
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Wed, 08 Apr 2026 09:31:16 GMT</lastBuildDate>
        <item>
            <title><![CDATA[Network-based policies in Cloudflare Gateway]]></title>
            <link>https://blog.cloudflare.com/network-based-policies-in-cloudflare-gateway/</link>
            <pubDate>Fri, 04 Jun 2021 15:30:00 GMT</pubDate>
            <description><![CDATA[ Today we’re excited to announce the ability for administrators to configure network-based policies in Cloudflare Gateway. ]]></description>
            <content:encoded><![CDATA[ <p>Over the past year, Cloudflare Gateway has grown from a DNS filtering solution to a <a href="https://www.cloudflare.com/learning/access-management/what-is-a-secure-web-gateway/">Secure Web Gateway</a>. That growth has allowed customers to protect their organizations with fine-grained <a href="/gateway-swg-3/">identity-based HTTP policies</a> and <a href="/announcing-antivirus-in-cloudflare-gateway/">malware protection</a> wherever their users are. But what about other Internet-bound, non-HTTP traffic that users generate every day — like SSH?</p><p>Today we’re excited to announce the ability for administrators to configure network-based policies in Cloudflare Gateway. Like DNS and HTTP policy enforcement, organizations can use network selectors like IP address and port to control access to any network origin.</p><p>Because Cloudflare for Teams integrates with your identity provider, it also gives you the ability to create <i>identity-based</i> network policies. This means you can now <a href="https://www.cloudflare.com/learning/access-management/what-is-access-control/">control access</a> to non-HTTP resources on a per-user basis regardless of where they are or what device they’re accessing that resource from.</p><p>A major goal for <a href="/introducing-cloudflare-one/">Cloudflare One</a> is to expand the number of on-ramps to Cloudflare — just send your traffic to our edge however you wish and we’ll make sure it gets to the destination as quickly and securely as possible. We released <a href="/magic-wan-firewall/">Magic WAN and Magic Firewall</a> to let administrators replace <a href="https://www.cloudflare.com/learning/network-layer/what-is-mpls/">MPLS connections</a>, define routing decisions, and apply packet-based filtering rules on network traffic from entire sites. When coupled with Magic WAN, Gateway allows customers to define network-based rules that apply to traffic between whole sites, data centers, and that which is Internet-bound.</p>
    <div>
      <h3>Solving Zero Trust networking problems</h3>
      <a href="#solving-zero-trust-networking-problems">
        
      </a>
    </div>
    <p>Until today, administrators could only create policies that filtered traffic at the DNS and HTTP layers. However, we know that organizations need to control the network-level traffic leaving their endpoints. We kept hearing two categories of problems from our users and we’re excited that today’s announcement addresses both.</p><p>First, organizations want to replace their legacy network firewall appliances. Those appliances are complex to manage, expensive to maintain, and force users to backhaul traffic. Security teams deploy those appliances in part to control the ports and IPs devices can use to send traffic. That level of security helps prevent devices from sending traffic over non-standard ports or to known malicious IPs, but customers had to deal with the downsides of on-premise security boxes.</p><p>Second, moving to a Zero Trust model for named resources is not enough. Cloudflare Access provides your team with Zero Trust controls over specific applications, including non-HTTP applications, but we know that customers who are migrating to this model want to bring that level of Zero Trust control to all of their network traffic.</p>
    <div>
      <h3>How it works</h3>
      <a href="#how-it-works">
        
