
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Fri, 03 Apr 2026 17:09:30 GMT</lastBuildDate>
        <item>
            <title><![CDATA[Introducing Custom Regions for precision data control]]></title>
            <link>https://blog.cloudflare.com/custom-regions/</link>
            <pubDate>Wed, 18 Mar 2026 13:00:00 GMT</pubDate>
            <description><![CDATA[ We are expanding Regional Services with new pre-defined regions and the launch of Custom Regions. Customers can now define precise geographical boundaries for data processing, tailored to meet their compliance and performance needs. ]]></description>
            <content:encoded><![CDATA[ <p>A key part of our mission to help build a better Internet is giving our customers the tools they need to operate securely and efficiently, no matter their compliance requirements. Our Regional Services product helps customers do just that, allowing them to meet data sovereignty legal obligations using the power of Cloudflare’s global network.</p><p>Today, we're taking two major steps forward: First, we’re expanding the pre-defined regions for Regional Services to include Turkey, the United Arab Emirates (UAE), IRAP (Australian compliance) and ISMAP (Japanese compliance). Second, we’re introducing the next evolution of our platform: Custom Regions.</p>
    <div>
      <h2>Global security, local compliance: the Regional Services advantage</h2>
      <a href="#global-security-local-compliance-the-regional-services-advantage">
        
      </a>
    </div>
    <p>Before we dive into what’s new, let’s revisit how <a href="https://developers.cloudflare.com/data-localization/regional-services/"><u>Regional Services</u></a> provides the best of both worlds: local compliance and global-scale security. Our approach is fundamentally different from many sovereign cloud providers. Instead of isolating your traffic to a single geography (and a smaller capacity for attack mitigation), we leverage the full scale of our global network for protection and only inspect your data where you tell us to.</p><p>Here’s an overview of how it works:</p><ol><li><p><b>Global ingestion &amp; L3/L4 DDoS defense:</b> Traffic is ingested at the closest Cloudflare data center, wherever in the world that may be. At this initial entry point, we apply our massive-scale DDoS mitigation to block volumetric attacks at the network and transport layers. This happens outside your designated region, ensuring only clean traffic is forwarded.</p></li><li><p><b>Intelligent in-region routing:</b> Before any decryption occurs, we inspect the request's metadata. If it has arrived at a data center outside your specified region, we route it across our secure, private backbone to a data center within your boundaries, using the most performant pathway.</p></li><li><p><b>In-region TLS termination &amp; L7 processing:</b> Only once the traffic is confirmed to be within your chosen region do we decrypt the request. It is only then that we apply our application-layer security services, like our Web Application Firewall (WAF) or Bot Management, and execute any Cloudflare Workers logic.</p></li><li><p><b>Secure transit to origin:</b> Once processed, the request is re-encrypted and securely sent to your origin server.</p></li></ol><p>This unique architecture means you can localize data inspection as needed to meet your legal obligations without sacrificing the robust DDoS protection that only a massive global network can provide.</p>
    <div>
      <h2>New options available within Cloudflare Managed Regions</h2>
      <a href="#new-options-available-within-cloudflare-managed-regions">
        
      </a>
    </div>
    <p>When we launched Regional Services in 2020, we started with just three regions: EU, UK, and U.S. Over time we have added regions that are shared across all accounts — we refer to these as Cloudflare Managed Regions.</p><p>A few more are newly available: Turkey, the United Arab Emirates (UAE), and IRAP (Australian compliance), bringing our total to <a href="https://developers.cloudflare.com/data-localization/region-support/"><u>35 regions</u></a>.</p><p>In addition, we are now giving our customers the ability to request a custom region that meets their account needs. These are Custom Regions, launching today.</p>
    <div>
      <h2>Beyond pre-defined boundaries: introducing Custom Regions</h2>
      <a href="#beyond-pre-defined-boundaries-introducing-custom-regions">
        
      </a>
    </div>
    <p>While our 35 pre-defined regions serve many of our customers’ needs, the digital world isn't one-size-fits-all. We've heard you loud and clear: you've asked for a specific country, unique combinations of countries, and the ability to exclude a set of countries from a region.</p><p>That's why we're excited to announce the next evolution of Regional Services: Custom Regions.</p><p>Simply put, Custom Regions give you the power to define your own geographical boundaries for traffic processing. Instead of choosing from a list of regions defined by us, you tell us precisely which locations constitute your region.</p><p>This flexibility unlocks a new level of control. Our early-access customers have already used Custom Regions to:</p><ul><li><p><b>Regionalize AI inference:</b> Keep LLM prompts and responses within a specific set of countries to optimize for performance and data localization legal obligations.</p></li><li><p><b>Launch hyper-targeted promotions:</b> Serve marketing campaigns and content that are optimized for a unique combination of countries.</p></li><li><p><b>Scale government operations:</b> Build regions that align with contractual commitments with government entities.</p></li><li><p><b>Mirror your corporate structure:</b> Build regions that match your internal business units, like EMEA, MENA, or APAC, for perfectly aligned governance.</p></li></ul><p>The core mechanism is the same; the only thing that changes is the boundary. Instead of Cloudflare defining the region, you do.</p><p>The possibilities are endless. For example, your region could be:</p><ul><li><p><b>North America:</b> Canada, United States, Mexico</p></li><li><p><b>Everywhere except North America:</b> Not Canada, not United States, not Mexico</p></li><li><p><b>Countries that use Fahrenheit:</b> USA, Bahamas, Cayman Islands, Marshall Islands, Liberia</p></li></ul>
    <div>
      <h3>How Regional Services works</h3>
      <a href="#how-regional-services-works">
        
