
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Sat, 04 Apr 2026 05:34:45 GMT</lastBuildDate>
        <item>
            <title><![CDATA[Eliminate VPN vulnerabilities with Cloudflare One]]></title>
            <link>https://blog.cloudflare.com/eliminate-vpn-vulnerabilities-with-cloudflare-one/</link>
            <pubDate>Wed, 06 Mar 2024 14:00:32 GMT</pubDate>
            <description><![CDATA[ The Cybersecurity & Infrastructure Security Agency (CISA) recently issued an Emergency Directive due to the Ivanti Connect Secure and Policy Secure vulnerabilities. In this blog, we discuss the threat actor tactics exploiting these vulnerabilities ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7dkFzKpbp6dNWRPtmhzmF/c38942d12f78bff0cba968474c923a17/image1-17.png" />
            
            </figure><p>On January 19, 2024, the Cybersecurity &amp; Infrastructure Security Agency (CISA) issued <a href="https://www.cisa.gov/news-events/directives/ed-24-01-mitigate-ivanti-connect-secure-and-ivanti-policy-secure-vulnerabilities">Emergency Directive 24-01: Mitigate Ivanti Connect Secure and Ivanti Policy Secure Vulnerabilities</a>. CISA has the authority to issue emergency directives in response to a known or reasonably suspected information security threat, vulnerability, or incident. U.S. Federal agencies are required to comply with these directives.</p><p>Federal agencies were directed to apply a mitigation against two recently discovered vulnerabilities; the mitigation was to be applied within three days. Further monitoring by CISA revealed that threat actors were continuing to exploit the vulnerabilities and had developed some workarounds to earlier mitigations and detection methods. On January 31, CISA issued <a href="https://www.cisa.gov/news-events/directives/supplemental-direction-v1-ed-24-01-mitigate-ivanti-connect-secure-and-ivanti-policy-secure">Supplemental Direction V1</a> to the Emergency Directive instructing agencies to immediately disconnect all instances of Ivanti Connect Secure and Ivanti Policy Secure products from agency networks and perform several actions before bringing the products back into service.</p><p>This blog post will explore the threat actor’s tactics, discuss the high-value nature of the targeted products, and show how Cloudflare’s <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/">Secure Access Service Edge</a> (SASE) platform <a href="https://www.cloudflare.com/products/zero-trust/threat-defense/">protects against such threats</a>.</p><p>As a side note and showing the value of layered protections, Cloudflare’s WAF had <a href="/how-cloudflares-ai-waf-proactively-detected-ivanti-connect-secure-critical-zero-day-vulnerability">proactively detected</a> the Ivanti zero-day vulnerabilities and deployed emergency rules to protect Cloudflare customers.</p>
    <div>
      <h2>Threat Actor Tactics</h2>
      <a href="#threat-actor-tactics">
        
      </a>
    </div>
    <p>Forensic investigations (see the <a href="https://www.volexity.com/blog/2024/01/10/active-exploitation-of-two-zero-day-vulnerabilities-in-ivanti-connect-secure-vpn/">Volexity</a> blog for an excellent write-up) indicate that the attacks began as early as December 2023. Piecing together the evidence shows that the threat actors chained two previously unknown vulnerabilities together to gain access to the Connect Secure and Policy Secure appliances and achieve unauthenticated remote code execution (RCE).</p><p><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46805">CVE-2023-46805</a> is an authentication bypass vulnerability in the products’ web components that allows a remote attacker to bypass control checks and gain access to restricted resources. <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21887">CVE-2024-21887</a> is a command injection vulnerability in the products’ web components that allows an authenticated administrator to execute arbitrary commands on the appliance and send specially crafted requests. The remote attacker was able to bypass authentication and be seen as an “authenticated” administrator, and then take advantage of the ability to execute arbitrary commands on the appliance.</p><p>By exploiting these vulnerabilities, the threat actor had near total control of the appliance. Among other things, the attacker was able to:</p><ul><li><p>Harvest credentials from users logging into the VPN service</p></li><li><p>Use these credentials to log into protected systems in search of even more credentials</p></li><li><p>Modify files to enable remote code execution</p></li><li><p>Deploy web shells to a number of web servers</p></li><li><p>Reverse tunnel from the appliance back to their command-and-control server (C2)</p></li><li><p>Avoid detection by disabling logging and clearing existing logs</p></li></ul>
    <div>
      <h2>Little Appliance, Big Risk</h2>
      <a href="#little-appliance-big-risk">
        
      </a>
    </div>
    <p>This is a serious incident that is exposing customers to significant risk. CISA is justified in issuing their directive, and Ivanti is working hard to mitigate the threat and develop patches for the software on their appliances. But it also serves as another indictment of the legacy “<a href="https://www.cloudflare.com/learning/access-management/castle-and-moat-network-security/">castle-and-moat</a>” security paradigm. In that paradigm, remote users were outside the castle while protected applications and resources remained inside. The moat, consisting of a layer of security appliances, separated the two. The moat, in this case the Ivanti appliance, was responsible for authenticating and authorizing users, and then connecting them to protected applications and resources. Attackers and other bad actors were blocked at the moat.</p><p>This incident shows us what happens when a bad actor is able to take control of the moat itself, and the challenges customers face to recover control. Two typical characteristics of vendor-supplied appliances and the legacy security strategy highlight the risks:</p><ul><li><p>Administrators have access to the internals of the appliance</p></li><li><p>Authenticated users indiscriminately have access to a wide range of applications and resources on the corporate network, increasing the risk of bad actor <a href="https://www.cloudflare.com/learning/security/glossary/what-is-lateral-movement/">lateral movement</a></p></li></ul>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1ijcyO0LP8vTx3RE2vVdtF/878a0dac9efef21e54aa17e340657a83/image2-13.png" />
            
