roaming-or-hybrid-workforce">
        
      </a>
    </div>
    <p>In order to connect to corporate resources or get secure access to the Internet, users in traditional network architectures establish a VPN connection from their devices to a central location where firewalls are located. There, their traffic is processed before it’s allowed to its final destination. This architecture introduces performance penalties and while modern firewalls can enable user-level controls, they don’t necessarily achieve Zero Trust. Cloudflare enables customers to use a device client as an on-ramp to Zero Trust policies; watch out for more updates later this week on how to smoothly deploy the client at scale.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3O3oEBTYP2VN6fDCLrjZ10/0c855b9a935dde38bb24d5c67fca348c/unnamed--2--1.png" />
            
            </figure>
    <div>
      <h2>What’s next</h2>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>We can’t wait to keep evolving this platform to serve new use cases. We’ve heard from customers who are interested in expanding NAT Gateway functionality through Cloudflare One, who want richer analytics, reporting, and <a href="https://www.cloudflare.com/application-services/solutions/app-performance-monitoring/">user experience monitoring</a> across all our firewall capabilities, and who are excited to adopt a full suite of DLP features across all of their traffic flowing through Cloudflare’s network. Updates on these areas and more are coming soon (stay tuned).</p><p>Cloudflare’s new firewall capabilities are available for enterprise customers today. Learn more <a href="https://www.cloudflare.com/magic-firewall/">here</a> and check out the <a href="http://cloudflare.com/oahu">Oahu Program</a> to learn how you can migrate from hardware firewalls to Zero Trust — or talk to your account team to get started today.</p> ]]></content:encoded>
            <category><![CDATA[CIO Week]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Firewall]]></category>
            <category><![CDATA[Cloudflare Gateway]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <guid isPermaLink="false">NVgWtzBSDEvGcm5UE0AC5</guid>
            <dc:creator>Ankur Aggarwal</dc:creator>
            <dc:creator>Annika Garbers</dc:creator>
        </item>
        <item>
            <title><![CDATA[PII and Selective Logging controls for Cloudflare’s Zero Trust platform]]></title>
            <link>https://blog.cloudflare.com/pii-and-selective-logging-controls-for-cloudflares-zero-trust-platform/</link>
            <pubDate>Mon, 06 Dec 2021 13:59:18 GMT</pubDate>
            <description><![CDATA[ Today we’re excited to announce a combination of two features, Zero Trust role-based access and selective logging. With these features, administrators will be able to protect not only their users but also the data their users generate. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>At Cloudflare, we believe that you shouldn’t have to compromise privacy for security. Last year, we launched Cloudflare Gateway — a comprehensive, Secure Web Gateway with built-in <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> browsing controls for your organization. Today, we’re excited to share the latest set of privacy features available to administrators to log and audit events based on your team’s needs.</p>
    <div>
      <h3>Protecting your organization</h3>
      <a href="#protecting-your-organization">
        
      </a>
    </div>
    <p>Cloudflare Gateway helps organizations replace legacy firewalls while also <a href="https://www.cloudflare.com/learning/access-management/how-to-implement-zero-trust/">implementing Zero Trust controls</a> for their users. Gateway meets you wherever your users are and allows them to connect to the Internet or even your private network running on Cloudflare. This extends your <a href="https://www.cloudflare.com/learning/access-management/what-is-the-network-perimeter/">security perimeter</a> without having to purchase or maintain any additional boxes.</p><p>Organizations also benefit from improvements to user performance beyond just removing the backhaul of traffic to an office or data center. Cloudflare’s network delivers security filters closer to the user in over 250 cities around the world. Customers start their connection by using the <a href="/announcing-1111/">world’s fastest DNS resolver</a>. Once connected, Cloudflare intelligently routes their traffic through our network with layer 4 network and layer 7 HTTP filters.</p><p>To get started, administrators deploy Cloudflare’s client (WARP) on user devices, whether those devices are macOS, Windows, iOS, Android, ChromeOS or Linux. The client then sends all outbound layer 4 traffic to Cloudflare, along with the identity of the user on the device.</p><p>With proxy and TLS decryption turned on, Cloudflare will log all traffic sent through Gateway and surface this in Cloudflare’s dashboard in the form of raw logs and aggregate analytics. However, in some instances, administrators may not want to retain logs or allow access to all members of their security team.</p><p>The reasons may vary, but the end result is the same: administrators need the ability to control how their users' data is collected and who can audit those records.</p><p>Legacy solutions typically give administrators an all-or-nothing blunt hammer. Organizations could either enable or disable all logging. Without any logging, those services did not capture any personally identifiable information (PII). By avoiding PII, administrators did not have to worry about control or access permissions, but they lost all visibility to investigate security events.</p><p>That lack of visibility adds even more complications when teams need to address tickets from their users to answer questions like “why was I blocked?”, “why did that request fail?”, or “shouldn’t that have been blocked?”. Without logs related to any of these events, your team can’t help end users diagnose these types of issues.</p>
    <div>
      <h3>Protecting your data</h3>
      <a href="#protecting-your-data">
        
