
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Sat, 04 Apr 2026 02:31:26 GMT</lastBuildDate>
        <item>
            <title><![CDATA[From the endpoint to the prompt: a unified data security vision in Cloudflare One]]></title>
            <link>https://blog.cloudflare.com/unified-data-security/</link>
            <pubDate>Fri, 06 Mar 2026 14:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare One unifies data security from endpoint to prompt: RDP clipboard controls, operation-mapped logs, on-device DLP, and Microsoft 365 Copilot scanning via API CASB. ]]></description>
            <content:encoded><![CDATA[ <p>Cloudflare One has grown a lot over the years. What started with securing traffic at the network now spans the endpoint and SaaS applications – because that’s where work happens.</p><p>But as the market has evolved, the core mission has become clear: data security is enterprise security.</p><p>Here’s why. We don’t enforce controls just to enforce controls. We do it because the downstream outcomes are costly: malware, credential theft, session hijacking, and eventually the thing that matters most: sensitive data leaving the organization. What looks like a simple access policy can be the first link in a chain that ends in incident response, customer impact, and reputational damage.</p><p>So when you take a step back, most security programs – even the ones that look different on paper – are trying to answer the same questions:</p><ul><li><p>Where is sensitive data?</p></li><li><p>Who can access it?</p></li><li><p>What paths exist for it to move somewhere it shouldn’t?</p></li></ul><p>That’s the backbone of our data security vision in <a href="https://www.cloudflare.com/sase/"><u>Cloudflare One</u></a>: a single model that follows data across the places it moves, not a pile of siloed controls. That means:</p><ul><li><p>Protection in transit (across Internet + SaaS access)</p></li><li><p>Visibility and control at rest (inside SaaS)</p></li><li><p>Enforcement in use (on endpoints)</p></li><li><p>And now, coverage at the prompt (as AI becomes a new interface to enterprise data)</p></li></ul><p>Think of these as one connected system: visibility tells you what’s happening, controls constrain where data can move, and enforcement closes the last-mile gaps when content leaves an app. That’s the endpoint-to-prompt problem: data moves faster than product boundaries, so policy needs to follow the data, not the tool.</p><p>In this post, we’ll walk through a set of updates that push that vision forward – from browser-based Remote Desktop Protocol (RDP) controls, to operation-level logging, to endpoint data loss prevention (DLP), to AI security scanning for Microsoft 365 Copilot. </p>
    <div>
      <h3>Remote access without data sprawl: browser-based RDP clipboard controls</h3>
      <a href="#remote-access-without-data-sprawl-browser-based-rdp-clipboard-controls">
        
      </a>
    </div>
    <p><a href="https://blog.cloudflare.com/browser-based-rdp/"><u>Browser-based RDP</u></a> is a practical way to provide remote access when you can’t assume a managed endpoint or installed client – common for contractors, partners, and occasional access workflows. Cloudflare One’s browser-based RDP adds visibility and policy controls to that access. But once you’re delivering a full RDP experience in the browser, the question becomes simple: how granular are your controls over where data can move, especially via the clipboard?</p><p>Today, we’re adding a setting that directly protects data: clipboard controls for browser-based RDP. With this <a href="https://developers.cloudflare.com/cloudflare-one/networks/connectors/cloudflare-tunnel/use-cases/rdp/rdp-browser/#clipboard-controls"><u>new feature</u></a>, security and IT administrators will now be able to decide whether their users can copy or paste information between their local device and the browser-based RDP session.</p><p>Clipboard restrictions are a perfect example of the productivity-security tradeoff. If users can’t copy and paste in the workflow they rely on, they’ll route around the control, whether it’s by taking screenshots, retyping data, or shifting work to unmanaged tools. Clipboard controls let you be precise: allow the workflow where it’s safe, and block it where it isn’t.</p><p>With clipboard controls in browser-based RDP, administrators can enable the copy/paste workflow users expect while enforcing granular control over directionality and context. For example, if users access a customer support portal that contains sensitive customer information, you might allow copy/paste into the session for productivity, but block copy/paste out of the session to prevent data from landing on unmanaged endpoints.</p><p>This functionality is now available in Cloudflare One and can be configured as a new setting within Access Application Policies for browser-based RDP apps.</p>
    <div>
      <h3>Visibility without guesswork: operation mapping in logs</h3>
      <a href="#visibility-without-guesswork-operation-mapping-in-logs">
        
      </a>
    </div>
    <p>While remote access controls reduce risk, to tune them well, you also need to understand the specific actions users are taking inside SaaS apps.</p><p>We use a process called <b>operation mapping</b> (detailed in <a href="https://blog.cloudflare.com/ai-prompt-protection/#how-we-built-it"><u>a recent blog post</u></a>) to give visibility to these actions and simplify the way customers write policies for SaaS services. Our mapping process takes various elements of an HTTP request and interprets them as a single operation, e.g. ‘SendPrompt’, in the example of ChatGPT. We collect multiple operations that perform similar actions into an Application Control, e.g., ‘Share’ or ‘Upload’. The [what?] is viewable in our HTTP policy builder, allowing for simple policy authoring. </p><p>Today, we’ve taken that process a step further to enrich logs and provide greater visibility over how SaaS applications are being used in your organization – by extending that mapping into logging. Without any additional configuration, operations and application controls will now appear in log events for traffic that matches our <a href="https://developers.cloudflare.com/cloudflare-one/traffic-policies/http-policies/granular-controls/#compatible-applications"><u>operation maps</u></a>.</p><p>In log details, you’ll now see both the application control group and the specific operation (e.g., SendPrompt for ChatGPT). This makes investigations and policy tuning faster.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/tkgCxY8qze9SeHupiYfPR/1563abb3c0386941ef461c3ffed018f0/log-details.png" />
          </figure><p>The added context helps you understand usage patterns, accelerate forensic analysis, and spot potentially risky behavior, so you can tune policy with less guesswork and disruption to users.</p><p>Visibility is step one. To protect data in use, especially what moves through the clipboard, you also need enforcement on the endpoint.</p>
    <div>
      <h3>Better endpoint protection: on-device DLP in the Cloudflare One Client</h3>
      <a href="#better-endpoint-protection-on-device-dlp-in-the-cloudflare-one-client">
        
      </a>
    </div>
    <p>In a modern enterprise, sensitive information routinely moves from managed applications into unmanaged contexts – often via the clipboard. The risk isn’t only a file leaving the organization; it can be a snippet of proprietary code or a customer record pasted into an unauthorized <a href="https://www.cloudflare.com/learning/ai/what-is-large-language-model/"><u>large language model (LLM)</u></a> or personal tool.</p><p>Cloudflare One already helps protect data in transit with <a href="https://blog.cloudflare.com/casb-dlp/#understanding-dlp"><u>Gateway and DLP</u></a>, and provides visibility and control at rest through <a href="https://blog.cloudflare.com/casb-dlp/#understanding-casb"><u>CASB</u></a> and its <a href="https://developers.cloudflare.com/cloudflare-one/applications/scan-apps/casb-integrations/"><u>API integrations</u></a>. Now we’re extending coverage to data in use by bringing Endpoint DLP enforcement to the Cloudflare One Client, starting with high-signal workflows like clipboard movement, so data protection doesn’t stop the moment content leaves a browser tab.</p><p>That means sensitive data copied from a protected SaaS app doesn’t immediately become “policy-free” content the moment it hits the OS clipboard. With Endpoint DLP, teams can extend data protection to users’ fingertips without deploying a second agent or stitching together complex integrations.</p><p>For teams already using Cloudflare One for <a href="https://www.cloudflare.com/sase/use-cases/data-protection/"><u>data protection</u></a>, Endpoint DLP completes the model by adding a consistent enforcement layer for data in use.</p><p>This is the endpoint-to-prompt problem: if sensitive data can be copied locally, it can be pasted into an AI assistant just as easily. Once you protect data in use, the next question becomes unavoidable – what happens when that same data is transformed at the prompt?</p>
    <div>
      <h3>AI visibility without blind spots: M365 Copilot scanning with API CASB</h3>
      <a href="#ai-visibility-without-blind-spots-m365-copilot-scanning-with-api-casb">
        
      </a>
    </div>
    <p>Last year, Cloudflare One and API CASB became the <a href="https://blog.cloudflare.com/casb-ai-integrations/"><u>first to offer API integrations with OpenAI ChatGPT, Anthropic Claude, and Google Gemini offerings</u></a> – and we’re not done yet. </p><p>Starting today, customers using Cloudflare One’s <a href="https://www.cloudflare.com/sase/products/casb/"><u>API Cloud Access Security Broker</u></a> (CASB) – which scans SaaS apps via API for common, yet risky security issues – can now analyze <a href="https://developers.cloudflare.com/cloudflare-one/integrations/cloud-and-saas/microsoft-365/"><u>Microsoft 365 Copilot</u></a> activity for data security issues, including chats and uploads that match DLP detection profiles.</p><p>Copilot findings surface with rich context (file references, profile matches, and interaction metadata) so teams can triage quickly instead of starting from raw audit logs.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2c2tzwBiDnF7sU0q983Gyl/9a84c088aa766bf0fd8b71a29a75aeae/image4.png" />
          </figure><p><sup>A CASB Finding showing detection of a file used in M365 Copilot that matches an enabled DLP Profile</sup></p><p>Customers can now see when Copilot activity includes sensitive data. For example, user prompts, Copilot responses, and uploaded files that match DLP detection profiles.</p><p>Microsoft 365 Copilot findings are available by default as part of the Microsoft 365 integration. If you already use this integration, go to Integrations in the Cloudflare One dashboard, update your Microsoft 365 connection, and start receiving Copilot findings. If you’re new to the integration, connect your Microsoft 365 tenant to gain visibility into Copilot usage and associated data security findings.</p><p>As AI product sprawl continues, we’ll be massively expanding coverage across additional AI assistants and core SaaS platforms throughout 2026 – stay tuned!</p>
    <div>
      <h3>What’s next: unified data security in Cloudflare One</h3>
      <a href="#whats-next-unified-data-security-in-cloudflare-one">
        
      </a>
    </div>
    <p>Over the last few years, enterprise security has expanded across more surfaces: SaaS, unmanaged endpoints, remote access patterns, and now AI assistants. But the objective – protecting sensitive data – hasn’t changed. The updates in this post reflect a single direction: consistent visibility and enforcement across data in transit, at rest, in use, and at the prompt. So policy follows data, not product boundaries.</p><p>Looking forward, our vision is broader than “data security features in data security products.” Over time, every Cloudflare One product will become more data-security-aware, with more data-oriented configurability, visibility, controls, and guardrails, built directly into the workflows teams already use across <a href="https://www.cloudflare.com/sase/products/access/"><u>Access</u></a>, <a href="https://www.cloudflare.com/sase/products/gateway/"><u>Gateway</u></a>, endpoint enforcement, and SaaS integrations. The goal is simple: wherever your users work and wherever data moves, Cloudflare One should be able to explain what’s happening and help you control it.</p><p>As the modern perimeter spreads across applications, browsers, endpoints, and AI prompts, patching together point solutions becomes harder to operate and easier to bypass. By building data security directly into Cloudflare One – from access controls to endpoint enforcement to AI visibility – and continuing to unify these layers, we’re helping teams build a clearer, more complete picture of their data risk and their data security posture from the endpoint to the prompt.</p><p>To get started, explore <a href="https://www.cloudflare.com/sase/"><u>Cloudflare One</u></a> or <a href="https://www.cloudflare.com/contact/sase/"><u>contact our team</u></a> to learn more about the platform and these new features.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Data Protection]]></category>
            <category><![CDATA[CASB]]></category>
            <category><![CDATA[Cloudflare Access]]></category>
            <category><![CDATA[WARP]]></category>
            <category><![CDATA[DLP]]></category>
            <category><![CDATA[Cloudflare Gateway]]></category>
            <guid isPermaLink="false">66d1PG4KE6FjrBqG2OqMCW</guid>
            <dc:creator>Alex Dunbrack</dc:creator>
        </item>
        <item>
            <title><![CDATA[How Cloudy translates complex security into human action]]></title>
            <link>https://blog.cloudflare.com/cloudy-upgrades-for-cloudflare-one/</link>
            <pubDate>Tue, 03 Mar 2026 06:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudy is our LLM-powered explanation layer built directly into Cloudflare One. Its explanations, now part of Phishnet and API CASB, can improve user decisions and SOC efficiency. ]]></description>
            <content:encoded><![CDATA[ <p>Today’s security ecosystem generates a staggering amount of complex telemetry. For instance, processing a single email requires analyzing sender reputation, authentication results, link behavior, infrastructure metadata, and countless other attributes. Simultaneously, <a href="https://www.cloudflare.com/sase/products/casb/"><u>Cloud access security broker (CASB)</u></a> engines continuously scan SaaS environments for signals that detect misconfigurations, risky access, and exposed data.</p><p>But while detections have become more sophisticated, explanations have not always kept pace.</p><p>Security and IT teams are often aware when something is flagged, but they do not always know, at a glance, why. End users are asked to make real-time decisions about emails that may impact the entire organization, yet they are rarely given clear, contextual guidance in the moment that matters.</p><p><a href="https://developers.cloudflare.com/fundamentals/reference/cloudy-ai-agent/"><u>Cloudy</u></a> changes that.</p><p>Cloudy is our LLM-powered explanation layer, built directly into Cloudflare One. It translates complex machine learning outputs into precise, human-readable guidance for security teams and end users alike. Instead of exposing raw technical signals, Cloudy surfaces the reasoning behind a detection in a way that drives informed action.</p><p>For <a href="https://www.cloudflare.com/en-au/sase/products/email-security/"><u>Cloudflare Email Security</u></a>, this means helping users understand why a message was flagged before they escalate it to the security operations center, or SOC. For Cloudflare CASB, it means helping administrators quickly understand the risk and remediation path for SaaS findings without having to manually assess low-level signals.</p><p>This post outlines how we are extending Cloudy across <a href="https://developers.cloudflare.com/cloudflare-one/email-security/settings/phish-submissions/"><u>Phishnet</u></a> and API CASB to improve decision making, reduce unnecessary noise, and turn complex security signals into clear, actionable insight.</p>
    <div>
      <h2>Cloudy for Email Security users</h2>
      <a href="#cloudy-for-email-security-users">
        
      </a>
    </div>
    <p>When an email is analyzed by <a href="https://www.cloudflare.com/sase/products/email-security/"><u>Cloudflare Email Security</u></a>, it is not evaluated by a single signal or model. Instead, a wide range of machine learning models analyze different parts of the message, from sender reputation and message structure to content, links, and behavioral patterns. This model set continues to grow as our machine learning team regularly trains and deploys new detections to keep pace with evolving threats.</p><p>Based on this analysis, messages are labeled with outcomes such as Malicious, Suspicious, Spam, Bulk, or Spoof. While these detections have been effective, we consistently heard feedback from customers that it was not always clear why a message was flagged. The decision was correct, they told us —  but the reasoning behind it was often opaque to both end users and security teams.</p><p>To address this, we introduced the first version of <a href="https://blog.cloudflare.com/cloudy-driven-email-security-summaries/"><b><u>Cloudy</u></b><u>: LLM-powered summaries for detections</u></a>. These summaries translate what our machine learning models are seeing into human readable explanations. Initially, these summaries were available in the Cloudflare dashboard to help SOC teams during investigations. Over the past few months, customer feedback has confirmed that these explanations significantly improve understanding in our detections.</p><p>As we continued speaking with customers, another challenge surfaced. Our <b>Phishnet</b> tool allows users to submit messages to the SOC when they believe an email may be suspicious. While this empowers employees to participate in security, many SOC teams told us their queues were being flooded with submissions that turned out to be clean messages.</p><p>The result was unnecessary backlog and slower response times for emails that actually required investigation.</p><p>At the same time, customers told us that traditional security awareness training was not always enough. Users still struggled to evaluate emails in the moment, when it mattered most. They wanted more contextual guidance directly within the workflow where decisions are made.</p><p>This upgrade is designed to address both of these problems. By bringing clearer explanations and contextual education directly into Phishnet, we aim to help users make better decisions while reducing noise for SOC teams, without sacrificing security.</p>
    <div>
      <h3>The problem: Some users flag too many emails, while some aren’t cautious enough</h3>
      <a href="#the-problem-some-users-flag-too-many-emails-while-some-arent-cautious-enough">
        