            </figure>
    <div>
      <h2>A better way: Cloudflare’s SASE platform</h2>
      <a href="#a-better-way-cloudflares-sase-platform">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/zero-trust/">Cloudflare One</a> is Cloudflare’s <a href="https://www.cloudflare.com/learning/access-management/security-service-edge-sse/">SSE</a> and single-vendor SASE platform. While Cloudflare One spans broadly across security and networking services (and you can read about the latest additions <a href="/single-vendor-sase-announcement-2024/">here</a>), I want to focus on the two points noted above.</p><p>First, Cloudflare One employs the principles of Zero Trust, including the <a href="https://www.cloudflare.com/learning/access-management/principle-of-least-privilege/">principle of least privilege</a>. As such, users that authenticate successfully only have access to the resources and applications necessary for their role. This principle also helps in the event of a compromised user account as the bad actor does not have indiscriminate network-level access. Rather, least privilege limits the range of lateral movement that a bad actor has, effectively reducing the blast radius.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2JO2DWzmnzBQMpfyxgdetM/11056f797c5b712d9babb88b40a05ff2/image3-15.png" />
            
            </figure><p>Second, while customer administrators need to have access to configure their services and policies, Cloudflare One does not provide any external access to the system internals of Cloudflare’s platform. Without that access, a bad actor would not be able to launch the types of attacks executed when they had access to the internals of the Ivanti appliance.  </p>
    <div>
      <h2>It’s time to eliminate the legacy VPN</h2>
      <a href="#its-time-to-eliminate-the-legacy-vpn">
        
      </a>
    </div>
    <p>If your organization is impacted by the CISA directive, or you are just ready to modernize and want to augment or replace your current VPN solution, Cloudflare is here to help. Cloudflare’s <a href="https://cfl.re/ztna-product-overview">Zero Trust Network Access (ZTNA) service</a>, part of the Cloudflare One platform, is the fastest and safest way to connect any user to any application.</p><p>Contact us to get immediate onboarding help or to schedule an architecture workshop to help you <a href="https://www.cloudflare.com/vpn-vulnerability/">augment or replace your Ivanti (or any) VPN solution</a>.Not quite ready for a live conversation? Read our learning path article on how to <a href="https://www.cloudflare.com/products/zero-trust/vpn-replacement/">replace your VPN</a> with Cloudflare or our <a href="https://developers.cloudflare.com/reference-architecture/architectures/sase/">SASE reference architecture</a> for a view of how all of our SASE services and on-ramps work together.</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[VPN]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Cloudflare Access]]></category>
            <category><![CDATA[Vulnerabilities]]></category>
            <category><![CDATA[Attacks]]></category>
            <category><![CDATA[Application Services]]></category>
            <guid isPermaLink="false">5rEwvIjtLi0zxozkXfCbOY</guid>
            <dc:creator>Dan Hall</dc:creator>
            <dc:creator>Michael Keane</dc:creator>
        </item>
        <item>
            <title><![CDATA[New WAF intelligence feeds]]></title>
            <link>https://blog.cloudflare.com/new-waf-intelligence-feeds/</link>
            <pubDate>Thu, 07 Jul 2022 12:57:12 GMT</pubDate>
            <description><![CDATA[ Cloudflare is expanding our WAF’s threat intelligence capabilities by adding four new managed IP lists that can be used as part of any custom firewall rule ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3viqacx0pyK5KfuztWaVO9/ae921f1c63025506f3709dbdff7c339e/unnamed.png" />
            
            </figure><p>Cloudflare is expanding our <a href="https://www.cloudflare.com/learning/ddos/glossary/web-application-firewall-waf/">WAF’s</a> threat intelligence capabilities by adding four new managed IP lists that can be used as part of any custom firewall rule.</p><p>Managed lists are created and maintained by Cloudflare and are built based on threat intelligence feeds collected by analyzing patterns and trends observed across the Internet. Enterprise customers can already use the Open SOCKS Proxy list (<a href="/protecting-apis-from-abuse-and-data-exfiltration/">launched in March 2021</a>) and today we are adding four new IP lists: “VPNs”, “Botnets, Command and Control Servers”, “Malware” and “Anonymizers”.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/31yUbQ5PMWyQOuR6SKAYVm/e6b624da1f780033213cf902e1e40edb/XkegdawMtkmBmuCmAin8MIzby8BSozlKq1g_EJRwpKwYIkmx_e0t49a3yoc8YYNltTLJBQ3oFxDRmBFxP01RTytGgD-zCwQsfiQr5r2WyFChLu9wsmDjeAx5Rb0i.png" />
            