      </a>
    </div>
    <p>At the core of Regional Services is enforcement of a simple rule: TLS termination and Layer 7 processing only happen inside your chosen region. Custom Regions expands this capability by allowing you to choose your own region definitions.</p><p>Cloudflare Managed Regions and Custom Regions rely on three building blocks: defining region membership, selecting an in-region destination, and enforcing the boundary at the edge.</p>
    <div>
      <h4>Defining region membership</h4>
      <a href="#defining-region-membership">
        
      </a>
    </div>
    <p>A region is ultimately a set of Cloudflare data centers.</p><ul><li><p><b>Cloudflare managed regions</b> use a pre-defined membership set.</p></li><li><p><b>Custom Regions</b> define membership with an expression. The most common field is <code>country_code</code>: the ISO code where each data center is located:</p></li></ul><table><tr><td><p><b>Use case</b></p></td><td><p><b>Expression</b></p></td><td><p><b>Definition</b></p></td></tr><tr><td><p>Single country</p></td><td><p><code>country_code == "TR"</code></p></td><td><p>Turkey</p></td></tr><tr><td><p>Multiple countries</p></td><td><p><code>country_code in ["DE", "FR", "NL"]</code></p></td><td><p>Germany, France, and the Netherlands</p></td></tr><tr><td><p>Exclude countries</p></td><td><p><code>!(country_code in ["US", "CA", "MX"])</code></p></td><td><p>Everything except the U.S., Canada, and Mexico</p></td></tr></table><p>That expression is evaluated against data centers' metadata. Matches become your region's membership set and are distributed globally, so every data center can quickly answer: "Am I in this region?"</p><p>As Cloudflare's infrastructure evolves, membership updates, so new matching data centers can join automatically. You do not need to worry about when data centers are added or removed from the definition; Cloudflare takes care of that for you. </p>
    <div>
      <h4>Calculating optimal in-region routing</h4>
      <a href="#calculating-optimal-in-region-routing">
        
      </a>
    </div>
    <p>If a request enters Cloudflare outside your region, the next step is choosing the best in-region destination for that ingress location.</p><p>Cloudflare's selection is a two-step process:</p><ol><li><p><b>Allowed destinations:</b> the region's membership set (which data centers are in-region)</p></li><li><p><b>Best destination for this ingress:</b> a performance-ranked list tailored to the data center where the request entered our network</p></li></ol><p>These per-ingress rankings are computed centrally and distributed to the edge via <a href="https://blog.cloudflare.com/quicksilver-v2-evolution-of-a-globally-distributed-key-value-store-part-2-of-2/"><u>Quicksilver</u></a>. They are built from measured path quality across our network (not just physical distance), using signals like:</p><ul><li><p><b>Network performance:</b> Latency and reliability indicators (for example, loss and timeouts)</p></li><li><p><b>Capacity and load:</b> Available resources and current utilization</p></li><li><p><b>Operational status:</b> Health and availability</p></li></ul><p>At routing time, we intersect the ranked list with the region membership set and choose from the top candidates. The final choice is validated against live availability: destinations that are disabled or otherwise unreachable are skipped, so traffic can fail over to the next best in-region option.</p>
    <div>
      <h4>Enforcing the boundary</h4>
      <a href="#enforcing-the-boundary">
        
      </a>
    </div>
    <p>This is the process when a request arrives at Cloudflare:</p><ol><li><p><b>Ingress.</b> The request lands at the nearest data center. Layer 3/4 DDoS mitigation is applied immediately.</p></li><li><p><b>Configuration lookup.</b> Is a region configured for this zone?</p></li><li><p><b>Membership check.</b> Is this data center in the configured region?</p></li><li><p><b>Routing decision.</b></p><ul><li><p><b>In region:</b> Process locally. TLS termination and all Layer 7 services run here.</p></li><li><p><b>Out of region:</b> An in-region data center is selected, and the request is forwarded over Cloudflare's private backbone.</p></li></ul></li><li><p><b>In-region processing.</b> TLS is terminated for the first time. Layer 7 services run here.</p></li><li><p><b>Origin connection.</b> The processed request is sent to your origin.</p></li></ol><p>As noted above, Cloudflare does not decrypt the request outside your defined region. Instead, we forward it to the closest data center inside your region, where decryption and Layer 7 services occur. </p>
    <div>
      <h4>How we handle errors</h4>
      <a href="#how-we-handle-errors">
        