      </a>
    </div>
    <p>Cloudflare Gateway, part of Cloudflare One, helps organizations replace legacy firewalls and upgrade to <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust networking</a> by starting with the endpoint itself. Wherever your users do their work, they can connect to a private network running on Cloudflare or the public Internet without backhauling traffic.</p><p>First, administrators deploy the Cloudflare WARP agent on user devices, whether those devices are MacOS, Windows, iOS, Android and (soon) Linux. The WARP agent can operate in two modes:</p><ul><li><p>DNS filtering: WARP becomes a DNS-over-HTTPS (DoH) client and sends all DNS queries to a nearby Cloudflare data center where Cloudflare Gateway can filter those queries for threats like websites that host malware or phishing campaigns.</p></li><li><p>Proxy mode: WARP creates a WireGuard tunnel from the device to Cloudflare’s edge and sends all network traffic through the tunnel. Cloudflare Gateway can then inspect HTTP traffic and apply policies like URL-based rules and virus scanning.</p></li></ul><p>Today’s announcement relies on the second mode. The WARP agent will send all <i>TCP</i> traffic leaving the device to Cloudflare, along with the identity of the user on the device and the organization in which the device is enrolled. The Cloudflare Gateway service will take the identity and then review the TCP traffic against four criteria:</p><ul><li><p>Source IP or network</p></li><li><p>Source Port</p></li><li><p>Destination IP or network</p></li><li><p>Destination Port</p></li></ul><p>Before allowing the packets to proceed to their destination, Cloudflare Gateway checks the organization’s rules to determine if they should be blocked. Rules can apply to all of an organization’s traffic or just specific users and directory groups. If the traffic is allowed, Cloudflare Gateway still logs the identity and criteria above.</p><p>Cloudflare Gateway accomplishes this without slowing down your team. The Gateway service runs in every Cloudflare data center in over 200 cities around the world, giving your team members an on-ramp to the Internet that does not backhaul or hairpin traffic. We enforce rules using Cloudflare’s <a href="/building-fast-interpreters-in-rust/">Rust-based</a> Wirefilter execution engine, taking what we’ve learned from applying IP-based rules in our reverse proxy firewall at scale and giving your team the performance benefits.</p>
    <div>
      <h3>Building a Zero Trust networking rule</h3>
      <a href="#building-a-zero-trust-networking-rule">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/learning/access-management/what-is-ssh/">SSH</a> is a versatile protocol that allows users to connect to remote machines and even tunnel traffic from a local machine to a remote machine before reaching the intended destination. That’s great but it also leaves organizations with a gaping hole in their security posture. At first, an administrator could configure a rule that blocks all outbound SSH traffic across the organization.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2PuvwSo4c4rojxjIuvuUsc/a0ac33dc9fc109631c68658537b573a2/image1-1.png" />
            
            </figure><p>As soon as you save that policy, the phone rings and it’s an engineer asking why they can’t use a lot of their development tools. Right, engineers use SSH a lot so we should use the engineering IdP group to allow just our engineers to use SSH.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4V3VEbkNMhvpSMV5Bb63p6/be90f9f55c5883d6d5764fea3adf95dc/image3.png" />
            
            </figure><p>You take advantage of rule precedence and place that rule above the existing rule that affects all users to allow engineers to SSH outbound but not any other users in the organization.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4fv1F45sVsyODzjx0X3lgG/a81d883af18fec99cbd579fc3dcde942/image2-2.png" />
            
            </figure><p>It doesn’t matter which corporate device engineers are using or where they are located, they will be allowed to use SSH and all other users will be blocked.</p>
    <div>
      <h3>One more thing</h3>
      <a href="#one-more-thing">
        
      </a>
    </div>
    <p>Last month, we announced the ability for customers to <a href="/build-your-own-private-network-on-cloudflare/">create private networks on Cloudflare</a>. Using Cloudflare Tunnel, organizations can connect environments they control using private IP space and route traffic between sites; better, WARP users can connect to those private networks wherever they’re located. No need for centralized VPN concentrators and complicated configurations--connect your environment to Cloudflare and configure routing.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/18Lu4V9HQRQ5OyrPMMQTYD/0c808689c3fa8ed706f3d08ff4757be2/image4.png" />
            
            </figure><p>Today’s announcement gives administrators the ability to <i>configure network access policies</i> to control traffic within those private networks. What if the engineer above wasn’t trying to SSH to an Internet-accessible resource but to something an organization deliberately wants to keep within an internal private network (e.g., a development server)? Again, not everyone in the organization should have access to that either. Now administrators can configure identity-based rules that apply to private networks built on Cloudflare.</p>
    <div>
      <h3>What’s next?</h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>We’re laser-focused on our Cloudflare One goal to secure organizations regardless of how their traffic gets to Cloudflare. Applying network policies to both WARP users and routing between private networks is part of that vision.</p><p>We’re excited to release these building blocks to Zero Trust Network Access policies to protect an organization’s users and data. We can’t wait to dig deeper into helping organizations secure applications that use private hostnames and IPs like they can today with their publicly facing applications.</p><p>We’re just getting started--follow <a href="https://www.cloudflare.com/teams/">this link</a> so you can too.</p> ]]></content:encoded>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Cloudflare Gateway]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">1s68dZtnBX5xt4bKbOLrF6</guid>
            <dc:creator>Pete Zimmerman</dc:creator>
        </item>
        <item>
            <title><![CDATA[Announcing antivirus in Cloudflare Gateway]]></title>
            <link>https://blog.cloudflare.com/announcing-antivirus-in-cloudflare-gateway/</link>
            <pubDate>Tue, 23 Mar 2021 13:00:00 GMT</pubDate>
            <description><![CDATA[ We’re announcing support for malware detection and prevention directly from the Cloudflare edge, giving Gateway users an additional line of defense against security threats. ]]></description>
            <content:encoded><![CDATA[ <p>Today we’re announcing support for malware detection and prevention directly from the Cloudflare edge, giving Gateway users an additional line of defense against security threats.</p><p>Cloudflare Gateway protects employees and data from threats on the Internet, and it does so without sacrificing performance for security. Instead of backhauling traffic to a central location, Gateway customers connect to one of Cloudflare’s data centers in 200 cities around the world where our network can apply content and security policies to protect their Internet-bound traffic.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2Df0kOWRoBf3PRw2eumHJ8/9455cbbd422bbc2b5a35561893936705/image1-34.png" />
            