            </figure><p>You can check what rules are available in your plan by navigating to Manage Account → Configuration → Lists.</p><p>Customers can reference these lists when creating a custom firewall rule or in <a href="/advanced-rate-limiting/">Advanced Rate Limiting</a>. For example, you can choose to block all traffic generated by IPs we categorize as VPNs, or rate limit traffic generated by all Anonymizers. You can simply incorporate managed IP lists in the powerful firewall rule builder. Of course, you can also use your own <a href="/introducing-ip-lists/">custom IP list</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/72EGCZbWhomtW9Up3IT9yg/b97c63a343aa7ed580bc0d00987a53ef/WsDGsltjclo0RVf5cZlM3yiQFzdDUIIteuM2jE80480j63zup6IMVvJtrazsG7VSaBTFSgnX0kYqZBpf3xzgqdLOX_VTpxX3sb398t_tj86gO-EiDKFwVoltRR85.png" />
            
            </figure><p>Managed IP Lists can be used in WAF rules to manage incoming traffic from these IPs.</p>
    <div>
      <h3>Where do these feeds come from?</h3>
      <a href="#where-do-these-feeds-come-from">
        
      </a>
    </div>
    <p>These lists are based on Cloudflare-generated threat feeds which are made available as IP lists to be easily consumed in the WAF. Each IP is categorized by combining open source data as well as by analyzing the behavior of each IP leveraging the scale and reach of Cloudflare network. After an IP has been included in one of these feeds, we verify its categorization and feed this information back into our security systems and make it available to our customers in the form of a managed IP list. The content of each list is updated multiple times a day.</p><p>In addition to generating IP classifications based on Cloudflare’s internal data, Cloudflare curates and combines several data sources that we believe provide reliable coverage of active security threats with a low false positive rate. In today’s environment, an IP belonging to a cloud provider might today be distributing malware, but tomorrow might be a critical resource for your company.</p><p>Some IP address classifications are publicly available, OSINT data, for example Tor exit nodes, and Cloudflare takes care of integrating this into our Anonymizer list so that you don’t have to manage integrating this list into every asset in your network. Other classifications are determined or vetted using a variety of DNS techniques, like lookup, PTR record lookup, and observing passive DNS from Cloudflare’s network.</p><p>Our malware and command-and-control focused lists are generated from curated partnerships, and one type of IP address we target when we select partners is data sources that identify security threats that do not have DNS records associated with them.</p><p>Our Anonymizer list encompasses several types of services that perform anonymization, including VPNs, open proxies, and Tor nodes. It is a superset of the more narrowly focused VPN list (known commercial VPN nodes), and the Cloudflare Open Proxies list (proxies that relay traffic without requiring authentication).</p>
    <div>
      <h3>In dashboard IP annotations</h3>
      <a href="#in-dashboard-ip-annotations">
        
      </a>
    </div>
    <p>Using these lists to deploy a preventative security policy for these IPs is great, but what about knowing if an IP that is interacting with your website or application is part of a Botnet or VPN? We first released <a href="/security-center-investigate/">contextual information</a> for Anonymizers as part of Security Week 2022, but we are now closing the circle by extending this feature to cover all new lists.</p><p>As part of Cloudflare's threat intelligence feeds, we are exposing the IP category directly into the dashboard. Say you are investigating requests that were blocked by the WAF and that looked to be probing your application for known software vulnerabilities. If the source IP of these requests is matching with one of our feeds (for example part of a VPN), contextual information will appear directly on the analytics page.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3BEsz0Ts0fqS0o7Rlu0Kh0/a2eeba1c392e9d51a47efac8327e5f98/ba1SUQnRFtLMyaBYf580Fup-l4DJXdqOXEFrBm_KtT6egoEuFy0dh5HSZJvTSokZvDYC1d7US1dlhXMjn2jFgAgNr3Hmf455vhT6sT76JzXpI5ZyTO7bxGrXdj8o.png" />
            
            </figure><p>When the source IP of a WAF event matches one of the threat feeds, we provide contextual information directly onto the Cloudflare dashboard.</p><p>This information can help you see patterns and decide whether you need to use the managed lists to handle the traffic from these IPs in a particular way, for example by creating a rate limiting rule that reduces the amount of requests these actors can perform over a period of time.</p>
    <div>
      <h3>Who gets this?</h3>
      <a href="#who-gets-this">
        
      </a>
    </div>
    <p>The following table summarizes what plans have access to each one of these features. Any paying plans will have access to the contextual in-dash information, while Enterprise will be able to use different managed lists. Managed lists can be used only on Enterprise zones within an Enterprise account.</p>
<table>
<thead>
  <tr>
    <th></th>
    <th><span> FREE</span></th>
    <th><span>PRO</span></th>
    <th><span>BIZ</span></th>
    <th><span>ENT with WAF Essential</span></th>
    <th><span>ENT with WAF Advanced  *</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><span>Annotations</span></td>
    <td><span>x</span></td>
    <td><span>✅</span></td>
    <td><span>✅</span></td>
    <td><span>✅</span></td>
    <td><span>✅</span></td>
  </tr>
  <tr>
    <td><span>Open Proxies</span></td>
    <td><span>x</span></td>
    <td><span>x</span></td>
    <td><span>x</span></td>
    <td><span>✅</span></td>
    <td><span>✅</span></td>
  </tr>
  <tr>
    <td><span>Anonymizers</span></td>
    <td><span>x</span></td>
    <td><span>x</span></td>
    <td><span>x</span></td>
    <td><span>x</span></td>
    <td><span>✅</span></td>
  </tr>
  <tr>
    <td><span>VPNs</span></td>
    <td><span>x</span></td>
    <td><span>x</span></td>
    <td><span>x</span></td>
    <td><span>x</span></td>
    <td><span>✅</span></td>
  </tr>
  <tr>
    <td><span>Botnets, command and control</span></td>
    <td><span>x</span></td>
    <td><span>x</span></td>
    <td><span>x</span></td>
    <td><span>x</span></td>
    <td><span>✅</span></td>
  </tr>
  <tr>
    <td><span>Malware</span></td>
    <td><span>x</span></td>
    <td><span>x</span></td>
    <td><span>x</span></td>
    <td><span>x</span></td>
    <td><span>✅</span></td>
  </tr>
</tbody>
</table><p>* Contact your customer success manager to learn how to get access to these lists.</p>
    <div>
      <h3>Future releases</h3>
      <a href="#future-releases">
        
