
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Fri, 03 Apr 2026 22:01:36 GMT</lastBuildDate>
        <item>
            <title><![CDATA[Quick Tunnels: Anytime, Anywhere]]></title>
            <link>https://blog.cloudflare.com/quick-tunnels-anytime-anywhere/</link>
            <pubDate>Thu, 02 Sep 2021 13:00:03 GMT</pubDate>
            <description><![CDATA[ Cloudflare Tunnel now supports a free version that includes all the latest features and does not require any onboarding to Cloudflare. With today’s change, you can begin experimenting with Tunnel in five minutes or less. ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6aq4Df0NwD6Jx4gVeluk4N/3b98261144f2f97f0903627cb3e50493/image2-28.png" />
            
            </figure><p>My name is Rishabh Bector, and this summer, I worked as a software engineering intern on the Cloudflare Tunnel team. One of the things I built was quick Tunnels and before departing for the summer, I wanted to write a blog post on how I developed this feature.</p><p>Over the years, our engineering team has worked hard to continually improve the underlying architecture through which we serve our Tunnels. However, the core use case has stayed largely the same. Users can implement Tunnel to establish an encrypted connection between their origin server and Cloudflare’s edge.</p><p>This connection is initiated by installing a lightweight daemon on your origin, to serve your traffic to the Internet without the need to poke holes in your firewall or create intricate access control lists. Though we’ve always centered around the idea of being a <code>connector</code> to Cloudflare, we’ve also made many enhancements behind the scenes to the way in which our connector operates.</p><p>Typically, users run into a few speed bumps before being able to use Cloudflare Tunnel. Before they can create or route a tunnel, users need to authenticate their unique token against a zone on their account. This means in order to simply spin up a Tunnel testing environment, users need to first create an account, add a website, change their nameservers, and wait for DNS propagation.</p><p>Starting today, we’re excited to fix that. Cloudflare Tunnel now supports a free version that includes all the latest features and does not require any onboarding to Cloudflare. With today’s change, you can begin experimenting with Tunnel in five minutes or less.</p>
    <div>
      <h3>Introducing Quick Tunnels</h3>
      <a href="#introducing-quick-tunnels">
        
      </a>
    </div>
    <p>When administrators start using Cloudflare Tunnel, they need to perform four specific steps:</p><ol><li><p>Create the Tunnel</p></li><li><p>Configure the Tunnel and what services it will represent</p></li><li><p>Route traffic to the Tunnel</p></li><li><p>And finally… run the Tunnel!</p></li></ol><p>These steps give you control over how your services connect to Cloudflare, but they are also a chore. Today’s change, which we are calling quick Tunnels, not only removes some onboarding requirements, we’re also condensing these into a single step.</p><p>If you have a service running locally that you want to share with teammates or an audience, you can use this single command to connect your service to Cloudflare’s edge. First, you need to install the Cloudflare connector, a lightweight daemon called <code>cloudflared</code>. Once installed, you can run the command below.</p><p><code>cloudflared tunnel</code></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/52RN2zWOVsS0PKx2CJRIUx/44b28bb92b76ba31a346675877de428b/image1-36.png" />
            
            </figure><p>When run, <code>cloudflared</code> will generate a URL that consists of a random subdomain of the website <code>trycloudflare.com</code> and point traffic to localhost port 8080. If you have a web service running at that address, users who visit the subdomain generated will be able to visit your web service through Cloudflare’s network.</p>
    <div>
      <h3>Configuring Quick Tunnels</h3>
      <a href="#configuring-quick-tunnels">
        
      </a>
    </div>
    <p>We built this feature with the single command in mind, but if you have services that are running at different default locations, you can optionally configure your quick Tunnel to support that.</p><p>One example is if you’re building a multiplayer game that you want to share with friends. If that game is available locally on your origin, or even your laptop, at localhost:3000, you can run the command below.</p><p><code>cloudflared tunnel --url localhost:3000</code></p><p>You can do this with IP addresses or URLs, as well. Anything that <code>cloudflared</code> can reach can be made available through this service.</p>
    <div>
      <h3>How does it work?</h3>
      <a href="#how-does-it-work">
        
      </a>
    </div>
    <p>Cloudflare quick Tunnels is powered by Cloudflare <a href="https://workers.cloudflare.com/">Workers</a>, giving us a serverless compute deployment that puts Tunnel management in a Cloudflare data center closer to you instead of a centralized location.</p><p>When you run the command <code>cloudflared tunnel</code>, your instance of <code>cloudflared</code> initiates an outbound-only connection to Cloudflare. Since that connection was initiated without any account details, we treat it as a quick Tunnel.</p><p>A Cloudflare Worker, which we call the quick Tunnel Worker, receives a request that a new quick Tunnel should be created. The Worker generates the random subdomain and returns that to the instance of <code>cloudflared</code>. That instance of <code>cloudflared</code> can now establish a connection for that subdomain.</p><p>Meanwhile, a complementary service running on Cloudflare’s edge receives that subdomain and the identification number of the instance of <code>cloudflared</code>. That service uses that information to create a DNS record in Cloudflare’s authoritative DNS which maps the randomly-generated hostname to the specific Tunnel you created.</p><p>The deployment also relies on the <a href="/introducing-cron-triggers-for-cloudflare-workers/">Workers Cron Trigger</a> feature to perform clean up operations. On a regular interval, the Worker looks for quick Tunnels which have been disconnected for more than five minutes. Our Worker classifies these Tunnels as abandoned and proceeds to delete them and their associated DNS records.</p><p>What about Zero Trust policies?</p><p>By default, all the quick Tunnels that you create are available on the public Internet at the randomly generated URL. While this might be fine for some projects and tests, other use cases require more security.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7nQnLMDD856i6qX9MjHMFD/e384f7683da597a8c440b682b8e64edd/image3-23.png" />
            
            </figure><p>If you need to add additional Zero Trust rules to control who can reach your services, you can use Cloudflare Access alongside Cloudflare Tunnel. That use case does require creating a Cloudflare account and adding a zone to Cloudflare, but we’re working on ideas to make that easier too.</p>
    <div>
      <h3>Where should I notice improvements?</h3>
      <a href="#where-should-i-notice-improvements">
        
      </a>
    </div>
    <p>We first launched a version of Cloudflare Tunnel that did not require accounts over two years ago. While we’ve been thrilled that customers have used this for their projects, Cloudflare Tunnel evolved significantly since then. Specifically, Cloudflare Tunnel relies on a new architecture that is more redundant and stable than the one used by that older launch. While all Tunnels that migrated to this new architecture, which we call <a href="/argo-tunnels-that-live-forever/">Named Tunnels</a>, enjoyed those benefits, the users on this option that did not require an account were left behind.</p><p>Today’s announcement brings that stability to quick Tunnels. Tunnels are now designed to be long-lived, persistent objects. Unless you delete them, Tunnels can live for months, an improvement over the average lifespan measured in hours before connectivity issues disrupted a Tunnel in the older architecture.</p><p>These quick Tunnels run on this same, resilient architecture not only expediting time-to-value, but also improving the overall tunnel quality of life.</p>
    <div>
      <h3>What’s next?</h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>Today’s quick Tunnels add a powerful feature to Cloudflare Tunnels: the ability to create a reliable, resilient tunnel in a single command, without the hassle of creating an account first. We’re excited to help your team build and connect services to Cloudflare’s network and on to your audience or teammates. If you have additional questions, please share them in this community post here.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare Tunnel]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Road to Zero Trust]]></category>
            <guid isPermaLink="false">2roWhXiAJnt7fEoqoxfAXt</guid>
            <dc:creator>Rishabh Bector</dc:creator>
        </item>
        <item>
            <title><![CDATA[Data protection controls with Cloudflare Browser Isolation]]></title>
            <link>https://blog.cloudflare.com/data-protection-browser/</link>
            <pubDate>Fri, 20 Aug 2021 13:34:47 GMT</pubDate>
            <description><![CDATA[ Starting today, your team can use Cloudflare’s Browser Isolation service to protect sensitive data inside the web browser. Administrators can define Zero Trust policies to control who can copy, paste, and print data in any web based application. ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3pfCjaLKWhg07vPGyAP50X/476b19e51dd2c0c017bc78a3edd3bfc1/image3-21.png" />
            