            </figure><p>Last year, Gateway expanded from a <a href="/protect-your-team-with-cloudflare-gateway/">secure DNS filtering solution</a> to a full <a href="/gateway-swg/">Secure Web Gateway</a> capable of protecting every user’s HTTP traffic as well. This enables admins to detect and block not only threats at the DNS layer, but malicious URLs and undesired file types as well. Moreover, admins now have the ability to create high-impact, company-wide policies that protect all users with one click, or they can create more granular <a href="/gateway-swg-3/">rules based on user identity</a>.</p><p>Earlier this month, we launched <a href="/gateway-app-policies/">application policies</a> in Cloudflare Gateway to make it easier for administrators to block specific web applications. With this feature, administrators can block those applications commonly used to distribute malware, such as public cloud file storage.</p><p>These features in Gateway enable a layered approach to security. With Gateway’s DNS filtering, customers are protected from threats that <a href="/a-quirk-in-the-sunburst-dga-algorithm/">abuse the DNS protocol</a> for the purposes of communicating with a C2 server, downloading an implant payload, or exfiltrating corporate data. DNS filtering applies to all applications generating DNS queries, and HTTP traffic inspection complements that by going deep on threats that users might encounter as they navigate the Internet.</p><p>Today, we are excited to announce another layer of defense with the addition of antivirus protection in Cloudflare Gateway. Now administrators can block malware and other malicious files from being downloaded onto corporate devices as they pass through Cloudflare’s edge for file inspection.</p>
    <div>
      <h3>Stopping malware distribution</h3>
      <a href="#stopping-malware-distribution">
        
      </a>
    </div>
    <p>Protecting corporate infrastructure and devices from becoming infected with malware in the first place is one of the top priorities for IT admins. Malware can wreak a wide range of havoc: business operations may be crippled by ransomware, sensitive data may be exfiltrated by spyware, or local CPU resources may be siphoned for financial gain by cryptojacking malware.</p><p>In order to compromise a network, malicious actors commonly attempt to distribute malware through an email attachment or malicious link <a href="https://www.cloudflare.com/learning/email-security/what-is-email-fraud/">sent via email</a>. More recently, in order to evade <a href="https://www.cloudflare.com/zero-trust/products/email-security/">email security</a>, threat actors are beginning to leverage other communication channels, such as SMS, voice, and support ticket software for malware distribution.</p><p>The devastating impact of malware, coupled with the <a href="https://www.cloudflare.com/learning/security/what-is-an-attack-surface/">large attack surface</a> for potential compromise, makes <a href="https://www.cloudflare.com/learning/security/ransomware/how-to-prevent-ransomware/">malware prevention</a> a top-of-mind concern for security teams.</p>
    <div>
      <h3>Defense in Depth</h3>
      <a href="#defense-in-depth">
        
      </a>
    </div>
    <p>No single tool or approach provides perfect security, necessitating a layered defense against threats that make their way past these different tools. Not all threats are previously known to threat researchers, requiring admins to fall back on additional inspection tools once a user successfully connects to a site containing potentially malicious content.</p><p>Highly sophisticated threats may make their way into a user’s network and the primary task for security teams is to quickly determine the scope of the attack against their organization. In these worst case scenarios, where a user accesses a domain, website, or file that is deemed malicious, the last line of defense for a security team is achieving a clear understanding of the source of the attack against their organization and what resources were affected.</p>
    <div>
      <h3>Announcing File Scanning</h3>
      <a href="#announcing-file-scanning">
        
      </a>
    </div>
    <p>Today, with Cloudflare Gateway, you can augment your endpoint protection and prevent malicious files from being downloaded onto employee devices. Gateway will scan files inbound from the Internet as they pass through the Cloudflare edge at the nearest data center. Cloudflare manages this layer of defense for customers the same as it manages intelligence used for DNS and HTTP traffic filtering, freeing admins from purchasing additional antivirus licenses or worrying about keeping virus definitions up to date.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1ewqp8BcNB4NfhfJoR0Ugc/818f0b6dd60a4d5e7dae03da32bd1c41/image2-28.png" />
            
