
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Mon, 13 Apr 2026 09:44:01 GMT</lastBuildDate>
        <item>
            <title><![CDATA[Securing data in SaaS to SaaS applications]]></title>
            <link>https://blog.cloudflare.com/saas-to-saas-security/</link>
            <pubDate>Wed, 24 Sep 2025 13:00:00 GMT</pubDate>
            <description><![CDATA[ The recent Salesloft breach taught us one thing: companies do not have visibility over data in SaaS applications. Cloudflare is committing to providing additional security tools for SaaS applications ]]></description>
            <content:encoded><![CDATA[ <p>The recent <a href="https://blog.cloudflare.com/response-to-salesloft-drift-incident/"><u>Salesloft breach</u></a> taught us one thing: connections between <a href="https://www.cloudflare.com/learning/cloud/what-is-saas/"><u>SaaS applications</u></a> are hard to monitor and create blind spots for security teams with disastrous side effects. This will likely not be the last breach of this type. </p><p>To fix this, Cloudflare is working towards a set of solutions that consolidates all SaaS connections via a single proxy, for easier monitoring, detection and response. A SaaS to SaaS proxy for everyone.</p><p>As we build this, we need feedback from the community, both data owners and SaaS platform providers. If you are interested in gaining early access, <a href="http://www.cloudflare.com/lp/saas-to-saas-security"><u>please sign up here</u></a>.</p><p>SaaS platform providers, who often offer marketplaces for additional applications, store data on behalf of their customers and ultimately become the trusted guardians. As integrations with marketplace applications take place, that guardianship is put to the test. A key breach in any one of these integrations can lead to widespread data exfiltration and tampering. As more apps are added the attack surface grows larger. Security teams who work for the data owner have no ability, today, to detect and react to any potential breach.</p><p>In this post we explain the underlying technology required to make this work and help keep your data on the Internet safe.</p>
    <div>
      <h2>SaaS to SaaS integrations</h2>
      <a href="#saas-to-saas-integrations">
        
      </a>
    </div>
    <p>No one disputes the value provided by SaaS applications and their integrations. Major SaaS companies implement flourishing integration ecosystems, often presented as marketplaces. For many, it has become part of their value pitch. Salesforce provides an <a href="https://appexchange.salesforce.com/"><u>AppExchange</u></a>. Zendesk provides a <a href="https://www.zendesk.co.uk/marketplace/apps/"><u>marketplace</u></a>. ServiceNow provides an <a href="https://www.servicenow.com/uk/products/integration-hub.html"><u>Integration Hub</u></a>. And so forth.</p><p>These provide significant value to any organisation and complex workflows. Data analysis or other tasks that are not supported natively by the SaaS vendor are easily carried out via a few clicks.</p><p>On the other hand, SaaS applications present security teams with a growing list of unknowns. Who can access this data? What security processes are put in place? And more importantly: how do we detect data leak, compromise, or other malicious intent?</p><p>Following the <a href="https://blog.cloudflare.com/response-to-salesloft-drift-incident/"><u>Salesloft breach</u></a>, which compromised the data of hundreds of companies, including Cloudflare, the answers to these questions are top of mind.</p>
    <div>
      <h2>The power of the proxy: seamless observability</h2>
      <a href="#the-power-of-the-proxy-seamless-observability">
        
      </a>
    </div>
    <p>There are two approaches Cloudflare is actively prototyping to address the growing security challenges SaaS applications pose, namely visibility into SaaS to SaaS connections, including anomaly detection and key management in the event of a breach. Let’s go over each of these, both relying on proxying SaaS to SaaS traffic.</p>
    <div>
      <h3>1) Giving control back to the data owner</h3>
      <a href="#1-giving-control-back-to-the-data-owner">
        
      </a>
    </div>
