
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Sat, 04 Apr 2026 02:36:13 GMT</lastBuildDate>
        <item>
            <title><![CDATA[See risk, fix risk: introducing Remediation in Cloudflare CASB]]></title>
            <link>https://blog.cloudflare.com/remediation-in-cloudflare-casb/</link>
            <pubDate>Tue, 03 Mar 2026 06:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare CASB Remediation lets security teams go beyond visibility to fix risky file sharing in Microsoft 365 and Google Workspace directly from Cloudflare One, all in just a few clicks. ]]></description>
            <content:encoded><![CDATA[ <p>Starting today, Cloudflare CASB customers can do more than see risky file-sharing across their SaaS apps: they can fix it, directly from the Cloudflare One dashboard.</p><p>This launch marks a huge advancement for Cloudflare’s <a href="https://www.cloudflare.com/zero-trust/products/casb/"><u>Cloud Access Security Broker</u></a> (CASB). Since its release, Cloudflare’s API-based CASB has focused on providing robust, comprehensive visibility and detection. It also connects to the SaaS tools your business runs on, surfacing misconfigurations, and flagging overshared data before it becomes tomorrow’s incident.</p><p>With today’s release of Remediation – a new way to fix problems with just a click, right from the CASB Findings page – CASB begins its next chapter, and moves from telling you what’s wrong to helping you make it right.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3sl5Cse8hP3nZwE1deik09/1ee2d7d9f61eceb4a23868b9dab7bbbc/image4.png" />
          </figure><p><sub><i>An example of a Remediation Action (Remove Public File Sharing) in a CASB Finding.</i></sub></p>
    <div>
      <h2>CASB 101: A single place to see SaaS risk</h2>
      <a href="#casb-101-a-single-place-to-see-saas-risk">
        
      </a>
    </div>
    <p>Inside <a href="https://www.cloudflare.com/zero-trust/"><u>Cloudflare One</u></a>, our SASE platform, CASB connects to the SaaS and cloud tools your teams already use. By talking to providers over API, CASB gives security and IT teams:</p><ul><li><p>A consolidated view of misconfigurations, overshared files, and risky access patterns across apps like Microsoft 365, Google Workspace, Slack, Salesforce, Box, GitHub, Jira, and Confluence (<a href="https://developers.cloudflare.com/cloudflare-one/applications/scan-apps/casb-integrations/"><u>CASB Integrations</u></a>).</p></li><li><p>Continuous scanning for new issues as users collaborate, share, and adopt new tools.</p></li><li><p>Findings that are organized, searchable, and exportable for triage and reporting.</p></li></ul><p>But until now, the actual fixing usually happened somewhere else, whether it’s inside each app’s admin UI, or through a ticket to the team that owns that tool. Remediation closes that loop.</p>
    <div>
      <h2>Remediation: CASB’s next chapter</h2>
      <a href="#remediation-casbs-next-chapter">
        
      </a>
    </div>
    <p>The launch of CASB Remediation marks a major shift forward for the product and Cloudflare One, and we have a ton of big updates planned for the next year. </p><p>With today’s release, we focused on fixing file-share issues in <a href="https://developers.cloudflare.com/cloudflare-one/integrations/cloud-and-saas/microsoft-365/#file-sharing"><u>Microsoft 365</u></a> and <a href="https://developers.cloudflare.com/cloudflare-one/integrations/cloud-and-saas/google-workspace/#file-sharing"><u>Google Workspace</u></a>.</p><p>With Remediation, you can fix the highest-impact, most common file risks we see across customers, including:</p><ul><li><p>Public links that let anyone on the Internet view or edit a file.</p></li><li><p>Files shared company-wide across your tenant or domain, even when just a handful of people should have access.</p></li><li><p>Files shared outside your organization to personal accounts and external domains.</p></li><li><p>All of the above, when they also match a DLP Profile. For example, a document full of customer records, credentials, or financial details.</p></li></ul><p>When you trigger the ‘Remove sharing’ Remediation action on a supported finding, CASB immediately moves to remove the risky sharing configuration (for example, the public link or organization-wide access) from the file in question. And crucially, Remediation only removes risky sharing; it doesn’t delete files or change who owns them.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3Te9jeJnI3TRXdxbyT19cf/9f429b27cfd5a6e9fe39b69656cc723c/image3.png" />
          </figure><p><sub><i>A new page to track the progress and success of Remediated CASB findings.</i></sub></p>
    <div>
      <h2>Two starting points: Microsoft 365 and Google Workspace</h2>
      <a href="#two-starting-points-microsoft-365-and-google-workspace">
        