      </a>
    </div>
    <p>As organizations and attack techniques have evolved, so has the role of the end user. Modern email threats increasingly rely on social engineering, subtle impersonation, and psychological pressure which places users directly in the decision path.</p><p>In response, users are being asked to act as an additional layer of defense. However, traditional security awareness tools often fall short. Training is typically delivered through periodic sessions or simulated phishing campaigns, disconnected from real messages and real decisions. When users encounter an unfamiliar email, they are left without enough context to confidently assess risk.</p><p>This gap commonly leads to one of two outcomes. Some users submit nearly every questionable message to the SOC, creating excessive noise and slowing down investigations. Others interact with messages they should not, simply because nothing in the moment signals clear risk.</p><p><b>By embedding Cloudy directly into Phishnet, we close this gap. </b></p><p>Users receive immediate, contextual explanations that help them understand what Cloudflare is seeing and why a message may be risky. This enables users to make informed decisions at the point of interaction, reduces unnecessary escalations to the SOC, and allows security teams to focus on the messages that truly require attention.</p><p>Over time, this approach shifts users from being a source of noise to becoming an effective part of the detection and response workflow. The result: stronger email security, without adding friction or burden to security teams.</p>
    <div>
      <h3>Phishnet for Microsoft gets a Cloudy upgrade</h3>
      <a href="#phishnet-for-microsoft-gets-a-cloudy-upgrade">
        
      </a>
    </div>
    <p>In the next month, we will be upgrading our Phishnet reporting button to extend the Cloudy summaries.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6dO9TV4MfE2R0YZ035QQ7/3693156d65a4c8aca4b2b9d57e77ce87/image1.png" />
          </figure><p><sub><i>The new Phishnet screens will show Cloudy summaries.</i></sub></p><p>With this upgrade, end users receive a simplified, user-friendly version of Cloudy summaries at the moment they report a message. These summaries are generated in real time using Cloudflare Workers AI and run directly on Cloudflare’s global Workers platform when a user interacts with a message in Phishnet.</p><p>When a user clicks the Phishnet reporting button, the request triggers a Workers-based workflow that aggregates structured outputs from multiple detection models associated with that message. These model outputs include signals such as sender reputation, domain and infrastructure characteristics, authentication results, link and content analysis, and behavioral indicators collected during message processing.</p><p>The aggregated signals are then passed to Workers AI, where a series of purpose-built prompts generate a natural language explanation. Each prompt is designed to transform low-level detection outputs into a concise and human-readable summary. This process focuses on explanation rather than classification and does not alter the original disposition of the message.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5PSAZclxFkdcvSivalmoCn/b355e9e6cf667e6e8e9587f6946db5c6/image6.png" />
          </figure><p><sub><i>How Cloudy transforms detections into clear explanations.</i></sub></p><p>For this experience, we intentionally redesigned the summaries compared to those shown to administrators in the Cloudflare dashboard. During testing, we found that admin-focused summaries often relied on technical concepts that were difficult for non-technical users to interpret. Terms such as ASNs, IP reputation, or authentication failures required translation. </p><p>To ensure end users can understand the summaries, Phishnet emphasizes plain-language explanations while preserving the meaning of the underlying detections.</p><table><tr><td><p><b>Signal</b></p></td><td><p><b>What it means</b></p></td><td><p><b>Cloudy translation for end users</b></p></td></tr><tr><td><p>SPF Fail</p></td><td><p>Sender explicitly not authorized by SPF</p></td><td><p>This email failed a sender verification check.</p></td></tr><tr><td><p>DKIM Fail</p></td><td><p>Message signature does not validate</p></td><td><p>The message integrity check failed, which can be a sign of tampering.</p></td></tr><tr><td><p>DMARC Fail</p></td><td><p>DMARC policy check failed</p></td><td><p>The sender’s domain could not confirm this email is legitimate.</p></td></tr><tr><td><p>Reply to Mismatch</p></td><td><p>Reply To differs from From</p></td><td><p>Replies may go to a different address than the sender shown.</p></td></tr><tr><td><p>Domain Age</p></td><td><p>Domain recently registered</p></td><td><p>The sender domain is newly created, which is common in phishing.</p></td></tr><tr><td><p>URL Low Reputation</p></td><td><p>Destination URL has poor reputation</p></td><td><p>The link destination has signals associated with risk.</p></td></tr></table><p>Because this workflow runs on the Cloudflare Workers platform, summaries are generated with low latency and at global scale — so users receive immediate feedback at the moment of interaction. This real-time context allows users to better understand why an email may be risky or why it appears safe before deciding whether to escalate it to the SOC.</p><p>We are currently beta testing this experience with Microsoft customers to ensure the summaries are accurate and reliable. <b>Cloudy summaries are not trained on customer data.</b> We are also applying additional validation to ensure the generated explanations do not hallucinate. Accuracy is critical at this stage as incorrect guidance could introduce real security risk.</p><p>Following the beta period, we plan to expand access to all Microsoft users. We will also bring similar upgrades to the Phishnet sidebar for Google Workspace users later in 2026.</p>
    <div>
      <h2>Your CASB findings, explained with Cloudy</h2>
      <a href="#your-casb-findings-explained-with-cloudy">
        
      </a>
    </div>
    <p>But helping end users better understand what makes an email risky is only part of the story. We are also applying Cloudy to the administrative side of security operations, where clarity and speed matter just as much. Beyond Phishnet, Cloudy now translates complex CASB findings into structured explanations that help security and IT teams quickly understand risk, prioritize remediation, and take confident action across their SaaS environments.</p>
    <div>
      <h3>API CASB in the wild</h3>
      <a href="#api-casb-in-the-wild">
        
      </a>
    </div>
    <p>Inside <a href="https://www.cloudflare.com/sase/"><u>Cloudflare One</u></a>, our SASE platform, CASB connects to the SaaS and cloud tools your teams already use. By talking to providers over API, CASB gives security and IT teams:</p><ul><li><p>A consolidated view of misconfigurations, overshared files, and risky access patterns across apps like Microsoft 365, Google Workspace, Slack, Salesforce, Box, GitHub, Jira, and Confluence (<a href="https://developers.cloudflare.com/cloudflare-one/applications/scan-apps/casb-integrations/"><u>CASB Integrations</u></a>).</p></li><li><p>Continuous scanning for new issues as users collaborate, share, and adopt new tools.</p></li><li><p>Findings that are organized, searchable, and exportable for triage and reporting.</p></li></ul>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1CH5fnjMQL3oK5PdF9F1bT/d34abcaa64d536cd8706a407f20ba2a9/image2.png" />
          </figure><p><sub><i>A typical CASB Findings page showing detections for a Microsoft 365 finding.</i></sub></p>
    <div>
      <h3>Making SaaS security straightforward</h3>
      <a href="#making-saas-security-straightforward">
        
      </a>
    </div>
    <p>Until now, understanding what exactly triggered a CASB Finding — the detections that CASB makes across connected SaaS integrations — has been a black box. While the information was there to put together an explanation of why that file, that user, that configuration was triggering a CASB Finding Type, it wasn’t exactly obvious the reason why it was ultimately detected by our system.</p><p>With the introduction of Cloudy summaries in CASB, users receive a short description of the detection rationale with the specific details of the match listed out for easy comprehension.</p><p>Unlike a simple text summary, Cloudy for CASB provides a structured breakdown designed for immediate remediation. As seen in our beta testing across different providers, from Microsoft 365 to Dropbox, the model consistently parses findings into two distinct sections:</p><ul><li><p>Risk: It identifies exactly why the finding matters. For instance, rather than just noting a 'Suspended User,' Cloudy clarifies that this 'may indicate a compromised account or a user who should no longer have access to company data'.</p></li><li><p>Guidance: It offers immediate next steps. Instead of generic advice, it suggests specific actions, such as verifying if a suspension was intentional or reviewing an application's legitimacy before revoking access.</p></li></ul><p>This structure ensures that analysts can understand the gravity of a finding without needing deep expertise in the specific SaaS application involved.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/BkfPI5VWYYaGzjjHsfyEz/16783ef841292ff66972222afda350e9/image4.png" />
          </figure><p><sub><i>An example Cloudy Summary in a CASB Posture Finding.</i></sub></p><table><tr><td><p><b>Finding Type</b></p></td><td><p><b>Technical Signal</b></p></td><td><p><b>Cloudy Translation (Risk &amp; Guidance)</b></p></td></tr><tr><td><p><b>Identity &amp; Access</b></p></td><td><p>Dropbox:</p><p>Suspended User</p></td><td><p>Risk: A suspended user account may indicate a compromised account or a user who should no longer have access to company data.</p><p></p><p>Guidance: Verify that the suspension is intentional and that the user's access has been properly revoked.</p></td></tr><tr><td><p><b>Shadow IT</b></p></td><td><p>Google Workspace:</p><p>Installed 3rd-party app</p></td><td><p>Risk: This installed application with Google Sign In access may pose a risk of unauthorized access to user data.</p><p></p><p>Guidance: Review the application's legitimacy and necessity, and consider revoking access if it is no longer needed.</p></td></tr><tr><td><p><b>Email Security</b></p></td><td><p>Microsoft 365:</p><p>Domain DMARC record not present</p></td><td><p>Risk: The absence of a DMARC record may leave the domain vulnerable to email spoofing and phishing attacks.</p><p></p><p>Guidance: Configure a DMARC record for the domain to specify how to handle unauthenticated emails.</p></td></tr><tr><td><p><b>Data Loss Prevention</b></p></td><td><p>Microsoft 365:</p><p>File publicly accessible + DLP Match</p></td><td><p>Risk: This file being shared publicly with edit access may allow unauthorized modifications... especially given the potential sensitive content indicated by the DLP Profile match.</p><p></p><p>Guidance: Review the file's content... and consider restricting access if necessary.</p></td></tr></table><p>We know that when it comes to our customers getting to the bottom of identified security issues, time is of the essence. We believe that any amount of unnecessary uncertainty or lack of clarity around what’s going wrong just puts more time between an imperfect state and one that is more secure.</p><p>We built this feature on the same privacy-first foundations as all products at Cloudflare. Cloudy summaries in CASB are generated using Cloudflare Workers AI, ensuring that your data remains within our secure infrastructure during analysis. The models are not trained on your SaaS data, and the summaries are generated ephemerally to aid in triage. This allows your team to leverage the speed of AI without exposing sensitive internal documents or configurations to public models.</p>
    <div>
      <h3>What’s next</h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>For Email Security, we will continue to expand how Cloudy supports both administrators and end users. Our focus is on delivering clearer explanations, better in context guidance, and deeper integration into daily workflows.</p><p>For CASB, we’re excited to look for opportunities where Cloudy can make it even easier for CASB administrators to understand what’s going on across their cloud and SaaS apps. Keep an eye out as we look to expand Cloudy coverage to allow administrators to query their findings using natural language, further reducing the time it takes to identify and remediate risks.</p><p>Looking ahead, this includes richer explanations for additional detection types, tighter feedback loops between user actions and detections, and continued improvements to how users and SOC teams collaborate through Phishnet. Our goal is to make Cloudy a core part of how organizations understand, trust, and act on email security decisions.</p><p>We provide all organizations (whether a Cloudflare customer or not) with free access to our <a href="https://developers.cloudflare.com/cloudflare-one/email-security/retro-scan/"><u>Retro Scan</u></a> tool, allowing them to use our predictive AI models to scan existing inbox messages in Microsoft 365. </p><p>Retro Scan will detect and highlight any threats found, enabling organizations to remediate them directly in their email accounts. With these insights, organizations can implement further controls, either using <a href="https://www.cloudflare.com/zero-trust/products/email-security/"><u>Cloudflare Email Security</u></a> or their preferred solution, to prevent similar threats from reaching their inboxes in the future.</p><p>If you are interested in how Cloudflare can help secure your inboxes, sign up for a phishing risk assessment <a href="https://www.cloudflare.com/lp/email-security-self-guided-demo-request/?utm_medium=referral&amp;utm_source=blog&amp;utm_campaign=2025-q3-acq-gbl-modernsec-es-ge-general-ai_week_blog"><u>here</u></a>.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/FcaNb9DmTtKE1VbgLfPtT/5824d6eacb9f4ea5fe09c3dbd0843ba1/image3.png" />
          </figure><p></p> ]]></content:encoded>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[CASB]]></category>
            <guid isPermaLink="false">6S9GOOoOPdJX0xziMyNShi</guid>
            <dc:creator>Ayush Kumar</dc:creator>
            <dc:creator>Alex Dunbrack</dc:creator>
        </item>
        <item>
            <title><![CDATA[See risk, fix risk: introducing Remediation in Cloudflare CASB]]></title>
            <link>https://blog.cloudflare.com/remediation-in-cloudflare-casb/</link>
            <pubDate>Tue, 03 Mar 2026 06:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare CASB Remediation lets security teams go beyond visibility to fix risky file sharing in Microsoft 365 and Google Workspace directly from Cloudflare One, all in just a few clicks. ]]></description>
            <content:encoded><![CDATA[ <p>Starting today, Cloudflare CASB customers can do more than see risky file-sharing across their SaaS apps: they can fix it, directly from the Cloudflare One dashboard.</p><p>This launch marks a huge advancement for Cloudflare’s <a href="https://www.cloudflare.com/zero-trust/products/casb/"><u>Cloud Access Security Broker</u></a> (CASB). Since its release, Cloudflare’s API-based CASB has focused on providing robust, comprehensive visibility and detection. It also connects to the SaaS tools your business runs on, surfacing misconfigurations, and flagging overshared data before it becomes tomorrow’s incident.</p><p>With today’s release of Remediation – a new way to fix problems with just a click, right from the CASB Findings page – CASB begins its next chapter, and moves from telling you what’s wrong to helping you make it right.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3sl5Cse8hP3nZwE1deik09/1ee2d7d9f61eceb4a23868b9dab7bbbc/image4.png" />
          </figure><p><sub><i>An example of a Remediation Action (Remove Public File Sharing) in a CASB Finding.</i></sub></p>
    <div>
      <h2>CASB 101: A single place to see SaaS risk</h2>
      <a href="#casb-101-a-single-place-to-see-saas-risk">
        
      </a>
    </div>
    <p>Inside <a href="https://www.cloudflare.com/zero-trust/"><u>Cloudflare One</u></a>, our SASE platform, CASB connects to the SaaS and cloud tools your teams already use. By talking to providers over API, CASB gives security and IT teams:</p><ul><li><p>A consolidated view of misconfigurations, overshared files, and risky access patterns across apps like Microsoft 365, Google Workspace, Slack, Salesforce, Box, GitHub, Jira, and Confluence (<a href="https://developers.cloudflare.com/cloudflare-one/applications/scan-apps/casb-integrations/"><u>CASB Integrations</u></a>).</p></li><li><p>Continuous scanning for new issues as users collaborate, share, and adopt new tools.</p></li><li><p>Findings that are organized, searchable, and exportable for triage and reporting.</p></li></ul><p>But until now, the actual fixing usually happened somewhere else, whether it’s inside each app’s admin UI, or through a ticket to the team that owns that tool. Remediation closes that loop.</p>
    <div>
      <h2>Remediation: CASB’s next chapter</h2>
      <a href="#remediation-casbs-next-chapter">
        
      </a>
    </div>
    <p>The launch of CASB Remediation marks a major shift forward for the product and Cloudflare One, and we have a ton of big updates planned for the next year. </p><p>With today’s release, we focused on fixing file-share issues in <a href="https://developers.cloudflare.com/cloudflare-one/integrations/cloud-and-saas/microsoft-365/#file-sharing"><u>Microsoft 365</u></a> and <a href="https://developers.cloudflare.com/cloudflare-one/integrations/cloud-and-saas/google-workspace/#file-sharing"><u>Google Workspace</u></a>.</p><p>With Remediation, you can fix the highest-impact, most common file risks we see across customers, including:</p><ul><li><p>Public links that let anyone on the Internet view or edit a file.</p></li><li><p>Files shared company-wide across your tenant or domain, even when just a handful of people should have access.</p></li><li><p>Files shared outside your organization to personal accounts and external domains.</p></li><li><p>All of the above, when they also match a DLP Profile. For example, a document full of customer records, credentials, or financial details.</p></li></ul><p>When you trigger the ‘Remove sharing’ Remediation action on a supported finding, CASB immediately moves to remove the risky sharing configuration (for example, the public link or organization-wide access) from the file in question. And crucially, Remediation only removes risky sharing; it doesn’t delete files or change who owns them.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3Te9jeJnI3TRXdxbyT19cf/9f429b27cfd5a6e9fe39b69656cc723c/image3.png" />
          </figure><p><sub><i>A new page to track the progress and success of Remediated CASB findings.</i></sub></p>
    <div>
      <h2>Two starting points: Microsoft 365 and Google Workspace</h2>
      <a href="#two-starting-points-microsoft-365-and-google-workspace">
        