            </figure><p>Starting today, your team can use Cloudflare’s Browser Isolation service to protect sensitive data inside the web browser. Administrators can define <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust policies</a> to control who can copy, paste, and print data in any web based application.</p><p>In March 2021, for <a href="/welcome-to-security-week-2021/">Security Week</a>, we announced the <a href="/browser-isolation-for-teams-of-all-sizes/">general availability</a> of Cloudflare Browser Isolation as an add-on within the Cloudflare for Teams suite of Zero Trust application access and browsing services. <a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">Browser Isolation</a> protects users from browser-borne malware and zero-day threats by shifting the risk of executing untrusted website code from their local browser to a secure browser hosted on our edge.</p><p>And currently, we’re democratizing browser isolation for any business by including it with our Teams Enterprise Plan at no additional charge.<sup>1</sup></p>
    <div>
      <h3>A different approach to zero trust browsing</h3>
      <a href="#a-different-approach-to-zero-trust-browsing">
        
      </a>
    </div>
    <p>Web browsers, the same tool that connects users to critical business applications, is one of the most common attack vectors and hardest to control.</p><p>Browsers started as simple tools intended to share academic documents over the Internet and over time have become sophisticated platforms that replaced virtually every desktop application in the workplace. The dominance of web-based applications in the workplace has created a challenge for security teams who race to stay patch zero-day vulnerabilities and protect sensitive data stored in self-hosted and SaaS based applications.</p><p>In an attempt to <a href="https://www.cloudflare.com/application-services/solutions/">protect users and applications from web based attacks</a>, administrators have historically relied on DNS or HTTP inspection to prevent threats from reaching the browser. These tools, while useful for protecting against <i>known threats,</i> are difficult to tune without false-positives (negatively impacting user productivity and increasing IT support burden) and ineffective against zero day vulnerabilities.</p><p>Browser isolation technologies mitigate risk by shifting the risk of executing foreign code from the endpoint to a secure environment. Historically administrators have had to make a compromise between <b>performance</b> and <b>security</b> when adopting such a solution. They could either:</p><ul><li><p><b>Prioritize</b> <b>security</b> by choosing a solution that relies on pixel pushing techniques to serve a visual representation to users. This comes at the cost of performance by introducing latency, graphical artifacts and heavy bandwidth usage.</p></li></ul><p><b><i>OR</i></b></p><ul><li><p><b>Prioritize performance</b> by choosing a solution that relies on code scrubbing techniques to unpack, inspect and repack the webpage. This model is fragile (often failing to repack leading to a broken webpage) and insecure by allowing undetected threats to compromise users.</p></li></ul><p>At Cloudflare, we know that security products do not need to come at the expense of performance. We developed a third option that delivers a remote browsing experience without needing to compromise on performance and security for users.</p><ul><li><p><b>Prioritize security</b> by never sending foreign code to the endpoint and executing it in a secure remote environment.</p></li><li><p><b>Prioritize</b> <b>performance</b> sending light-weight vector instructions (rather than pixels) over the wire and minimize remote latency on our global edge network.</p></li></ul>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/41ebdDVZfNPcZDrzSErdei/64d92c0dfee8d66ac8ec820710c5aab4/image4-14.png" />
            
            </figure><p>This unique approach delivers an isolated browser without the security or performance challenges faced by legacy solutions.</p>
    <div>
      <h3>Data control through the browser</h3>
      <a href="#data-control-through-the-browser">
        
      </a>
    </div>
    <p>Malware and zero-day threats are not the only security challenges administrators face with web browsers. The mass adoption of SaaS products has made the web browser the primary tool used to access data. Lack of control over both the application and the browser has left administrators little control over their data once it is delivered to an endpoint.</p><p>Data loss prevention tools typically rely on pattern recognition to partially or completely redact the transmission of sensitive data values. This model is useful for protecting against an unexpected breach of PII and <a href="https://www.cloudflare.com/learning/privacy/what-is-pci-dss-compliance/">PCI</a> data, such as locations and financial information but comes at the loss of visibility.</p><p>The redaction model falls short when sensitive data does not fit into easily recognizable patterns, and the end-users require visibility to do their job. In industries such as health care, redacting sensitive data is not feasible as medical professions require visibility of patient notes and appointment data.</p><p>Once data lands in the web browser it is trivial for a user to copy-paste and print sensitive data into another website, application, or physical location. These seemingly innocent actions can lead to data being misplaced by naive users leading to a data breach. Administrators have had limited options to protect data in the browser, some even going so far as to deploy virtual desktop services to <a href="https://www.cloudflare.com/learning/access-management/what-is-access-control/">control access</a> to a SaaS based customer relationship management (CRM) tool. This increased operating costs, and frustrated users who had to learn how to use computer-in-a-computer just to use a website.</p>
    <div>
      <h3>One-click to isolate data in the browser</h3>
      <a href="#one-click-to-isolate-data-in-the-browser">
        
      </a>
    </div>
    <p>Cloudflare Browser Isolation executes all website code (including HTML) in the remote browser. Since page content remains on the remote browser and draw instructions are only sent to the browser, Cloudflare Browser Isolation is in a powerful position to protect sensitive data on any website or SaaS application.</p><p>Administrators can now control copy-paste, and printing functionality with per-rule granularity with one click in the Cloudflare for Teams Dashboard. For example, now administrators can build rules that prevent users from copying information from your CRM or that stop team members from printing data from your ERP—without blocking their attempts to print from external websites where printing does not present a data loss risk.</p><p>From the user’s perspective websites look and behave normally until the user performs a restricted action.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/117OYpWOP2A2nfrdIyvKy1/78601296763701820f40fe61f69b2c89/image2-5.gif" />
            
            </figure><p>Copy-paste and printing control can be configured for both new and existing HTTP policies in the Teams Dashboard.</p><ol><li><p>Navigate to the Cloudflare for Teams dashboard.</p></li><li><p>Navigate to Gateway → Policies → HTTP.</p></li><li><p>Create/update an HTTP policy with an <b>Isolate</b> action (<a href="https://developers.cloudflare.com/cloudflare-one/policies/filtering/http-policies/#isolate">docs</a>).</p></li><li><p>Configure policy settings.</p></li></ol>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/hA5ZS9T1CskQuCcYmU0z5/041c95876666a465e1db6570119f26df/image1-34.png" />
            
            </figure><p>Administrators have flexibility with data protection controls and can enable/disable browser behaviours based on application, hostname, user identity and security risk.</p>
    <div>
      <h3>What’s next?</h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>We’re just getting started with zero trust browsing controls. We’re hard at work building controls to protect against phishing attacks, further protect data by controlling file uploading and downloading without needing to craft complex network policies as well as support for a fully clientless browser isolation experience.</p>
    <div>
      <h3>Democratizing browser isolation for any business</h3>
      <a href="#democratizing-browser-isolation-for-any-business">
        
      </a>
    </div>
    <p>Historically, only large enterprises had justified the cost to add on remote browser isolation to their existing security deployments. And the resulting loosely-integrated solution fell short of achieving Zero Trust due to poor end-user experiences. Cloudflare has already solved these challenges, so businesses achieve full Zero Trust security including browser-based data protection controls without performance tradeoffs.</p><p>Yet it’s not always enough to democratize Zero Trust browser isolation for any business, so we’re currently including it with our Teams Enterprise Plan at no additional charge.<sup>1</sup> <a href="https://www.cloudflare.com/teams/browser-isolation/">Get started here</a>.</p><p>.......</p><p><sup>1</sup> For up to 2000 seats until 31 Dec 2021</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Remote Browser Isolation]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Road to Zero Trust]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">5TAae1DDChg8vSupwwaUQZ</guid>
            <dc:creator>Tim Obezuk</dc:creator>
        </item>
        <item>
            <title><![CDATA[Announcing Tenant Control in Cloudflare Gateway]]></title>
            <link>https://blog.cloudflare.com/gateway-tenant-control/</link>
            <pubDate>Fri, 20 Aug 2021 13:00:45 GMT</pubDate>
            <description><![CDATA[ Today, we’re excited to announce Tenant Control in Cloudflare Gateway, a new feature that helps keep our work at work. ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3Rp8wjIon8rNXOAYb86Cv3/3d0c2be8cb5552417a4361c6a4ee474f/teams-gateway-hero-illustration-3x-8-1.png" />
            