      </a>
    </div>
    <p>We chose to start with Microsoft 365 and Google Workspace because, for many organizations, that’s where the bulk of their business-critical documents live: internal financials, product roadmaps, customer contracts, HR notes, and more.</p><p>They’re also where “temporary” sharing tends to linger too long:</p><ul><li><p>A spreadsheet shared “Anyone with the link can edit” for a quick review.</p></li><li><p>A doc made company-wide for an all-hands, then quietly forgotten.</p></li><li><p>A sheet of customer records shared to a contractor’s personal email.</p></li></ul><p>For Microsoft 365, that means cleaning up risky shares in places like OneDrive and SharePoint. For Google Workspace, it means tightening sharing on Docs, Sheets, Slides, and other files stored in Drive.</p><p>Instead of exporting a CSV of risky files out of CASB, sending it to app owners, and hoping everyone gets around to fixing their share settings, <b>you can drive the clean-up directly from CASB and know when those risks have actually been addressed</b>.</p><p>And when you and your team use <a href="https://developers.cloudflare.com/cloudflare-one/cloud-and-saas-findings/manage-findings/#remediate-findings"><u>CASB Remediation</u></a>, every action is logged in Cloudflare One’s <a href="https://developers.cloudflare.com/cloudflare-one/insights/logs/"><u>Admin logs</u></a>, so you can see who took action on which files and when, or export that activity to your security information and event management tool (SIEM).</p>
    <div>
      <h2>How it works</h2>
      <a href="#how-it-works">
        
      </a>
    </div>
    <p>When architecting the system that supports CASB Remediations, we knew it had to do three things really well:</p><ul><li><p>Be fast, even at scale</p></li><li><p>Durable execution to handle surprises gracefully</p></li><li><p>Be easy for our customers to use </p></li></ul><p>To meet these goals, we built a system using several Cloudflare products: <a href="https://workers.cloudflare.com/"><u>Workers</u></a>, <a href="https://workers.cloudflare.com/product/workflows/"><u>Workflows</u></a>, <a href="https://workers.cloudflare.com/product/queues/"><u>Queues</u></a>, <a href="https://workers.cloudflare.com/product/kv/"><u>Workers KV</u></a>, <a href="https://developers.cloudflare.com/secrets-store/"><u>Secrets Store</u></a>, and <a href="https://workers.cloudflare.com/product/hyperdrive/"><u>Hyperdrive</u></a>. </p><p>When a remediation job is initiated, an API call is made to a Worker. That Worker writes the job to a Queue which is consumed by a second Worker to kick off a Workflow. Workers KV and Secrets Store are used to securely distribute credentials for use in the Workflow. The Workflow runs a series of steps to collect information and execute third-party API calls to complete the remediation. The final outcome of the action is recorded in a database via Hyperdrive. </p><p>At scale, we are guaranteed to encounter 429s from vendor APIs. Workflows’ native retries simplify handling this, and built-in step logging gives visibility into each retry. This means that there was no need for us to build a complex, single-purpose, state-tracking system or dozens of serverless functions for each action.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6TMLm3Wqw5AQHPj6y26Ac4/9acc4fa8b1d1b8f378ab9a23f52e1bdd/image1.png" />
          </figure><p>Performance results from load testing and early access customers have shown strong performance even under heavy load. The average (p50) end-to-end job completion time is 48 seconds, and the p90 is 72 seconds. Durable Execution (via Workflows) has made job management completely hands-off for our team, even when the Workflow encounters issues with third-party APIs. The simplicity of the final system has made troubleshooting issues fast and straightforward.</p>
    <div>
      <h2>What’s next for CASB Remediation</h2>
      <a href="#whats-next-for-casb-remediation">
        