      </a>
    </div>
    <p>Resilience is built in at multiple layers:</p><ul><li><p><b>Multiple candidates:</b> Routing considers multiple in-region options and selects an available destination in real time.</p></li><li><p><b>Health-aware routing:</b> Unhealthy or disabled data centers are excluded.</p></li><li><p><b>Data quality gates:</b> Fresh routing inputs are only published when sufficient monitoring data is available. </p></li><li><p><b>Fail-close design:</b> If no valid in-region destination exists, the connection fails rather than processing outside your region.</p></li></ul>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5DSicSTe5WOXe9qZEmNO1R/be26bd032aa0bbae052b1a1cede23161/image1.png" />
          </figure>
    <div>
      <h3>How to get started</h3>
      <a href="#how-to-get-started">
        
      </a>
    </div>
    <p>The new Cloudflare managed regions are available now for customers using Regional Services. If you would like to use these, just follow the standard process to enable it via the Cloudflare Dashboard or via the Cloudflare API. Custom Regions are new and follow a different process.</p><p>To ensure a perfect fit for your needs, the initial setup for Custom Regions is a collaborative process. To get started, simply reach out to your account team. They will work with you to define your region and get it deployed. While the service is not yet self-serve, we are continuously developing the technology and will revisit this as the feature matures. Please note that some technical limitations may apply, and your solutions engineer is the perfect person to discuss the details with.</p>
    <div>
      <h3>Interested in taking control of your data?</h3>
      <a href="#interested-in-taking-control-of-your-data">
        
      </a>
    </div>
    <p>If you are interested in learning more about Regional Services, please contact your account team. If you’re not yet a Cloudflare customer, we would love to have you. <a href="https://www.cloudflare.com/plans/enterprise/discover/contact/"><u>Fill out this form</u></a>, and we’ll be in touch with you soon.</p> ]]></content:encoded>
            <category><![CDATA[Regional Services]]></category>
            <category><![CDATA[Data Localization Suite]]></category>
            <category><![CDATA[Data Sovereignty]]></category>
            <guid isPermaLink="false">7zfn4cHE2C5bgEo1cWSL4u</guid>
            <dc:creator>Andrew Berglund</dc:creator>
            <dc:creator>Erik Engstrom</dc:creator>
        </item>
        <item>
            <title><![CDATA[One-click ISO 27001 certified deployment of Regional Services in the EU]]></title>
            <link>https://blog.cloudflare.com/one-click-iso-27001-deployment/</link>
            <pubDate>Sat, 18 Mar 2023 15:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare announces one-click ISO certified region, a super easy way for customers to limit where traffic is serviced to ISO 27001 certified data centers inside the European Union ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6aVTJdGy7JkjPxS0Z827zC/93d84cd6fc8321a8ecdb60b48f476041/Regional-Services-one-click-limit-traffic-to-ISO-27001-certified-colos-only.png" />
            
            </figure><p>Today, we’re very happy to announce the general availability of a new region for Regional Services that allows you to limit your traffic to only <a href="https://www.iso.org/isoiec-27001-information-security.html">ISO 27001</a> certified data centers inside the EU. This helps customers that have very strict requirements surrounding which data centers are allowed to decrypt and service traffic. Enabling this feature is a one-click operation right on the Cloudflare dashboard.</p>
    <div>
      <h3>Regional Services - a recap</h3>
      <a href="#regional-services-a-recap">
        
      </a>
    </div>
    <p>In 2020, we saw an increase in prospects asking about data localization. Specifically, increased regulatory pressure limited them from using vendors that operated at global scale. We launched <a href="/introducing-regional-services/">Regional Services</a>, a new way for customers to use the Cloudflare network. With Regional Services, we put customers back in control over which data centers are used to service traffic. Regional Services operates by limiting exactly which data centers are used to decrypt and service HTTPS traffic. For example, a customer may want to use only data centers inside the European Union to service traffic. Regional Services operates by leveraging our global network for DDoS protection but only decrypting traffic and applying Layer 7 products inside data centers that are located inside the European Union.</p><p>We later followed up with the <a href="https://www.cloudflare.com/data-localization/">Data Localization Suite</a> and additional regions: <a href="/regional-services-comes-to-apac/">India, Japan, and Australia</a>.</p><p>With Regional Services, customers get the best of both worlds: we empower them to use our global network for volumetric DDoS protection whilst limiting where traffic is serviced. We do that by accepting the raw TCP connection at the closest data center but forwarding it on to a data center in-region for decryption. That means that only machines of the customer’s choosing actually see the raw HTTP request, which could contain sensitive data such as a customer’s bank account or medical information.</p>
    <div>
      <h3>A new region and a new UI</h3>
      <a href="#a-new-region-and-a-new-ui">
        