      </a>
    </div>
    <p>We are working on enriching our threat feeds even further. In the next months we are going to provide more IP lists, specifically we are looking into lists for cloud providers and Carrier-grade Network Address Translation (CG-NAT).</p> ]]></content:encoded>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[WAF]]></category>
            <category><![CDATA[Threat Intelligence]]></category>
            <category><![CDATA[VPN]]></category>
            <category><![CDATA[Botnet]]></category>
            <guid isPermaLink="false">qdVDHWjNU7EFOMA2A5uqb</guid>
            <dc:creator>Daniele Molteni</dc:creator>
            <dc:creator>Jesse Kipp</dc:creator>
        </item>
        <item>
            <title><![CDATA[Connect to private network services with Browser Isolation]]></title>
            <link>https://blog.cloudflare.com/browser-isolation-private-network/</link>
            <pubDate>Fri, 24 Jun 2022 13:15:05 GMT</pubDate>
            <description><![CDATA[ Browser Isolation with private network connectivity enables your users to securely access private web services without installing any software or agents on an endpoint device or absorbing the management and cost overhead of serving virtual desktops ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5Ue8yFX0j4bZgnXuJRdRrD/c0d4e4e4b17391afcbe08e73f43fd58d/image3-29.png" />
            
            </figure><p>If you’re working in an IT organization that has relied on virtual desktops but looking to get rid of them, we have some good news: starting today, you can connect your users to your private network via isolated remote browsers. This means you can deliver sensitive internal web applications — reducing costs without sacrificing security.</p><p><a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">Browser Isolation</a> with private network connectivity enables your users to securely access private web services without installing any software or agents on an endpoint device or absorbing the management and cost overhead of serving virtual desktops. What’s even better: Browser Isolation is natively integrated into Cloudflare’s Zero Trust platform, making it easy to <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">control and monitor</a> who can access what private services from a remote browser without sacrificing performance or security.</p>
    <div>
      <h2>Deprecating virtual desktops for web apps</h2>
      <a href="#deprecating-virtual-desktops-for-web-apps">
        
      </a>
    </div>
    <p>The presence of virtual desktops in the workplace tells an interesting story about the evolution of deploying and securing enterprise applications. Serving a full virtual desktop to end-users is an expensive decision, each user requiring a dedicated virtual machine with multiple CPU cores and gigabytes of memory to run a full operating system. This cost was offset by the benefits of streamlining desktop app distribution and the security benefits of isolating unmanaged devices from the aging application.</p><p>Then the launch of Chromium/V8 surprised everyone by demonstrating that desktop-grade applications could be built entirely in web-based technologies.  Today, a vast majority of applications — either SaaS or private — exist within a web browser. With most Virtual Desktop Infrastructure (VDI) users connecting to a remote desktop just to open a web browser, VDI’s utility for distributing applications is really no longer needed and has become a tremendously expensive way to securely host a web browser.</p><p>Browser Isolation with private network connectivity enables businesses to maintain the security benefits of VDI, without the costs of hosting and operating legacy virtual desktops.</p>
    <div>
      <h3>Transparent end-user experience</h3>
      <a href="#transparent-end-user-experience">
        
      </a>
    </div>
    <p>But it doesn’t just have a better ROI. Browser Isolation also offers a better experience for your end-users, too. Serving web applications via virtual desktops is a clunky experience. Users first need to connect to their virtual desktop (either through a desktop application or web portal), open an embedded web browser. This model requires users to context-switch between local and remote web applications which adds friction, impacting user productivity.</p><p>With Browser Isolation users simply navigate to the isolated private application in their preferred web browser and use the service as if they were directly browsing the remote web browser.</p>
    <div>
      <h2>How it works</h2>
      <a href="#how-it-works">
        
      </a>
    </div>
    <p>Browser Isolation with private network connectivity works by unifying our <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/">Zero Trust</a> products: Cloudflare Access and Cloudflare Tunnels.</p><p>Cloudflare Access authorizes your users via your <a href="https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/">preferred Identity Provider</a> and connects them to a remote browser without installing any software on their device. Cloudflare Tunnels securely connects your private network to remote browsers hosted on Cloudflare’s network without opening any inbound ports on your firewall.</p>
    <div>
      <h3>Monitor third-party users on private networks</h3>
      <a href="#monitor-third-party-users-on-private-networks">
        
      </a>
    </div>
    <p>Ever needed to give a <a href="https://www.cloudflare.com/products/zero-trust/third-party-access/">contractor or vendor access</a> to your network to remotely manage a web UI? Simply add the user to your Clientless Web Isolation policy, and they can connect to your internal service without installing any client software on their device. All requests to private IPs are filtered, inspected, and logged through Cloudflare Gateway.</p>
    <div>
      <h3>Apply data protection controls</h3>
      <a href="#apply-data-protection-controls">
        