    <p>Cloudflare runs one of the world’s largest reverse proxy networks. As we terminate L7 traffic, we are able to perform security-related functions including blocking malicious requests, detecting anomalies, detecting automated traffic and so forth. This is one of the main use cases customers approach us for.</p><p>Cloudflare can proxy any hostname under the customer’s control.</p><p>It is this specific ability, often referred to as “vanity”, “branded” or “custom” hostnames, that allows us to act as a front door to the SaaS vendor on behalf of a customer. Provided a marketplace app integrates via a custom domain, the data owner can choose to use Cloudflare’s new SaaS integration protection capabilities. </p><p>For a customer (Acme Corp in this example) to access, say SaaS Application, the URL needs to become saas.acme.com as that is under Acme’s control (and not acme.saas.com).</p><p>This setup allows Cloudflare to be placed in front of SaaS Corp as the customer controls the DNS hostname. By proxying traffic, Cloudflare can be the only integration entity with programmatic access to SaaS Corp's APIs and data and transparently "swap" authorisation tokens with valid ones and issue separate tokens, using key splitting, to any integrations.  </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1diK7GrWICfbRyHu2fpvFt/26eec0f692686d7d4f769abd7e2db661/image__4_.png" />
          </figure><p>Note that in many cases, authorization and authentication flows fall outside any vanity/branded hostname. It is in fact very common for an <a href="https://www.cloudflare.com/learning/access-management/what-is-oauth/"><u>OAuth</u></a> flow to still hit the SaaS provider url oauth.saas.com. It is therefore required, in this setup, for marketplace applications to provide the ability to support vanity/branded URLs for their OAuth and similar flows, oauth.saas.acme.com in the diagram above.</p><p>Ultimately Cloudflare provides a full L7 <a href="https://www.cloudflare.com/learning/cdn/glossary/reverse-proxy/"><u>reverse proxy</u></a> for all traffic inbound/outbound to the given SaaS provider solving for the core requirements that would lessen the impact of a similar breach to the Salesloft example. Had Salesloft integrated via a Cloudflare-proxied domain, then data owners would be able to:</p><ul><li><p><b>Gain visibility into who or what can access data</b>, and where it’s accessed from, in the SaaS platform. Cloudflare already provides analytics and filtering tools to identify traffic sources, including hosting locations, IPs, user agents and other tools.</p></li><li><p><b>Instantly shut off access to the SaaS provider</b> without the need to rotate credentials on the SaaS platform, as Cloudflare would be able to block access from the proxy.</p></li><li><p><b>Detects anomalies </b>in data access by observing baselines and traffic patterns. For example a change in data exfiltration traffic flows would trigger an alert.</p></li></ul>
    <div>
      <h3>2) Improve SaaS platform security</h3>
      <a href="#2-improve-saas-platform-security">
        
      </a>
    </div>
    <p>The approach listed above assumes the end user is the company whose data is at risk. However, SaaS platforms themselves are now paying a lot of attention to marketplace applications and access patterns. From a deployment perspective, it’s actually easier to provide additional visibility to a SaaS provider as it is a standard reverse proxy deployment and we have tools designed for SaaS applications, such as <a href="https://developers.cloudflare.com/cloudflare-for-platforms/cloudflare-for-saas/"><u>Cloudflare for SaaS</u></a>.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3ElxtRBMqeI0GBD45BR4UC/13eee60d852991a3dfe5b2beb172584c/BLOG-2997_3.png" />
          </figure><p>This deployment model allows Cloudflare to proxy all traffic to the SaaS vendor, including to all API endpoints therefore gaining visibility into any SaaS to SaaS connections. As part of this, we are building improvements to our <a href="https://www.cloudflare.com/en-gb/application-services/products/api-shield/"><u>API Shield solution</u></a> to provide SaaS security teams with additional controls:</p><ul><li><p><b>Token / session logging:</b> Ability to keep track of OAuth tokens and provide session logs for audit purposes.</p></li><li><p><b>Session anomaly detection:</b> Ability to warn when a given OAuth (or other session) shows anomalous behavior.</p></li><li><p><b>Token / session replacement:</b> Ability to substitute SaaS-generated tokens with Cloudflare-generated tokens to allow for fast rotation and access lock down.</p></li></ul><p>The SaaS vendor may of course expose some of the affordances to their end customer as part of their dashboard.</p>
    <div>
      <h2>How key splitting enables secure token management</h2>
      <a href="#how-key-splitting-enables-secure-token-management">
        
      </a>
    </div>