      </a>
    </div>
    <p>Traditionally we’ve seen requests for data localization largely center around countries or geographic areas. Many types of regulations require companies to make promises about working only with vendors that are capable of restricting where their traffic is serviced geographically. Organizations can have many reasons for being limited in their choices, but they generally fall into two buckets: compliance and contractual commitments.</p><p>More recently, we are seeing that more and more companies are asking about security requirements. An often asked question about security in IT is: how do you ensure that something is safe? For instance, for a data center you might be wondering how physical access is managed. Or how often security policies are reviewed and updated. This is where certifications come in. A common certification in IT is the <a href="https://en.wikipedia.org/wiki/ISO/IEC_27001">ISO 27001 certification</a>:</p><p>Per the <a href="https://www.iso.org/isoiec-27001-information-security.html">ISO.org</a>:</p><blockquote><p><i>“ISO/IEC 27001 is the world’s best-known standard for information security management systems (ISMS) and their requirements. Additional best practice in data protection and cyber resilience are covered by more than a dozen standards in the ISO/IEC 27000 family. Together, they enable organizations of all sectors and sizes to manage the security of assets such as financial information, intellectual property, employee data and information entrusted by third parties.”</i></p></blockquote><p>In short, ISO 27001 is a certification that a data center can achieve that ensures that they maintain a set of security standards to keep the data center secure. With the new Regional Services region, HTTPS traffic will only be decrypted in data centers that hold the ISO 27001 certification. Products such as WAF, Bot Management and Workers will only be applied in those relevant data centers.</p><p>The other update we’re excited to announce is a brand new User Interface for configuring the Data Localization Suite. The previous UI was limited in that customers had to preconfigure a region for an entire zone: you couldn’t mix and match regions. The new UI allows you to do just that: each individual hostname can be configured for a different region, directly on the DNS tab:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/60Ech3V5DIBzcXCKC79TU3/2e16686487cbbad51c77a3f896d9be87/pasted-image-0--5--3.png" />
            
            </figure><p>Configuring a region for a particular hostname is now just a single click away. Changes take effect within seconds, making this the easiest way to configure data localization yet. For customers using the Metadata Boundary, we’ve also launched a self-serve UI that allows you to configure where logs flow:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/62faVgbaj8GXkZtHrCX5xR/717d4b892a5f1f78c4b8c503a549c65c/image-13.png" />
            
            </figure><p>We’re excited about these new updates that give customers more flexibility in choosing which of Cloudflare’s data centers to use as well as making it easier than ever to configure them. The new region and existing regions are now a one-click configuration option right from the dashboard. As always, we love getting feedback, especially on what new regions you’d like to see us add in the future. In the meantime, if you’re interested in using the Data Localization Suite, please reach out to your account team.</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Data Localization]]></category>
            <category><![CDATA[Compliance]]></category>
            <category><![CDATA[Certification]]></category>
            <category><![CDATA[Regional Services]]></category>
            <category><![CDATA[Product News]]></category>
            <guid isPermaLink="false">4eu3YHNrghYyABVfdr9okM</guid>
            <dc:creator>Achiel van der Mandele</dc:creator>
        </item>
        <item>
            <title><![CDATA[A new, configurable and scalable version of Geo Key Manager, now available in Closed Beta]]></title>
            <link>https://blog.cloudflare.com/configurable-and-scalable-geo-key-manager-closed-beta/</link>
            <pubDate>Thu, 15 Dec 2022 14:00:00 GMT</pubDate>
            <description><![CDATA[ We’re excited to announce a new version of Geo Key Manager — one that allows customers to define boundaries by country, by a region, or by a standard, such as “only store my private keys in FIPS compliant data centers” — now available in Closed Beta. ]]></description>
            <content:encoded><![CDATA[ <p><i></i></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5MaRNMB7y16ivTdqoGenT8/140190c6e91d3de30cd51f728b4d852a/image2-35.png" />
            
            </figure><p>Today, traffic on the Internet stays encrypted through the use of public and private keys that encrypt the data as it's being transmitted. Cloudflare helps secure millions of websites by managing the encryption keys that keep this data protected. To provide lightning fast services, Cloudflare stores these keys on our fleet of data centers that spans more than 150 countries. However, some compliance regulations require that private keys are only stored in specific geographic locations.</p><p>In 2017, we <a href="/introducing-cloudflare-geo-key-manager/">introduced</a> Geo Key Manager, a product that allows customers to store and manage the encryption keys for their domains in different geographic locations so that compliance regulations are met and that data remains secure. We launched the product a few months before General Data Protection Regulation (GDPR) went into effect and built it to support three regions: the US, the European Union (EU), and a set of our top tier data centers that employ the highest security measures. Since then, GDPR-like laws have quickly expanded and now, more than 15 countries have comparable data protection laws or regulations that include restrictions on data transfer across and/or data localization within a certain boundary.</p><p>At Cloudflare, we like to be prepared for the future. We want to give our customers tools that allow them to maintain compliance in this ever-changing environment. That’s why we’re excited to announce a new version of Geo Key Manager — one that allows customers to define boundaries by country, ”only store my private keys in India”, by a region ”only store my private keys in the European Union”, or by a standard, such as “only store my private keys in FIPS compliant data centers” — now available in Closed Beta, sign up <a href="https://www.cloudflare.com/lp/geo-key-manager/">here</a>!</p>
    <div>
      <h3>Learnings from Geo Key Manager v1</h3>
      <a href="#learnings-from-geo-key-manager-v1">
        