            </figure><p>The tools we use at work are starting to look like the apps we use in our personal lives. We send emails for our jobs using Google Workspace and respond to personal notes in Gmail. We download PDFs from our team’s Dropbox and then upload images to our personal account. This can lead to confusion and mistakes—made worse by remote work when we forget to log off for the day.</p><p>Today, we’re excited to announce Tenant Control in Cloudflare Gateway, a new feature that helps keep our work at work. Organizations can deploy Cloudflare Gateway to their corporate devices and apply rules ensuring that employees can only log in to the corporate version of the tools they need. Now, teams can prevent users from logging in to the wrong instance of popular applications. What’s more, they can make sure corporate data stays within corporate accounts.</p>
    <div>
      <h3>Controlling the application, alone, isn’t sufficient</h3>
      <a href="#controlling-the-application-alone-isnt-sufficient">
        
      </a>
    </div>
    <p>Cloudflare Gateway provides security from threats on the Internet by sending all traffic leaving a device to Cloudflare’s network where it can be filtered. Organizations send traffic to Cloudflare by deploying the WARP agent, a WireGuard-based client built on feedback from our popular consumer app.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4I4Nvic29DjivU5ASKDFgF/4aea11857e44c0b807c0d6c5804576f6/identity-policy-engine.svg" />
            
            </figure><p>Cloudflare Gateway can be deployed in several modes, but most customers start with DNS filtering which only sends <a href="https://www.cloudflare.com/learning/dns/what-is-dns/">DNS queries</a> to Cloudflare. Cloudflare runs the world’s fastest DNS resolver, 1.1.1.1, and on top of that we’ve built a DNS filtering solution where we help prevent users from visiting sites that contain malware or serve phishing attacks.</p><p>When organizations are ready to <a href="https://www.cloudflare.com/products/zero-trust/remote-workforces/">add more security to their deployment</a>, they go beyond DNS filtering by adding HTTP filtering as well. Cloudflare inspects the HTTP traffic leaving the device which provides more granular control than just DNS filtering over destinations and events that happen inside the traffic, like blocking file uploads to certain destinations.</p><p>Customers use the HTTP filtering to filter and control SaaS application usage. For example, if your team uses OneDrive, you can block all file uploads to Google Drive to avoid data leaving the tenants you control. Cloudflare provides the classification of what hostnames and URLs constitute an application and make it possible to <a href="/gateway-app-policies/">build rules with just two clicks</a>. However, what happens when you aren’t using two different applications — you’re using two different instances of the same one?</p>
    <div>
      <h3>Applying control to the SaaS tenant</h3>
      <a href="#applying-control-to-the-saas-tenant">
        
      </a>
    </div>
    <p>Today, you can enable tenant control using Gateway HTTP policies in Cloudflare Gateway. Administrators can begin by adding a new type of rule in Gateway that prompts them to input a specific value provided by the SaaS application. For example, an administrator can gather the <a href="https://docs.microsoft.com/en-us/azure/active-directory/manage-apps/tenant-restrictions">tenant ID for their Microsoft 365</a> deployment.</p><p>Once the rule is enabled, Cloudflare Gateway will append a <a href="https://developers.cloudflare.com/cloudflare-one/policies/filtering/http-policies/tenant-control">specific header</a> and, if enabled, the specific tenant ID as part of the appended header to your request. Depending on the SaaS application, these will either block all consumer or personal usage or block all logins to accounts that are not part of that tenant ID. The SaaS application is aware of the specific header it relies on to enforce this rule and, when received, responds accordingly.</p><p>Traditionally, these headers are injected by corporate VPNs or proxy servers maintained on-premises and accessed by backhauling user traffic. Cloudflare Gateway provides customers with filtering and inspection in our data centers closer to your users and, combined with our ability to accelerate traffic, delivers your users to their destination without the performance consequences of legacy backhaul approaches.</p>
    <div>
      <h3>Enforcing Corporate Tenant Access</h3>
      <a href="#enforcing-corporate-tenant-access">
        
      </a>
    </div>
    <p>You can begin configuring these rules today in the Cloudflare for Teams dashboard. To enforce tenant control with Gateway, you can configure an HTTP policy in the Teams Dashboard. For example, you can prevent users from authenticating to GSuite with their personal account and uploading documents to Google Drive account by using the following policy (GSuite uses the “X-GooGApps-Allowed-Domains” header):</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/Nfi39ceQnPYt794xXHuff/8f9008d31a869f39fdfcca8119be4080/image1-37.png" />
            
            </figure><p>As requests get filtered by Gateway’s firewall, allowed requests are proxied to their respective upstream servers. Before sending them upstream, we preprocess the request and append our own trace headers — these include things that are useful for debugging, like request ID headers. Now you can specify your own custom headers to be added onto these requests, which is what enables customers to enforce tenant control for their organizations.</p>
    <div>
      <h3>What’s Next</h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>Controlling data usage in your organization is a multistep process. Today, Cloudflare Gateway gives your teams control of what <a href="/gateway-app-policies/">applications you use</a>, where you can <a href="https://developers.cloudflare.com/cloudflare-one/tutorials/block-uploads">upload or download files</a>, and when to block copy-paste and printing in our isolated browser. We’re excited to introduce tenant control into that portfolio to add another layer of security.</p><p>That said, we’re just getting started. We’ll be introducing new scanning features on top of this existing functionality as we continue to build Cloudflare’s data control features. If you want to be the first to know about the next wave of these features, follow <a href="https://www.cloudflare.com/teams/">this link</a> to sign up today.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Cloudflare Gateway]]></category>
            <category><![CDATA[Road to Zero Trust]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">5tlI49Ig2R0zUMKfSZCbzJ</guid>
            <dc:creator>Alyssa Wang</dc:creator>
        </item>
        <item>
            <title><![CDATA[Building a Pet Cam using a Raspberry Pi, Cloudflare Tunnels and Teams]]></title>
            <link>https://blog.cloudflare.com/building-a-pet-cam-using-a-raspberry-pi-cloudflare-tunnels-and-teams/</link>
            <pubDate>Thu, 19 Aug 2021 12:59:03 GMT</pubDate>
            <description><![CDATA[ This was a perfect weekend project: I would set up my own pet cam, connect it to the Internet, and make it available for me to check from anywhere in the world. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>I adopted Ziggy in late 2020. It took me quite a while to get used to his routine and mix it with mine. He consistently jumped on the kitchen counter in search of food, albeit only when no one was around. And I only found out when he tossed the ceramic butter box. It shattered and made a loud bang in the late hours of the night. Thankfully, no one was asleep yet.</p><p>This got me thinking that I should keep an eye on his mischievous behaviour, even when I'm not physically at home. I briefly considered buying a pet cam, but I remembered I had bought a Raspberry Pi a few months before. It was hardly being used, and it had a case (like <a href="https://thepihut.com/collections/raspberry-pi-4-cases/products/pir-camera-case-for-raspberry-pi-4-3">this</a>) allowing a camera module to be added. I hadn’t found a use for the camera module — until now.</p><p>This was a perfect weekend project: I would set up my own pet cam, connect it to the Internet, and make it available for me to check from anywhere in the world. I also wanted to ensure that only I could access it and that it had some easy way to login, possibly using my Google account. The solution? Cloudflare Tunnel and Teams. Cloudflare would help me expose a service running in an internal network using <a href="https://www.cloudflare.com/products/tunnel/">Tunnel</a> while providing a security solution on top of it to keep it secure. <a href="https://www.cloudflare.com/teams/">Teams</a> on the other hand, would help me by adding access control in the form of Google authentication.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5bWBM8Z87zIOnvBG8TYXJ3/54946b52cfe1989747b9400f2c2f2b66/image10.jpg" />
            