    <p>Both deployment approaches described above rely on our ability to control access without storing complete credentials. While we already store SSL/TLS private keys for millions of web applications, storing complete SaaS bearer tokens would create an additional security burden. To solve this, and enable the token swapping and instant revocation capabilities mentioned above, we use key splitting.</p><p>Key splitting cryptographically divides bearer tokens into two mathematically interdependent fragments called Part A and Part B. Part A goes to the fourth-party integration (like Drift or Zapier) while Part B stays in Cloudflare's edge storage. Part A is just random noise that won't authenticate to Salesforce or any SaaS platform expecting complete tokens, so neither fragment is usable alone.</p><p>This creates an un-bypassable control point. Integrations cannot make API calls without going through Cloudflare's proxy because they only possess Part A. When an integration needs to access data, it must present Part A to our edge where we retrieve Part B, reconstruct the token in memory for microseconds, forward the authenticated request, and then immediately clear the token. This makes sure that the complete bearer token never exists in any database or log.</p><p>This forced cooperation means every API call flows through Cloudflare where we can monitor for anomalies, delete Part B to instantly revoke access (transforming incident response from hours to seconds), and maintain complete audit trails. Even more importantly, this approach minimizes our burden of storing sensitive credentials since a breach of our systems wouldn't yield usable tokens.</p><p>If attackers compromise the integration and steal Part A, or somehow breach Cloudflare's storage and obtain Part B, neither fragment can authenticate on its own. This fundamentally changes the security model from protecting complete tokens to managing split fragments that are individually worthless. It also gives security teams unprecedented visibility and control over how their data is accessed across third-party integrations.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/MmwLfTnQweqJiIFe4fTac/a9596a5a023ec147af4dc671ba3b5b8a/BLOG-2997_4.png" />
          </figure>
    <div>
      <h2>Regaining control of your data</h2>
      <a href="#regaining-control-of-your-data">
        
      </a>
    </div>
    <p>We are excited to develop solutions mentioned above to give better control and visibility around data stored in SaaS environments, or more generally, outside a customer’s network.</p><p>If you are a company worried about this risk, and would like to be notified to take part in our early access, please sign up <a href="http://www.cloudflare.com/lp/saas-to-saas-security"><u>here</u></a>.</p><p>If you are a SaaS vendor who would like to provide feedback and take part in developing better API security tooling for third party integrations towards your platform, <a href="http://www.cloudflare.com/lp/saas-to-saas-security"><u>sign up here</u></a>.</p><p>We are looking forward to helping you get better control of your data in SaaS to SaaS environments.</p> ]]></content:encoded>
            <category><![CDATA[Birthday Week]]></category>
            <category><![CDATA[Application Services]]></category>
            <category><![CDATA[Application Security]]></category>
            <category><![CDATA[SAAS Security]]></category>
            <category><![CDATA[SaaS]]></category>
            <guid isPermaLink="false">44zY8Y1rBmaNIVZVbUGJAL</guid>
            <dc:creator>Michael Tremante</dc:creator>
            <dc:creator>Bill Sobel</dc:creator>
            <dc:creator>Ed Conolly</dc:creator>
        </item>
        <item>
            <title><![CDATA[Secure by default: recommendations from the CISA’s newest guide, and how Cloudflare follows these principles to keep you secure]]></title>
            <link>https://blog.cloudflare.com/secure-by-default-understanding-new-cisa-guide/</link>
            <pubDate>Thu, 20 Apr 2023 13:44:42 GMT</pubDate>
            <description><![CDATA[ In this post we’ll review some of the authors’ recommendations, discuss how Cloudflare applies these principles to the products that we build, and provide some suggestions on what other organizations can do to support similar initiatives internally ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6j0tYaz11zLGvniIkQhDWk/f10e0f3d509dafbab1aade081bd0a2ac/image1-13.png" />
            