      </a>
    </div>
    <p>We chose to start with Microsoft 365 and Google Workspace because, for many organizations, that’s where the bulk of their business-critical documents live: internal financials, product roadmaps, customer contracts, HR notes, and more.</p><p>They’re also where “temporary” sharing tends to linger too long:</p><ul><li><p>A spreadsheet shared “Anyone with the link can edit” for a quick review.</p></li><li><p>A doc made company-wide for an all-hands, then quietly forgotten.</p></li><li><p>A sheet of customer records shared to a contractor’s personal email.</p></li></ul><p>For Microsoft 365, that means cleaning up risky shares in places like OneDrive and SharePoint. For Google Workspace, it means tightening sharing on Docs, Sheets, Slides, and other files stored in Drive.</p><p>Instead of exporting a CSV of risky files out of CASB, sending it to app owners, and hoping everyone gets around to fixing their share settings, <b>you can drive the clean-up directly from CASB and know when those risks have actually been addressed</b>.</p><p>And when you and your team use <a href="https://developers.cloudflare.com/cloudflare-one/cloud-and-saas-findings/manage-findings/#remediate-findings"><u>CASB Remediation</u></a>, every action is logged in Cloudflare One’s <a href="https://developers.cloudflare.com/cloudflare-one/insights/logs/"><u>Admin logs</u></a>, so you can see who took action on which files and when, or export that activity to your security information and event management tool (SIEM).</p>
    <div>
      <h2>How it works</h2>
      <a href="#how-it-works">
        
      </a>
    </div>
    <p>When architecting the system that supports CASB Remediations, we knew it had to do three things really well:</p><ul><li><p>Be fast, even at scale</p></li><li><p>Durable execution to handle surprises gracefully</p></li><li><p>Be easy for our customers to use </p></li></ul><p>To meet these goals, we built a system using several Cloudflare products: <a href="https://workers.cloudflare.com/"><u>Workers</u></a>, <a href="https://workers.cloudflare.com/product/workflows/"><u>Workflows</u></a>, <a href="https://workers.cloudflare.com/product/queues/"><u>Queues</u></a>, <a href="https://workers.cloudflare.com/product/kv/"><u>Workers KV</u></a>, <a href="https://developers.cloudflare.com/secrets-store/"><u>Secrets Store</u></a>, and <a href="https://workers.cloudflare.com/product/hyperdrive/"><u>Hyperdrive</u></a>. </p><p>When a remediation job is initiated, an API call is made to a Worker. That Worker writes the job to a Queue which is consumed by a second Worker to kick off a Workflow. Workers KV and Secrets Store are used to securely distribute credentials for use in the Workflow. The Workflow runs a series of steps to collect information and execute third-party API calls to complete the remediation. The final outcome of the action is recorded in a database via Hyperdrive. </p><p>At scale, we are guaranteed to encounter 429s from vendor APIs. Workflows’ native retries simplify handling this, and built-in step logging gives visibility into each retry. This means that there was no need for us to build a complex, single-purpose, state-tracking system or dozens of serverless functions for each action.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6TMLm3Wqw5AQHPj6y26Ac4/9acc4fa8b1d1b8f378ab9a23f52e1bdd/image1.png" />
          </figure><p>Performance results from load testing and early access customers have shown strong performance even under heavy load. The average (p50) end-to-end job completion time is 48 seconds, and the p90 is 72 seconds. Durable Execution (via Workflows) has made job management completely hands-off for our team, even when the Workflow encounters issues with third-party APIs. The simplicity of the final system has made troubleshooting issues fast and straightforward.</p>
    <div>
      <h2>What’s next for CASB Remediation</h2>
      <a href="#whats-next-for-casb-remediation">
        
      </a>
    </div>
    <p>File-sharing Remediation for Microsoft 365 and Google Workspace is just the first step.</p><p>In the near term, we’re working on bringing our customers new Quarantine actions, which can move or isolate high-risk files to safer locations. We are also introducing Custom Webhook actions, hooks that let you trigger downstream workflows, like ticket creation, chat notifications, or your own automation.</p><p>And more broadly, we’re excited to explore ways to make CASB even more of an active control plane:</p><ul><li><p>Autoremediation policies for carefully scoped, policy-driven fixes where you’re comfortable letting CASB take action automatically.</p></li><li><p>Custom CASB findings so you can define the exact patterns, data types, or access conditions that matter most to your organization.</p></li><li><p>Bulk Remediation that allows you to remediate many similar findings in a single operation.</p></li><li><p>Extending Remediation to additional SaaS integrations beyond Microsoft 365 and Google Workspace, so the same experience applies to tools like Box, Dropbox, Salesforce, GitHub, Slack, Atlassian, and more over time.</p></li></ul>
    <div>
      <h2>How to get started</h2>
      <a href="#how-to-get-started">
        
      </a>
    </div>
    <p>CASB Remediation requires a paid CASB license, but don’t let that stop you from trying CASB out today!</p><ul><li><p><b>For existing Cloudflare One / CASB customers:</b> Integrate your Microsoft 365 or Google Workspace tenant (or update your existing integration to Read-Write), and start remediating risky shares directly from the side panel within your file sharing-related finding types.</p></li><li><p><b>New to Cloudflare One?</b> <a href="https://dash.cloudflare.com/sign-up/zero-trust"><u>Sign up now</u></a> for 50 free seats to begin using CASB immediately. For larger deployments, request a <a href="https://www.cloudflare.com/contact/sase/?utm_medium=referral&amp;utm_source=blog"><u>consultation with our experts</u></a>.</p></li></ul><p>From there, talk to our team about enabling CASB with Remediation for your Microsoft 365 and Google Workspace tenants so you can find and fix overshared files in one place.</p><p>We’re excited to see how you use Remediation to clean up long-lived file-sharing risks — and to help shape what CASB’s next generation of remediation capabilities looks like.</p> ]]></content:encoded>
            <category><![CDATA[CASB]]></category>
            <category><![CDATA[Microsoft 365]]></category>
            <category><![CDATA[Google Workspace]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[SASE]]></category>
            <category><![CDATA[SAAS Security]]></category>
            <guid isPermaLink="false">5qLzg7UQ9OtFryC8YVeSo5</guid>
            <dc:creator>Alex Dunbrack</dc:creator>
            <dc:creator>Michael Leslie </dc:creator>
        </item>
        <item>
            <title><![CDATA[ChatGPT, Claude, & Gemini security scanning with Cloudflare CASB]]></title>
            <link>https://blog.cloudflare.com/casb-ai-integrations/</link>
            <pubDate>Tue, 26 Aug 2025 14:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare CASB now scans ChatGPT, Claude, and Gemini for misconfigurations, sensitive data exposure, and compliance issues, helping organizations adopt AI with confidence.
 ]]></description>
            <content:encoded><![CDATA[ <p>Starting today, all users of <a href="https://www.cloudflare.com/zero-trust/"><u>Cloudflare One</u></a>, our <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/"><u>secure access service edge (SASE)</u></a> platform, can use our API-based <a href="https://www.cloudflare.com/zero-trust/products/casb/"><u>Cloud Access Security Broker (CASB)</u></a> to assess the security posture of their generative AI (GenAI) tools: specifically, OpenAI’s <a href="https://chatgpt.com/"><u>ChatGPT</u></a>, <a href="https://www.anthropic.com/claude"><u>Claude</u></a> by Anthropic, and Google’s <a href="https://gemini.google.com/"><u>Gemini</u></a>. Organizations can connect their GenAI accounts and within minutes, start detecting misconfigurations, <a href="https://www.cloudflare.com/learning/access-management/what-is-dlp/"><u>Data Loss Prevention (DLP)</u></a> matches, data exposure and sharing, compliance risks, and more — all without having to install cumbersome software onto user devices.</p><p>As <a href="https://www.cloudflare.com/learning/ai/what-is-generative-ai/"><u>Generative AI</u></a> adoption has exploded in the enterprise, IT and Security teams need to hustle to keep themselves abreast of newly emerging <a href="https://www.cloudflare.com/the-net/generative-ai-zero-trust/"><u> security and compliance challenges</u></a> that come alongside these powerful tools. In this rapidly changing landscape, IT and Security teams need tools that help <a href="https://www.cloudflare.com/ai-security/">enable AI adoption while still protecting the security and privacy of their enterprise networks and data</a>. </p><p>Cloudflare’s API CASB and inline CASB work together to help organizations safely adopt AI tools. The API CASB integrations provide out-of-band visibility into data at rest and security posture inside popular AI tools like ChatGPT, Claude, and Gemini. At the same time, Cloudflare Gateway provides <a href="https://blog.cloudflare.com/ai-prompt-protection"><u>in-line prompt controls</u></a> and <a href="https://blog.cloudflare.com/shadow-AI-analytics"><u>Shadow AI</u></a> identification. It applies policies and DLP to traffic as it moves to these AI providers. Together, these features give organizations a unified control plane for <a href="https://blog.cloudflare.com/best-practices-sase-for-ai/">securing their use of GenAI</a>.</p>
    <div>
      <h3>What’s new</h3>
      <a href="#whats-new">
        
      </a>
    </div>
    <p>ChatGPT, Claude and Gemini are now all live in the integrations supported by <a href="https://developers.cloudflare.com/cloudflare-one/applications/scan-apps/casb-integrations/"><u>Cloudflare’s API CASB</u></a>. These integrations are available to all Cloudflare One users, account owners can easily connect their GenAI tenants, and CASB will scan for security issues across multiple domains:</p><ul><li><p><b>Agentless Connections:</b> Connect ChatGPT, Claude, and Gemini via agentless, API‑based integrations to scan posture and data risks; no endpoint software to install.</p></li><li><p><b>Posture Management:</b> Detect insecure settings and misconfigurations that can lead to data exposure or misuse.</p></li><li><p><b>DLP Detection:</b> Identify where <a href="https://developers.cloudflare.com/cloudflare-one/policies/data-loss-prevention/"><u>sensitive data</u></a> has been uploaded in chat attachments (prompts coming soon).</p></li><li><p><b>GenAI-specific Insights:</b> Surface risks associated with the unique capability of a given AI provider's toolsets.</p></li></ul><p>Admins can now answer questions like: What are our employees doing in ChatGPT? What data is being uploaded and used in Claude? Is Gemini configured correctly in Google Workspace?</p><p>Now let’s take a closer look at each integration.</p>
    <div>
      <h3>OpenAI ChatGPT</h3>
      <a href="#openai-chatgpt">
        
      </a>
    </div>
    
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6dO0h3q9modcmRPAQeiCOH/d8d54f5233e0026a63569b53cbb8d9a6/image2.png" />
          </figure><p>Cloudflare’s CASB integration with OpenAI’s ChatGPT scans for several types of insights, including:</p><ul><li><p><b>Capability Activation</b>: Highlights capabilities that are specific to ChatGPT’s feature set, like <a href="https://platform.openai.com/docs/actions/introduction"><u>actions</u></a>, <a href="https://platform.openai.com/docs/guides/tools-code-interpreter"><u>code execution</u></a>, <a href="https://help.openai.com/en/articles/9237897-chatgpt-search"><u>web access</u></a>.</p></li><li><p><b>External Exposure: </b>Finds chats and GPTs that are shared beyond the tenant, like GPTs shared publicly or listed on the <a href="https://openai.com/index/introducing-the-gpt-store/"><u>GPT Store</u></a>, and ties them back to their owners for quick triage.</p></li><li><p><b>Secrets, Keys and Invites</b>: Identifies API keys that aren’t rotated or are no longer used to maintain credential hygiene. Identifies over‑privileged or stale invites.</p></li><li><p><b>Sensitive Content (via DLP)</b>: Detects sensitive data (e.g. credential and secrets, financial / health information, source code, etc.) via <a href="https://developers.cloudflare.com/cloudflare-one/policies/data-loss-prevention/dlp-profiles/"><u>DLP profile</u></a> matches in uploaded chat attachments to enable targeted response.</p></li></ul>
    <div>
      <h3>Anthropic Claude</h3>
      <a href="#anthropic-claude">
        
      </a>
    </div>
    <p>For Claude, Cloudflare is able to provide the following out-of-band detections:</p><ul><li><p><b>Secrets, Keys and Invites:</b> Surfaces high‑risk invites and entitlement drift early so the least‑privilege access control stays tight. Spots unused API keys and rotation gaps before they turn into forgotten open doors.</p></li><li><p><b>Sensitive Content (via DLP)</b>: Monitors for <a href="https://developers.cloudflare.com/cloudflare-one/policies/data-loss-prevention/dlp-profiles/predefined-profiles/"><u>sensitive data</u></a> in uploaded files to help organizations safely enable Claude usage while maintaining compliance. Security teams get this information as quickly as CASB scans, giving them the visibility they need to help employees use Claude productively and securely with sensitive data.</p></li></ul><p>As Anthropic continues to expand Claude's API capabilities and features, Cloudflare will add corresponding security detections to match new functionality as it becomes available.</p>
    <div>
      <h3>Google Gemini</h3>
      <a href="#google-gemini">
        
      </a>
    </div>
    <p>Cloudflare’s detections for Google Gemini appear as part of our API CASB integration for Google Workspace:</p><ul><li><p><b>Identity &amp; MFA</b>: Identifies Gemini users and admins without MFA, leaving them prime targets for compromise. Imagine if an IT admin relied on Gemini daily to process corporate data, but their Google Workspace account lacked multi-factor authentication. One successful phishing email could give an attacker privileged access to Gemini and the wider Google Workspace environment — turning a minor oversight into an organization-wide breach. </p></li><li><p><b>License Hygiene</b>: Flags suspended accounts still holding Gemini or <a href="https://support.google.com/a/answer/16345165"><u>AI Ultra</u></a> licenses to cut cost and reduce exposure. An AI Ultra user has access to more powerful and riskier features, like <a href="https://deepmind.google/models/project-mariner/"><u>Project Mariner</u></a>, a research prototype that acts as an autonomous agent, capable of automating up to 10 tasks simultaneously across web browsers. An attacker can cause more damage by compromising an AI Ultra user, which is why we include this in our set of detections.</p></li></ul><p>The Gemini integration has a narrower scope because Google has structured their product and API differently than OpenAI or Anthropic. For organizations, Gemini is delivered as a <a href="https://workspace.google.com/"><u>Google Workspace</u></a> add-on. Enterprises enable Gemini features in Gmail, Docs, Sheets, and other Google Workspace apps through add-on licenses such as Gemini Enterprise or AI Ultra. Our CASB detections focus on identity, MFA, and license hygiene, rather than posture issues like public sharing or custom assistant publishing because Gemini does not yet provide those API endpoints.</p>
    <div>
      <h3>The Future of GenAI Posture Management</h3>
      <a href="#the-future-of-genai-posture-management">
        
      </a>
    </div>
    <p>Like countless other organizations, Cloudflare is adopting GenAI, on the same journey to make these environments even safer than they are today. We are excited to extend our management coverage to our customers so they can continue to innovate with GenAI. But looking ahead, we’re encouraged to see GenAI providers take concrete steps towards making security, compliance, and data privacy even more important tenets of their platforms.</p>
    <div>
      <h3>Secure GenAI beyond the reach of Inline Controls</h3>
      <a href="#secure-genai-beyond-the-reach-of-inline-controls">
        
      </a>
    </div>
    <p>Generative AI adoption brings new security requirements. Cloudflare CASB delivers out-of-band visibility across these tools, surfacing insights on top of inline controls. With posture, access, and data under control, organizations can embrace GenAI confidently and securely.</p><p><b>How to get started:</b></p><ul><li><p><b>For existing Cloudflare One customers:</b> Contact your account manager or enable the integrations directly in your dashboard today.</p></li><li><p><b>New to Cloudflare One?</b> <a href="https://dash.cloudflare.com/sign-up/zero-trust"><u>Sign up now</u></a> for 50 free seats to begin securely using Gen AI immediately. For larger deployments, request a <a href="https://www.cloudflare.com/products/zero-trust/plans/enterprise/?utm_medium=referral&amp;utm_source=blog&amp;utm_campaign=2025-q3-acq-gbl-connectivity-ge-ge-general-ai_week_blog"><u>consultation with our experts</u></a>.</p></li></ul><p>If you want to preview other new functionality and help shape our roadmap,<a href="https://www.cloudflare.com/lp/ai-security-user-research-program-2025"><u> express interest in our user research program</u></a> for <a href="https://www.cloudflare.com/learning/ai/what-is-ai-security/">AI security</a>. </p><div>
  