            </figure><p>So all I am left to do is configure my Raspberry Pi to be able to run a camera as a web service. That weekend, I started researching for it and made a list of things I needed:</p><ul><li><p>A Raspberry Pi with a compatible camera module. I used a <a href="https://www.raspberrypi.org/products/raspberry-pi-4-model-b/">Raspberry Pi 4 model B</a> with <a href="https://www.raspberrypi.org/products/camera-module-v2/">camera module v2</a>.</p></li><li><p>Linux knowledge.</p></li><li><p>A domain name I could make changes to.</p></li><li><p>Understanding of how DNS works.</p></li><li><p>A Cloudflare account with Cloudflare for Teams+Tunnel access.</p></li><li><p>Internet connection.</p></li></ul><p>In this blog post, I’ll walk you through the process I followed to set everything up for the pet cam. To keep things simple and succinct, I will not cover how to set up your Raspberry Pi, but you should make sure it has Internet access and that you can run shell commands on it, either via <a href="https://www.cloudflare.com/learning/access-management/what-is-ssh/">SSH</a> or using a <a href="https://www.realvnc.com/en/">VNC connection</a>.</p>
    <div>
      <h3>Setup</h3>
      <a href="#setup">
        
      </a>
    </div>
    <p>The first thing we need to do is connect the camera module to the Raspberry Pi. For more detailed instructions, follow the <a href="https://projects.raspberrypi.org/en/projects/getting-started-with-picamera/1">official guide</a>, steps 1 to 3.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4nMbgxZI3HylSD6wKx5ImA/cef37fd42e0ea3f4338658d08f45f168/image2.jpg" />
            
            </figure><p>After setting up the camera and testing that it works, we need to set it up as a camera with a web server. This is so we can access it at a URL such as <a href="https://192.168.0.2:8080">https://192.168.0.2:8080</a> within the local network, to which the Raspberry Pi is also connected. To do that, we will use <a href="https://motion-project.github.io/">Motion</a>, a program for setting up the camera module v2 as a web server.</p><p>To install Motion, input these commands:</p>
            <pre><code>$ sudo apt-get update &amp;&amp; sudo apt-get upgrade
$ sudo apt install autoconf automake build-essential pkgconf libtool git libzip-dev libjpeg-dev gettext libmicrohttpd-dev libavformat-dev libavcodec-dev libavutil-dev libswscale-dev libavdevice-dev default-libmysqlclient-dev libpq-dev libsqlite3-dev libwebp-dev
$ sudo wget https://github.com/Motion-Project/motion/releases/download/release-4.3.1/pi_buster_motion_4.3.1-1_armhf.deb
$ sudo dpkg -i pi_buster_motion_4.3.1-1_armhf.deb</code></pre>
            <p>The above commands will update the local packages with new versions from the repositories and then install that version of Motion from Motion’s GitHub project.</p><p>Next, we need to configure Motion using:</p>
            <pre><code>$ sudo vim /etc/motion/motion.conf
# Find the following lines and update them to following:
# daemon on
# stream_localhost off
# save and exit</code></pre>
            <p>After that, we need to set Motion up as a daemon, so it runs whenever the system is restarted:</p>
            <pre><code>$ sudo vim /etc/default/motion
# and change the following line 
# start_motion_daemon=yes
# save and exit and run the next command
$ sudo service motion start</code></pre>
            <p>Great. Now that we have Motion set up, we can see the live feed from our camera in a browser on Raspberry Pi module at the default URL: <a href="http://0.0.0.0:8081"><b>http://localhost:8081</b></a> (the port can be changed in the config edit step above). Alternatively, we can open it on another machine within the same network by replacing 0.0.0.0 with the IP of the Raspberry Pi in the network.</p><p>For now, the camera web server is available only within our local network. However, I wanted to keep an eye on Ziggy no matter where I am, as long as I have Internet access and a browser. This is perfect for <a href="https://www.cloudflare.com/products/tunnel/">Cloudflare Tunnel</a>. An alternative would be to open a port in the firewall on the router in my home network, but I hate that idea of having to mess with the router configuration. I am not really an expert at that, and if I leave a backdoor open to my internal network, it can get scary quickly!</p><p>The Cloudflare Tunnel documentation takes us through <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-apps/install-and-setup/installation">its installation</a>. The only issue is that the architecture of the Raspberry Pi is based on armv7l (32-bit) and there is no package for it in the remote repositories_._ We could build cloudflared from source if we wanted as it’s an <a href="https://github.com/cloudflare/cloudflared">open source project</a>, but an easier route is to <code>wget</code> it.</p>
            <pre><code>$ wget https://bin.equinox.io/c/VdrWdbjqyF/cloudflared-stable-linux-arm.tgz
# a quick check of version shall confirm if it installed correctly
$ cloudflared -v 
cloudflared version 2021.5.10 (built 2021-05-26-1355 UTC)</code></pre>
            <p>Let’s set up our Tunnel now:</p>
            <pre><code>$ cloudflared tunnel create camera
Tunnel credentials written to /home/pi/.cloudflared/5f8182ba-906c-4910-98c3-7d042bda0594.json. cloudflared chose this file based on where your origin certificate was found. Keep this file secret. To revoke these credentials, delete the tunnel.

Created tunnel camera with id 5f8182ba-906c-4910-98c3-7d042bda0594</code></pre>
            <p>Now we need to configure the Tunnel to forward the traffic to the Motion webcam server:</p>
            <pre><code>$ vim /home/pi/.cloudflared/config.yaml 
# And add the following.
tunnel: 5f8182ba-906c-4910-98c3-7d042bda0594
credentials-file: /home/pi/.cloudflared/5f8182ba-906c-4910-98c3-7d042bda0594.json 

ingress:
  - hostname: camera.imohak.com
    service: http://0.0.0.0:9095
  - service: http_status:404</code></pre>
            <p>The Tunnel uuid should be the one created with the command above and so should the path of the credential file. The ingress should have the domain we want to use. In my case I have set up camera.imohak.com as my domain and 404 as the fallback rule.</p><p>Next, we need to route the DNS to this Tunnel:</p>
            <pre><code>$ cloudflared tunnel route dns 5f8182ba-906c-4910-98c3-7d042bda0594 camera.imohak.com</code></pre>
            <p>This adds a DNS CNAME record, which can be verified from the Cloudflare dashboard as shown here:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/72ToAYL4KvcUUsN9mLC4bY/54dcf24add84b971a02085ecb3b1e708/image9.png" />
            
            </figure><p>Let’s test the Tunnel!</p>
            <pre><code>$ cloudflared tunnel run camera
2021-06-15T21:44:41Z INF Starting tunnel tunnelID=5f8182ba-906c-4910-98c3-7d042bda0594
2021-06-15T21:44:41Z INF Version 2021.5.10
2021-06-15T21:44:41Z INF GOOS: linux, GOVersion: go1.16.3, GoArch: arm
2021-06-15T21:44:41Z INF Settings: map[cred-file:/home/pi/.cloudflared/5f8182ba-906c-4910-98c3-7d042bda0594.json credentials-file:/home/pi/.cloudflared/5f8182ba-906c-4910-98c3-7d042bda0594.json]
2021-06-15T21:44:41Z INF cloudflared will not automatically update when run from the shell. To enable auto-updates, run cloudflared as a service: https://developers.cloudflare.com/argo-tunnel/reference/service/
2021-06-15T21:44:41Z INF Generated Connector ID: 7e38566e-0d33-426d-b64d-326d0592486a
2021-06-15T21:44:41Z INF Initial protocol http2
2021-06-15T21:44:41Z INF Starting metrics server on 127.0.0.1:43327/metrics
2021-06-15T21:44:42Z INF Connection 6e7e0168-22a4-4804-968d-0674e4c3b4b1 registered connIndex=0 location=DUB
2021-06-15T21:44:43Z INF Connection fc83017d-46f9-4cee-8fc6-e4ee75c973f5 registered connIndex=1 location=LHR
2021-06-15T21:44:44Z INF Connection 62d28eee-3a1e-46ef-a4ba-050ae6e80aba registered connIndex=2 location=DUB
2021-06-15T21:44:44Z INF Connection 564164b1-7d8b-4c83-a920-79b279659491 registered connIndex=3 location=LHR</code></pre>
            <p>Next, we go to the browser and open the URL camera.imohak.com.</p><p><b>Voilà.</b> Or, not quite yet.</p>
    <div>
      <h3>Locking it Down</h3>
      <a href="#locking-it-down">
        
      </a>
    </div>
    <p>We still haven’t put any requirement for authentication on top of the server. Right now, anyone who knows about the domain can just open it and look at what is happening inside my house. Frightening, right? Thankfully we have two options now:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6ZyzqSJev8PbTkyn3qFn8n/d37bc2f7ced529309f7f173485256d05/image7-1.png" />
            