      </a>
    </div>
    <p>All traffic from remote browsers into your network is inspected and filtered. Data protection controls such as disabling clipboard, printing and file upload/downloads can be granularly applied to high-risk user groups and sensitive applications.</p>
    <div>
      <h2>Get started</h2>
      <a href="#get-started">
        
      </a>
    </div>
    
    <div>
      <h3>Connect your network to Cloudflare Zero Trust</h3>
      <a href="#connect-your-network-to-cloudflare-zero-trust">
        
      </a>
    </div>
    <p>It’s <a href="/ridiculously-easy-to-use-tunnels/">ridiculously easy to connect any network</a> with outbound Internet access.</p><p>Engineers needing a web environment to debug and test services inside a private network just need to run a single command to connect their network to Browser Isolation using Cloudflare Tunnels.</p>
    <div>
      <h3>Enable Clientless Web Isolation</h3>
      <a href="#enable-clientless-web-isolation">
        
      </a>
    </div>
    <p>Clientless Web Isolation allows users to connect to a remote browser without installing any software on the endpoint device. That means company-wide deployment is seamless and transparent to end users. Follow <a href="https://developers.cloudflare.com/cloudflare-one/policies/browser-isolation/clientless-browser-isolation/">these steps</a> to enable Clientless Web Isolation and define what users are allowed to connect to a remote browser.</p>
    <div>
      <h3>Browse private IP resources</h3>
      <a href="#browse-private-ip-resources">
        
      </a>
    </div>
    <p>Now that you have your network connected to Cloudflare, and your users connected to remote browsers it’s easy for a user to connect to any RFC 1918 address in a remote browser. Simply navigate to your isolation endpoint, and you’ll be connected to your private network.</p><p>For example, if you want a user to manage a router hosted at <code>http://192.0.2.1</code>, prefix this URL with your isolation endpoint such as</p><p><code>https://&lt;authdomain&gt;.cloudflareaccess.com/browser/http://192.0.2.1</code></p><p>That’s it! Users are automatically served a remote browser in a nearby Cloudflare data center.</p><div></div>
<small>Remote browser connected to a private web service with data loss prevention policies enabled</small>

    <div>
      <h3>Define policies</h3>
      <a href="#define-policies">
        
      </a>
    </div>
    <p>At this point, your users can connect to any private resource inside your network. You may want to further control what endpoints your users can reach. To do this, navigate to Gateway → Policies → HTTP and allow / block or apply data protection controls for any private resource based on identity or destination IP address. See our <a href="https://developers.cloudflare.com/cloudflare-one/policies/filtering/http-policies/">developer documentation</a> for more information.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/KyAXA4PIstf7lIuWtNxxE/3aba916caaf5159f3f8cbd7ed7f9c105/hVXFsRY7krJgCNMz5cc121Z1WQyGp-ywBSjvaS5xbAij8f3RepQxicMViym0BUJ2XMJcF6Feb_vgzZazp-Bw60f3uxzVsU37wahuc3Ory6rvtVPlm8VVF3MU_8ll.png" />
            
            </figure><p>Additionally, isolation policies can be defined to control <i>how</i> users can interact with the remote browser to disable the clipboard, printing or file upload / downloads. See our <a href="https://developers.cloudflare.com/cloudflare-one/policies/browser-isolation/#isolate-policies">developer documentation</a> for more information.</p>
    <div>
      <h3>Logging and visibility</h3>
      <a href="#logging-and-visibility">
        
      </a>
    </div>
    <p>Finally, all remote browser traffic is logged by the <a href="https://www.cloudflare.com/learning/access-management/what-is-a-secure-web-gateway/">Secure Web Gateway</a>. Navigate to Logs → Gateway → HTTP and filter by identity or destination IP address.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4v6DQw6XLbPuYBGTGcrYYN/f91b588881a8a9177eb0102fb3becefb/image1-46.png" />
            
            </figure>
    <div>
      <h2>What’s next?</h2>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>We’re excited to learn how people use Browser Isolation to enable remote access to private networks and protect sensitive apps. Like always, we’re just getting started so stay tuned for improvements on configuring remote browsers and deeper connectivity with Access applications. Click <a href="https://www.cloudflare.com/products/zero-trust/browser-isolation/">here to get started</a> with Browser Isolation.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare One Week]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Private Network]]></category>
            <category><![CDATA[VPN]]></category>
            <category><![CDATA[VDI]]></category>
            <category><![CDATA[Remote Browser Isolation]]></category>
            <category><![CDATA[SASE]]></category>
            <guid isPermaLink="false">2aw4CGc70Xd1iZqEKdPLEv</guid>
            <dc:creator>Tim Obezuk</dc:creator>
        </item>
        <item>
            <title><![CDATA[How to augment or replace your VPN with Cloudflare]]></title>
            <link>https://blog.cloudflare.com/how-to-augment-or-replace-your-vpn/</link>
            <pubDate>Wed, 22 Jun 2022 13:27:57 GMT</pubDate>
            <description><![CDATA[ Offloading key applications from your traditional VPN to a cloud-native ZTNA solution like Cloudflare Access is a great place to start with Zero Trust and provides an approachable, meaningful upgrade for your business ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/WN6lYTf2KuVkBxdvkwMYb/5ae53c8f61562ba7e21286d96461f91b/image2-31.png" />
            