      </a>
    </div>
    <p>Starting today, your team has more options to decide the type of information Cloudflare Gateway logs and who in your organization can review it. We are releasing role-based dashboard access for the logging and analytics pages, as well as selective logging of events. With role-based access, those with access to your account will have PII information redacted from their dashboard view by default.</p><p>We’re excited to help organizations build least-privilege controls into how they manage the deployment of Cloudflare Gateway. Security team members can continue to manage policies or investigate aggregate attacks. However, some events call for further investigation. With today’s release, your team can delegate the ability to review and search using PII to specific team members.</p><p>We still know that some customers want to reduce the logs stored altogether, and we’re excited to help solve that too. Now, administrators can now select what level of logging they want Cloudflare to store on their behalf. They can control this for each component, DNS, Network, or HTTP and can even choose to only log block events.</p><p>That setting does not mean you lose all logs — just that Cloudflare never stores them. Selective logging combined with our previously released <a href="/export-logs-from-cloudflare-gateway-with-logpush/">Logpush service</a> allows users to stop storage of logs on Cloudflare and turn on a Logpush job to their destination of choice in their location of choice as well.</p>
    <div>
      <h3>How to Get Started</h3>
      <a href="#how-to-get-started">
        
      </a>
    </div>
    <p>To get started, any Cloudflare Gateway customer can visit the <a href="https://dash.teams.cloudflare.com/settings/network">Cloudflare for Teams dashboard</a> and navigate to Settings &gt; Network. The first option on this page will be to specify your preference for activity logging. By default, Gateway will log all events, including DNS queries, HTTP requests and Network sessions. In the network settings page, you can then refine what type of events you wish to be logged. For each component of Gateway you will find three options:</p><ol><li><p>Capture all</p></li><li><p>Capture only blocked</p></li><li><p>Don’t capture</p></li></ol>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/51cwm1HCCSZ2XblS4aQuFc/8a14ff5ea45b8f16cc9d71d65e97b99f/image2-10.png" />
            
            </figure><p>Additionally, you’ll find an option to redact all PII from logs by default. This will redact any information that can be used to potentially identify a user including User Name, User Email, User ID, Device ID, source IP, URL, referrer and user agent.</p><p>We’ve also included new roles within the <a href="https://dash.cloudflare.com">Cloudflare dashboard</a>, which provide better granularity when partitioning Administrator access to Access or Gateway components. These new roles will go live in January 2022 and can be modified on enterprise accounts by visiting Account Home → Members.</p><p>If you’re not yet ready to create an account, but would like to explore our Zero Trust services, <a href="https://www.cloudflare.com/teams/self-guided-tour-of-zero-trust-platform/">check out our interactive demo</a> where you can take a self-guided tour of the platform with narrated walkthroughs of key use cases, including setting up DNS and HTTP filtering with Cloudflare Gateway.</p>
    <div>
      <h3>What’s Next</h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>Moving forward, we’re excited to continue adding more and more privacy features that will give you and your team more granular control over your environment. The features announced today are available to users on any plan; your team can follow this link to <a href="https://dash.cloudflare.com/sign-up/teams">get started today</a>.</p> ]]></content:encoded>
            <category><![CDATA[CIO Week]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Cloudflare Gateway]]></category>
            <category><![CDATA[Firewall]]></category>
            <category><![CDATA[Logs]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">1v1p5WFE2xOTy05X4x43AJ</guid>
            <dc:creator>Ankur Aggarwal</dc:creator>
            <dc:creator>Abe Carryl</dc:creator>
        </item>
    </channel>
</rss>