            </figure><ol><li><p><b>Use </b><a href="https://motion-project.github.io/motion_config.html#webcontrol_authentication"><b>Motion’s inbuilt authentication mechanisms</b></a>. However, we shall not choose this option as it’s just another username/password to remember which one can easily forget and who knows if in the future, there is a vulnerability found in the way motion authenticates and my credentials are leaked? We are looking for an SSO using Google which is easy and quick to use and gives us a secure login based on Google credentials.</p></li><li><p><b>Use Cloudflare Access</b>. Access gives us the ability to create policies based on IP addresses and email addresses, and it lets us integrate different <a href="https://developers.cloudflare.com/cloudflare-one/identity">types of authentication methods</a>, such as OTP or <a href="https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/google">Google</a>. In our case, we require authentication through Google.</p></li></ol><p>To take advantage of this Cloudflare Access functionality, the first step is to set up Cloudflare for Teams. Visit <a href="https://dash.teams.cloudflare.com/">https://dash.teams.cloudflare.com/</a>, follow the <a href="https://developers.cloudflare.com/cloudflare-one/setup">setup guide</a> and choose a team name (imohak in my case).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4Ckc0vrJf3mhwd00R4EPuO/43a6df1837a7eaf0fffd2128e8b467f1/image6-1.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7ECuaRhkiYYhB0PAn5wb66/495aced4d3bd416324e365018e0da159/image13.png" />
            
            </figure><p>After this, we have two things left to do: add a login method and add an application. Let’s cover how we add a login method first. Navigate to <b>Configuration</b> &gt; <b>Authentication</b> and click on <b>+Add</b>, under the Login tab. The Dashboard will show us a list of identity providers to choose from. Select <b>Google</b> — follow <a href="https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/google">this guide</a> for a walkthrough of how to set up a Google Cloud application, get a ClientID and Client Secret, and use them to configure the identity provider in Teams.</p><p>After adding a login method and testing it, we should see a confirmation page like this:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4P79mOvcSRa4tG1MQZlV4b/aa025e7c0fcc069fbcba15750602f4c7/image4-2.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1mrPcowDoLHrYOgO0m5TJZ/56caf36503399da9978180448a6393ec/image11.png" />
            
            </figure><p>The last thing we need to do is to add the pet-cam subdomain as an application protected behind Teams. This enables us to enforce the Google authentication requirement we have configured before. To do that, navigate to <b>Access</b> &gt; <b>Applications</b>, click on <b>Add an application</b>, and select <b>Self-hosted.</b></p><p>On the next page, we specify a name, session duration and also the URL at which the application should be accessible. We add the subdomain <b>camera.imohak.com</b> and also name the app ‘camera’ to keep it simple.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/Fw04ynQQofuRrzAEDtNrf/9c9f06d76be3fff0dab3a377b6f1b5bf/image5-6.png" />
            
            </figure><p>Next, we select Google as an identity provider for this application. Given that we are not choosing multiple authentication methods, I can also enable Instant Auth — this means we don’t need to select Google when we open the URL.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4afTGRdT9HqB27ijtHV1sz/899a61e1508a2b83cfa8542c6ebe5754/image3-7.png" />
            
            </figure><p>Now we add policies to the application. Here, we add an email check so that after the Google authentication, a check is made to ensure the specified email address is the only one who is able to access the URL. If needed, we can choose to configure other, more <a href="https://developers.cloudflare.com/cloudflare-one/policies/zero-trust">complex rules</a>. At this point, we click on <b>Next</b> and finish the setup.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1geMYdeb3TxwfOdNX2EbXc/ea5c14428ed5cdcdc83ec87dfa246c2c/image12.png" />
            
            </figure>
    <div>
      <h3>The Result</h3>
      <a href="#the-result">
        
      </a>
    </div>
    <p>The setup is now complete. Time to test everything! After opening the browser and entering my URL, <b>voilà.</b> Now, when I visit this URL, I see a Google authentication page and, after logging in, Ziggy eating his dinner.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/22S1tv39WLxSU92UNgnaPW/a54c9c1de414af27c0f68d9afaba55b2/image8.png" />
            
            </figure><p></p> ]]></content:encoded>
            <category><![CDATA[Cloudflare Tunnel]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Raspberry Pi]]></category>
            <category><![CDATA[Road to Zero Trust]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Developers]]></category>
            <guid isPermaLink="false">5zgPI338Em7XJ667F2OIi8</guid>
            <dc:creator>Mohak Kataria</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zero Trust controls for your SaaS applications]]></title>
            <link>https://blog.cloudflare.com/access-saas-integrations/</link>
            <pubDate>Wed, 18 Aug 2021 13:01:00 GMT</pubDate>
            <description><![CDATA[ With Access in front of your SaaS applications, you can build Zero Trust rules that determine who can reach your SaaS applications in the same place where your rules for self-hosted applications and network access live. ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2qOj8XyHMpENRlubyEkdCw/dcea33d20e6cbd9eec6dbffc3b3558e7/Teams-for-SAAS-thumb-1.png" />
            
            </figure><p>Most teams start that journey by moving the applications that lived on their private networks into this <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust model</a>. Instead of a private network where any user on the network is assumed to be trusted, the applications that use Cloudflare Access now check every attempt against the rules you create. For your end users, this makes these applications just feel like regular SaaS apps, while your security teams have full control and logs.</p><p>However, we kept hearing from teams that wanted to use their Access control plane to apply consistent security controls to their SaaS apps, and consolidate logs from self-hosted and SaaS in one place.</p><p>We’re excited to give your team the tools to solve that challenge. With Access in front of your SaaS applications, you can build Zero Trust rules that determine who can reach your SaaS applications in the same place where your rules for self-hosted applications and network access live. To make that easier, we are launching guided integrations with the Amazon Web Services (<a href="https://developers.cloudflare.com/cloudflare-one/tutorials/aws-sso-saas">AWS</a>) management console, <a href="https://developers.cloudflare.com/cloudflare-one/tutorials/zendesk-sso-saas">Zendesk</a>, and <a href="https://developers.cloudflare.com/cloudflare-one/tutorials/salesforce-saas">Salesforce</a>. In just a few minutes, your team can apply a Zero Trust layer over every resource you use and ensure your logs never miss a request.</p>
    <div>
      <h3>How it works</h3>
      <a href="#how-it-works">
        
      </a>
    </div>
    <p>Cloudflare Access secures applications that you host by becoming the authoritative DNS for the application itself. All DNS queries, and subsequent HTTP requests, hit Cloudflare’s network first. Once there, Cloudflare can apply the types of identity-aware and context-driven rules that make it possible to move to a Zero Trust model. Enforcing these rules in our network means your application doesn’t need to change. You can secure it on Cloudflare, integrate your single sign-on (SSO) provider and other systems like Crowdstrike and Tanium, and begin building rules.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3fzXkPD3VLf9Qd5wcrLrhI/a38164074f7d8dfb809809d428590602/image4-13.png" />
            
            </figure><p>SaaS applications pose a different type of challenge. You do not control where your SaaS applications are hosted — and that’s a big part of the value. You don’t need to worry about maintaining the hardware or software of the application.</p><p>However, that also means that your team cannot control how users reach those resources. In most cases, any user on the Internet can attempt to log in. Even if you incorporate SSO authentication or IP-based allowlisting, you might not have the ability to add location or device rules. You also have no way to centrally capture logs of user behavior on a per-request basis. Logging and permissions vary across SaaS applications — some are quite granular while others have non-existent controls and logging.</p><p>Cloudflare <a href="/cloudflare-access-for-saas/">Access for SaaS</a> solves that problem by injecting Zero Trust checks into the SSO flow for any application that supports <a href="https://www.cloudflare.com/learning/access-management/what-is-saml/">SAML authentication</a>. When users visit your SaaS application and attempt to log in, they are redirected through Cloudflare and then to your identity provider. They authenticate with your identity provider and are sent back to Cloudflare, where we layer on additional rules like device posture, multi factor method, and country of login. If the user meets all the requirements, Cloudflare converts the user’s authentication with your identity provider into a SAML assertion that we send to the SaaS application.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/YjDw22whJMNyIAiIBFNZn/8e34161664ba2fbbe05921045db7333c/image1-33.png" />
            