      </a>
    </div>
    <p>File-sharing Remediation for Microsoft 365 and Google Workspace is just the first step.</p><p>In the near term, we’re working on bringing our customers new Quarantine actions, which can move or isolate high-risk files to safer locations. We are also introducing Custom Webhook actions, hooks that let you trigger downstream workflows, like ticket creation, chat notifications, or your own automation.</p><p>And more broadly, we’re excited to explore ways to make CASB even more of an active control plane:</p><ul><li><p>Autoremediation policies for carefully scoped, policy-driven fixes where you’re comfortable letting CASB take action automatically.</p></li><li><p>Custom CASB findings so you can define the exact patterns, data types, or access conditions that matter most to your organization.</p></li><li><p>Bulk Remediation that allows you to remediate many similar findings in a single operation.</p></li><li><p>Extending Remediation to additional SaaS integrations beyond Microsoft 365 and Google Workspace, so the same experience applies to tools like Box, Dropbox, Salesforce, GitHub, Slack, Atlassian, and more over time.</p></li></ul>
    <div>
      <h2>How to get started</h2>
      <a href="#how-to-get-started">
        
      </a>
    </div>
    <p>CASB Remediation requires a paid CASB license, but don’t let that stop you from trying CASB out today!</p><ul><li><p><b>For existing Cloudflare One / CASB customers:</b> Integrate your Microsoft 365 or Google Workspace tenant (or update your existing integration to Read-Write), and start remediating risky shares directly from the side panel within your file sharing-related finding types.</p></li><li><p><b>New to Cloudflare One?</b> <a href="https://dash.cloudflare.com/sign-up/zero-trust"><u>Sign up now</u></a> for 50 free seats to begin using CASB immediately. For larger deployments, request a <a href="https://www.cloudflare.com/contact/sase/?utm_medium=referral&amp;utm_source=blog"><u>consultation with our experts</u></a>.</p></li></ul><p>From there, talk to our team about enabling CASB with Remediation for your Microsoft 365 and Google Workspace tenants so you can find and fix overshared files in one place.</p><p>We’re excited to see how you use Remediation to clean up long-lived file-sharing risks — and to help shape what CASB’s next generation of remediation capabilities looks like.</p> ]]></content:encoded>
            <category><![CDATA[CASB]]></category>
            <category><![CDATA[Microsoft 365]]></category>
            <category><![CDATA[Google Workspace]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[SASE]]></category>
            <category><![CDATA[SAAS Security]]></category>
            <guid isPermaLink="false">5qLzg7UQ9OtFryC8YVeSo5</guid>
            <dc:creator>Alex Dunbrack</dc:creator>
            <dc:creator>Michael Leslie </dc:creator>
        </item>
        <item>
            <title><![CDATA[Detecting sensitive data and misconfigurations in AWS and GCP with Cloudflare One]]></title>
            <link>https://blog.cloudflare.com/scan-cloud-dlp-with-casb/</link>
            <pubDate>Fri, 21 Mar 2025 13:10:00 GMT</pubDate>
            <description><![CDATA[ Using Cloudflare’s CASB, integrate, scan, and detect sensitive data and misconfigurations in your cloud storage accounts. ]]></description>
            <content:encoded><![CDATA[ <p>Today is the final day of Security Week 2025, and after a great week of blog posts across a variety of topics, we’re excited to share the latest on Cloudflare’s data security products.</p><p>This announcement takes us to Cloudflare’s SASE platform, <a href="https://www.cloudflare.com/zero-trust/products/"><u>Cloudflare One</u></a>, used by enterprise security and IT teams to manage the security of their employees, applications, and third-party tools, all in one place.</p><p>Starting today, Cloudflare One users can now use the <a href="https://www.cloudflare.com/zero-trust/products/casb/"><u>CASB</u></a> (Cloud Access Security Broker) product to integrate with and scan Amazon Web Services (AWS) S3 and Google Cloud Storage, for posture- and Data Loss Prevention (DLP)-related security issues. <a href="https://dash.cloudflare.com/sign-up"><u>Create a free account</u></a> to check it out.</p><p>Scanning both point-in-time and continuously, users can identify misconfigurations in Identity and Access Management (IAM), bucket, and object settings, and detect sensitive information, like Social Security numbers, credit card numbers, or any other pattern using regex, in cloud storage objects.</p>
    <div>
      <h3>Cloud DLP</h3>
      <a href="#cloud-dlp">
        