            </figure><blockquote><p><i>“Never trust, always verify.”</i></p></blockquote><p>Almost everyone we speak to these days understands and agrees with this fundamental principle of <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a>. So what’s stopping folks? The biggest gripe we hear: they simply aren’t sure where to start. Security tools and network infrastructure have often been in place for years, and a murky implementation journey involving applications that people rely on to do their work every day can feel intimidating.</p><p>While there’s no universal answer, several of our customers have agreed that offloading key applications from their traditional VPN to a cloud-native <a href="https://www.cloudflare.com/learning/access-management/what-is-ztna/">Zero Trust Network Access</a> (ZTNA) solution like Cloudflare Access is a great place to start—providing an approachable, meaningful upgrade for their business.</p><p>In fact, GartnerⓇ predicted that “by 2025, at least 70% of new remote access deployments will be served predominantly by ZTNA as opposed to VPN services, up from less than 10% at the end of 2021.”<sup>1</sup> By prioritizing a ZTNA project, IT and Security executives can better shield their business from attacks like ransomware while simultaneously improving their employees’ daily workflows. The trade-off between security and user experience is an outmoded view of the world; organizations can truly improve both if they go down the ZTNA route.</p><p>You can get started <a href="https://dash.cloudflare.com/sign-up/teams">here</a> with Cloudflare Access for free, and in this guide we’ll show you why, and how.</p>
    <div>
      <h3>Why nobody likes their VPN</h3>
      <a href="#why-nobody-likes-their-vpn">
        
      </a>
    </div>
    <p>The network-level access and default trust granted by VPNs create avoidable security gaps by inviting the possibility of lateral movement within your network. Attackers may enter your network through a less-sensitive entry point after stealing credentials, and then traverse to find more business-critical information to exploit. In the face of rising attacks, the threat here is too real—and the path to mitigate is too within reach—to ignore.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/S5AgHD6LfYya0TASHNSUw/306e79aa699b524dbb11a66c7d6a57ae/image1-31.png" />
            
            </figure><p>Meanwhile, VPN performance feels stuck in the 90s… and not in a fun, nostalgic way. Employees suffer through slow and unreliable connections that simply weren’t built for today’s scale of remote access. In the age of the “Great Reshuffle” and the current recruiting landscape, providing subpar experiences for teams based on legacy tech doesn’t have a great ROI. And when IT/security practitioners have plenty of other job opportunities readily available, they may not want to put up with manual, avoidable tasks born from an outdated technology stack. From both <a href="https://www.cloudflare.com/learning/access-management/what-is-remote-access-security/">security</a> and usability angles, moving toward <a href="https://www.cloudflare.com/products/zero-trust/vpn-replacement/">VPN replacement</a> is well worth the pursuit.</p>
    <div>
      <h3>Make least-privilege access the default</h3>
      <a href="#make-least-privilege-access-the-default">
        
      </a>
    </div>
    <p>Instead of authenticating a user and providing access to everything on your corporate network, a <a href="https://www.cloudflare.com/learning/access-management/how-to-implement-zero-trust/">ZTNA implementation</a> or “<a href="https://www.cloudflare.com/learning/access-management/software-defined-perimeter/">software-defined perimeter</a>” authorizes access per resource, effectively eliminating the potential for lateral movement. Each access attempt is evaluated against Zero Trust rules based on identity, device posture, geolocation, and other contextual information. Users are continuously re-evaluated as context changes, and all events are logged to help improve visibility across all types of applications.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1hpFxjdxDQMkkCZxn5QIWh/8affb5a021cbc9714fa632824ebd7377/image4-20.png" />
            
            </figure><p>As co-founder of <a href="https://www.cloudflare.com/case-studies/udaan-access/">Udaan</a>, Amod Malviya, noted, “VPNs are frustrating and lead to countless wasted cycles for employees and the IT staff supporting them. Furthermore, conventional VPNs can lull people into a false sense of security. With Cloudflare Access, we have a far more reliable, intuitive, secure solution that operates on a per user, per access basis. I think of it as Authentication 2.0 — even 3.0".</p><p>Better security <i>and</i> user experience haven’t always co-existed, but the fundamental architecture of ZTNA really does improve both compared to legacy VPNs. Whether your users are accessing Office 365 or your custom, on-prem HR app, every login experience is treated the same. With Zero Trust rules being checked behind the scenes, suddenly every app feels like a SaaS app to your end users. Like our friends at <a href="https://www.cloudflare.com/case-studies/onetrust/">OneTrust</a> said when they implemented ZTNA, “employees can connect to the tools they need, so simply teams don’t even know Cloudflare is powering the backend. It just works.”</p>
    <div>
      <h3>Assembling a ZTNA project plan</h3>
      <a href="#assembling-a-ztna-project-plan">
        
      </a>
    </div>
    <p>VPNs are so entrenched in an organization’s infrastructure that fully replacing one may take a considerable amount of time, depending on the total number of users and applications served. However, there still is significant business value in making incremental progress. You can migrate away from your VPN at your own pace and let ZTNA and your VPN co-exist for some time, but it is important to at least get started.</p><p>Consider which one or two applications behind your VPN would be most valuable for a ZTNA pilot, like one with known complaints or numerous IT support tickets associated with it. Otherwise, consider internal apps that are heavily used or are visited by particularly critical or high-risk users. If you have any upcoming hardware upgrades or license renewals planned for your VPN(s), apps behind the accompanying infrastructure may also be a sensible fit for a modernization pilot.</p><p>As you start to plan your project, it’s important to involve the right stakeholders. For your ZTNA pilot, your core team should at minimum involve an identity admin and/or admin who manages internal apps used by employees, plus a network admin who understands your organization's traffic flow as it relates to your VPN. These perspectives will help to holistically consider the implications of your project rollout, especially if the scope feels dynamic.</p>
    <div>
      <h3>Executing a transition plan for a pilot app</h3>
      <a href="#executing-a-transition-plan-for-a-pilot-app">
        