            </figure><p>We built support for SaaS applications by using <a href="https://workers.cloudflare.com/">Workers</a> to take the JWT and convert its content into SAML assertions that are sent to the SaaS application. The application thinks that Cloudflare Access is the identity provider, even though we’re just aggregating identity signals from your SSO provider and other sources into the JWT, and sending that summary to the app via SAML. All of this leverages Cloudflare’s global network and ensures users do not see a performance penalty.</p>
    <div>
      <h3>Enforcing managed devices and Gateway for SaaS applications</h3>
      <a href="#enforcing-managed-devices-and-gateway-for-saas-applications">
        
      </a>
    </div>
    <p>COVID-19 made it commonplace for employees to work from anywhere and, more concerning, from any device. Many SaaS applications contain sensitive data that should only be accessed with a corporately managed device. A benefit of SaaS tools is that they’re readily available from any device, it’s up to security administrators to enforce which devices can be used to log in.</p><p>Once Access for SaaS has been configured as the SSO provider for SaaS applications, policies that verify a device can be configured. You can then lock a tool like Salesforce down to only users with a device that has a known serial number, hard auth key plugged in, an up to date operating system and much more.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3BuzOFCnyzvAA0Mw97mopu/85ae375b2a4cce40805f49fd71ab1092/image2-25.png" />
            
            </figure><p>Cloudflare Gateway keeps your users and data safe from threats on the Internet by filtering Internet-bound connections that leave laptops and offices. Gateway gives administrators the ability to block, allow, or log every connection and request to SaaS applications.</p><p>However, users are connecting from personal devices and home WiFi networks, potentially bypassing Internet security filtering available on corporate networks. If users have their password and MFA token, they can bypass security requirements and reach into SaaS applications from their own, unprotected devices at home.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2YdkBJicp5NcdO6qAfmpE7/f1bb7bbc02aa1c62f606e73d79fd0a1d/image3-19.png" />
            
            </figure><p>To ensure traffic to your SaaS apps only connects over Gateway-protected devices, Cloudflare Access will add a new rule type that requires Gateway when users login to your SaaS applications. Once enabled, users will only be able to connect to your SaaS applications when they use Cloudflare Gateway. Gateway will log those connections and provide visibility into every action within SaaS apps and the Internet.</p>
    <div>
      <h3>Getting started and what’s next</h3>
      <a href="#getting-started-and-whats-next">
        
      </a>
    </div>
    <p>It’s easy to get started with setting up Access for SaaS application. Visit the <a href="http://dash.teams.cloudflare.com">Cloudflare for Teams Dashboard</a> and follow one of our published guides.</p><p>We will make it easier to protect SaaS applications and will soon be supporting configuration via metadata files. We will also continue to publish SaaS app specific integration guides. Are there specific applications you’ve been trying to integrate? <a href="https://community.cloudflare.com/t/cloudflare-access-for-saas-which-guides-should-we-build-next/295672">Let us know in the community</a>!</p> ]]></content:encoded>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Cloudflare for SaaS]]></category>
            <category><![CDATA[SaaS]]></category>
            <category><![CDATA[Road to Zero Trust]]></category>
            <category><![CDATA[Cloudflare Access]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">54Ewhh7Xv9pCnpWCbC9LJh</guid>
            <dc:creator>Kenny Johnson</dc:creator>
        </item>
        <item>
            <title><![CDATA[Capturing Purpose Justification in Cloudflare Access]]></title>
            <link>https://blog.cloudflare.com/access-purpose-justification/</link>
            <pubDate>Wed, 18 Aug 2021 12:59:42 GMT</pubDate>
            <description><![CDATA[ Starting today, Cloudflare for Teams administrators can prompt users to enter a justification for accessing an application prior to login.   ]]></description>
            <content:encoded><![CDATA[ <p>The digital world often takes its cues from the real world. For example, there’s a standard question every guard or agent asks when you cross a border—whether it’s a building, a neighborhood, or a country: “What’s the purpose of your visit?” It’s a logical question: sure, the guard knows some information—like who you are (thanks to your ID) and when you’ve arrived—but the context of “why” is equally important. It can set expectations around behavior during your visit, as well as what spaces you should or should not have access to.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6iS185biJdTAu6Ewnred83/55fdc58ff0c84cb1f4c519ce06365659/qmzQ0xFXnQvFq-HKSUNbK9RuDeFoGGTF6YNMydZQFjnSgJu81pH3zBXgG443Y_3z1mcguCRdQljLb4F9QMo9hoTQZ-WOeJQyTivEbpdpMYVvqm__s_TX54wgrPap.png" />
            
            </figure><p>The purpose justification prompt appears upon login, asking users to specify their use case before hitting submit and proceeding.</p><p>Digital access follows suit. Recent data protection regulations, <a href="/advancing-privacy-protection-with-the-gdpr/">such as the GDPR</a>, have formalized concepts of purpose limitation and data proportionality: people should only access data necessary for a specific stated reason. System owners know people need access to do their job, but especially for particularly sensitive applications, knowing why a login was needed is just as vital as knowing who, when, and how.</p><p>Starting today, Cloudflare for Teams administrators can prompt users to enter a justification for accessing an application prior to login. Administrators can add this prompt to any existing or new Access application with just two clicks, giving them the ability to:</p><ul><li><p>Log and review employee justifications for accessing sensitive applications</p></li><li><p>Add additional layers of security to applications they deem sensitive</p></li><li><p>Customize modal text to communicate data use &amp; sharing principles</p></li><li><p>Help meet regulatory requirements for data access control (such as GDPR)</p></li></ul><div></div>
<p></p>
    <div>
      <h3>Starting with Zero Trust access control</h3>
      <a href="#starting-with-zero-trust-access-control">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/teams/access/">Cloudflare Access</a> has been built with access management at its core: rather than trusting anyone on a private network, Access checks for identity, context and device posture every time someone attempts to reach an application or resource.</p><p>Behind the scenes, administrators build rules to decide who should be able to reach the tools protected by Access. When users need to connect to those tools, they are prompted to authenticate with one of the identity provider options. Cloudflare Access checks their login against the list of allowed users and, if permitted, allows the request to proceed.</p><p>Some applications and workflows contain data so sensitive that the user should have to prove who they are and why they need to reach that service. In this next phase of <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust security</a>, access to data should be limited to specific business use cases or needs, rather than generic all-or-nothing access.</p>
    <div>
      <h3>Deploying Zero Trust purpose justification</h3>
      <a href="#deploying-zero-trust-purpose-justification">
        
      </a>
    </div>
    <p>We created this functionality because we, too, wanted to make sure we had these provisions in place at Cloudflare. We have sensitive internal tools that help our team members serve our customers, and <a href="/dogfooding-from-home/">we’ve written before</a> about how we use Cloudflare Access to lock down those tools in a Zero Trust manner.</p><p>However, we were not satisfied with just restricting access in the least privileged model. We are accountable to the trust our customers put in our services, and we feel it is important to always have an explicit business reason when connecting to some data sets or tools.</p><p>We built purpose justification capture in Cloudflare Access to solve that problem. When team members connect to certain resources, Access prompts them to justify why. Cloudflare’s network logs that rationale and allows the user to proceed.</p><p>Purpose justification capture in Access helps fulfill policy requirements, but even for enterprises who don’t need to comply with specific regulations, it also enables a thoughtful privacy and security framework for access controls. Prompting employees to justify their use case helps solve the data management challenge of balancing transparency with security — helping to ensure that sensitive data is used the right way.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/24fx5VTFBxuoiU2tuS8SbL/47c9073b19dc9e9244433e45237fc353/image2-24.png" />
            
            </figure><p>Purpose justification capture adds an additional layer of context for enterprise administrators.</p>
    <div>
      <h3>Distinguishing Sensitive Domains</h3>
      <a href="#distinguishing-sensitive-domains">
        