      </a>
    </div>
    
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1R1bE9TRmTdHDTg1XeLS60/8269b687ec65e70bcaee437f30d5f590/1.png" />
          </figure><p>Over the last few years, our customers — predominantly security and IT teams — have told us about their appreciation for CASB’s simplicity and effectiveness as a SaaS security product. Its number of <a href="https://developers.cloudflare.com/cloudflare-one/applications/casb/casb-integrations/"><u>supported integrations</u></a>, its ease of setup, and speed in identifying critical issues across popular SaaS platforms, like files shared publicly in Microsoft 365 and exposed sensitive data in Google Workspace, has made it a go-to for many.</p><p>However, as we’ve engaged with customers, one thing became clear: the risks of unmonitored or exposed data at-rest go far beyond just SaaS environments. Sensitive information – whether intellectual property, customer data, or personal identifiers – can wreak havoc on an organization’s reputation and its obligations to its customers if it falls into the wrong hands. For many of our customers, the security of data stored in cloud providers like AWS and GCP is even more critical than the security of data in their SaaS tools.</p><p>That’s why we’ve extended Cloudflare CASB to include <a href="https://developers.cloudflare.com/cloudflare-one/policies/data-loss-prevention/"><u>Cloud DLP (Data Loss Prevention)</u></a> functionality, enabling users to scan objects in Amazon S3 buckets and Google Cloud Storage for sensitive data matches​.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5TKXiAkQKxw3GFQBCuQLjX/198e4620da8239280eff669b7b62678b/2.png" />
          </figure><p>With <a href="https://www.cloudflare.com/zero-trust/products/dlp/"><u>Cloudflare DLP</u></a>, you can choose from pre-built detection profiles that look for common data types (such as Social Security Numbers or credit card numbers) or create your own custom profiles using regular expressions​. As soon as an object matching a DLP profile is detected, you can dive into the details, understanding the file’s context, seeing who owns it, and more. These capabilities provide the insight needed to quickly protect data and prevent exposure in real time.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4cyOaQJ0ZyPO8r7LyeU6ON/30b8453888d6cb13dcb15225f875a0cd/3.png" />
          </figure><p>And as with all CASB integrations, this new functionality also comes with <a href="https://www.cloudflare.com/learning/cloud/what-is-dspm/">posture management features</a>, meaning whether you’re using AWS or GCP, we’ll help you identify misconfigurations and other cloud security issues that could leave your data vulnerable​, like buckets that are publicly-accessible or have critical logging settings disabled, access keys needing rotation, or users without <a href="https://www.cloudflare.com/learning/access-management/what-is-multi-factor-authentication/"><u>multi-factor authentication (MFA)</u></a>. It’s all included.</p>
    <div>
      <h3>Simple by default, configurable where you want it</h3>
      <a href="#simple-by-default-configurable-where-you-want-it">
        