      </a>
    </div>
    <p>Geo Key Manager has been around for a few years now, and we’ve used this time to gather feedback from our customers. As the demand for a more flexible system grew, we decided to go back to the drawing board and create a new version of Geo Key Manager that would better meet our customers’ needs.</p><p>We initially launched Geo Key Manager with support for US, EU, and Highest Security Data centers. Those regions were sufficient at the time, but customers wrestling with data localization obligations in other jurisdictions need more flexibility when it comes to selecting countries and regions. Some customers want to be able to set restrictions to maintain their private keys in one country, some want the keys stored everywhere except in certain countries, and some may want to mix and match rules and say “store them in X and Y, but not in Z”. What we learned from our customers is that they need flexibility, something that will allow them to keep up with the ever-changing rules and policies — and that’s what we set out to build out.</p><p>The next issue we faced was scalability.  When we built the initial regions, we included a hard-coded list of data centers that met our criteria for the US, EU, “high security” data center regions.  However, this list was static because the underlying cryptography did not support dynamic changes to our list of data centers. In order to distribute private keys to new data centers that met our criteria, we would have had to completely overhaul the system. In addition to that, our network significantly expands every year, with more than 100 new data centers since the initial launch. That means that any new potential locations that could be used to store private keys are currently not in use, degrading the performance and reliability of customers using this feature.</p><p>With our current scale, automation and expansion is a must-have. Our new system needs to dynamically scale every time we onboard or remove a data center from our Network, without any human intervention or large overhaul.</p><p>Finally, one of our biggest learnings was that customers make mistakes, such as defining a region that’s so small that availability becomes a concern. Our job is to prevent our customers from making changes that we know will negatively impact them.</p>
    <div>
      <h3>Define your own geo-restrictions with the new version of Geo Key Manager</h3>
      <a href="#define-your-own-geo-restrictions-with-the-new-version-of-geo-key-manager">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/32wIGpiYX9XBNE6IqIo4qW/53a0340bfbd4c175a1ced8177df8cdfe/image3-21.png" />
            
            </figure><p>Cloudflare has significantly grown in the last few years and so has our international customer base. Customers need to keep their traffic regionalized. This region can be as broad as a continent — Asia, for example. Or, it can be a specific country, like Japan.</p><p>From our conversations with our customers, we’ve heard that they want to be able to define these regions themselves. This is why today we’re excited to announce that customers will be able to use Geo Key Manager to create what we call “policies”.</p><p>A policy can be a single country, defined by two-letter (ISO 3166) country code. It can be a region, such as “EU” for the European Union or Oceania. It can be a mix and match of the two, “country:US or region: EU”.</p><p>Our new policy based Geo Key Manager allows you to create allowlist or blocklists of countries and supported regions, giving you control over the boundary in which your private key will be stored. If you’d like to store your private keys globally and omit a few countries, you can do that.</p><p>If you would like to store your private keys in the EU and US, you would make the following <a href="https://api.cloudflare.com/#custom-ssl-for-a-zone-create-ssl-configuration">API</a> call:</p>
            <pre><code>curl -X POST "https://api.cloudflare.com/client/v4/zones/zone_id/custom_certificates" \
     -H "X-Auth-Email: user@example.com" \
     -H "X-Auth-Key: auth-key" \
     -H "Content-Type: application/json" \
     --data '{"certificate":"certificate","private_key":"private_key","policy":"(country: US) or (region: EU)", "type": "sni_custom"}'</code></pre>
            <p>If you would like to store your private keys in the EU, but not in France, here is how you can define that:</p>
            <pre><code>curl -X POST "https://api.cloudflare.com/client/v4/zones/zone_id/custom_certificates" \
     -H "X-Auth-Email: user@example.com" \
     -H "X-Auth-Key: auth-key" \
     -H "Content-Type: application/json" \
     --data '{"certificate":"certificate","private_key":"private_key","policy": "region: EU and (not country: FR)", "type": "sni_custom"}'</code></pre>
            <p>Geo Key Manager can now support more than 30 countries and regions. But that’s not all! The superpower of our Geo Key Manager technology is that it doesn’t actually have to be “geo” based, but instead, it’s attribute based. In the future, we’ll have a policy that will allow our customers to define where their private keys are stored based on a compliance standard like <a href="https://www.cloudflare.com/learning/privacy/what-is-fedramp/">FedRAMP</a> or ISO 27001.</p>
    <div>
      <h3>Reliability, resiliency, and redundancy</h3>
      <a href="#reliability-resiliency-and-redundancy">
        