      </a>
    </div>
    <p>So how do you distinguish if something is sensitive? There are two main categories of  applications that may be considered “sensitive.” First: does it contain personally identifiable information or sensitive financials? Second, do all the employees who have access actually need access? The flexibility of the configuration of Access policies helps effectively distinguish sensitive domains for specific user groups.</p><p>Purpose justification in Cloudflare Access enables Teams administrators to configure the language of the prompt itself by domain. This is a helpful place to remind employees of the sensitivity of the data, such as, “This application contains PII. Please be mindful of company policies and provide a justification for access,” or “Please enter the case number corresponding to your need for access.” The language can proactively ensure that employees with access to an internal tool are using it as intended.</p><p>Additionally, Access <a href="https://www.cloudflare.com/learning/access-management/what-is-identity-and-access-management/">identity management</a> allows Teams customers to configure purpose capture for only specific, more sensitive employee groups. For example, some employees need daily access to an application and should be considered “trusted.” But other employees may still have access, but should only rarely need to use the tool— security teams or data protection officers may view their access as higher risk. The policies enable flexible logical constructions that equate to actions such as “ask everyone but the following employees for a purpose.”</p><p>This distinction of sensitive applications and “trusted” employees enables friction to the benefit of data protection, rather than a loss of efficiency for employees.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6BGP2bPBc9Y0t9U1KoHdDb/f7372f399b72e14e4c3ce06349eae5b7/image1-32.png" />
            
            </figure><p>Purpose justification is configurable as an Access policy, allowing for maximum flexibility in configuring and layering rules to protect sensitive applications.</p>
    <div>
      <h3>Auditing justification records</h3>
      <a href="#auditing-justification-records">
        
      </a>
    </div>
    <p>As a Teams administrator, enterprise data protection officer, or security analyst, you can view purpose justification logs for a specific application to better understand how it has been accessed and used. Auditing the logs can reveal insights about security threats, the need for improved data classification training, or even potential application development to more appropriately address employees’ use cases.</p><p>The justifications are seamlessly integrated with other Access audit logs — they are viewable in the Teams dashboard as an additional column in the table of login events, and exportable to a SIEM for further data analysis.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/70b9hrImfGx55o9x0kqUxM/638db006ff154092b0fa3b416c865342/image3-18.png" />
            
            </figure><p>Teams administrators can review the purpose justifications submitted upon application login by their employees.</p>
    <div>
      <h3>Getting started</h3>
      <a href="#getting-started">
        
      </a>
    </div>
    <p>You can start adding purpose justification prompts to your application access policies in Cloudflare Access today. The purpose justification feature is available in all plans, and with the <a href="https://www.cloudflare.com/plans/free/">Cloudflare for Teams free plan</a>, you can use it for up to 50 users at no cost.</p><p>We're excited to continue adding new features that give you more flexibility over purpose justification in Access... Have feedback for us? Let us know <a href="https://community.cloudflare.com/t/cloudflare-access-purpose-justification-is-live-let-us-know-what-you-think">in this community post</a>.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare Access]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Privacy]]></category>
            <category><![CDATA[Road to Zero Trust]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">5kytsZHOc3MvwZQsP36Td2</guid>
            <dc:creator>Molly Cinnamon</dc:creator>
        </item>
        <item>
            <title><![CDATA[6 New Ways to Validate Device Posture]]></title>
            <link>https://blog.cloudflare.com/6-new-ways-to-validate-device-posture/</link>
            <pubDate>Tue, 17 Aug 2021 12:59:34 GMT</pubDate>
            <description><![CDATA[ Cloudflare for Teams adds additional posture capabilities to better protect Access backed applications ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2ZA158O8L7tj3GYRMM1II8/6285bf55eff2eb067d3c07a332bf8d7b/image1-25.png" />
            
            </figure><p>Cloudflare for Teams gives your organization the ability to build rules that determine who can reach specified resources. When we first <a href="/cloudflare-access-now-teams-of-any-size-can-turn-off-their-vpn/">launched</a>, those rules primarily relied on identity. This helped our customers replace their private networks with a model that evaluated every request for <i>who</i> was connecting, but this lacked consideration for <i>how</i> they were connecting.</p><p>In March, we began to change that. We <a href="/endpoint-partnerships/">announced new integrations</a> that give you the ability to create rules that consider the device as well. Starting today, we’re excited to share that you can now build additional rules that consider <i>several different factors about the device,</i> like its OS, patch status, and domain join or disk encryption status. This has become increasingly important over the last year as more and more people began connecting from home. Powered by the Cloudflare WARP agent, your team now has control over more health factors about the devices that connect to your applications.</p>
    <div>
      <h3>Zero Trust is more than just identity</h3>
      <a href="#zero-trust-is-more-than-just-identity">
        
      </a>
    </div>
    <p>With Cloudflare for Teams, administrators can replace their Virtual Private Networks (VPNs), where users on the network were trusted, with an alternative that does not trust any connection by default—also known as a <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> model.</p><p>Customers start by connecting the resources they previously hosted on a private network to Cloudflare’s network using <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-apps/create-tunnel">Cloudflare Tunnel</a>. Cloudflare Tunnel uses a lightweight connector that creates an outbound-only connection to Cloudflare’s edge, removing the need to poke holes in your existing firewall.</p><p>Once connected, administrators can build rules that apply to each and every resource and application, or even a part of an application. Cloudflare’s Zero Trust network evaluates every request and connection against the rules that an administrator created before the user is ever allowed to reach that resource.</p><p>For example, an administrator can create a rule that limits who can reach an internal reporting tool to users in a specific Okta group, connecting from an approved country, and only when they log in with a hardkey as their second factor. Cloudflare’s global network enforces those rules close to the user, in over 200 cities around the world, to make a comprehensive rule like the outlined above feel seamless to the end-user.</p><p>Today’s launch adds new types of signals your team can use to define these rules. By definition, a Zero Trust model considers every request or connection to be “untrusted.” Only the rules that you create determine what is considered trusted and allowed. Now, we’re excited to let users take this a step further and create rules that not only focus on trusting the user, but also the security posture of the device they are connecting from.</p>
    <div>
      <h3>More (and different) factors are better</h3>
      <a href="#more-and-different-factors-are-better">
        
      </a>
    </div>
    <p>Building rules based on device posture covers a blind spot for your applications and data. If I’m allowed to reach a particular resource, without any consideration for the device I’m using, then I could log in with my corporate credentials from a personal device running an unpatched or vulnerable version of an operating system. I might do that because it is convenient, but I am creating a much bigger problem for my team if I then download data that could be compromised because of that device.</p><p>That posture can also change based on the destination. For example, maybe you are comfortable if a team member uses any device to review a new splash page for your marketing campaign. However, if a user is connecting to an administrative tool that manages customer accounts, you want to make sure that device complies with your security policies for customer data that include factors like disk encryption status. With Cloudflare for Teams, you can apply rules that contain multiple and different factors with that level of per-resource granularity.</p><p>Today, we are thrilled to announce six additional posture types on top of the ones you can already set:</p><ol><li><p><a href="/endpoint-partnerships/">Endpoint Protection Partners</a> — Verify that your users are running one of our Endpoint Protection Platform providers (Carbon Black, CrowdStrike, SentinelOne, Tanium)</p></li><li><p><a href="/zero-trust-with-managed-devices/">Serial Number</a> — Allow devices only from your known inventory pool</p></li><li><p><a href="/integrating-cloudflare-gateway-and-access/">Cloudflare WARP’s proxy</a> — Determine if your users are connected via our encrypted WARP tunnel (Free, Paid or any Teams account)</p></li><li><p><a href="/integrating-cloudflare-gateway-and-access/">Cloudflare’s secure web gateway</a> — Determine if your users are connecting from a device managed by your HTTP FIltering policies</p></li><li><p><b>(NEW) Application Check</b> — Verify any program of your choice is running on the device</p></li><li><p><b>(NEW) File Check</b> — Ensure a particular file is present on the device (such as an updated signature, OS patch, etc.)</p></li><li><p><b>(NEW) Disk Encryption</b> — Ensure all physical disks on the device are encrypted</p></li><li><p><b>(NEW) OS Version</b> — Confirm users have upgraded to a specific operating system version</p></li><li><p><b>(NEW) Firewall</b> — Check that a firewall is configured on the device</p></li><li><p><b>(NEW) Domain Joined</b> — Verify that your Windows devices must be joined to the corporate directory</p></li></ol>
    <div>
      <h3>Device rules should be as simple as identity rules</h3>
      <a href="#device-rules-should-be-as-simple-as-identity-rules">
        