            </figure><p>When a user initiates a download and that file passes through Gateway at Cloudflare’s edge, that file is sent to the malware scanning engine. This engine contains malware sample definitions and is updated on a daily basis. When Gateway scans a file and detects the presence of malware, it will block the file transfer by resetting the connection which is then displayed to the user in their browser as a download error. Gateway also logs the URL where the file was downloaded, the SHA-256 hash of the file, and the fact that the file was blocked due to the presence of malware.</p><p>A common approach to security is to “assume breach.” This assumption by security teams acknowledges that not all threats are previously known and optimizes for responding to threats quickly. With Gateway, administrators have complete visibility over the impact the threat had on their organization by leveraging Gateway’s centralized logging, providing clear steps for threat remediation as part of an incident response.</p>
    <div>
      <h3>Detecting malware post-compromise</h3>
      <a href="#detecting-malware-post-compromise">
        
      </a>
    </div>
    <p>When using an “assume breach” approach, security teams rely on surfacing actionable insights from all available information around an attack. A more sophisticated attack might unfold this way:</p><ul><li><p>After exploiting a user’s system through any number of means (leading to the “assume breach” approach), a stage 0 implant (or dropper) is placed on the exploited device.</p></li><li><p>This file may be complete or need additional pieces of a larger implant, and sends a DNS query to a domain previously unknown to threat research as being associated with C2 for an attack campaign.</p></li><li><p>The response to the query to the C2 server encodes information indicating where the implant can download additional components of the implant.</p></li><li><p>The implant uses DNS tunneling to a different domain, also unknown to threat research as being malicious, to download additional components of the implant.</p></li><li><p>The fully constructed implant performs any number of tasks assigned by another C2 server. These include exfiltrating local files, moving laterally in the network, encrypting all the files on the local machine, or even using the local CPU for the purpose of mining cryptocurrency.</p></li></ul><p>Cloudflare Gateway goes beyond simply detecting and blocking queries to domains previously known to be associated with C2, DNS tunneling, or that appear to be generated by a Domain Generation Algorithm (DGA). Gateway uses heuristics from threat research to identify queries that appear to be generated by a DGA for the purposes of an attack outlined above, detects these previously unknown threats from an organization’s log data, and proactively blocks them before a security admin needs to manually intervene.</p><p>Threat research is continually evolving. Cloudflare Gateway takes the burden of keeping pace with security threats off IT admins by delivering <a href="/solarwinds-orion-compromise-trend-data/">insights derived from Cloudflare’s network</a> to protect organizations of any size anywhere they are.</p>
    <div>
      <h3>What’s Next</h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>Our goal is to provide sophisticated, but easy to implement, security capabilities to organizations regardless of size so they can get back to what matters to their business. We’re excited to continue to expand Gateway’s capabilities to protect users and their data. DNS tunneling and DGA detection is included in Gateway DNS filtering at no cost for <a href="https://www.cloudflare.com/teams-pricing/">teams up to 50 users</a>. In-line detection of malware at Cloudflare’s edge will be included with Teams Standard and Teams Enterprise plans.</p><p>Stay tuned for filtering at the network level and integration with GRE tunnels — we’re just getting started. Follow <a href="https://www.cloudflare.com/teams/">this link</a> to sign up today.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Cloudflare Gateway]]></category>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <guid isPermaLink="false">6kIGxhqH4GgYl0tnlwXtML</guid>
            <dc:creator>Malavika Balachandran Tadeusz</dc:creator>
            <dc:creator>Pete Zimmerman</dc:creator>
        </item>
        <item>
            <title><![CDATA[Configure identity-based policies in Cloudflare Gateway]]></title>
            <link>https://blog.cloudflare.com/gateway-swg-3/</link>
            <pubDate>Mon, 21 Dec 2020 11:11:00 GMT</pubDate>
            <description><![CDATA[ You can now build secure web gateway rules based on user and group identity. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>During Zero Trust Week in October, <a href="/gateway-swg/">we released HTTP filtering</a> in Cloudflare Gateway, which expands protection beyond DNS threats to those at the HTTP layer as well. With this feature, Cloudflare WARP proxies all Internet traffic from an enrolled device to a data center in our network. Once there, Cloudflare Gateway enforces organization-wide rules to <a href="https://developers.cloudflare.com/cloudflare-one/tutorials/secure-web-gateway/block-uploads">prevent data loss</a> and <a href="https://developers.cloudflare.com/cloudflare-one/tutorials/secure-web-gateway/block-football">protect team members</a>.</p><p>However, rules are not one-size-fits-all. Corporate policies can vary between groups or even single users. For example, we heard from customers who want to stop users from uploading files to cloud storage services except for a specific department that works with partners. Beyond filtering, security teams asked for the ability to audit logs on a user-specific basis. If a user account was compromised, they needed to know what happened during that incident.</p><p>We’re excited to announce the ability for administrators to create policies based on a user’s identity and correlate that identity to activity in the Gateway HTTP logs. Your team can reuse the same identity provider integration configured in Cloudflare Access and start building policies tailored to your organization today.</p>
    <div>
      <h3>Fine-grained rule enforcement</h3>
      <a href="#fine-grained-rule-enforcement">
        