</div><p></p> ]]></content:encoded>
            <category><![CDATA[AI Week]]></category>
            <category><![CDATA[AI]]></category>
            <category><![CDATA[AI-SPM]]></category>
            <category><![CDATA[CASB]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[SASE]]></category>
            <category><![CDATA[SAAS Security]]></category>
            <guid isPermaLink="false">ZCOT8h5K8IwD7kDikj0G1</guid>
            <dc:creator>Alex Dunbrack</dc:creator>
        </item>
        <item>
            <title><![CDATA[Security Week 2025: in review]]></title>
            <link>https://blog.cloudflare.com/security-week-2025-wrap-up/</link>
            <pubDate>Mon, 24 Mar 2025 13:05:00 GMT</pubDate>
            <description><![CDATA[ Security Week 2025 has officially come to a close. Our updates for the week included a deep dive on our AI offering, a unified navigation experience, and an introduction to our AI Agent Cloudy. ]]></description>
            <content:encoded><![CDATA[ <p>Thank you for following along with another Security Week at Cloudflare. We’re extremely proud of the work our team does to make the Internet safer and to help meet the challenge of emerging threats. As our CISO Grant Bourzikas outlined in his <a href="https://blog.cloudflare.com/welcome-to-security-week-2025/"><u>kickoff post</u></a> this week, security teams are facing a landscape of rapidly increasing complexity introduced by vendor sprawl, an “AI Boom”, and an ever-growing surface area to protect.</p><p>As we continuously work to meet new challenges, Innovation Weeks like Security Week give us an invaluable opportunity to share our point of view and engage with the wider Internet community. Cloudflare’s mission is to <i>help</i> build a better Internet. We want to help safeguard the Internet from the arrival of quantum supercomputers, help protect the livelihood of content creators from <a href="https://www.cloudflare.com/learning/ai/how-to-prevent-web-scraping/">unauthorized AI scraping</a>, help raise awareness of the latest Internet threats, and help find new ways to help reduce the reuse of compromised passwords. Solving these challenges will take a village. We’re grateful to everyone who has engaged with us on these issues via social media, contributed to <a href="https://github.com/cloudflare"><u>our open source repositories</u></a>, and reached out through our <a href="https://www.cloudflare.com/partners/technology-partners/"><u>technology partner program</u></a> to work with us on the issues most important to them. For us, that’s the best part.</p><p>Here’s a recap of this week’s announcements:</p>
    <div>
      <h3>Helping make the Internet safer</h3>
      <a href="#helping-make-the-internet-safer">
        
      </a>
    </div>
    <table><tr><td><p><b>Title</b></p></td><td><p><b>Excerpt</b></p></td></tr><tr><td><p><a href="https://blog.cloudflare.com/post-quantum-zero-trust/"><u>Conventional cryptography is under threat. Upgrade to post-quantum cryptography with Cloudflare Zero Trust</u></a></p></td><td><p>We’re thrilled to announce that organizations can now protect their sensitive corporate network traffic against quantum threats by tunneling it through Cloudflare’s Zero Trust platform.</p></td></tr><tr><td><p><a href="https://blog.cloudflare.com/how-cloudflare-is-using-automation-to-tackle-phishing/"><u>How Cloudflare is using automation to tackle phishing head on</u></a></p></td><td><p>How Cloudflare is using threat intelligence and our Developer Platform products to automate phishing abuse reports.</p></td></tr><tr><td><p><a href="https://blog.cloudflare.com/advancing-account-security-as-part-of-cloudflare-commitment-to-cisa-secure-by-design-pledge/"><u>Advancing account security as part of Cloudflare’s commitment to CISA’s Secure by Design pledge</u></a></p></td><td><p>Cloudflare has made significant progress in boosting multi-factor authentication (MFA) adoption. With the addition of Apple and Google social logins, we’ve made secure access easier for our users.</p></td></tr><tr><td><p><a href="https://blog.cloudflare.com/email-security-now-available-for-free-for-political-parties-and-campaigns/"><u>Email Security now available for free for political parties and campaigns through Cloudflare for Campaigns</u></a></p></td><td><p>We’re excited to announce that Cloudflare for Campaigns now includes Email Security, adding an extra layer of protection to email systems that power political campaigns.</p></td></tr><tr><td><p><a href="https://blog.cloudflare.com/enhanced-security-and-simplified-controls-with-automated-botnet-protection/"><u>Enhanced security and simplified controls with automated botnet protection, cipher suite selection, and URL Scanner updates</u></a></p></td><td><p>Enhanced security, simplified control! This Security Week, Cloudflare unveils automated botnet protection, flexible cipher suites, and an upgraded URL Scanner.</p></td></tr><tr><td><p><a href="https://blog.cloudflare.com/password-reuse-rampant-half-user-logins-compromised/"><u>Password reuse is rampant: nearly half of user logins are compromised</u></a></p></td><td><p>Nearly half of login attempts across websites protected by Cloudflare involved leaked credentials. The pervasive issue of password reuse is enabling automated bot attacks on a massive scale.</p></td></tr></table>
    <div>
      <h3>Threat research from the network that sees the most threats </h3>
      <a href="#threat-research-from-the-network-that-sees-the-most-threats">
        
      </a>
    </div>
    <table><tr><td><p><b>Title</b></p></td><td><p><b>Excerpt</b></p></td></tr><tr><td><p><a href="https://blog.cloudflare.com/threat-events-platform/"><u>Unleashing improved context for threat actor activity with our Cloudforce One threat events platform</u></a></p></td><td><p>Gain real-time insights with our new threat events platform. This tool empowers your cybersecurity defense with actionable intelligence to stay ahead of attacks and protect your critical assets.</p></td></tr><tr><td><p><a href="https://blog.cloudflare.com/cloudflare-security-posture-management/"><u>One platform to manage your company’s predictive security posture with Cloudflare</u></a></p></td><td><p>Cloudflare introduces a single platform for unified security posture management, helping protect SaaS and web applications deployed across various environments.</p></td></tr><tr><td><p><a href="https://blog.cloudflare.com/monitoring-and-forensics/"><u>Cloudflare enables native monitoring and forensics with Log Explorer and custom dashboards</u></a></p></td><td><p>We are excited to announce support for Zero Trust datasets, and custom dashboards where customers can monitor critical metrics for suspicious or unusual activity</p></td></tr><tr><td><p><a href="https://blog.cloudflare.com/upgraded-turnstile-analytics-enable-deeper-insights-faster-investigations/"><u>Introducing new Turnstile Analytics: Gain insight into your visitor traffic, bot behavior patterns, traffic anomalies, and attack attributes.</u></a></p></td><td><p>Introducing new Turnstile Analytics: gain insight into your visitor traffic, bot behavior patterns, traffic anomalies, and attack attributes.</p></td></tr><tr><td><p><a href="https://blog.cloudflare.com/cloudflare-radar-ddos-leaked-credentials-bots/"><u>Extending Cloudflare Radar’s security insights with new DDoS, leaked credentials, and bots datasets</u></a></p></td><td><p>For Security Week 2025, we are adding several new DDoS-focused graphs, new insights into leaked credential trends, and a new Bots page to Cloudflare Radar.</p></td></tr></table>
    <div>
      <h3>Securing models and guarding against AI threats </h3>
      <a href="#securing-models-and-guarding-against-ai-threats">
        
      </a>
    </div>
    <table><tr><td><p><b>Title</b></p></td><td><p><b>Excerpt</b></p></td></tr><tr><td><p><a href="https://blog.cloudflare.com/cloudflare-for-ai-supporting-ai-adoption-at-scale-with-a-security-first-approach/"><u>Cloudflare for AI: supporting AI adoption at scale with a security-first approach</u></a></p></td><td><p>With Cloudflare for AI, developers, security teams, and content creators can leverage Cloudflare’s network and portfolio of tools to secure, observe, and make AI applications resilient and safe to use.</p></td></tr><tr><td><p><a href="https://blog.cloudflare.com/how-we-train-ai-to-uncover-malicious-javascript-intent-and-make-web-surfing-safer/"><u>How we train AI to uncover malicious JavaScript intent and make web surfing safer</u></a></p></td><td><p>Learn more about how Cloudflare developed an AI model to uncover malicious JavaScript intent using a Graph Neural Network, from pre-processing data to inferencing at scale.</p></td></tr><tr><td><p><a href="https://blog.cloudflare.com/an-early-look-at-cryptographic-watermarks-for-ai-generated-content/"><u>An early look at cryptographic watermarks for AI-generated content</u></a></p></td><td><p>It's hard to tell the difference between web content produced by humans and web content produced by AI. We're taking a new approach to making AI content distinguishable without impacting performance.</p></td></tr><tr><td><p><a href="https://blog.cloudflare.com/ai-labyrinth/"><u>How Cloudflare uses generative AI to slow down, confuse, and waste the resources of AI Crawlers and other bots that don’t respect “no crawl” directives.</u></a></p></td><td><p>How Cloudflare uses generative AI to slow down, confuse, and waste the resources of AI Crawlers and other bots that don’t respect “no crawl” directives.</p></td></tr><tr><td><p><a href="https://blog.cloudflare.com/take-control-of-public-ai-application-security-with-cloudflare-firewall-for-ai/"><u>Take control of public AI application security with Cloudflare's Firewall for AI</u></a></p></td><td><p>Firewall for AI discovers and protects your public LLM-powered applications, and is seamlessly integrated with Cloudflare WAF. Join the beta now and take control of your generative AI security</p></td></tr><tr><td><p><a href="https://blog.cloudflare.com/bots-heuristics/"><u>Improved Bot Management flexibility and visibility with new high-precision heuristics</u></a></p></td><td><p>By building and integrating a new heuristics framework into the Cloudflare Ruleset Engine, we now have a more flexible system to write rules and deploy new releases rapidly</p></td></tr></table>
    <div>
      <h3>Simplifying security</h3>
      <a href="#simplifying-security">
        
      </a>
    </div>
    <table><tr><td><p><b>Title</b></p></td><td><p><b>Excerpt</b></p></td></tr><tr><td><p><a href="https://blog.cloudflare.com/introducing-ai-agent/"><u>Introducing Cloudy, Cloudflare’s AI agent for simplifying complex configurations</u></a></p></td><td><p>Cloudflare’s first AI agent, Cloudy, helps make complicated configurations easy to understand for Cloudflare administrators.</p></td></tr><tr><td><p><a href="https://blog.cloudflare.com/new-application-security-experience/"><u>Making Application Security simple with a new unified dashboard experience</u></a></p></td><td><p>We’re introducing a new Application Security experience in the Cloudflare dashboard, with a reworked UI organized by use cases, making it easier for customers to navigate and secure their accounts</p></td></tr><tr><td><p><a href="https://blog.cloudflare.com/improved-support-for-private-applications-and-reusable-access-policies-with-cloudflare-access/"><u>Improved support for private applications and reusable access policies with Cloudflare Access</u></a></p></td><td><p>We are excited to introduce support for private hostname and IP address-defined applications as well as reusable access policies.</p></td></tr><tr><td><p><a href="https://blog.cloudflare.com/aegis-deep-dive/"><u>Simplify allowlist management and lock down origin access with Cloudflare Aegis</u></a></p></td><td><p>Cloudflare Aegis provides dedicated egress IPs for Zero Trust origin access strategies, now supporting BYOIP and customer-facing configurability, with observability of Aegis IP address utilization coming soon.</p></td></tr><tr><td><p><a href="https://blog.cloudflare.com/https-only-for-cloudflare-apis-shutting-the-door-on-cleartext-traffic"><u>HTTPS-only for Cloudflare APIs: shutting the door on cleartext traffic</u></a></p></td><td><p>We are closing the cleartext HTTP ports entirely for Cloudflare API traffic. This prevents the risk of clients unintentionally leaking their secret API keys in cleartext during the initial request, before we can reject the connection at the server side.</p></td></tr><tr><td><p><a href="https://blog.cloudflare.com/cloudflare-named-leader-waf-forrester-2025/"><u>Cloudflare named a leader in Web Application Firewall Solutions in 2025 Forrester report</u></a></p></td><td><p>Forrester Research has recognized Cloudflare as a Leader in its The Forrester Wave™: Web Application Firewall Solutions, Q1 2025 report.</p></td></tr></table>
    <div>
      <h3>Data security everywhere, all the time </h3>
      <a href="#data-security-everywhere-all-the-time">
        
      </a>
    </div>
    <table><tr><td><p><b>Title</b></p></td><td><p><b>Excerpt</b></p></td></tr><tr><td><p><a href="https://blog.cloudflare.com/scan-cloud-dlp-with-casb"><u>Detecting sensitive data and misconfigurations in AWS and GCP with Cloudflare One</u></a></p></td><td><p>Using Cloudflare’s CASB, integrate, scan, and detect sensitive data and misconfigurations in your cloud storage accounts.</p></td></tr><tr><td><p><a href="https://blog.cloudflare.com/browser-based-rdp"><u>RDP without the risk: Cloudflare's browser-based solution for secure third-party access</u></a></p></td><td><p>Cloudflare now provides clientless, browser-based support for the Remote Desktop Protocol (RDP). It natively enables secure, remote Windows server access without VPNs or RDP clients, to support third-party access and BYOD security.</p></td></tr><tr><td><p><a href="https://blog.cloudflare.com/improving-data-loss-prevention-accuracy-with-ai-context-analysis"><u>Improving Data Loss Prevention accuracy with AI-powered context analysis</u></a></p></td><td><p>Cloudflare’s Data Loss Prevention is reducing false positives by using a self-improving AI-powered algorithm, built on Cloudflare’s Developer Platform, to improve detection accuracy through AI context analysis.</p></td></tr><tr><td><p><a href="https://blog.cloudflare.com/enhance-data-protection-in-microsoft-outlook-with-cloudflare-ones-new-dlp"><u>Enhance data protection in Microsoft Outlook with Cloudflare One’s new DLP Assist</u></a></p></td><td><p>Customers can now easily safeguard sensitive data in Microsoft Outlook with our new DLP Assist feature.</p></td></tr><tr><td><p><a href="https://blog.cloudflare.com/lattice-crypto-primer"><u>Prepping for post-quantum: a beginner’s guide to lattice cryptography</u></a></p></td><td><p>This post is a beginner's guide to lattices, the math at the heart of the transition to post-quantum (PQ) cryptography. It explains how to do lattice-based encryption and authentication from scratch.</p></td></tr><tr><td><p><a href="https://blog.cloudflare.com/irap-protected-assessment"><u>Cloudflare is now IRAP assessed at the PROTECTED level, furthering our commitment to the global public sector</u></a></p></td><td><p>Cloudflare is now assessed at the IRAP PROTECTED level, bringing our products and services to the Australian Public Sector.</p></td></tr></table>
    <div>
      <h2>Tune in to the latest on Cloudflare TV</h2>
      <a href="#tune-in-to-the-latest-on-cloudflare-tv">
        
      </a>
    </div>
    <p>For a deeper dive on many of the great announcements from Security Week, <a href="https://www.cloudflare.com/security-week-2025/cloudflare-tv/"><u>check out our CFTV segments</u></a> where our team shares even more details on our latest updates. </p><div>
  
</div>
<p></p>
    <div>
      <h2>See you for our next Innovation Week</h2>
      <a href="#see-you-for-our-next-innovation-week">
        
      </a>
    </div>
    <p>We appreciate everyone who’s taken the time to read Cloudflare’s Security Week blog posts or engage with us on these topics via social media. Our next innovation week, <a href="https://www.cloudflare.com/developer-week-2024/updates/"><u>Developer Week</u></a>, is right around the corner in April. We look forward to seeing you then!</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Application Security]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[AI]]></category>
            <guid isPermaLink="false">57bTt5UYhnjdF2MwuEePqb</guid>
            <dc:creator>Kim Blight</dc:creator>
            <dc:creator>Adam Martinetti</dc:creator>
            <dc:creator>Alex Dunbrack</dc:creator>
        </item>
        <item>
            <title><![CDATA[Detecting sensitive data and misconfigurations in AWS and GCP with Cloudflare One]]></title>
            <link>https://blog.cloudflare.com/scan-cloud-dlp-with-casb/</link>
            <pubDate>Fri, 21 Mar 2025 13:10:00 GMT</pubDate>
            <description><![CDATA[ Using Cloudflare’s CASB, integrate, scan, and detect sensitive data and misconfigurations in your cloud storage accounts. ]]></description>
            <content:encoded><![CDATA[ <p>Today is the final day of Security Week 2025, and after a great week of blog posts across a variety of topics, we’re excited to share the latest on Cloudflare’s data security products.</p><p>This announcement takes us to Cloudflare’s SASE platform, <a href="https://www.cloudflare.com/zero-trust/products/"><u>Cloudflare One</u></a>, used by enterprise security and IT teams to manage the security of their employees, applications, and third-party tools, all in one place.</p><p>Starting today, Cloudflare One users can now use the <a href="https://www.cloudflare.com/zero-trust/products/casb/"><u>CASB</u></a> (Cloud Access Security Broker) product to integrate with and scan Amazon Web Services (AWS) S3 and Google Cloud Storage, for posture- and Data Loss Prevention (DLP)-related security issues. <a href="https://dash.cloudflare.com/sign-up"><u>Create a free account</u></a> to check it out.</p><p>Scanning both point-in-time and continuously, users can identify misconfigurations in Identity and Access Management (IAM), bucket, and object settings, and detect sensitive information, like Social Security numbers, credit card numbers, or any other pattern using regex, in cloud storage objects.</p>
    <div>
      <h3>Cloud DLP</h3>
      <a href="#cloud-dlp">
        