            </figure><p>When you buy a new house, you shouldn’t have to worry that everyone in the city can unlock your front door with a universal key before you change the lock. You also shouldn’t have to walk around the house with a screwdriver and tighten the window locks and back door so that intruders can’t pry them open. And you <i>really</i> shouldn’t have to take your alarm system offline every few months to apply critical software updates that the alarm vendor could have fixed with better software practices before they installed it.</p><p>Similarly, you shouldn’t have to worry that when you buy a network discovery tool it can be <a href="https://threatpost.com/cisco-patches-critical-default-password-bug/142814/">accessed by any attacker until you change the password</a>, or that your expensive hardware-based firewalls <a href="https://www.darkreading.com/vulnerabilities-threats/cisa-palo-alto-firewall-bug-active-exploit">can be recruited to launch DDoS attacks</a> or <a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa22-138a">run arbitrary code</a> without the <a href="https://www.bleepingcomputer.com/news/security/fortinet-warns-of-new-critical-unauthenticated-rce-vulnerability">need to authenticate</a>.</p><p>This “default secure” posture is the focus of a <a href="https://www.cisa.gov/sites/default/files/2023-04/principles_approaches_for_security-by-design-default_508_0.pdf">recently published guide</a> jointly authored by the Cybersecurity and Infrastructure Agency (CISA), NSA, FBI, and six other international agencies representing the United Kingdom, Australia, Canada, Germany, Netherlands, and New Zealand. In the guide, the authors implore technology vendors to follow <i>Secure-by-Design</i> and <i>Secure-by-Default</i> principles, shifting the burden of security as much as possible <i>away</i> from the end-user and back <i>towards</i> the manufacturer:</p><blockquote><p><i>The authoring agencies strongly encourage every technology manufacturer to build their products in a way that prevents customers from having to constantly perform monitoring, routine updates, and damage control on their systems to mitigate cyber intrusions. Manufacturers are encouraged to take ownership of improving the security outcomes of their customers. Historically, technology manufacturers have relied on fixing vulnerabilities found after the customers have deployed the products, requiring the customers to apply those patches at their own expense. Only by incorporating Secure-by-Design practices will we break the vicious cycle of creating and applying fixes.</i></p></blockquote><p>In this post we’ll review some of the authors’ recommendations, discuss how Cloudflare applies these principles to the products that we build, and provide some suggestions on what other organizations can do to support similar initiatives internally.</p>
    <div>
      <h3>Secure-by-Default: building products that require minimal hardening</h3>
      <a href="#secure-by-default-building-products-that-require-minimal-hardening">
        
      </a>
    </div>
    <p>Cloudflare makes cybersecurity products that protect <a href="https://www.cloudflare.com/everywhere-security/">employees, applications, and networks</a> from attack. Typically, the ideas for new products and features come from one of two places: i) customers who are expressing a risk they’re worried about; or ii) our own internal Security team asking for help better securing Cloudflare’s internal network from threats. (The products that we build for our Security team are also then made available to our customers, once they’re battle tested internally.)</p><p>Wherever the source, when a product manager thinks through a new product offering, they first socialize the idea around the company for feedback. Often this feedback includes encouragement to make the product more “magical”. What this means in practice is that customers should have to do less, but get more; our job is essentially to make security administrators’ lives easier so they can focus their time where it’s most needed. An early example of this approach can be found in our blog post announcing <a href="/introducing-universal-ssl/">Universal SSL</a> in 2014:</p><blockquote><p><i>For all customers, we will now automatically provision a SSL certificate on CloudFlare's network that will accept HTTPS connections for a customer's domain and subdomains.</i></p></blockquote><p>The idea sounds simple but in 2014 this approach to SSL/TLS was unique in the industry: every other platform required customers to take some action before their website was encrypted-in-transit using HTTPS to protect against snooping and impersonation. Security administrators either had to go acquire the certificate themselves and upload (and renew) it, or manually perform some steps to demonstrate ownership to a certificate authority (CA). Because Cloudflare both manages authoritative DNS for our customers and runs a global reverse proxy, we can take care of all these steps automagically. Additionally, as new SSL/TLS attacks are discovered, we <a href="/staying-on-top-of-tls-attacks/">automatically improve</a> how our servers negotiate encryption with browsers and API clients to keep our customers secure. No customer configuration or oversight is required.