      </a>
    </div>
    <p>By giving our customers the remote control for Geo Key Manager, we want to make sure that customers understand the impact of their changes on both redundancy and latency.</p><p>On the redundancy side, one of our biggest concerns is allowing customers to choose a region small enough that if a data center is removed for maintenance, for example, then availability is drastically impacted. To protect our customers, we’ve added redundancy restrictions. These prevent our customers from setting regions with too few data centers, ensuring that all the data centers within a policy can offer high availability and redundancy.</p><p>Not just that, but in the last few years, we’ve significantly improved the underlying networking that powers Geo Key Manager. For more information on how we did that, keep an eye out for a technical deep dive inside Geo Key Manager.</p>
    <div>
      <h3>Performance matters</h3>
      <a href="#performance-matters">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/77nOyNlNPEyaWkHPZ1xfpM/aac3e0d99f380dbc97d244f99d89aeec/image1-39.png" />
            
            </figure><p>With the original regions (US, EU, and Highest Security Data Centers), we learned customers may overlook possible latency impacts that occur when defining the key manager to a certain region. Imagine your keys are stored in the US. For your Asia-based customers, there’s going to be some latency impact for the requests that go around the world. Now, with customers being able to define more granular regions, we want to make sure that before customers make that change, they see the impact of it.</p><p>If you’re an <a href="https://www.cloudflare.com/ecommerce/">E-Commerce platform</a> then <a href="https://www.cloudflare.com/solutions/ecommerce/optimization/">performance</a> is always top-of-mind. One thing that we’re working on right now is performance metrics for Geo Key Manager policies both from a regional point of view — “what’s the latency impact for Asia based customers?” and from a global point of view — “for anyone in the world, what is the average impact of this policy?”.</p><p>By seeing the latency impact, if you see that the impact is unacceptable, you may want to create a separate domain for your service that’s specific to the region that it’s serving.</p>
    <div>
      <h3>Closed Beta, now available!</h3>
      <a href="#closed-beta-now-available">
        
      </a>
    </div>
    <p>Interested in trying out the latest version of Geo Key Manager? Fill out this <a href="https://www.cloudflare.com/lp/geo-key-manager/">form</a>.</p>
    <div>
      <h3>Coming soon!</h3>
      <a href="#coming-soon">
        
      </a>
    </div>
    <p>Geo Key Manager is only available via API at the moment. But, we are working on creating an easy-to-use UI for it, so that customers can easily manage their policies and regions. In addition, we’ll surface performance measurements and warnings when we see any degraded impact in terms of performance or redundancy to ensure that customers are mindful when setting policies.</p><p>We’re also excited to extend our Geo Key Manager product beyond custom uploaded certificates. In the future, certificates issued through Advanced Certificate Manager or <a href="https://www.cloudflare.com/application-services/products/ssl-for-saas-providers/">SSL for SaaS</a> will be allowed to add policy based restrictions for the key storage.</p><p>Finally, we’re looking to add more default regions to make the selection process simple for our customers. If you have any regions that you’d like us to support, or just general feedback or feature requests related to Geo Key Manager, make a note of it on the <a href="https://www.cloudflare.com/lp/geo-key-manager/">form</a>. We love hearing from our customers!</p> ]]></content:encoded>
            <category><![CDATA[Impact Week]]></category>
            <category><![CDATA[SSL]]></category>
            <category><![CDATA[TLS]]></category>
            <category><![CDATA[Regional Services]]></category>
            <category><![CDATA[Geo Key Manager]]></category>
            <guid isPermaLink="false">2OgNkneECLDxlFcB0j9my4</guid>
            <dc:creator>Dina Kozlov</dc:creator>
        </item>
        <item>
            <title><![CDATA[Regional Services comes to India, Japan and Australia]]></title>
            <link>https://blog.cloudflare.com/regional-services-comes-to-apac/</link>
            <pubDate>Thu, 22 Sep 2022 01:00:00 GMT</pubDate>
            <description><![CDATA[ With Regional Services, we are thrilled to expand our coverage to these countries in Asia Pacific, allowing more customers to use Cloudflare by giving them precise control over which parts of the Cloudflare network are able to perform advanced functions ]]></description>
            <content:encoded><![CDATA[ <p></p><p>We <a href="/introducing-the-cloudflare-data-localization-suite/">announced</a> the Data Localization Suite in 2020, when requirements for data localization were already important in the European Union. Since then, we’ve witnessed a growing trend toward localization globally. We are thrilled to expand our coverage to these countries in Asia Pacific, allowing more customers to use Cloudflare by giving them precise control over which parts of the Cloudflare network are able to perform advanced functions like <a href="https://www.cloudflare.com/learning/ddos/glossary/web-application-firewall-waf/">WAF</a> or Bot Management that require inspecting traffic.</p>
    <div>
      <h3>Regional Services, a recap</h3>
      <a href="#regional-services-a-recap">
        