      </a>
    </div>
    
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1R1bE9TRmTdHDTg1XeLS60/8269b687ec65e70bcaee437f30d5f590/1.png" />
          </figure><p>Over the last few years, our customers — predominantly security and IT teams — have told us about their appreciation for CASB’s simplicity and effectiveness as a SaaS security product. Its number of <a href="https://developers.cloudflare.com/cloudflare-one/applications/casb/casb-integrations/"><u>supported integrations</u></a>, its ease of setup, and speed in identifying critical issues across popular SaaS platforms, like files shared publicly in Microsoft 365 and exposed sensitive data in Google Workspace, has made it a go-to for many.</p><p>However, as we’ve engaged with customers, one thing became clear: the risks of unmonitored or exposed data at-rest go far beyond just SaaS environments. Sensitive information – whether intellectual property, customer data, or personal identifiers – can wreak havoc on an organization’s reputation and its obligations to its customers if it falls into the wrong hands. For many of our customers, the security of data stored in cloud providers like AWS and GCP is even more critical than the security of data in their SaaS tools.</p><p>That’s why we’ve extended Cloudflare CASB to include <a href="https://developers.cloudflare.com/cloudflare-one/policies/data-loss-prevention/"><u>Cloud DLP (Data Loss Prevention)</u></a> functionality, enabling users to scan objects in Amazon S3 buckets and Google Cloud Storage for sensitive data matches​.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5TKXiAkQKxw3GFQBCuQLjX/198e4620da8239280eff669b7b62678b/2.png" />
          </figure><p>With <a href="https://www.cloudflare.com/zero-trust/products/dlp/"><u>Cloudflare DLP</u></a>, you can choose from pre-built detection profiles that look for common data types (such as Social Security Numbers or credit card numbers) or create your own custom profiles using regular expressions​. As soon as an object matching a DLP profile is detected, you can dive into the details, understanding the file’s context, seeing who owns it, and more. These capabilities provide the insight needed to quickly protect data and prevent exposure in real time.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4cyOaQJ0ZyPO8r7LyeU6ON/30b8453888d6cb13dcb15225f875a0cd/3.png" />
          </figure><p>And as with all CASB integrations, this new functionality also comes with <a href="https://www.cloudflare.com/learning/cloud/what-is-dspm/">posture management features</a>, meaning whether you’re using AWS or GCP, we’ll help you identify misconfigurations and other cloud security issues that could leave your data vulnerable​, like buckets that are publicly-accessible or have critical logging settings disabled, access keys needing rotation, or users without <a href="https://www.cloudflare.com/learning/access-management/what-is-multi-factor-authentication/"><u>multi-factor authentication (MFA)</u></a>. It’s all included.</p>
    <div>
      <h3>Simple by default, configurable where you want it</h3>
      <a href="#simple-by-default-configurable-where-you-want-it">
        
      </a>
    </div>
    <p>Cloudflare CASB and DLP are simple to use by default, making it easy to get started right away. But it’s also highly configurable, giving you the flexibility to fine-tune the scanning profiles to suit your specific needs.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5MLh3y7SMHnX52cjuu4pmE/b7bb67497fc21bc9d3f3f740a9b3fe52/4.png" />
          </figure><p>For example, you can adjust which storage buckets or file types to scan, and even sample only a percentage of objects for analysis​. The scanning also runs within your own cloud environment, so your data never leaves your infrastructure​. This approach keeps your cloud storage secure and your costs managed while allowing you to tailor the solution to your organization’s unique compliance and security requirements.</p><p>Looking ahead, our roadmap also includes expanding support to additional cloud storage environments, such as Azure Blob Storage and Cloudflare R2, further extending our comprehensive, multi-cloud security strategy. Stay tuned for more on that!</p>
    <div>
      <h3>How it works</h3>
      <a href="#how-it-works">
        
      </a>
    </div>
    <p>From the start, we knew that to deliver DLP capabilities across cloud environments, it would require an efficient and scalable design to enable real-time detection of sensitive data exposure.</p>
    <div>
      <h4>Serverless architecture for streamlined processing</h4>
      <a href="#serverless-architecture-for-streamlined-processing">
        
      </a>
    </div>
    <p>An early design decision was made to leverage a serverless architecture approach to ensure sensitive data discovery is both efficient and scalable. Here’s how it works:</p><ul><li><p><b>Compute Account</b>: The entire process runs within a cloud account owned by your organization, known as a Compute Account. This design ensures your data remains within your boundaries, avoiding costly cloud egress fees. The Compute Account can be launched in under 15 minutes using a provided Terraform template.</p></li><li><p><b>Controller function</b>: Every minute, a lightweight, serverless controller function in your cloud environment communicates with Cloudflare’s APIs, fetching the latest DLP configurations and security profiles from your Cloudflare One account.</p></li><li><p><b>Crawler process</b>: The controller triggers an object discovery task, which is processed by a second serverless function known as the Crawler. The Crawler queries cloud storage accounts, like AWS S3 or Google Cloud Storage, via API to identify new objects. Redis is used within the Compute Account to track which objects have yet to be evaluated.</p></li><li><p><b>Scanning for sensitive data</b>: Newly discovered objects are sent through a queue to a third serverless function called the Scanner. This function downloads the objects and streams their contents to the DLP engine in the Compute Account, which scans for matches against predefined or custom DLP Profiles.</p></li><li><p><b>Finding generation and alerts</b>: If a DLP match is found, metadata about the object, such as context and ownership details, is published to a queue. This data is ingested by a Cloudflare-hosted service and presented in the Cloudflare Dashboard as findings, giving security teams the visibility needed to take swift action.</p></li></ul>
    <div>
      <h4>Scalable and secure design</h4>
      <a href="#scalable-and-secure-design">
        
      </a>
    </div>
    <p>The DLP pipeline ensures that sensitive data never leaves your cloud environment — a privacy-first approach. All communication between the Compute Account and Cloudflare's APIs are initiated by the controller, also meaning there is no need to perform any extra configuration to allow ingress traffic.</p>
    <div>
      <h3>How to get started</h3>
      <a href="#how-to-get-started">
        
      </a>
    </div>
    <p>To get started, reach out to your account team to learn more about this new data security functionality and our roadmap. If you want to try this out on your own, you can login to the Cloudflare One dashboard (create a free account <a href="https://www.cloudflare.com/zero-trust/products/"><u>here</u></a> if you don’t have one) and navigate to the CASB page to set up your first integration.</p>
    <div>
      <h3>Watch on Cloudflare TV</h3>
      <a href="#watch-on-cloudflare-tv">
        
      </a>
    </div>
    <div>
  
</div><p></p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[CASB]]></category>
            <category><![CDATA[DLP]]></category>
            <category><![CDATA[AWS]]></category>
            <category><![CDATA[Google Cloud]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <guid isPermaLink="false">2hlOlV28pXRFpnmnkqbbhw</guid>
            <dc:creator>Alex Dunbrack</dc:creator>
            <dc:creator>Michael Leslie </dc:creator>
        </item>
        <item>
            <title><![CDATA[Introducing Cloudy, Cloudflare’s AI agent for simplifying complex configurations]]></title>
            <link>https://blog.cloudflare.com/introducing-ai-agent/</link>
            <pubDate>Thu, 20 Mar 2025 13:10:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare’s first AI agent, Cloudy, helps make complicated configurations easy to understand for Cloudflare administrators. ]]></description>
            <content:encoded><![CDATA[ <p>It’s a big day here at Cloudflare! Not only is it Security Week, but today marks Cloudflare’s first step into a completely new area of functionality, intended to improve how our users both interact with, and get value from, all of our products.</p><p>We’re excited to share a first glance of how we’re embedding <a href="https://www.cloudflare.com/learning/ai/what-is-artificial-intelligence/">AI</a> features into the management of Cloudflare products you know and love. Our first mission? Focus on security and streamline the rule and policy management experience. The goal is to automate away the time-consuming task of manually reviewing and contextualizing Custom Rules in <a href="https://www.cloudflare.com/application-services/products/waf/">Cloudflare WAF</a>, and Gateway policies in Cloudflare One, so you can instantly understand what each policy does, what gaps they have, and what you need to do to fix them.</p>
    <div>
      <h3>Meet Cloudy, Cloudflare’s first AI agent</h3>
      <a href="#meet-cloudy-cloudflares-first-ai-agent">
        
      </a>
    </div>
    <p>Our initial step toward a fully AI-enabled product experience is the introduction of <i>Cloudy</i>, the first version of Cloudflare AI agents, assistant-like functionality designed to help users quickly understand and improve their Cloudflare configurations in multiple areas of the product suite. You’ll start to see Cloudy functionality seamlessly embedded into two Cloudflare products across the dashboard, which we’ll talk about below.</p><p>And while the name <i>Cloudy</i> may be fun and light-hearted, our goals are more serious: Bring Cloudy and AI-powered functionality to every corner of Cloudflare, and optimize how our users operate and manage their favorite Cloudflare products. Let’s start with two places where Cloudy is now live and available to all customers using the WAF and Gateway products.</p>
    <div>
      <h3>WAF Custom Rules</h3>
      <a href="#waf-custom-rules">
        
      </a>
    </div>
    <p>Let’s begin with AI-powered overviews of <a href="https://developers.cloudflare.com/waf/custom-rules/"><u>WAF Custom Rules</u></a>. For those unfamiliar, Cloudflare’s Web Application Firewall (WAF) helps protect web applications from attacks like <a href="https://www.cloudflare.com/learning/security/threats/sql-injection/">SQL injection</a>, <a href="https://www.cloudflare.com/learning/security/threats/cross-site-scripting/">cross-site scripting (XSS)</a>, and other vulnerabilities. </p><p>One specific feature of the WAF is the ability to create WAF Custom Rules. These allow users to tailor security policies to block, challenge, or allow traffic based on specific attributes or security criteria.</p><p>However, for customers with dozens or even hundreds of rules deployed across their organization, it can be challenging to maintain a clear understanding of their security posture. Rule configurations evolve over time, often managed by different team members, leading to potential inefficiencies and security gaps. What better problem for Cloudy to solve?</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4zcFRfhRWGQWhoza9TolDu/25e1357540db32e59150609e6eddd1e0/BLOG-2692_2.png" />
          </figure><p>Powered by <a href="https://developers.cloudflare.com/workers-ai/"><u>Workers AI</u></a>, today we’ll share how Cloudy will help review your WAF Custom Rules and provide a summary of what's configured across them. Cloudy will also help you identify and solve issues such as:</p><ul><li><p><b>Identifying redundant rules</b>: Identify when multiple rules are performing the same function, or using similar fields, helping you streamline your configuration.</p></li><li><p><b>Optimising execution order</b>: Spot cases where rules ordering affects functionality, such as when a terminating rule (block/challenge action) prevents subsequent rules from executing.</p></li><li><p><b>Analysing conflicting rules</b>: Detect when rules counteract each other, such as one rule blocking traffic that another rule is designed to allow or log.</p></li><li><p><b>Identifying disabled rules</b>: Highlight potentially important security rules that are in a disabled state, helping ensure that critical protections are not accidentally left inactive.</p></li></ul><p>Cloudy won't just summarize your rules, either. It will analyze the relationships and interactions between rules to provide actionable recommendations. For security teams managing complex sets of Custom Rules, this means less time spent auditing configurations and more confidence in your security coverage.</p><p>Available to all users, we’re excited to show how Cloudflare AI Agents can enhance the usability of our products, starting with WAF Custom Rules. But this is just the beginning.</p>
    <div>
      <h3>Cloudflare One Firewall policies</h3>
      <a href="#cloudflare-one-firewall-policies">
        
      </a>
    </div>
    
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4CXHQVlO3GGqwp6DGyOklJ/3068c434c4a303cf22c328c302947fcb/BLOG-2692_3.png" />
          </figure><p>We've also added Cloudy to <a href="https://www.cloudflare.com/static/e9ea5dfaa69c554cc1cbaa7f3e441acf/Cloudflare_One_at_a_glance.pdf"><u>Cloudflare One</u></a>, our SASE platform, where enterprises manage the security of their employees and tools from a single dashboard.</p><p>In <a href="https://www.cloudflare.com/zero-trust/products/gateway/"><u>Cloudflare Gateway</u></a>, our Secure Web Gateway offering, customers can configure policies to manage how employees do their jobs on the Internet. These Gateway policies can block access to malicious sites, prevent data loss violations, and control user access, among other things.</p><p>But similar to WAF Custom Rules, Gateway policy configurations can become overcomplicated and bogged down over time, with old, forgotten policies that do who-knows-what. Multiple selectors and operators working in counterintuitive ways. Some blocking traffic, others allowing it. Policies that include several user groups, but carve out specific employees. We’ve even seen policies that block hundreds of URLs in a single step. All to say, managing years of Gateway policies can become overwhelming.</p><p>So, why not have Cloudy summarize Gateway policies in a way that makes their purpose clear and concise?</p><p>Available to all Cloudflare Gateway users (create a free Cloudflare One account <a href="https://www.cloudflare.com/zero-trust/products/"><u>here</u></a>), Cloudy will now provide a quick summary of any Gateway policy you view. It’s now easier than ever to get a clear understanding of each policy at a glance, allowing admins to spot misconfigurations, redundant controls, or other areas for improvement, and move on with confidence.</p>
    <div>
      <h3>Built on Workers AI</h3>
      <a href="#built-on-workers-ai">
        
      </a>
    </div>
    <p>At the heart of our new functionality is <a href="https://www.cloudflare.com/developer-platform/products/workers-ai/"><u>Cloudflare Workers AI</u></a> (yes, the same version that everyone uses!) that leverages advanced <a href="https://www.cloudflare.com/learning/ai/what-is-large-language-model/">large language models (LLMs) </a>to process vast amounts of information; in this case, policy and rules data. Traditionally, manually reviewing and contextualizing complex configurations is a daunting task for any security team. With Workers AI, we automate that process, turning raw configuration data into consistent, clear summaries and actionable recommendations.</p>
    <div>
      <h4><b>How it works</b></h4>
      <a href="#how-it-works">
        
      </a>
    </div>
    <p>Cloudflare Workers AI ingests policy and rule configurations from your Cloudflare setup and combines them with a purpose-built LLM prompt. We leverage the same <a href="https://developers.cloudflare.com/workers-ai/models/"><u>publicly-available LLM models</u></a> that we offer our customers, and then further enrich the prompt with some additional data to provide it with context. For this specific task of analyzing and summarizing policy and rule data, we provided the LLM:</p><ul><li><p><b>Policy &amp; rule data</b>: This is the primary data itself, including the current configuration of policies/rules for Cloudy to summarize and provide suggestions against.</p></li><li><p><b>Documentation on product abilities:</b> We provide the model with additional technical details on the policy/rule configurations that are possible with each product, so that the model knows what kind of recommendations are within its bounds.</p></li><li><p><b>Enriched datasets</b>: Where WAF Custom Rules or CF1 Gateway policies leverage other ‘lists’ (e.g., a WAF rule referencing multiple countries, a Gateway policy leveraging a specific content category), the list item(s) selected must be first translated from an ID to plain-text wording so that the LLM can interpret which policy/rule values are actually being used.</p></li><li><p><b>Output instructions</b>: We specify to the model which format we’d like to receive the output in. In this case, we use JSON for easiest handling.</p></li><li><p><b>Additional clarifications</b>: Lastly, we explicitly instruct the LLM to be sure about its output, valuing that aspect above all else. Doing this helps us ensure that no hallucinations make it to the final output.</p></li></ul><p>By automating the analysis of your WAF Custom Rules and Gateway policies, Cloudflare Workers AI not only saves you time but also enhances security by reducing the risk of human error. You get clear, actionable insights that allow you to streamline your configurations, quickly spot anomalies, and maintain a strong security posture—all without the need for labor-intensive manual reviews.</p>
    <div>
      <h4>What’s next for Cloudy</h4>
      <a href="#whats-next-for-cloudy">
        