      </a>
    </div>
    <p>Until today, organizations could protect their users' Internet-bound traffic by configuring DNS and HTTP policies that applied to every user. While that makes it simple to configure policies to enforce content restrictions and mitigate security threats, any IT administrator knows that for every policy there’s an exception to that policy.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/174WHmJo1idvkjRgLzae7I/51f7020d71c5830841e58c6957c81882/image2-40.png" />
            
            </figure><p>For example, a corporate content policy might restrict users from accessing social media —  which is not ideal for a marketing team that needs to manage digital marketing campaigns. Administrators can now configure a rule in Gateway to ensure a marketing team can always reach social media from their corporate devices.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2VekrGyvpHkmBgtZL0roUK/9234e305a6c237a6154e97e758bd4bb7/image3-42.png" />
            
            </figure><p>To meet corporate policy requirements for the rest of the organization, the administrator can then build a second rule to block all social media. They can drag-and-drop that rule below the marketing team’s rule, giving it a lower precedence so that anyone not in marketing will instead be evaluated against this policy.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/NCD76Z26ZrcGWoikzXknC/0d97895683e96283e862fc92d80a1cae/image6-12.png" />
            
            </figure>
    <div>
      <h3>Identity integration and filtering options</h3>
      <a href="#identity-integration-and-filtering-options">
        
      </a>
    </div>
    <p>Cloudflare Gateway leverages the integration between your chosen identity provider (IdP) and Cloudflare Access to add identity to rules and logs. Customers can integrate one or more providers at the same time, including corporate providers like Okta and Azure AD, as well as public providers like GitHub and LinkedIn.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/56LKepvMR6GRKJYoligKgv/f626378385759f6fa9ea64726b03f1c4/image4-25.png" />
            
            </figure><p>When users first launch the WARP client, they will be prompted to authenticate with one of the providers configured. Once logged in, Cloudflare Gateway can send their traffic through your organization’s policies and attribute each connection to the user’s identity.</p><p>Depending on what your IdP supports, you can create rules based on the following attributes:</p><table><tr><td><p><b>Attribute</b></p></td><td><p><b>Example</b></p></td></tr><tr><td><p>User Name</p></td><td><p>John Doe</p></td></tr><tr><td><p>User Email</p></td><td><p><a>john.doe@example.com</a></p></td></tr><tr><td><p>User Group Name*</p></td><td><p>Marketing Team</p></td></tr><tr><td><p>User Group Email*</p></td><td><p><a>marketing@example.com</a></p></td></tr><tr><td><p>User Group ID</p></td><td><p>1234</p></td></tr></table><p><i>*Note: some IdPs use group email in place of a group name</i></p><p>Cloudflare Gateway gives teams the ability to create fine-grained rules that meet the real needs of IT administrators. But policy enforcement is only one side of the equation — protecting users and preventing corporate data loss requires visibility into Internet traffic across an organization, for auditing compliance or security incident investigations.</p>
    <div>
      <h3>User-level visibility in activity logs</h3>
      <a href="#user-level-visibility-in-activity-logs">
        
      </a>
    </div>
    <p>In addition to the ability to create identity-based rules, IT administrators can use the Gateway activity logs to filter the HTTP traffic logs for specific users and device IDs. This is critical for reasons with varying degrees of seriousness: on one end an administrator can identify users who are attempting to bypass content security policies, and on the other end, that administrator can identify users or devices that may be compromised.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/TeZ70Kl6B7ERXaN154ocN/3ad2998fc05c70a6c748bdba87a78c66/image1-64.png" />
            
            </figure><p>Securing your team from Internet threats requires IT or security administrators to keep pace with evolving attackers and, just as importantly, maintain full visibility on what’s happening to your users and data. Cloudflare Gateway now allows you to do both, so your team can get back to what matters.</p>
    <div>
      <h3>One more thing</h3>
      <a href="#one-more-thing">
        