      </a>
    </div>
    <p><b>Step 1: Connect your internal app to Cloudflare’s network</b>The Zero Trust dashboard guides you through a <a href="/ridiculously-easy-to-use-tunnels/">few simple steps</a> to set up our app connector, no virtual machines required. Within minutes, you can create a tunnel for your application traffic and route it based on public hostnames or your private network routes. The dashboard will provide a string of commands to copy and paste into your command line to facilitate initial routing configurations. From there, Cloudflare will manage your configuration automatically.</p><p>A pilot web app may be the most straightforward place to start here, but you can also extend to <a href="https://www.cloudflare.com/learning/access-management/what-is-ssh/">SSH</a>, VNC, RDP, or internal IPs and hostnames through the same workflow. With your tunnel up and running, you’ve created the means through which your users will securely access your resources and have essentially eliminated the potential for lateral movement within your network. Your application is not visible to the public Internet, significantly reducing your <a href="https://www.cloudflare.com/learning/security/what-is-an-attack-surface/">attack surface</a>.</p><p><b>Step 2: Integrate identity and endpoint protection</b>Cloudflare Access acts as an aggregation layer for your existing security tools. With support for over a dozen identity providers (IdPs) like Okta, Microsoft Azure AD, Ping Identity, or OneLogin, you can link multiple simultaneous IdPs or separate tenants from one IdP. This can be particularly useful for companies undergoing mergers or acquisitions or perhaps going through compliance updates, e.g. incorporating a separate <a href="https://www.cloudflare.com/learning/privacy/what-is-fedramp/">FedRAMP</a> tenant.</p><p>In a ZTNA implementation, this linkage lets both tools play to their strengths. The IdP houses user stores and performs the <a href="https://www.cloudflare.com/learning/access-management/what-is-identity/">identity authentication</a> check, while Cloudflare Access controls the broader Zero Trust rules that ultimately decide access permissions to a broad range of resources.</p><p>Similarly, admins can integrate common endpoint protection providers like Crowdstrike, SentinelOne, Tanium or VMware Carbon Black to incorporate device posture into Zero Trust rulesets. Access decisions can <a href="https://www.cloudflare.com/cybersecurity-risk-management/">incorporate device posture risk scores</a> for tighter granularity.</p><p>You might find shortcut approaches to this step if you plan on using simpler authentication like one-time pins or social identity providers with external users like partners or contractors. As you mature your ZTNA rollout, you can incorporate additional IdPs or endpoint protection providers at any time without altering your fundamental setup. Each integration only adds to your source list of contextual signals at your disposal.</p><p><b>Step 3: Configure Zero Trust rules</b>Depending on your assurance levels for each app, you can customize your Zero Trust policies to appropriately restrict access to authorized users using contextual signals. For example, a low-risk app may simply require email addresses ending in “@company.com” and a successful SMS or email multifactor authentication (MFA) prompt. Higher risk apps could require hard token MFA specifically, plus a device posture check or other custom validation check using <a href="/access-external-validation-rules">external APIs</a>.</p><p>MFA in particular can be difficult to implement with legacy on-prem apps natively using traditional single sign-on tools. Using Cloudflare Access as a reverse proxy helps provide an aggregation layer to simplify rollout of MFA to all your resources, no matter where they live.</p><p><b>Step 4: Test clientless access right away</b>After connecting an app to Cloudflare and configuring your desired level of authorization rules, end users in most cases can test web, SSH, or VNC access without using a device client. With no downloads or mobile device management (MDM) rollouts required, this can help accelerate ZTNA adoption for key apps and be particularly useful for <a href="https://www.cloudflare.com/products/zero-trust/third-party-access/">enabling third-party access</a>.</p><p>Note that a device client can still be used to unlock other use cases like protecting SMB or thick client applications, verifying device posture, or enabling private routing. Cloudflare Access can handle any arbitrary L4-7 TCP or UDP traffic, and through bridges to WAN-as-a-service it can offload VPN use cases like ICMP or server-to-client initiated protocol traffic like VoIP as well.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6746KBqjBDBLiO8bEocEJZ/e95d66609c7fd21f7cb72351b78ae39d/image3-22.png" />
            
            </figure><p>At this stage for the pilot app, you are up and running with ZTNA! Top priority apps can be offloaded from your VPN one at a time at any pace that feels comfortable to help modernize your access security. Still, augmenting and fully replacing a VPN are two very different things.</p>
    <div>
      <h3>Moving toward full VPN replacement</h3>
      <a href="#moving-toward-full-vpn-replacement">
        