      </a>
    </div>
    <p>Beta previews of Cloudy are live for all Cloudflare customers today. But this is just the beginning of what we envision for AI-powered functionality across our entire product suite.</p><p>Throughout the rest of 2025, we plan to roll out additional <a href="https://www.cloudflare.com/learning/ai/what-is-agentic-ai/">AI agent capabilities</a> across other areas of Cloudflare. These new features won’t just help customers manage security more efficiently, but they’ll also provide intelligent recommendations for optimizing performance, streamlining operations, and enhancing overall user experience.</p><p>We’re excited to hear your thoughts as you get to meet Cloudy and try out these new AI features – send feedback to us at <a><u>cloudyfeedback@cloudflare.com</u></a>, or post your thoughts on X, LinkedIn, or Mastodon tagged with #SecurityWeek! Your feedback will help shape our roadmap for AI enhancement, and bring our users smarter, more efficient tooling that helps everyone get more secure.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5gGseiyO6pbddpdSVQ5wfJ/ae1d0d5a2f8ec01f571de7a85b655370/BLOG-2692_4.png" />
          </figure>
    <div>
      <h3>Watch on Cloudflare TV</h3>
      <a href="#watch-on-cloudflare-tv">
        
      </a>
    </div>
    <div>
  
</div><p></p> ]]></content:encoded>
            <category><![CDATA[Workers AI]]></category>
            <category><![CDATA[Cloudflare Workers]]></category>
            <category><![CDATA[Developer Platform]]></category>
            <category><![CDATA[Developers]]></category>
            <category><![CDATA[LLM]]></category>
            <category><![CDATA[WAF]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[SASE]]></category>
            <category><![CDATA[Secure Web Gateway]]></category>
            <category><![CDATA[Beta]]></category>
            <category><![CDATA[Network Services]]></category>
            <guid isPermaLink="false">7ywSxti5U7fxjKbqmVXpGW</guid>
            <dc:creator>Alex Dunbrack</dc:creator>
            <dc:creator>Harsh Saxena</dc:creator>
        </item>
        <item>
            <title><![CDATA[What’s next for Cloudflare One’s data protection suite]]></title>
            <link>https://blog.cloudflare.com/cloudflare-one-data-protection-roadmap-preview/</link>
            <pubDate>Thu, 07 Sep 2023 13:00:31 GMT</pubDate>
            <description><![CDATA[ Cloudflare One just launched its data protection suite. This blog previews new functionality to protect data and code in SaaS environments with our DLP and CASB services and looks back on what we have built over the past year ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4WClMGClAUrNY0rHmGzotr/6e13a6250104ebc9b9b6cdff4a34128d/image1-2.png" />
            
            </figure><p>Today, we announced Cloudflare One for Data Protection — a unified suite to protect data everywhere across web, SaaS, and private applications. This suite converges capabilities including our <a href="https://www.cloudflare.com/learning/access-management/what-is-dlp/">data loss prevention (DLP)</a>, <a href="https://www.cloudflare.com/learning/access-management/what-is-a-casb/">cloud access security broker (CASB)</a>, <a href="https://www.cloudflare.com/learning/access-management/what-is-ztna/">Zero Trust network access (ZTNA)</a>, <a href="https://www.cloudflare.com/learning/access-management/what-is-a-secure-web-gateway/">secure web gateway (SWG)</a>, <a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">remote browser isolation (RBI)</a>, and <a href="https://www.cloudflare.com/learning/email-security/what-is-email-security/">cloud email security</a> services. The suite is available and packaged now as part of <a href="https://www.cloudflare.com/cloudflare-one/">Cloudflare One</a>, our <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/">SASE</a> platform.</p><p>In the <a href="https://cflr.re/data-protection-announcement-blog">announcement post</a>, we focused on how the data protection suite helps customers navigate modern data risks, with recommended use cases and real-world customer examples.</p><p>In this companion blog post, we recap the capabilities built into the Cloudflare One suite over the past year and preview new functionality that customers can look forward to. This blog is best for practitioners interested in protecting data and SaaS environments using Cloudflare One.</p>
    <div>
      <h2>DLP &amp; CASB capabilities launched in the past year</h2>
      <a href="#dlp-casb-capabilities-launched-in-the-past-year">
        
      </a>
    </div>
    <p>Cloudflare launched both <a href="/inline-dlp-ga/">DLP</a> and <a href="/casb-ga/">CASB</a> services in September 2022, and since then have rapidly built functionality to meet the growing needs of our organizations of all sizes. Before previewing how these services will evolve, it is worth recapping the many enhancements added in the past year.</p><p>Cloudflare’s <a href="/inline-dlp-ga/">DLP</a> solution helps organizations detect and protect sensitive data across their environment based on its several characteristics. DLP controls can be critical in preventing (and detecting) damaging leaks and ensuring compliance for regulated classes of data like financial, health, and <a href="https://www.cloudflare.com/learning/privacy/what-is-pii/">personally identifiable</a> information.</p><p>Improvements to DLP detections and policies can be characterized by three major themes:</p><ul><li><p><b>Customization:</b> making it easy for administrators to design DLP policies with the flexibility they want.</p></li><li><p><b>Deep detections:</b> equipping administrators with increasingly granular controls over what data they protect and how.</p></li><li><p><b>Detailed detections:</b> providing administrators with more detailed visibility and logs to analyze the efficacy of their DLP policies.</p></li></ul><p>Cloudflare’s <a href="/casb-ga/">CASB</a> helps organizations connect to, scan, and monitor third-party SaaS applications for misconfigurations, improper data sharing, and other security risks — all via lightweight API integrations. In this way, organizations can regain visibility and controls over their growing investments in SaaS apps.</p><p>CASB product enhancements can similarly be summarized by three themes:</p><ul><li><p><b>Expanding API integrations:</b> Today, our CASB integrates with <a href="https://developers.cloudflare.com/cloudflare-one/applications/scan-apps/casb-integrations/">18 of the most popular SaaS apps</a> — Microsoft 365 (including OneDrive), Google Workspace (including Drive), Salesforce, GitHub, and more. Setting up these API integrations takes fewer clicks than first-generation CASB solutions, with comparable coverage to other vendors in the <a href="https://www.cloudflare.com/learning/access-management/security-service-edge-sse/">Security Services Edge (SSE)</a> space.</p></li><li><p><b>Strengthening findings of CASB scans:</b> We have made it easier to remediate the misconfigurations identified by these CASB scans with both prescriptive guides and in-line policy actions built into the dashboard.</p></li><li><p><b>Converging CASB &amp; DLP functionality:</b> We started enabling organizations to <a href="/casb-dlp/">scan SaaS apps for sensitive data, as classified by DLP policies</a>. For example, this helps organizations detect when credit cards or social security numbers are in Google documents or spreadsheets that have been made publicly available to anyone on the Internet.</p></li></ul><p>This last theme, in particular, speaks to the value of unifying data protection capabilities on a single platform for simple, streamlined workflows. The below table highlights some major capabilities launched since our general availability announcements last September.</p>
    <div>
      <h3>Table 1: Select DLP and CASB capabilities shipped since 2022 Q4</h3>
      <a href="#table-1-select-dlp-and-casb-capabilities-shipped-since-2022-q4">
        
      </a>
    </div>
    
<table>
<thead>
  <tr>
    <th><span>Theme</span></th>
    <th><span>Capability</span></th>
    <th><span>Description</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><span>DLP: Customizability</span></td>
    <td><a href="http://staging.blog.mrk.cfdata.org/cloudflare-dlp-mip/"><span>Microsoft Information Protection labels integration</span></a></td>
    <td><span>After a quick API integration, Cloudflare syncs continuously with the Microsoft Information Protection (MIP) labels you already use to streamline how you build DLP policies.</span></td>
  </tr>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/custom-dlp-profiles/"><span>Custom DLP profiles</span></a></td>
    <td><span>Administrators can create custom detections using the same regex policy builder used across our entire Zero Trust platform for a consistent configuration experience across services.</span></td>
  </tr>
  <tr>
    <td><a href="https://developers.cloudflare.com/cloudflare-one/policies/data-loss-prevention/dlp-profiles/advanced-settings/"><span>Match count controls</span></a></td>
    <td><span>Administrators can set minimum thresholds for the number of times a detection is made before an action (like block or log) is triggered. This way, customers can create policies that allow individual transactions but block up/downloads with high volumes of sensitive data.</span></td>
  </tr>
  <tr>
    <td><span>DLP: Deepening detection</span></td>
    <td><a href="https://developers.cloudflare.com/cloudflare-one/policies/data-loss-prevention/dlp-profiles/advanced-settings/"><span>Context analysis</span></a></td>
    <td><span>Context analysis helps reduce false positive detections by analyzing proximity keywords (for example: seeing “expiration date” near a credit card number increases the likelihood of triggering a detection).</span></td>
  </tr>
  <tr>
    <td><a href="https://developers.cloudflare.com/cloudflare-one/policies/gateway/http-policies/#download-and-upload-file-type"><span>File type control</span></a></td>
    <td><span>DLP scans can be scoped to specific file types, such as Microsoft Office documents, PDF files, and ZIP files.</span></td>
  </tr>
  <tr>
    <td><a href="https://developers.cloudflare.com/cloudflare-one/policies/data-loss-prevention/dlp-profiles/predefined-profiles/"><span>Expanded predefined DLP profiles</span></a></td>
    <td><span>Since launch, DLP has built out a wider variety of detections for common data types, like financial data, personal identifiers, and credentials.</span></td>
  </tr>
  <tr>
    <td><span>DLP: Detailed detections</span></td>
    <td><a href="https://developers.cloudflare.com/cloudflare-one/insights/logs/gateway-logs/#http-logs"><span>Expanded logging details</span></a><span> </span></td>
    <td><span>Cloudflare now captures more wide-ranging and granular details of DLP-related activity in logs, including payload analysis, file names, and higher fidelity details of individual files. A large percentage of our customers prefer to push these logs to SIEM tools like </span><a href="http://staging.blog.mrk.cfdata.org/integrate-cloudflare-zero-trust-with-datadog-cloud-siem/"><span>DataDog</span></a><span> and </span><a href="http://staging.blog.mrk.cfdata.org/zero-trust-signals-to-sumo-logic/"><span>Sumo Logic</span></a><span>.</span></td>
  </tr>
  <tr>
    <td><span>CASB: Expanding integrations and findings</span></td>
    <td><a href="https://developers.cloudflare.com/cloudflare-one/applications/scan-apps/casb-integrations/"><span>API-based integrations</span></a><br /><a href="https://developers.cloudflare.com/cloudflare-one/applications/scan-apps/manage-findings/"><span>Managing findings</span></a></td>
    <td><span>Today, Cloudflare integrates with 18 of the most widely used SaaS apps, including productivity suites, cloud storage, chat tools, and more. </span><br /><span>API-based scans not only reveal misconfigurations, but also offer built-in HTTP policy creation workflows and step-by-step remediation guides. </span></td>
  </tr>
  <tr>
    <td><span>DLP &amp; CASB convergence</span></td>
    <td><a href="https://developers.cloudflare.com/cloudflare-one/applications/scan-apps/casb-dlp/"><span>Scanning for sensitive data in SaaS apps</span></a></td>
    <td><span>Today, organizations can set up CASB to scan every publicly accessible file in Google Workspace for text that matches a DLP profile (financial data, personal identifiers, etc.).</span></td>
  </tr>
</tbody>
</table>
    <div>
      <h2>New and upcoming DLP &amp; CASB functionality</h2>
      <a href="#new-and-upcoming-dlp-casb-functionality">
        
      </a>
    </div>
    <p>Today’s launch of <a href="http://cfl.re/data-protection-press-release">Cloudflare One’s data protection suite</a> crystalizes our commitment to keep investing in DLP and CASB functionality across these thematic areas. Below we wanted to preview a few new and upcoming capabilities on the Cloudflare One’s data protection suite roadmap that will become available in the coming weeks for further visibility and controls across data environments.</p>
    <div>
      <h3><i>Exact data matching with custom wordlists</i></h3>
      <a href="#exact-data-matching-with-custom-wordlists">
        
      </a>
    </div>
    <p><b>Already shipped:</b> <a href="/edm-beta/">Exact Data Match</a>, moves from out of beta to general availability, allowing customers to tell Cloudflare’s DLP exactly what data to look for by uploading a dataset, which could include names, phone numbers, or anything else.</p><p><b>Next 30 days:</b> Customers will soon be able to upload a list of specific words, create DLP policies to search for those important keywords in files, and block and log that activity.</p><p><b>How customers benefit:</b> Administrators can be more specific about what they need to protect and save time creating policies by bulk uploading the data and terms that they care most about. Over time, many organizations have amassed long lists of terms configured for incumbent DLP services, and these customizable upload capabilities <a href="/descaler-program-update/">streamline migration from other vendors</a> to Cloudflare. Just as with all other DLP profiles, Cloudflare searches for these custom lists and keywords within in-line traffic and in integrated SaaS apps.</p>
    <div>
      <h3><i>Detecting source code and health data</i></h3>
      <a href="#detecting-source-code-and-health-data">
        
      </a>
    </div>
    <p><b>Next 30 days:</b> Soon, Clouflare’s DLP will include predefined profiles to detect developer source code and <a href="https://www.cloudflare.com/learning/privacy/what-is-hipaa-compliance/">protected health information (PHI)</a>. Initially, code data will include languages like Python, Javascript, Java, and C++ — four of the most popular languages today — and PHI data will include medication and diagnosis names — two highly sensitive medical topics.</p><p><b>How customers benefit:</b> These predefined profiles expand coverage to some of the most valuable — and in the case of PHI, one of the most regulated — types of data within an organization.</p>
    <div>
      <h3><i>Converging API-driven CASB &amp; DLP for data-at-rest protections</i></h3>
      <a href="#converging-api-driven-casb-dlp-for-data-at-rest-protections">
        
      </a>
    </div>
    <p><b>Next 30 days:</b> Soon, organizations will be able to scan for sensitive data at rest in Microsoft 365 (e.g. OneDrive). API-based scans of these environments will flag, for example, whether credit card numbers, source code, or other data configured via DLP policies reside within publicly accessible files. Administrators can then take prescriptive steps to remediate via in-line CASB gateway policies.</p><p><b>Shipping by the end of the year:</b> Within the next few months, this same integration will be available with GitHub.</p><p><b>How customers benefit:</b> Between the existing <a href="https://developers.cloudflare.com/cloudflare-one/applications/scan-apps/casb-dlp/">Google Workspace</a> integration and this upcoming Microsoft 365 integration, customers can scan for sensitive data across two of the most prominent cloud productivity suites — where users spend much of their time and where large percentages of organizational data lives. This new Microsoft integration represents a continued investment in streamlining security workflows across the Microsoft ecosystem — whether for <a href="/expanding-our-collaboration-with-microsoft-proactive-and-automated-zero-trust-security/">managing identity and application access</a>, <a href="/cloudflare-microsoft-intune-partner-to-give-cisos-secure-control-across-devices-applications/">enforcing device posture</a>, or <a href="https://developers.cloudflare.com/cloudflare-one/tutorials/azuread-risky-users/?cf_target_id=9878E2009FA06D9AC4B5552DD9D7E75D">isolating risky users</a>.</p><p>The GitHub integration also restores visibility over one of the most critical developer environments that is also increasingly a risk for <a href="https://www.cloudflare.com/learning/access-management/what-is-dlp/">data leaks</a>. In fact, according to <a href="https://www.gitguardian.com/state-of-secrets-sprawl-report-2023">GitGuardian</a>, 10 million hard-coded secrets were exposed in public GitHub commits in 2022, a figure that is up 67% from 2021 and only expected to grow. Preventing source code exposure on GitHub is a problem area our product team regularly hears from our customers, and we will continue to prioritize securing developer environments.</p>
    <div>
      <h3><i>Layering on Zero Trust context: User Risk Score</i></h3>
      <a href="#layering-on-zero-trust-context-user-risk-score">
        
      </a>
    </div>
    <p><b>Next 30 days:</b> Cloudflare will introduce a risk score based on user behavior and activities that have been detected across Cloudflare One’s services. Organizations will be able to detect user behaviors that introduce risk from action like an Impossible Travel anomaly or detections from too many DLP violations in a given period of time. Shortly following the detection capabilities will be the option to take preventative or remediative policy actions, within the wider Cloudflare One suite. In this way, organizations can control access to sensitive data and applications based on changing risk factors and real-time context.</p><p><b>How customers benefit:</b> Today, intensive time, labor, and money are spent on analyzing large volumes of log data to identify patterns of risk. Cloudflare's ‘out-of-the-box’ risk score simplifies that process, helping organizations gain visibility into and lock down suspicious activity with speed and efficiency.</p>
    <div>
      <h2>How to get started</h2>
      <a href="#how-to-get-started">
        