      </a>
    </div>
    <p>In 2020, we introduced (<a href="/introducing-regional-services/">Regional Services</a>), a new way for customers to use Cloudflare. With Regional Services, customers can limit which data centers actually decrypt and inspect traffic. This helps because certain customers are affected by regulations on where they are allowed to service traffic. Others have agreements with <i>their</i> customers as part of contracts specifying exactly where traffic is allowed to be decrypted and inspected.</p><p>As one German bank told us: "We can look at the rules and regulations and debate them all we want. As long as you promise me that no machine outside the European Union will see a decrypted bank account number belonging to one of my customers, we're happy to use Cloudflare in any capacity".</p><p>Under normal operation, Cloudflare uses its entire network to perform all functions. This is what most customers want: leverage all of Cloudflare’s data centers so that you always service traffic to eyeballs as quickly as possible. Increasingly, we are seeing customers that wish to strictly limit which data centers service their traffic. With <a href="/introducing-regional-services/">Regional Services</a>, customers can use Cloudflare's network but limit which data centers perform the actual decryption. Products that require decryption, such as WAF, Bot Management and Workers will only be applied within those data centers.</p>
    <div>
      <h3>How does Regional Services work?</h3>
      <a href="#how-does-regional-services-work">
        
      </a>
    </div>
    <p>You might be asking yourself: how does that even work? Doesn't Cloudflare operate an anycast network? Cloudflare was built from the bottom up to leverage anycast, a routing protocol. All of Cloudflare's data centers advertise the same IP addresses through Border Gateway Protocol. Whichever data center is closest to you from a network point of view is the one that you'll hit.</p><p>This is great for two reasons. The first is that the closer the data center to you, the faster the reply. The second great benefit is that this comes in very handy when dealing with large DDoS attacks. Volumetric DDoS attacks throw a lot of bogus traffic at you, which overwhelms network capacity. Cloudflare's anycast network is great at taking on these attacks because they get distributed across the entire network.</p><p>Anycast doesn't respect regional borders, it doesn't even know about them. Which is why out of the box, Cloudflare can't guarantee that traffic inside a country will also be serviced there. Although typically you’ll hit a data center inside your country, it’s very possible that your Internet Service Provider will send traffic to a network that might route it to a different country.</p><p>Regional Services solves that: when turned on, each data center becomes aware of which region it is operating in. If a user from a country hits a data center that doesn't match the region that the customer has selected, we simply forward the raw TCP stream in encrypted form. Once it reaches a data center inside the right region, we decrypt and apply all Layer 7 products. This covers products such as CDN, WAF, Bot Management and Workers.</p><p>Let's take an example. A user is in Kerala, India and their Internet Service Provider has determined that the fastest path to one of our data centers is to Colombo, Sri Lanka. In this example, a customer may have selected India as the sole region within which traffic should be serviced. The Colombo data center sees that this traffic is meant for the India region. It does not decrypt, but instead forwards it to the closest data center inside India. There, we decrypt and products such as WAF and Workers are applied as if the traffic had hit the data center directly.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7gRJahpGc8QYhz5fZlXsIl/5d5adca2fba56b006c98459cc304e7b9/image2-27.png" />
            
            </figure>
    <div>
      <h3>Bringing Regional Services to Asia</h3>
      <a href="#bringing-regional-services-to-asia">
        