      </a>
    </div>
    <p>At the end of Zero Trust Week, <a href="/browser-beta/">we announced our Cloudflare Isolated Browser</a> to protect organizations from Internet threats unknown to threat intelligence (i.e., zero-day attacks). By integrating with Gateway, organizations can use the Remote Browser to provide higher levels of security to individual users who might be targets of spear phishing campaigns.</p><p>For example, consider an employee in the finance department who interfaces with systems handling procurement or fund disbursement. A security team might consider preventing this employee from accessing the public Internet with their native browser and forcing that traffic into an isolated remote browser. Any traffic destined to internal systems would use the native browser. To create this policy, an administrator could create the following rules:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2czRlPLAbdEExXkBOgd1ZZ/c5225ffc1a0e055e92c233cc805076fc/image7-9.png" />
            
            </figure><p>While other Gateway rules protect you from known threats, the isolate rule can help guard against everything else. Your team can build rules that isolate traffic based on identity or content without requiring the user to switch between browsers or client applications.</p><p>Cloudflare Browser Isolation is available in private beta today; you can sign up to join the wait list <a href="https://www.cloudflare.com/teams/lp/browser-isolation/">here</a>.</p>
    <div>
      <h3>What’s next?</h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>We’re excited to bring customers with us on our journey to providing a full <a href="https://www.cloudflare.com/learning/access-management/what-is-a-secure-web-gateway/">Secure Web Gateway</a> with features such as network-level rules, in-line anti-virus scanning, and data loss prevention. This feature is <a href="https://www.cloudflare.com/teams-pricing/">available</a> to any Gateway Standard or Teams customer at no additional cost. We plan to extend these capabilities from individual remote users to branch offices and data centers.</p><p>Our goal is dead-simple integration and configuration of products that secure your users and data, so you can focus on bringing your own products into the world — we’re thrilled to help you do that. Follow this <a href="https://www.cloudflare.com/teams/">link</a> to get started.</p> ]]></content:encoded>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[WARP]]></category>
            <category><![CDATA[Cloudflare Gateway]]></category>
            <category><![CDATA[SWG]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">5TliWNfN4Xdu7i6Jf5wVkG</guid>
            <dc:creator>Pete Zimmerman</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare Gateway now protects teams, wherever they are]]></title>
            <link>https://blog.cloudflare.com/gateway-swg/</link>
            <pubDate>Wed, 14 Oct 2020 15:00:00 GMT</pubDate>
            <description><![CDATA[ Announcing a full Secure Web Gateway at the Cloudflare edge. Cloudflare Gateway provides security wherever organizations operate via the Cloudflare WARP client. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>In <a href="/introducing-cloudflare-for-teams/">January 2020</a>, we launched Cloudflare for Teams—a new way to protect organizations and their employees globally, without sacrificing performance. Cloudflare for Teams centers around two core products - Cloudflare Access and Cloudflare Gateway.</p><p><a href="/protect-your-team-with-cloudflare-gateway/">In March 2020</a>, Cloudflare launched the first feature of Cloudflare Gateway, a secure DNS filtering solution powered by the world’s fastest DNS resolver. Gateway’s DNS filtering feature kept users safe by blocking DNS queries to potentially harmful destinations associated with threats like malware, phishing, or ransomware. Organizations could change the router settings in their office and, in about five minutes, keep the entire team safe.</p><p>Shortly after that launch, entire companies began leaving their offices. Users connected from initially makeshift home offices that have become permanent in the last several months. Protecting users and data has now shifted from a single office-level setting to user and device management in hundreds or thousands of locations.</p><p>Security threats on the Internet have also evolved. Phishing campaigns and malware attacks have increased in the last six months. Detecting those types of attacks requires looking deeper than just the <a href="https://www.cloudflare.com/learning/dns/what-is-dns/">DNS query</a>.</p><p>Starting today, we’re excited to announce two features in Cloudflare Gateway that solve those new challenges. First, Cloudflare Gateway now integrates with the <a href="/warp-for-desktop">Cloudflare WARP desktop client</a>. We built WARP around WireGuard, a modern, efficient VPN protocol that is much more efficient and flexible than legacy VPN protocols.</p><p>Second, Cloudflare Gateway becomes a <a href="https://www.cloudflare.com/learning/access-management/what-is-a-secure-web-gateway/">Secure Web Gateway</a> and performs L7 filtering to inspect traffic for threats that hide below the surface. Like our DNS filtering and 1.1.1.1 resolver, both features are powered by everything we’ve learned by offering Cloudflare WARP to millions of users globally.</p>
    <div>
      <h3>Securing the distributed workforce</h3>
      <a href="#securing-the-distributed-workforce">
        