      </a>
    </div>
    <p>Cloudflare for Teams device rules can be configured in the same place that you control identity-based rules. Let’s use the Disk Encryption posture check as an example. You may want to create a rule that enforces the Disk Encryption check when your users need to download and store files on their devices locally.</p><p>To build that rule, first visit the <a href="https://dash.teams.cloudflare.com/team/devices">Cloudflare for Teams dashboard</a> and navigate to the Devices section of the “My Team” page. Then, choose “Disk Encryption” as a new attribute to add.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5ghCYtgEEGFtfErqQjJddQ/fd7811c310564fda87a64a572c51b386/image5-14.png" />
            
            </figure><p>You can enter a descriptive name for this attribute. For example, this rule should require Windows disk encryption, while others might require encryption on other platforms.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7njkspD0ailjBgC2tAcowC/f91ecfc3d22be90ee4046833df16da7c/image2-17.png" />
            
            </figure><p>To save time, you can also create reusable rules, called <a href="https://developers.cloudflare.com/cloudflare-one/identity/users/groups#create-a-group">Groups</a>, to include multiple types of device posture check for reference in new policies later on.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4A0ZbehejwlwjgZg0nOz4W/74b65a04a30e3b78a32f7aa3ab791c5b/image3-16.png" />
            
            </figure><p>Now that you’ve created your group, you can create a Zero Trust Require rule to apply your Disk Encryption checks. To do that, navigate to Access &gt; Applications and create a new application. If you already have your application in place, simply edit your application to add a new rule. In the Assign a group section you will see the group you just created—select it and choose a Require rule type. And finally, save the rule to begin enforcing granular, zero trust device posture checks on every request in your environment.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1Wa9IEM5FiiM6iikUs4TPo/3df247639c5172c622a84528daa60386/image4-11.png" />
            
            </figure>
    <div>
      <h3>What’s next</h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>Get started with exploring all <a href="https://developers.cloudflare.com/cloudflare-one/identity/devices">device posture attributes</a> in our developer docs. Note that not all posture types are currently available on operating systems and some operating systems don’t support them.</p><p>Is there a posture type we’re missing that you’d love to have? We’d love to hear from you in the <a href="https://community.cloudflare.com/">Community</a>.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare Access]]></category>
            <category><![CDATA[Cloudflare Gateway]]></category>
            <category><![CDATA[WARP]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Road to Zero Trust]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">4oNJWVakW42XRVAs4sMpl9</guid>
            <dc:creator>Kyle Krum</dc:creator>
        </item>
        <item>
            <title><![CDATA[Introducing Shadow IT Discovery]]></title>
            <link>https://blog.cloudflare.com/introducing-shadow-it-discovery/</link>
            <pubDate>Mon, 16 Aug 2021 12:59:33 GMT</pubDate>
            <description><![CDATA[ With Cloudflare for Teams, Administrators can allow their users to securely access applications with Cloudflare Access and explicitly block users from visiting various applications with Cloudflare Gateway. ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2sSOTV0nHN9QxfknfCWVeK/7ed26713467a08092c3f26f15f4f0126/image2-6.png" />
            
            </figure><p>Your team likely uses more SaaS applications than you realize. The time your administrators spend vetting and approving applications sanctioned for use can suddenly be wasted when users sign up for alternative services and store data in new places. Starting today, you can use Cloudflare for Teams to detect and block unapproved SaaS applications with just two clicks.</p>
    <div>
      <h3>Increasing Shadow IT usage</h3>
      <a href="#increasing-shadow-it-usage">
        
      </a>
    </div>
    <p>SaaS applications save time and budget for IT departments. Instead of paying for servers to host tools — and having staff ready to monitor, upgrade, and troubleshoot those tools — organizations can sign up for a SaaS equivalent with just a credit card and never worry about hosting or maintenance again.</p><p>That same convenience causes a data control problem. Those SaaS applications sit outside any environment that you control; the same reason they are easy for your team is also a potential liability now that your sensitive data is kept by third parties. Most organizations keep this in check through careful audits of the SaaS applications being used. Depending on industry and regulatory impact, IT departments evaluate, approve, and catalog the applications they use.</p><p>However, users can intentionally or accidentally bypass those approvals. For example, if your organization relies on OneDrive but a user is more comfortable with Google Drive, that user might decide to store work files in Google Drive instead. IT has no visibility into this happening and the user might think it’s fine. That user begins sharing files with other users in your organization, who also sign up with Google Drive, and suddenly an unsanctioned application holds sensitive information. This is “Shadow IT” and these applications inherently obfuscate the controls put in place by your organization.</p>
    <div>
      <h3>Detecting Shadow IT</h3>
      <a href="#detecting-shadow-it">
        
      </a>
    </div>
    <p>Cloudflare Gateway routes all Internet bound traffic to Cloudflare’s network to enforce granular controls for your users to block them from unknown security threats. Now, it also provides your team added assurance with a low-effort, high-visibility overview into the SaaS applications being used in your environment.</p><p>By simply turning on Gateway, all HTTP requests for your organization are aggregated in your Gateway Activity Log for audit and security purposes. Within the activity log, we surface pertinent information about the user, action, and request. These records include data about the application and application type. In the example above, the application type would be Collaboration and Online Meeting and the application would be Google Drive.</p><p>From there, Gateway analyzes your HTTP request in the Activity Log and surfaces your Shadow IT, by categorizing and sorting these seemingly miscellaneous applications into actionable insights without any additional lift from your team.</p>
    <div>
      <h3>Introducing Shadow IT Discovery</h3>
      <a href="#introducing-shadow-it-discovery">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6VW7WDJSKRuyOrdIxGwQCb/ffdbb58d5ab2a6c8857e5ad00e0ef382/image3-8.png" />
            
            </figure><p>With Shadow IT Discovery, Cloudflare for Teams first catalogs all applications used in your organization. The feature runs in an “observation” mode first - all applications are analyzed, but default to “unreviewed.”</p><p>Your team can then review the applications found and, with just a couple clicks, designate applications approved or unapproved — either for a single application or in bulk.</p><p>This allows administrators to easily track the top approved and unapproved applications their users are accessing to better profile their security posture. When drilling down into a more detailed view, administrators can take bulk actions to move multiple newly discovered applications at once. In this view, users can also filter on application type to easily identify redundancies in their organization.</p><p>Another feature we wanted to add was the ability to quickly highlight if an application being used by your organization has already been secured by Cloudflare Access. You can find this information in the column titled Secured. If an application is not Secured by Access, you can start that process today as well with <a href="/cloudflare-access-for-saas/">Access for SaaS</a>. (We added two new <a href="https://developers.cloudflare.com/cloudflare-one/tutorials">tutorials</a> this week!)</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7c9IpWxjA8QsnmzQ2zGgu3/6017d3536af454d3f080a7280a3a3747/image1-10.png" />
            
            </figure><p>When you mark an application unapproved, Cloudflare for Teams does not block it outright. We know some organizations need to label an application unapproved and check in with the users before they block access to it altogether. If your team is ready, you can then apply a Gateway rule to block access to it going forward.</p>
    <div>
      <h3>Saving IT cost</h3>
      <a href="#saving-it-cost">
        
      </a>
    </div>
    <p>While we’re excited to help IT teams stop worrying about unapproved apps, we also talked to teams who feared they were overspending for certain approved applications.</p><p>We want to help here too. Today’s launch counts the number of unique users who access any one application over different time intervals. IT teams can use this data to check usage against licenses and right size as needed.</p><p>Without this feature, many administrators and our own internal IT department were losing sleep each night wondering if their users were circumventing their controls and putting them at risk of attack. Additionally, many administrators are financially impacted as they procure software licenses for their entire organization. With Shadow IT Discovery, we empower your team to anticipate popular applications and begin the assessment process earlier in the procurement lifecycle.</p>
    <div>
      <h3>What's next</h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>We’re excited to announce Shadow IT and can’t wait to see what you’ll do with it. To get started, deploy HTTP filtering for your organization with the Cloudflare for Teams client. In the future, we’ll also be adding automation to block unapproved applications in Gateway, but we can’t wait to hear what else you’d like to see out of this feature.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Teams Dashboard]]></category>
            <category><![CDATA[Road to Zero Trust]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">68ThrQV3l2Hm5ph7LuYmqN</guid>
            <dc:creator>Abe Carryl</dc:creator>
        </item>
    </channel>
</rss>