      </a>
    </div>
    <p>Historically, we’ve seen most interest in Regional Services in geographic regions such as the European Union and the Americas. Over the past few years, however, we are seeing a lot of interest from Asia Pacific. Based on customer feedback and analysis on regulations we quickly concluded there were three key regions we needed to support: India, Japan and Australia. We’re proud to say that all three are now generally available for use today.</p><p>But we’re not done yet! We realize there are many more customers that require localization to their particular region. We’re looking to add many more in the near future and are working hard to make it easier to support more of them. If you have a region in mind, we’d love to hear it!</p><p>India, Japan and Australia are all live today! If you’re interested in using the <a href="https://www.cloudflare.com/data-localization/">Data Localization Suite</a>, contact your account team!</p> ]]></content:encoded>
            <category><![CDATA[GA Week]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[General Availability]]></category>
            <category><![CDATA[Regional Services]]></category>
            <category><![CDATA[APJC]]></category>
            <guid isPermaLink="false">3jabawaAHr0fzOv3vBeQHx</guid>
            <dc:creator>Achiel van der Mandele</dc:creator>
        </item>
        <item>
            <title><![CDATA[Introducing Regional Services]]></title>
            <link>https://blog.cloudflare.com/introducing-regional-services/</link>
            <pubDate>Fri, 26 Jun 2020 11:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare launches Regional Services, giving customers control over where their data is processed. ]]></description>
            <content:encoded><![CDATA[ <p>In a world where, increasingly, workloads shift to the cloud, it is often uncertain and unclear how data travels the Internet and in which countries data is processed. Today, Cloudflare is pleased to announce that we're giving our customers control. With Regional Services, we’re providing customers full control over exactly where their traffic is handled.</p><p>We operate a global network spanning more than 200 cities. Each data center runs servers with the exact same software stack. This has enabled Cloudflare to quickly and efficiently add capacity where needed. It also allows our engineers to ship features with ease: deploy once, and it's available globally.</p><p>The same benefit applies to our customers: configure once and that change is applied everywhere in seconds, regardless of whether they’re changing security features, adding a DNS record or deploying a Cloudflare Worker containing code.</p><p>Having a homogenous network is great from a routing point of view: whenever a user performs an HTTP request, the closest datacenter is found due to Cloudflare's Anycast network. BGP looks at the hops that would need to be traversed to find the closest data center. This means that someone near the Canadian border (let's say North Dakota) could easily find themselves routed to Winnipeg (inside Canada) instead of a data center in the United States. This is generally what our customers want and expect: find the fastest way to serve traffic, regardless of geographic location.</p><a href="https://cloudflare.tv/">
         <img src="http://staging.blog.mrk.cfdata.org/content/images/2020/06/tube-blog-banner.png" />
      </a><p>Some organizations, however, have expressed preferences for maintaining regional control over their data for a variety of reasons. For example, they may be bound by agreements with their own customers that include geographic restrictions on data flows or data processing. As a result, some customers have requested control over where their web traffic is serviced.</p><p>Regional Services gives our customers the ability to accommodate regional restrictions while still using Cloudflare’s global edge network. As of today, Enterprise customers can add Regional Services to their contracts. With Regional Services, customers can choose which subset of data centers are able to service traffic on the HTTP level. But we're not reducing network capacity to do this: that would not be the Cloudflare Way. Instead, we're allowing customers to use our entire network for <a href="https://www.cloudflare.com/ddos/">DDoS protection</a> but limiting the data centers that apply higher-level layer 7 security and performance features such as WAF, Workers, and Bot Management.</p><p>Traffic is ingested on our global Anycast network at the location closest to the client, as usual, and then passed to data centers inside the geographic region of the customer’s choice. TLS keys are only <a href="/geo-key-manager-how-it-works">stored</a> and used to actually handle traffic inside that region. This gives our customers the benefit of our huge, low-latency, high-throughput network, capable of withstanding even the <a href="/the-daily-ddos-ten-days-of-massive-attacks/">largest DDoS attacks</a>, while also giving them local control: only data centers inside a customer’s preferred geographic region will have the access necessary to apply security policies.</p><p>The diagram below shows how this process works. When users connect to Cloudflare, they hit the closest data center to them, by nature of our Anycast network. That data center detects and mitigates DDoS attacks. Legitimate traffic is passed through to a data center with the geographic region of the customers choosing. Inside that data center, traffic is inspected at OSI layer 7 and HTTP products can work their magic:</p><ul><li><p>Content can be returned from and stored in cache</p></li><li><p>The WAF looks inside the HTTP payloads</p></li><li><p>Bot Management detects and blocks suspicious activity</p></li><li><p>Workers scripts run</p></li><li><p>Access policies are applied</p></li><li><p>Load Balancers look for the best origin to service traffic</p></li></ul>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7aaFSqiVx77rXsS2N3RT1f/d574a8616e54dd8246b68ee94a09837e/image2-9.png" />
            
            </figure><p>Today's launch includes preconfigured geographic regions; we'll look to add more depending on customer demand. Today, US and EU regions are available immediately, meaning layer 7 (HTTP) products can be configured to only be applied within those regions and not outside of them.</p><p>The US and EU maps are depicted below. Purple dots represent data centers that apply DDoS protection and network acceleration. Orange dots represent data centers that process traffic.</p>
    <div>
      <h3>US</h3>
      <a href="#us">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/27QO1l8SD4U7w27OSYYPOp/33c4577ab859445c0f3fab1f515fbf72/image1-10.png" />
            
            </figure>
    <div>
      <h3>EU</h3>
      <a href="#eu">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/10lHcRerwTtYDamjx1u0HA/7f714e18362e0ad7a09caa8ea4447406/BDES-655-_-Slides-with-Cloudflare-PoPs-for-product-launch--1-.jpg" />
            
            </figure><p>We're very excited to provide new tools to our customers, allowing them to dictate which of our data centers employ HTTP features and which do not. If you're interested in learning more, contact <a>sales@cloudflare.com</a>.</p> ]]></content:encoded>
            <category><![CDATA[Data Center]]></category>
            <category><![CDATA[Europe]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[BGP]]></category>
            <category><![CDATA[Regional Services]]></category>
            <guid isPermaLink="false">6odmOeCIIEK47sVIlmcGt6</guid>
            <dc:creator>Achiel van der Mandele</dc:creator>
        </item>
    </channel>
</rss>