      </a>
    </div>
    <p>These are just some of the capabilities on our short-term roadmap, and we can’t wait to share more with you as the data protection suite evolves. If you’re ready to explore how Cloudflare One can protect your data, <a href="https://www.cloudflare.com/products/zero-trust/plans/enterprise/">request a workshop</a> with our experts today.</p><p>Or to learn more about how Cloudflare One protects data, read <a href="https://cfl.re/data-protection-press-release">today’s press release</a>, visit our <a href="https://www.cloudflare.com/zero-trust/solutions/data-protection">website</a>, or dive deeper with a <a href="https://cfl.re/data-protection-demo">technical demo</a>.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[DLP]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[CASB]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <guid isPermaLink="false">5UtpTLoZcB9dgL16R3HWNw</guid>
            <dc:creator>Corey Mahan</dc:creator>
            <dc:creator>James Chang</dc:creator>
            <dc:creator>Alex Dunbrack</dc:creator>
            <dc:creator>Noelle Kagan</dc:creator>
        </item>
        <item>
            <title><![CDATA[Scan and secure Atlassian with Cloudflare CASB]]></title>
            <link>https://blog.cloudflare.com/scan-atlassian-casb/</link>
            <pubDate>Tue, 14 Mar 2023 13:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare CASB can now integrate and scan Atlassian products, Confluence and Jira, for critical security issues, like misconfigurations, data exposure, and third-party app risks. Start scanning in just a few clicks! ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4bqsv7cI4zU4QNT0rvzPpD/4bdc86509688d9164ef464d30dce03eb/Secure-Atlassian-with-CASB---Proactively-scan-Jira-and-Confluence-for-misconfig-and-data-leaks.png" />
            
            </figure><p>As part of Security Week, two new integrations are coming to Cloudflare CASB, one for Atlassian Confluence and the other for Atlassian Jira.</p><p>We’re excited to launch support for these two new SaaS applications (in addition to <a href="https://developers.cloudflare.com/cloudflare-one/applications/scan-apps/casb-integrations/">those we already support</a>) given the reliance that we’ve seen organizations from around the world place in them for streamlined, end-to-end project management.</p><p>Let’s dive into what Cloudflare Zero Trust customers can expect from these new integrations.</p>
    <div>
      <h3>CASB: Security for your SaaS apps</h3>
      <a href="#casb-security-for-your-saas-apps">
        
      </a>
    </div>
    <p>First, a quick recap. <a href="https://www.cloudflare.com/learning/access-management/what-is-a-casb/">CASB</a>, or Cloud Access Security Broker, is one of Cloudflare’s newer offerings, released last September to provide security operators - <a href="https://www.cloudflare.com/ciso/">CISOs</a> and security engineers - clear visibility and administrative control over the security of their SaaS apps.</p><p>Whether it’s Google Workspace, Microsoft 365, Slack, Salesforce, Box, GitHub, or Atlassian (<i>whew!</i>), CASB can easily connect and scan these apps for critical security issues, and provide users an exhaustive list of identified problems, organized for triage.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/16BcZ05g2b4YzwqMSK5LaU/343144f5e4abad2609340a3b244e6e0d/CASB_Atlassian_1.png" />
            
            </figure>
    <div>
      <h3>Scan Confluence with Cloudflare CASB</h3>
      <a href="#scan-confluence-with-cloudflare-casb">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3FPOXC7mEDMcwbqTVyad6S/b7e77abfe419e4afe163eaf2832b09d8/CASB_Atlassian_2.png" />
            
            </figure><p>Over time, Atlassian Confluence has become the go-to collaboration platform for teams to create, organize, and share content, such as documents, notes, and meeting minutes. However, from a security perspective, Confluence's flexibility and wide compatibility with third-party applications can pose a security risk if not properly configured and monitored.</p><p>With this new integration, IT and security teams can begin scanning for Atlassian- and Confluence-specific security issues that may be leaving sensitive corporate data at risk. Customers of CASB using Confluence Cloud can expect to identify issues like publicly shared content, unauthorized access, and other vulnerabilities that could be exploited by bad actors.</p><p>By providing this additional layer of SaaS security, Cloudflare CASB can help organizations better protect their sensitive data while still leveraging the collaborative power of Confluence.</p>
    <div>
      <h3>Scan Jira with Cloudflare CASB</h3>
      <a href="#scan-jira-with-cloudflare-casb">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4Gdd8kYQvdsZOceciHtr6a/03a2ab966df4cbba3f3cddd807d26a99/CASB_Atlassian_3.png" />
            
            </figure><p>A mainstay project management tool used to track tasks, issues, and progress on projects, Atlassian Jira has become an essential part of the software development process for teams of all sizes. At the same time, this also means that Jira has become a rich target for those looking to exploit and gain access to sensitive data.</p><p>With Cloudflare CASB, security teams can now easily identify security issues that could leave employees and sensitive business data vulnerable to compromise. Compatible with Jira Cloud accounts, Identified issues can range from flagging user and <a href="https://www.cloudflare.com/products/zero-trust/third-party-access/">third-party app access issues</a>, such as account misuse and users not following best practices, to identification of files that could be potentially overshared and worth deeper investigation.</p><p>By providing security admins with a single view to see security issues across their entire SaaS footprint, now including Jira and Confluence, Cloudflare CASB makes it easier for security teams to stay up-to-date with potential security risks.</p>
    <div>
      <h3>Getting started</h3>
      <a href="#getting-started">
        
      </a>
    </div>
    <p>With the addition of Jira and Confluence to the growing list of CASB integrations, we’re making our products as widely compatible as possible so that organizations can continue placing their trust and confidence in us to help keep them secure.</p><p>Today, Cloudflare CASB supports integrations with Google Workspace, Microsoft 365, Slack, Salesforce, Box, GitHub, Jira, and Confluence, with a growing list of other critical applications on their way, so if there’s one in particular you’d like to see soon, let us know!</p><p>For those not already using Cloudflare Zero Trust, don’t hesitate to get started today - see the platform yourself with 50 free seats by signing up <a href="https://dash.cloudflare.com/sign-up/teams">here</a>, then get in touch with our team <a href="https://www.cloudflare.com/products/zero-trust/plans/enterprise/">here</a> to learn more about how Cloudflare CASB can help your organization lock down its SaaS apps.</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[CASB]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Atlassian]]></category>
            <category><![CDATA[SaaS]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">4QwfEsjjziuPmIBFQqkFWT</guid>
            <dc:creator>Alex Dunbrack</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare's CASB integration with Salesforce and Box]]></title>
            <link>https://blog.cloudflare.com/casb-adds-salesforce-and-box-integrations/</link>
            <pubDate>Thu, 12 Jan 2023 14:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare CASB adds two new SaaS integrations for Salesforce and Box. ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/51lE809bNl9pljZYRATeg5/d88e19cd9eb2943142e80a4a1431fbb0/image2-23.png" />
            
            </figure><p>Today, we’re sharing the release of two new SaaS integrations for Cloudflare CASB - Salesforce and Box - in order to help <a href="https://www.cloudflare.com/cio/">CIOs</a>, IT leaders, and security admins swiftly identify looming security issues present across the exact type of tools housing this business-critical data.</p>
    <div>
      <h3>Recap: What is Cloudflare CASB?</h3>
      <a href="#recap-what-is-cloudflare-casb">
        
      </a>
    </div>
    <p><a href="/casb-ga/">Released in September</a>, Cloudflare’s API CASB has already proven to organizations from around the world that security risks - like insecure settings and inappropriate file sharing - can often exist across the friendly SaaS apps we all know and love, and indeed pose a threat. By giving operators a comprehensive view of the issues plaguing their SaaS environments, Cloudflare CASB has allowed them to effortlessly <a href="https://www.cloudflare.com/learning/access-management/what-is-a-casb/">remediate problems</a> in a timely manner before they can be leveraged against them.</p><p>But as both we and other forward-thinking administrators have come to realize, it’s not always Microsoft 365, Google Workspace, and business chat tools like Slack that contain an organization’s most sensitive information.</p>
    <div>
      <h3>Scan Salesforce with Cloudflare CASB</h3>
      <a href="#scan-salesforce-with-cloudflare-casb">
        
      </a>
    </div>
    <p>The first Software-as-a-Service. Salesforce, the sprawling, intricate, hard-to-contain Customer Relationship Management (CRM) platform, gives workforces a flexible hub from which they can do just as the software describes: manage customer relationships. Whether it be tracking deals and selling opportunities, managing customer conversations, or storing contractual agreements, Salesforce has truly become the ubiquitous solution for organizations looking for a way to manage every customer-facing interaction they have.</p><p>This reliance, however, also makes Salesforce a business data goldmine for bad actors.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7vgTUpghNJ4h0XJkjIUT1e/75b84bd59e6e64b1c5bd08a34f443c29/CASB_Salesforce_Findings.jpg" />
            
            </figure><p>With CASB’s new integration for Salesforce, IT and security operators will be able to quickly connect their environments and scan them for the kind of issues putting their sensitive business data at risk. Spot uploaded files that have been shared publicly with anyone who has the link. Identify default permissions that give employees access to records that should be need-to-know only. You can even see employees who are sending out emails as other Salesforce users!</p><p>Using this new integration, we’re excited to help close the security visibility gap for yet another SaaS app serving as the lifeblood for teams out in the field making business happen.</p>
    <div>
      <h3>Scan Box with Cloudflare CASB</h3>
      <a href="#scan-box-with-cloudflare-casb">
        
      </a>
    </div>
    <p>Box is the leading Content Cloud that enables organizations to accelerate business processes, power workplace collaboration, and protect their most valuable information, all while working with a best-of-breed enterprise IT stack like Cloudflare.</p><p>A platform used to store everything - from contracts and financials to product roadmaps and employee records - Box has given collaborative organizations a single place to convene and share information that, in a growing remote-first world, has no better place to be stored.</p><p>So where are disgruntled employees and people with malicious intent going to look when they want to unveil private business files?</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/CACCaqOTfhtpJvlYrA4S7/fad020b308d04bcdd7f36db93ab01e13/CASB_Box_Findings.jpg" />
            
            </figure><p>With Cloudflare CASB’s new integration for Box, security and IT teams alike can now link their admin accounts and scan them for under-the-radar security issues leaving them prone to compromise and data exfiltration. In addition to Box’s built-in content and collaboration security, Cloudflare CASB gives you another added layer of protection where you can catch files and folders shared publicly or with users outside your organization. By providing security admins with a single view to see employees who aren’t following security policies, we make it harder for bad actors to get inside and do damage.</p><p>With Cloudflare’s status as an official <a href="https://www.box.com/integrations/boxtrustpartnerprogram">Box Technology Partner</a>, we’re looking forward to offering both Cloudflare and Box users a robust, yet easy-to-use toolset that can help stop pressing, real-world data security incidents right in their tracks.</p><blockquote><p><i>“Organizations today need products that are inherently secure to support employees working from anywhere,”</i> said <b>Areg Alimian</b>, Head of Security Products at Box. <i>“At Box, we continuously strive to improve our integrations with third-party apps so that it’s easier than ever for customers to use Box alongside best-in-class solutions. With today’s integration with Cloudflare CASB, we enable our joint customers to have a single pane of glass view allowing them to consistently enforce security policies and protect leakage of sensitive information across all their apps.”</i></p></blockquote>
    <div>
      <h3>Taking action on your business data security</h3>
      <a href="#taking-action-on-your-business-data-security">
        
      </a>
    </div>
    <p>Salesforce and Box are certainly not the only SaaS applications managing this type of sensitive organizational data. At Cloudflare, we strive to make our products as widely compatible as possible so that organizations can continue to place their trust and confidence in us to help keep them secure.</p><p>Today, Cloudflare CASB supports integrations with Google Workspace, Microsoft 365, Slack, GitHub, Salesforce, and Box, with a growing list of other critical applications on their way, so if there’s one in particular you’d like to see soon, <a href="https://docs.google.com/forms/d/e/1FAIpQLSfRlXT3ux2yDaFcCQO4orj1uQZjZyGqLr7vWH2odwUZtwPcpg/viewform">let us know</a>!</p><p>For those not already using Cloudflare Zero Trust, don’t hesitate to get started today - see the platform yourself with 50 free seats by signing up <a href="https://dash.cloudflare.com/sign-up/teams">here</a>, then get in touch with our team <a href="https://www.cloudflare.com/products/zero-trust/">here</a> to learn more about how Cloudflare CASB can help your organization lock down its SaaS apps.</p> ]]></content:encoded>
            <category><![CDATA[CIO Week]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[CASB]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[SaaS]]></category>
            <guid isPermaLink="false">r0pkkKPl4CdJgLGGQAMHr</guid>
            <dc:creator>Alex Dunbrack</dc:creator>
        </item>
        <item>
            <title><![CDATA[How Cloudflare CASB and DLP work together to protect your data]]></title>
            <link>https://blog.cloudflare.com/casb-dlp/</link>
            <pubDate>Wed, 11 Jan 2023 13:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare CASB and DLP will work together to protect sensitive data at rest. ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5Wqq52bJYYraL6kGegsWIc/d2b89355122ed7b0055bf5de4cc4847b/image4-12.png" />
            
            </figure><p>Cloudflare’s Cloud Access Security Broker (CASB) <a href="https://www.cloudflare.com/learning/access-management/what-is-a-casb/">scans SaaS applications</a> for misconfigurations, unauthorized user activity, shadow IT, and other data security issues. Discovered security threats are called out to IT and security administrators for timely remediation, removing the burden of endless manual checks on a long list of applications.</p><p>But Cloudflare customers revealed they want more information available to assess the risk associated with a misconfiguration. A publicly exposed intramural kickball schedule is not nearly as critical as a publicly exposed customer list, so customers want them treated differently. They asked us to identify where sensitive data is exposed, reducing their assessment and remediation time in the case of leakages and incidents. With that feedback, we recognized another opportunity to do what Cloudflare does best: combine the best parts of our products to solve customer problems.</p><p>What’s underway now is an exciting effort to provide <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> users a way to get the same DLP coverage for more than just sensitive data going over the network: SaaS DLP for data stored in popular SaaS apps used by millions of organizations.</p><p>With these upcoming capabilities, customers will be able to connect their SaaS applications in just a few clicks and scan them for sensitive data - such as PII, PCI, and even custom regex - stored in documents, spreadsheets, PDFs, and other uploaded files. This gives customers the signals to quickly assess and remediate major security risks.</p>
    <div>
      <h3>Understanding CASB</h3>
      <a href="#understanding-casb">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5vES53c15VUuvf2jGa0tGh/7ac679bf0220f2b6ee3076ddf34fc4a5/image2.jpg" />
            
            </figure><p>Released in September, Cloudflare’s API CASB has already enabled organizations to quickly and painlessly deep-dive into the security of their SaaS applications, whether it be Google Workspace, Microsoft 365, or any of the other SaaS apps we support (including Salesforce and Box released today). With CASB, operators have been able to understand what SaaS security issues could be putting their organization and employees at risk, like insecure settings and misconfigurations, files shared inappropriately, user access risks and best practices not being followed.</p><p>“But what about the sensitive data stored <i>inside</i> the files we’re collaborating on? How can we identify that?”</p>
    <div>
      <h3>Understanding DLP</h3>
      <a href="#understanding-dlp">
        
      </a>
    </div>
    <p>Also released in September, Cloudflare DLP for data in-transit has provided users of Gateway, Cloudflare’s <a href="https://www.cloudflare.com/learning/access-management/what-is-a-secure-web-gateway/">Secure Web Gateway (SWG)</a>, a way to manage and outright block the movement of sensitive information into and out of the corporate network, preventing it from landing in the wrong hands. In this case, DLP can spot sensitive strings, like credit card and social security numbers, as employees attempt to communicate them in one form or another, like uploading them in a document to Google Drive or sent in a message on Slack. Cloudflare DLP blocks the HTTP request before it reaches the intended application.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6Tioay2oFOuQnRla7yv3Ty/94d810dcd8faa75059ca4a73f445bcc9/image3-14.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1qDIi5N0R3koBNDcpbQQBg/f7e21759ba2778d1d9b2a87fbd125978/image1-25.png" />
            
            </figure><p>But once again we received the same questions and feedback as before.</p><p>“What about data in our SaaS apps? The information stored there won’t be visible over the network.”</p>
    <div>
      <h3>CASB + DLP, Better Together</h3>
      <a href="#casb-dlp-better-together">
        