</p><p>We agree with CISA’s statement that “[t]he complexity of security configuration should not be a customer problem.” And aim to build products that materially improve security with little to no customer action beyond putting their employees, applications, and networks behind Cloudflare:</p><blockquote><p><i>Secure-by-Default products are those that are secure to use “out of the box” with little to no configuration changes necessary and security features available without additional cost. Together, these two principles move much of the burden of staying secure to manufacturers and reduce the chances that customers will fall victim to security incidents resulting from misconfigurations, insufficiently fast patching, or many other common issues.</i></p></blockquote><p>Another example of our Secure-by-Default approach is how we protect against “0 day” attacks in our Web Application Firewall using <a href="https://www.cloudflare.com/learning/ai/what-is-machine-learning/">machine learning (ML)</a>. Zero day attacks are security vulnerabilities discovered by attackers or researchers before the software vendor is aware of the issue (or has had a chance to release a patch). Often the attack is exploited “in the wild” before customers are able to plug the holes in their systems, or their upstream security vendors are able to virtually patch the issue. A recent, widely-exploited 0 day was <a href="/cve-2021-44228-log4j-rce-0-day-mitigation/">Log4j</a>; software manufacturers using this library in their code raced to update their software as quickly as possible. But many took days, weeks, or even months to do so.</p><p>Cloudflare is proud of the speed at which we responded to Log4j, and the fact we provide the highest severity WAF protections <a href="/waf-for-everyone/">to all plans including Free</a>—but it’s always a race against the clock. We created the <a href="/stop-attacks-before-they-are-known-making-the-cloudflare-waf-smarter/">ML-computed WAF Attack Score</a> to provide our customers with a more Secure-by-Default system that didn’t rely on new rules being raced out, or making reactive configuration changes. The way most <a href="https://www.cloudflare.com/learning/ddos/glossary/web-application-firewall-waf/">WAFs</a> work is they match properties of an incoming HTTP request against a set of “signatures”, which are essentially patterns described using <a href="https://en.wikipedia.org/wiki/Regular_expression">regular expressions</a>. We do that too, but we also train ML models on the “true positive” matches, which allow us to infer the likelihood a new request is malicious <i>even when</i> it doesn’t match a signature. Customers can write one rule up front that blocks high-confidence malicious requests, and they’re protected against 0 days thereafter. Secure by default, even against attacks that have not yet been discovered.</p><p>One final example of this approach can be found in how we designed Cloudflare One, the <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">zero trust</a> suite we initially built to protect Cloudflare’s own employees and networks. When we opened Cloudflare One to businesses of all sizes, we wanted a secure-by-default way to connect and protect corporate networks that didn’t require poking a bunch of holes in network firewalls.</p><p>Instead of this traditional route that requires security administrators to make upfront changes and avoid firewall configuration drift over time, we designed <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-apps/">Cloudflare Tunnel</a> to establish mutually authenticated, encrypted connections directly to Cloudflare’s edge. Additionally, we wanted to completely shut off access to our customers’ networks by default, except for access to <a href="https://www.cloudflare.com/products/zero-trust/access/">specific applications by strongly-authenticated users</a> rather than IP and port holes that aren’t tied to a known identity.</p>
    <div>
      <h3>Secure-by-Design: continual (re)investment in secure development practices</h3>
      <a href="#secure-by-design-continual-re-investment-in-secure-development-practices">
        
      </a>
    </div>