      </a>
    </div>
    <p>Our customers are largely distributed workforces with employees split between corporate offices and their homes. Due to the pandemic, this is their operating environment for the foreseeable future.</p><p>The fact that users aren’t located at fixed, known locations (with remote workers allowed by exception) has created challenges for already overworked IT staff:</p><ol><li><p>VPNs are an all-or-nothing approach to providing remote access to internal applications. We address this with Cloudflare Access and our <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust approach</a> to security for internal applications and <a href="/cloudflare-access-for-saas/">now SaaS applications as well</a>.</p></li><li><p>VPNs are slow and expensive. However, back hauling traffic to a centralized security boundary has been the primary approach to enforcing corporate content and security policies to protect roaming users. Cloudflare Gateway was created to tackle this problem for our customers.</p></li></ol><p>Until today, Cloudflare Gateway has provided security for our customers through DNS filtering. While this provides a level of security and content control that’s application-agnostic, it still leaves our customers with a few challenges:</p><ol><li><p>Customers need to register the source IP address of all locations that send DNS queries to Gateway, so their organization’s traffic can be identified for policy enforcement. This is tedious at best, if not intractable for larger organizations with hundreds of locations.</p></li><li><p>DNS policies are relatively coarse, with enforcement performed with an all-or-nothing approach per domain. Organizations lack the ability to, for example, allow access to a cloud storage provider but block the download of harmful files from known-malicious URLs.</p></li><li><p>Organizations that register IP addresses frequently use Network Address Translation (NAT) traffic in order to share public IP addresses across many users. This results in a loss of visibility into DNS activity logs at the individual user level. So while IT security admins can see that a malicious domain was blocked, they must leverage additional forensic tools to track down a potentially compromised device.</p></li></ol><p>Starting today, we are taking Cloudflare Gateway beyond a secure DNS filtering solution by pairing the Cloudflare for Teams client with a cloud L7 firewall. Now our customers can toss out another hardware appliance in their centralized security boundary and provide enterprise-level security for their users directly from the Cloudflare edge.</p>
    <div>
      <h3>Protecting users and preventing corporate data loss</h3>
      <a href="#protecting-users-and-preventing-corporate-data-loss">
        
      </a>
    </div>
    <p>DNS filtering provides a baseline level of security across entire systems and even networks, since it’s leveraged by all applications for Internet communications. However, application-specific protection offers granular policy enforcement and visibility into whether traffic should be classified as malicious.</p><p>Today we’re excited to extend the protection we offer through DNS filtering by adding an L7 firewall that allows our customers to apply security and content policies to HTTP traffic. This provides administrators with a better tool to protect users through granular controls within HTTP sessions, and with visibility into policy enforcement. Just as importantly, it also gives our customers greater control over where their data resides. By building policies, customers can specify whether to allow or block a request based on file type, on whether the request was to upload or download a file, or on whether the destination is an approved cloud storage provider for the organization.</p><p>Enterprises protect their users’ Internet traffic wherever they are by connecting to Cloudflare with the Cloudflare for Teams client. This client provides a fast, secure connection to the Cloudflare data center nearest them, and it relies on the same Cloudflare WARP application millions of users connect through globally. Because the client uses the same WARP application under the hood, enterprises can be sure it has been tested at scale to provide security without compromising on performance. Cloudflare WARP optimizes network performance by leveraging WireGuard for the connection to the Cloudflare edge.</p><p>The result is a secure, performant connection for enterprise users wherever they are without requiring the backhaul of network traffic to a centralized security boundary. By connecting to Cloudflare Gateway with the Cloudflare for Teams client, enterprise users are protected through filtering policies applied to all outbound Internet traffic--protecting users as they navigate the Internet and preventing the loss of corporate data.</p><p>Cloudflare Gateway now supports HTTP traffic filtering based on a variety of criteria including:</p><p></p><table><tr><td><p><b>Criteria</b></p></td><td><p><b>Example</b></p></td></tr><tr><td><p>URL, path, and/or query string</p></td><td><p><a href="http://web.archive.org/web/20210826102410/https://www.myurl.com/path?query">https://www.myurl.com/path?query</a></p></td></tr><tr><td><p>HTTP method</p></td><td><p>GET, POST, etc.</p></td></tr><tr><td><p>HTTP response code</p></td><td><p>500</p></td></tr><tr><td><p>File type and file name</p></td><td><p>myfilename.zip</p></td></tr><tr><td><p>MIME type</p></td><td><p>application/zip</p></td></tr><tr><td><p>URL security or content category</p></td><td><p>Malware, phishing, adult themes</p></td></tr></table><p>To complement DNS filtering policies, IT admins can now create L7 firewall rules to apply granular policies on HTTP traffic.</p><p>For example, an admin may want to allow users to navigate to useful parts of Reddit, but block undesirable subreddits.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1ArFEuCCcc77PX9cMvTpaR/e5e5e7fc42ce8e89cd01a1bf8c0b3b56/image2-12.png" />
            