      </a>
    </div>
    <p>Coming in early 2023, Cloudflare Zero Trust will introduce a new product synergy that allows customers to peer into the files stored in their SaaS applications and identify any particularly sensitive data inside them.</p><p>Credit card numbers in a Google Doc? No problem. Social security numbers in an Excel spreadsheet? CASB will let you know.</p><p>With this product collaboration, Cloudflare will provide IT and security administrators one more critical area of security coverage, rounding out our data loss prevention story. Between DLP for data in-transit, CASB for file sharing monitoring, and even <a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">Remote Browser Isolation (RBI)</a> and Area 1 for data in-use DLP and email DLP, respectively, organizations can take comfort in knowing that their bases are covered when it comes to <a href="https://www.cloudflare.com/learning/security/what-is-data-exfiltration/">data exfiltration</a> and misuse.</p><p>While development continues, we’d love to hear how this kind of functionality could be used at an organization like yours. Interested in learning more about either of these products or what’s coming next? Reach out to your account manager or <a href="https://www.cloudflare.com/lp/cio-week-2023-cloudflare-one-contact-us/">click here to get in touch</a> if you’re not already using Cloudflare.</p> ]]></content:encoded>
            <category><![CDATA[CIO Week]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[CASB]]></category>
            <category><![CDATA[DLP]]></category>
            <guid isPermaLink="false">6uJb9raFodA5Si2waedXl8</guid>
            <dc:creator>Alex Dunbrack</dc:creator>
            <dc:creator>Noelle Kagan</dc:creator>
        </item>
        <item>
            <title><![CDATA[Gateway + CASB: alphabetti spaghetti that spells better SaaS security]]></title>
            <link>https://blog.cloudflare.com/gateway-casb-in-action/</link>
            <pubDate>Fri, 30 Sep 2022 13:02:00 GMT</pubDate>
            <description><![CDATA[ Now that Cloudflare CASB is Generally Available, let’s take a look at how users have been leveraging other Cloudflare Zero Trust products with CASB, starting with Gateway ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Back in June 2022, we <a href="/announcing-gateway-and-casb/">announced</a> an upcoming feature that would allow for Cloudflare Zero Trust users to easily create prefilled HTTP policies in <a href="https://www.cloudflare.com/products/zero-trust/gateway/">Cloudflare Gateway</a> (Cloudflare’s Secure Web Gateway solution) via issues identified by CASB, a <a href="/casb-ga/">new Cloudflare product</a> that connects, scans, and monitors your SaaS apps - like Google Workspace and Microsoft 365 - for security issues.</p><p>With Cloudflare’s 12th Birthday Week nearing its end, we wanted to highlight, in true Cloudflare fashion, this new feature in action.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3mSpcUDLz1bZgXJbt1nTfR/e04400bed656f582031080e1433eeda7/image2-65.png" />
            
            </figure>
    <div>
      <h3>What is CASB? What is Gateway?</h3>
      <a href="#what-is-casb-what-is-gateway">
        
      </a>
    </div>
    <p>To quickly recap, Cloudflare’s API-driven <a href="https://www.cloudflare.com/learning/access-management/what-is-a-casb/">CASB</a> offers IT and security teams a fast, yet effective way to connect, scan, and monitor their SaaS apps for security issues, like file exposures, misconfigurations, and Shadow IT. In just a few clicks, users can see an exhaustive list of security issues that may be affecting the security of their SaaS apps, including Google Workspace, Microsoft 365, Slack, and GitHub.</p><p>Cloudflare Gateway, our <a href="https://www.cloudflare.com/learning/access-management/what-is-a-secure-web-gateway/">Secure Web Gateway (SWG)</a> offering, allows teams to monitor and control the outbound connections originating from endpoint devices. For example, don’t want your employees to access gambling and social media websites on company devices? Just block access to them in our easy-to-use <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> dashboard.</p>
    <div>
      <h3>The problems at hand</h3>
      <a href="#the-problems-at-hand">
        
      </a>
    </div>
    <p>As we highlighted in our first post, Shadow IT - or unapproved third-party applications being used by employees - continues to be one of the biggest pain points for IT administrators in the cloud era. When employees grant access to external services without the consent of their IT or security department, they risk granting bad actors access to some of the company’s most sensitive data stored in these SaaS applications.</p><p>Another major issue affecting the security of data stored in the cloud is file exposure in the form of oversharing. When an employee shares a highly sensitive Google Doc to someone via a public link, would your IT or security team know about it? And even if they do, do they have a way to minimize the risk and block access to it?</p><p>With these two products now being used by customers around the world, we’re excited to share how visibility and basic awareness of SaaS security issues doesn’t have to be the end of it. What are admins supposed to do next?</p>
    <div>
      <h3>Gateway + CASB: blocking identified threats in three (yes, three) clicks</h3>
      <a href="#gateway-casb-blocking-identified-threats-in-three-yes-three-clicks">
        
      </a>
    </div>
    <p>Now, when CASB discovers a problem (which we call a <i>Finding</i>), it’s now possible to easily create a corresponding Gateway policy in as few as three clicks.</p><p>This means users can now automatically generate fine-grained Gateway policies to prevent specific inappropriate behavior from continuing, while still allowing for expected access and usage that meets company policy.</p>
    <div>
      <h3>Example 1: Block employees from uploading to their personal Google Drive</h3>
      <a href="#example-1-block-employees-from-uploading-to-their-personal-google-drive">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2TBhfuLYq8CDoKSh96WedR/80b80b4b13d281adc149dbce061b2759/image3-49.png" />
            
            </figure><p>A common use case we heard during CASB’s beta program was the tendency for employees to upload corporate data - documents, spreadsheets, files, folders,  etc. - to their personal Google Drive (or similar) accounts, presenting the risk of intellectual property making its way out of a secure corporate environment. With Gateway and CASB working together, IT administrators can now directly <a href="https://developers.cloudflare.com/cloudflare-one/policies/filtering/http-policies/tenant-control/">block upload activity</a> from anywhere other than their corporate tenant of Google Drive or Microsoft OneDrive.</p>
    <div>
      <h3>Example 2: Restrict repeat oversharers from uploading and downloading files</h3>
      <a href="#example-2-restrict-repeat-oversharers-from-uploading-and-downloading-files">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/17jgB11afm3st3RD6lncrp/42492a4ff1466915e6a12f1677630f91/image1-80.png" />
            
            </figure><p>A great existing use case of Cloudflare CASB has been the ability to identify employees that are habitual oversharers of files in their corporate Google or Microsoft tenants - sharing files to anyone that has the link, sharing files with emails outside their company, etc.</p><p>Now when these employees are identified, CASB admins can create Gateway policies to block specific users from further upload and download activity until the behavior has been addressed.</p>
    <div>
      <h3>Example 3: Prevent file uploads to unapproved, Shadow IT applications</h3>
      <a href="#example-3-prevent-file-uploads-to-unapproved-shadow-it-applications">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7HWqMKv1qTuHvEh45HwSX/92e3016aaa54185167ee6e8051d77e2c/image4-27.png" />
            
            </figure><p>To address the concern of Shadow IT, CASB-originating Gateway policies can be customized, including being able to restrict upload and download events to only the SaaS applications your organization uses. Let’s say your company uses Box as its file storage solution; in just a few clicks, you can use an identified CASB Finding to create a Gateway policy that blocks activity to any file sharing application other than Box. This gives IT and security admins the peace of mind that their files will only end up in the approved cloud application they use.</p>
    <div>
      <h3>Get started today with the Cloudflare Zero Trust</h3>
      <a href="#get-started-today-with-the-cloudflare-zero-trust">
        
      </a>
    </div>
    <p>Ultimately, the power of Cloudflare Zero Trust comes from its existence as a single, unified platform that draws strength from its combination of products and features. As we continue our work towards bringing these new and exciting offerings to market, we believe that it’s just as important to highlight their synergies and associated use cases, this time from Cloudflare Gateway and CASB.</p><p>For those not already using Cloudflare Zero Trust, don’t hesitate to get started today - see the platform yourself with 50 free seats by <a href="https://dash.cloudflare.com/sign-up">signing up here</a>.</p><p>For those who already know and love Cloudflare Zero Trust, reach out to your Cloudflare sales contact to get started with CASB and Gateway. We can’t wait to hear what interesting and exciting use cases you discover from this new cross-product functionality.</p> ]]></content:encoded>
            <category><![CDATA[Birthday Week]]></category>
            <category><![CDATA[CASB]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Connectivity Cloud]]></category>
            <guid isPermaLink="false">FZuN3uIXuOg76s1qTyfZy</guid>
            <dc:creator>Alex Dunbrack</dc:creator>
        </item>
        <item>
            <title><![CDATA[Detect security issues in your SaaS apps with Cloudflare CASB]]></title>
            <link>https://blog.cloudflare.com/casb-ga/</link>
            <pubDate>Tue, 20 Sep 2022 13:00:00 GMT</pubDate>
            <description><![CDATA[ Connect and scan your third-party SaaS apps for file leaks, misconfigurations, and Shadow IT, all in just a few clicks. Cloudflare CASB now Generally Available ]]></description>
            <content:encoded><![CDATA[ <p></p><p>It’s GA Week here at Cloudflare, meaning some of our latest and greatest endeavors are here and ready to be put in the hands of Cloudflare customers around the world. One of those releases is Cloudflare’s API-driven Cloud Access Security Broker, or <a href="https://www.cloudflare.com/learning/access-management/what-is-a-casb/">CASB</a>, one of the newest additions to our <a href="https://www.cloudflare.com/products/zero-trust/">Zero Trust platform</a>.</p><p>Starting today, IT and security administrators can begin using <a href="https://www.cloudflare.com/products/zero-trust/casb/">Cloudflare CASB</a> to connect, scan, and <a href="https://www.cloudflare.com/application-services/solutions/app-performance-monitoring/">monitor their third-party SaaS applications</a> for a wide variety of security issues - all in just a few clicks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1vuJA1D61molQYhcWYK9G8/8ed6449cf3e58493f203363791ecf4ff/image2-13.png" />
            
            </figure><p>Whether it’s auditing Google Drive for data exposure and file oversharing, checking Microsoft 365 for misconfigurations and insecure settings, or reviewing <a href="https://www.cloudflare.com/products/zero-trust/third-party-access/">third-party access</a> for Shadow IT, CASB is now here to help organizations establish a direct line of sight into their SaaS app security and DLP posture.</p>
    <div>
      <h3>The problem</h3>
      <a href="#the-problem">
        
      </a>
    </div>
    <p>Try to think of a business or organization that uses fewer than 10 SaaS applications. Hard, isn’t it?</p><p>It’s 2022, and by now, most of us have noticed the trend of mass SaaS adoption balloon over recent years, with some organizations utilizing hundreds of third-party services across a slew of internal functions. Google Workspace and Microsoft 365 for business collaboration. Slack and Teams for communication. Salesforce for customer management, GitHub for version control… the list goes on and on and on.</p><p>And while the average employee might see these products as simply tools used in their day-to-day work, the reality is much starker than that. Inside these services lie some of an organization’s most precious, sensitive, business-critical data - something IT and security teams don’t take lightly and strive to protect at all costs.</p><p>But there hasn’t been a great way for these teams to ensure their data and the applications that contain it are kept secure. Go user by user, file by file, SaaS app by SaaS app and review everything for what could be potentially problematic? For most organizations, that’s just simply not realistic.</p><p>So, doing what Cloudflare does best, how are we helping our users get a grip on this wave of growing security risk in an intuitive and manageable way?</p>
    <div>
      <h3>The solution</h3>
      <a href="#the-solution">
        
      </a>
    </div>
    <p>Connect your most critical SaaS applications in just minutes and clicks</p><p>It all starts with a simple integration process, connecting your favorite SaaS applications to Cloudflare CASB in just a few clicks. Once connected, you’ll instantly begin to see <i>Findings</i> - or identified security issues - appear on your CASB home page.</p><p>CASB utilizes each vendor’s API to scan and identify a range of application-specific security issues that span several domains of information security, including misconfigurations and insecure settings, file sharing security, Shadow IT, best practices not being followed, and more.</p><p>Today CASB supports integrations with Google Workspace, Microsoft 365, Slack, and GitHub, with a growing list of other critical applications not far behind. Have a SaaS app you want to see next? <a href="https://forms.gle/zN6W8K3ys3RyaQu86">Let us know</a>!</p><p>See how all your files have been shared</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3jz5NNEO31yqGuxl19ljUs/5d0fb722502b4217f300f5564be9962f/image3-9.png" />
            
            </figure><p>One of the easiest ways for employees to accidentally expose internal information is usually with just the flick of a switch - changing a sharing setting to <i>Share this file to anyone with the link</i>.</p><p>Cloudflare CASB provides users an exhaustive list of files that have questionable, often insecure, sharing settings, giving them a fast and reliable way to address low-hanging fruit exposures and get ahead of data protection incidents.</p><p>Identify insecure settings and bad practices</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4AweM5BmHVJZlqqnbL46Tl/fad098bee4fcf7c616acd16e39afb7bf/image5-4.png" />
            
            </figure><p>How we configure our SaaS apps dictates how they keep our data secure. Would you know if that one important GitHub repository had its visibility changed from Private to Public overnight? And why does one of our IT admins not have 2FA enabled on their account?</p><p>With Cloudflare CASB, users can now see those issues in just a few clicks and prioritize misconfigurations that might not expose just one file, but the entirety of them across your organization’s SaaS footprint.</p><p>Discover third-party apps with shadowy permissions</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/74DjxhmE1iGNgchSmmcepx/a8f04a52baea4e3f6fe7a1f343fcccc5/image4-5.png" />
            
            </figure><p>With the advent of frictionless product signups comes the rise of third-party applications that have breezed past approval processes and internal security reviews to lay claim to data and other sensitive resources. You guessed it, we’re talking about Shadow IT.</p><p>Cloudflare CASB adds a layer of access visibility beyond what traditional network-based Shadow IT discovery tools (like <a href="https://www.cloudflare.com/products/zero-trust/gateway/">Cloudflare Gateway</a>) can accomplish on their own, providing a detailed list of access that’s been granted to third-party services via those easy <i>Sign in with Google</i> buttons.</p>
    <div>
      <h3>So, why does this matter in the context of Zero Trust?</h3>
      <a href="#so-why-does-this-matter-in-the-context-of-zero-trust">
        
      </a>
    </div>
    <p>While we’re here to talk about CASB, it would be remiss if we didn’t acknowledge how CASB is only one piece of the puzzle in the wider context of Zero Trust.</p><p><a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> is all about broad security coverage and simple interconnectivity with how employees access, navigate, and leverage the complex systems and services needed to operate every day. Where <a href="https://www.cloudflare.com/products/zero-trust/access/">Cloudflare Access</a> and Gateway have provided users with <a href="https://www.cloudflare.com/learning/access-management/what-is-access-control/">granular access control</a> and visibility into how employees traverse systems, and where <a href="https://www.cloudflare.com/products/zero-trust/browser-isolation/">Browser Isolation</a> and our new <a href="https://www.cloudflare.com/products/zero-trust/dlp/">in-line DLP</a> offering protect users from malicious sites and limit sensitive data flying over the wire, CASB adds coverage for one of enterprise security’s final frontiers: visibility into data at-rest, who/what has access to it, and the practices that make it easier or harder for someone to access it inappropriately.</p>
    <div>
      <h3>How to get started</h3>
      <a href="#how-to-get-started">
        
      </a>
    </div>
    <p>As we’ve found through CASB’s beta program over the last few months, SaaS sprawl and misuse compounds with time - we’ve already identified more than five million potential security issues across beta users, with some organizations seeing several thousand files flagged as needing a sharing setting review.</p><p>So don’t hesitate to get started on your SaaS app wrangling and cleanup journey; it’s easier than you might think.</p><p>To get started, create a <a href="https://dash.cloudflare.com/sign-up/teams">free Zero Trust account</a> to try it out with 50 free seats, and then get in touch with our team <a href="https://www.cloudflare.com/products/zero-trust/casb/">here</a> to learn more about how Cloudflare CASB can help at your organization. We can’t wait to hear what you think.</p>
    <div>
      <h3>Watch on Cloudflare TV</h3>
      <a href="#watch-on-cloudflare-tv">
        
      </a>
    </div>
    <div></div><p></p> ]]></content:encoded>
            <category><![CDATA[GA Week]]></category>
            <category><![CDATA[General Availability]]></category>
            <category><![CDATA[CASB]]></category>
            <category><![CDATA[SaaS]]></category>
            <guid isPermaLink="false">s7VV7AIcGZnpvE4jjwlCs</guid>
            <dc:creator>Alex Dunbrack</dc:creator>
        </item>
    </channel>
</rss>