      </a>
    </div>
    <p>Cloudflare CASB and DLP are simple to use by default, making it easy to get started right away. But it’s also highly configurable, giving you the flexibility to fine-tune the scanning profiles to suit your specific needs.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5MLh3y7SMHnX52cjuu4pmE/b7bb67497fc21bc9d3f3f740a9b3fe52/4.png" />
          </figure><p>For example, you can adjust which storage buckets or file types to scan, and even sample only a percentage of objects for analysis​. The scanning also runs within your own cloud environment, so your data never leaves your infrastructure​. This approach keeps your cloud storage secure and your costs managed while allowing you to tailor the solution to your organization’s unique compliance and security requirements.</p><p>Looking ahead, our roadmap also includes expanding support to additional cloud storage environments, such as Azure Blob Storage and Cloudflare R2, further extending our comprehensive, multi-cloud security strategy. Stay tuned for more on that!</p>
    <div>
      <h3>How it works</h3>
      <a href="#how-it-works">
        
      </a>
    </div>
    <p>From the start, we knew that to deliver DLP capabilities across cloud environments, it would require an efficient and scalable design to enable real-time detection of sensitive data exposure.</p>
    <div>
      <h4>Serverless architecture for streamlined processing</h4>
      <a href="#serverless-architecture-for-streamlined-processing">
        
      </a>
    </div>
    <p>An early design decision was made to leverage a serverless architecture approach to ensure sensitive data discovery is both efficient and scalable. Here’s how it works:</p><ul><li><p><b>Compute Account</b>: The entire process runs within a cloud account owned by your organization, known as a Compute Account. This design ensures your data remains within your boundaries, avoiding costly cloud egress fees. The Compute Account can be launched in under 15 minutes using a provided Terraform template.</p></li><li><p><b>Controller function</b>: Every minute, a lightweight, serverless controller function in your cloud environment communicates with Cloudflare’s APIs, fetching the latest DLP configurations and security profiles from your Cloudflare One account.</p></li><li><p><b>Crawler process</b>: The controller triggers an object discovery task, which is processed by a second serverless function known as the Crawler. The Crawler queries cloud storage accounts, like AWS S3 or Google Cloud Storage, via API to identify new objects. Redis is used within the Compute Account to track which objects have yet to be evaluated.</p></li><li><p><b>Scanning for sensitive data</b>: Newly discovered objects are sent through a queue to a third serverless function called the Scanner. This function downloads the objects and streams their contents to the DLP engine in the Compute Account, which scans for matches against predefined or custom DLP Profiles.</p></li><li><p><b>Finding generation and alerts</b>: If a DLP match is found, metadata about the object, such as context and ownership details, is published to a queue. This data is ingested by a Cloudflare-hosted service and presented in the Cloudflare Dashboard as findings, giving security teams the visibility needed to take swift action.</p></li></ul>
    <div>
      <h4>Scalable and secure design</h4>
      <a href="#scalable-and-secure-design">
        
      </a>
    </div>
    <p>The DLP pipeline ensures that sensitive data never leaves your cloud environment — a privacy-first approach. All communication between the Compute Account and Cloudflare's APIs are initiated by the controller, also meaning there is no need to perform any extra configuration to allow ingress traffic.</p>
    <div>
      <h3>How to get started</h3>
      <a href="#how-to-get-started">
        
      </a>
    </div>
    <p>To get started, reach out to your account team to learn more about this new data security functionality and our roadmap. If you want to try this out on your own, you can login to the Cloudflare One dashboard (create a free account <a href="https://www.cloudflare.com/zero-trust/products/"><u>here</u></a> if you don’t have one) and navigate to the CASB page to set up your first integration.</p>
    <div>
      <h3>Watch on Cloudflare TV</h3>
      <a href="#watch-on-cloudflare-tv">
        
      </a>
    </div>
    <div>
  
</div><p></p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[CASB]]></category>
            <category><![CDATA[DLP]]></category>
            <category><![CDATA[AWS]]></category>
            <category><![CDATA[Google Cloud]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <guid isPermaLink="false">2hlOlV28pXRFpnmnkqbbhw</guid>
            <dc:creator>Alex Dunbrack</dc:creator>
            <dc:creator>Michael Leslie </dc:creator>
        </item>
    </channel>
</rss>