    <p>Secure defaults that require minimal customer intervention are critically important, but not sufficient on their own to protect our customers. <i>How</i> the products are built by engineering and evaluated by our CSO organization for adherence to secure development practices is just as important in minimizing vulnerabilities that may result in customer compromise. And none of that matters without the support from executive leadership to make significant investments that may not immediately result in visible customer benefit.</p><p>Cloudflare’s engineering team builds products using the most secure development practices and tools available at the time of implementation, that sufficiently meet the requirements and architectural constraints. The options available evolve over time of course, so what was most appropriate (and secure) back in 2013 when we <a href="/cloudflares-new-waf-compiling-to-lua/">wrote the initial version of the Cloudflare WAF</a> may no longer be the best option in 2023. Lua made sense for us for the reasons <a href="https://www.youtube.com/watch?v=nlt4XKhucS4">outlined in this talk</a>, but when the WAF was starting to show its age in 2017 we had a choice: continue bolting on features quickly to try to <a href="/cloudflare-waap-named-leader-gartner-magic-quadrant-2022/">close the gap with competitive products</a>, or invest in a memory-safe language that improved security and performance at the cost of near-term momentum?</p><p>We knew that if we designed our underlying WAF platform correctly, customers—at scale—could more easily adopt other Application Security products such as Bot Management and our new API Gateway. Our existing core WAF functionality would also benefit from new evaluation engines, <a href="/making-the-waf-40-faster/">running 40% faster</a> and <a href="/details-of-the-cloudflare-outage-on-july-2-2019/#what-s-happened-since-last-tuesday">becoming more resilient</a>. But proposing an entire rewrite of a system that processed millions of requests per second in a relatively nascent language, Rust, was not a small undertaking or ask. Fortunately we had the full support of Cloudflare’s executive and technical leadership teams to make this investment, which is critical for security as CISA et al. write (emphasis <b>added</b>):</p><blockquote><p><i>Secure-by-Design development requires the investment of significant resources by software manufacturers at each layer of the product design and development process that cannot be “bolted on” later. It requires </i><b><i>strong leadership by the manufacturer’s top business executives to make security a business priority</i></b><i>, not just a technical feature.</i></p></blockquote><p>[and]</p><blockquote><p><i>Manufacturers are encouraged to make hard tradeoffs and investments, </i><b><i>including those that will be “invisible” to the customers, such as migrating to programming languages that eliminate widespread vulnerabilities</i></b><i>. They should prioritize features, mechanisms, and implementation of tools that protect customers rather than product features that seem appealing but enlarge the attack surface.</i></p></blockquote><p>The end result of our efforts was a new WAF rule evaluation engine entirely written in Rust—a performant, memory-safe language that is immune to <a href="https://my.f5.com/manage/s/article/K52510511">buffer overflow attacks</a> and has positioned us well for the future. After that rewrite, our Cache team also embarked on a similarly XL-sized project called Pingora, which replaced NGINX with a Rust-based reverse proxy engine called <a href="/how-we-built-pingora-the-proxy-that-connects-cloudflare-to-the-internet/">Pingora</a>. These projects were costly, but improved the security posture of our customers:</p><blockquote><p><i>The authoring agencies acknowledge that taking ownership of the security outcomes for customers and </i><b><i>ensuring this level of customer security may increase development costs.</i></b></p></blockquote><blockquote><p><i>However, investing in “Secure-by-Design" practices while developing new technology products and maintaining existing ones can substantially improve the security posture of customers and reduce the likelihood of being compromised.</i></p></blockquote>
    <div>
      <h3>Secure-by-Default and Secure-by-Design: implementing these principles into your organization</h3>
      <a href="#secure-by-default-and-secure-by-design-implementing-these-principles-into-your-organization">
        
      </a>
    </div>