            </figure><p>Or to prevent data loss, an admin could create a rule that allows users to receive content from popular cloud storage providers but not upload select file types from corporate devices.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/iKIRnSd2A6ehkzBhJWhhf/ce59d24f46a23138a298e3448742f7b5/image6-7.png" />
            
            </figure><p>Another admin might want to prevent malicious files from being smuggled in through zip file downloads, so they may decide to configure a rule to block downloads of compressed file types.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/mCROB1jq2CKam8tFz8ghi/79a00a382f860f263c62abe1dad3fb19/image5-6.png" />
            
            </figure><p>Having used our DNS filtering categories to protect internal users, an admin may want to simply block security threats based on the classification of full URLs. Malware payloads are frequently disseminated from cloud storage and with DNS filtering an admin has to choose whether to allow or deny access to the entire domain for a given storage provider. <a href="https://www.cloudflare.com/learning/access-management/what-is-url-filtering/">URL filtering</a> gives admins the ability to filter requests for the exact URLs where malware payloads reside, allowing customers to continue to leverage the usefulness of their chosen storage provider.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2rvW866zgYx5m9k9KybSCT/8b15d21f1aa664f51e419fce53652e80/image7-4.png" />
            
            </figure><p>And because all of this is made possible with the Cloudflare for Teams client, distributed workforces with roaming clients receive this protection wherever they are through a secure connection to the Cloudflare data center nearest them.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5DZZ6DSVRQcNTHA4QVvb1X/c9d29b26ca1e590c68f002794a53334a/image4-7.png" />
            
            </figure><p>We’re excited to protect teams as they browse the Internet by inspecting HTTP traffic, but what about non-HTTP traffic? Later this year, we will extend Cloudflare Gateway by adding support for IP, port, and protocol filtering with a cloud L4 firewall. This will allow administrators to apply rules to all Internet-bound traffic, like rules that allow outbound SSH, or rules that determine whether to send HTTP traffic arriving at a non-standard port to the L7 firewall for HTTP inspection.</p><p>At launch, Cloudflare Gateway will allow administrators to create policies that filter DNS and HTTP traffic across all users in an organization. This creates a great baseline for security. However, exceptions are part of reality: a one-size-fits-all approach to content and security policy enforcement rarely matches the specific needs of all users.</p><p>To address this, we’re working on supporting rules based on user and group identity by integrating Cloudflare Access with a customer’s existing identity provider. This will let administrators create granular rules that also leverage context around the user, such as:</p><ul><li><p>Deny access to social media to all users. But if John Doe is in the marketing group, allow him to access these sites in order to perform his job role.</p></li><li><p>Only allow Jane Doe to connect to specific SaaS applications through Cloudflare Gateway, or a certain <a href="/tanium-cloudflare-teams/">device posture</a>.</p></li></ul><p>The need for policy enforcement and logging visibility based on identity arises from the reality that users aren’t tied to fixed, known workplaces. We meet that need by integrating identity and protecting users wherever they are with the Cloudflare for Teams client.</p>
    <div>
      <h3>What’s next</h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>People do not start businesses to deal with the minutiae of information technology and security. They have a vision and a product or service they want to get out in the world, and we want to get them back to doing that. We can help eliminate the hard parts around implementing advanced security tools that are usually reserved for larger, more sophisticated organizations, and we want to make them available to teams regardless of size.</p><p>The launch of both the Cloudflare for Teams client and L7 firewall lays the foundation for an advanced Secure Web Gateway with integrations including antivirus scanning, <a href="https://www.cloudflare.com/learning/access-management/what-is-a-casb/">CASB</a>, and <a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">remote browser isolation</a>—all performed at the Cloudflare edge. We’re excited to share this glimpse of the future our team has built—and we’re just getting started.</p>
    <div>
      <h3>Get started now</h3>
      <a href="#get-started-now">
        
      </a>
    </div>
    <p>All of these new capabilities are ready for you to use today. The L7 firewall is available in Gateway standalone, Teams Standard, and Teams Enterprise plans. You can get started by <a href="https://dash.cloudflare.com/sign-up/teams">signing up for a Gateway account</a> and following the <a href="https://developers.cloudflare.com/gateway/about">onboarding directions</a>.</p> ]]></content:encoded>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Zero Trust Week]]></category>
            <category><![CDATA[1.1.1.1]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[WARP]]></category>
            <category><![CDATA[Cloudflare Gateway]]></category>
            <category><![CDATA[SWG]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">0iIBdieVUgKSkTL9RBkGF</guid>
            <dc:creator>Pete Zimmerman</dc:creator>
        </item>
    </channel>
</rss>