    <p>Building secure products that are easy to adopt and require minimal ongoing customer oversight is paramount in today’s threat environment, but it takes an aligned organization to deliver. Below are some techniques that Cloudflare employs to solve our customers’ security problems, and shift the operational burden away from their network towards ours:</p><p><b>1. Perform as much logic as you can in code you control and can update without user intervention</b>Like many readers, I’m the technical support person for my parents. Their home networking equipment is quite modern and sends me alerts when there are critical security updates, but I’m always afraid if I apply updates without being onsite something might go wrong.</p><p>Professional security administrators face the same problem when dealing with enterprise networking equipment. When software gets shipped into heterogeneous customer environments, things can go wrong. Having a single software stack that runs on every server in our fleet has made it immeasurably easier to stay on top of software updates for our customers.</p><p>To the extent your organization can shift the operational burden away from your customer to your own infrastructure, the easier it will be for people to adopt your products and keep them secure. Relying on overburdened administrators to apply patches, especially if there’s risk of downtime, is a difficult proposition.</p><p><b>2. Educate executive leadership on the importance of continual reinvestment in modern security standards, and run experiments to build credibility</b>Today’s economic environment is challenging: customers are being forced to do more with less, while the software providers they depend upon are no longer hiring at the rate they once were. The appropriate prioritization of scarce engineering resources across new features, technical debt, and security hardening is not obvious and is likely met internally with differing opinions. Laying out clear business cases for adopting  secure-by-default and secure-by-design mindsets is thus even more critical for improving security outcomes without obvious customer-visible benefit.</p><p>Projects should also be appropriately scoped, and experiments should be run early and often. Do not wait until you are nearly through a project before letting others play with and review your proof-of-concepts and code. You may find support within the organization where you did not expect it, accelerating projects and increasing the likelihood that they succeed. You’ll also be able to demonstrate unexpected benefits that customers will embrace, helping build a base of support for the sustained effort.</p><p><b>3. Empower your security practitioners to provide feedback early and often in the development cycle</b>The skill set required to code new products and features does not perfectly overlap with the skill set required to spot security risks in them. Application security experts are helpful because they can quickly pattern match security “code smells” with other projects they’ve previously reviewed and helped harden.</p><p>You should embed your security experts within your product engineering teams so that they can provide guidance at the earliest (and lowest cost) phase of development. Having these experts review your functional specifications may save development cycles downstream.</p><p><b>4. Incentivize products that do more for customers “automagically”</b>People respond to incentives. If your business is built on selling professional services to enterprise customers, there is little incentive for your software developers to minimize the effort required during the installation, tuning, and hardening process.</p><p>If your products are designed to be consumed by hundreds of thousands of customers of all sizes, you have no choice but to do more for customers out-of-the-box. Otherwise, your support organization will be overwhelmed and your customers will be vulnerable.</p><p><b>5. Avoid default passwords at all costs</b>Every day, Cloudflare mitigates DDoS attacks launched by botnets comprised of <i>insecure</i>-by-default devices. Manufacturers ship IoT devices and home networking equipment with default or easy-to-guess passwords, and many proxy vendors require no authentication out of the box.</p><p>If these manufacturers followed the principles outlined in the CISA guide, these attacks would decrease in both intensity and frequency, as fewer and fewer devices can be recruited for attack amplification.</p> ]]></content:encoded>
            <category><![CDATA[CISA]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">66WsBhDcccpFb56DTesYZl</guid>
            <dc:creator>Patrick R. Donahue</dc:creator>
            <dc:creator>Ed Conolly</dc:creator>
        </item>
    </channel>
</rss>