      </a>
    </div>
    <p>While a few top resource candidates for VPN offloading might be clear for your company, the total scope could be overwhelming, with potentially thousands of internal IPs and domains to consider. You can configure the local domain fallback entries within Cloudflare Access to point to your internal DNS resolver for selected <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-networks/private-net/private-hostnames-ips/">internal hostnames</a>. This can help you more efficiently disseminate access to resources made available over your Intranet.</p><p>It can also be difficult for admins to granularly understand the full reach of their current VPN usage. Potential visibility issues aside, the full scope of applications and users may be in dynamic flux especially at large organizations. You can use the <a href="/introducing-network-discovery">private network discovery</a> report within Cloudflare Access to passively vet the state of traffic on your network over time. For discovered apps requiring more protection, Access workflows help you tighten Zero Trust rules as needed.</p><p>Both of these capabilities can help reduce anxiety around fully retiring a VPN. By starting to build your private network on top of Cloudflare’s network, you’re bringing your organization closer to achieving Zero Trust security.</p>
    <div>
      <h3>The business impact our customers are seeing</h3>
      <a href="#the-business-impact-our-customers-are-seeing">
        
      </a>
    </div>
    <p>Offloading applications from your VPN and moving toward ZTNA can have measurable benefits for your business even in the short term. Many of our customers speak to improvements in their IT team’s efficiency, onboarding new employees faster and spending less time on access-related help tickets. For example, after implementing Cloudflare Access, <a href="https://www.cloudflare.com/case-studies/eteacher-group/">eTeacher Group</a> reduced its employee onboarding time by 60%, helping all teams get up to speed faster.</p><p>Even if you plan to co-exist with your VPN alongside a slower modernization cadence, you can still track IT tickets for the specific apps you’ve transitioned to ZTNA to help quantify the impact. Are overall ticket numbers down? Did time to resolve decrease? Over time, you can also partner with HR for qualitative feedback through employee engagement surveys. Are employees feeling empowered with their current toolset? Do they feel their productivity has improved or complaints have been addressed?</p><p>Of course, improvements to security posture also help mitigate the risk of expensive data breaches and their lingering, damaging effects to brand reputation. Pinpointing narrow cause-and-effect relationships for the cost benefits of each small improvement may feel more art than science here, with too many variables to count. Still, reducing reliance on your VPN is a great step toward reducing your attack surface and contributes to your macro return on investment, however long your full Zero Trust journey may last.</p>
    <div>
      <h3>Start the clock toward replacing your VPN</h3>
      <a href="#start-the-clock-toward-replacing-your-vpn">
        
      </a>
    </div>
    <p>Our obsession with product simplicity has helped many of our customers sunset their VPNs already, and we can’t wait to do more.</p><p>You can get started <a href="https://dash.cloudflare.com/sign-up/teams">here</a> with Cloudflare Access for free to begin augmenting your VPN. Follow the steps outlined above with your prioritized ZTNA test cases, and for a sense of broader timing you can create your own <a href="https://zerotrustroadmap.org/">Zero Trust roadmap</a> as well to figure out what project should come next.</p><p>For a full summary of Cloudflare One Week and what’s new, tune in to our <a href="https://gateway.on24.com/wcc/eh/2153307/lp/3824611/the-evolution-of-cloudflare-one?partnerref=blog">recap webinar</a>.</p><p>___</p><p><sup>1</sup>Nat Smith, Mark Wah, Christian Canales. (2022, April 08). Emerging Technologies: Adoption Growth Insights for Zero Trust Network Access. GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare One Week]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[VPN]]></category>
            <category><![CDATA[Cloudflare Access]]></category>
            <guid isPermaLink="false">9MTFeA4uaVtxpQW4jARbx</guid>
            <dc:creator>Michael Keane</dc:creator>
        </item>
        <item>
            <title><![CDATA[Looking Forward: Some Predictions for 2022]]></title>
            <link>https://blog.cloudflare.com/predictions-for-2022/</link>
            <pubDate>Fri, 31 Dec 2021 13:54:10 GMT</pubDate>
            <description><![CDATA[ As we approach the end of the year, let's look ahead at some trends and predictions for 2022 ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2Cc3EWZVVC5ipRybQvtkVK/4624e0dc8b98a01a2d9024a844241eee/image1-116.png" />
            
            </figure><p>As the year comes to a close, I often reflect and make predictions about what’s to come in the next. I’ve written end-of-year predictions posts in the past, but this is my first one at Cloudflare. I joined as Field CTO in September and currently enjoy the benefit of a long history in the Internet industry with fresh eyes regarding Cloudflare. I’m excited to share a few of my thoughts as we head into the new year. Let’s go!</p><blockquote><p>“Never make predictions, especially about the future.”— <b>Casey Stengel</b></p></blockquote>
    <div>
      <h3>Adapting to a 5G world</h3>
      <a href="#adapting-to-a-5g-world">
        
      </a>
    </div>
    <p>Over the last few years, 5G networks have begun to roll out gradually worldwide. When carriers bombard us with holiday ads touting their new 5G networks, it can be hard to separate hype from reality. But 5G technology is real, and the promise for end-users is vastly more wireless bandwidth and lower network latency. Better network performance will make websites, business applications, video streaming, online games, and emerging technologies like AR/VR all perform better.</p><p>The trend of flexible work will also likely increase the adoption of 5G mobile and fixed wireless broadband. Device makers will ship countless new products with embedded 5G in the coming year. Remote workers will eagerly adopt new technology that improves Internet performance and reliability.</p><p>Companies will also invest heavily in 5G to deliver better experiences for their employees and customers. Developers will start re-architecting applications where more wireless “last mile”  bandwidth and lower wireless latency will have the most benefit. Similarly, network architects will seek solutions to improve the end-to-end performance of the entire network. In 2022, we’ll see massive investment and increased competition around 5G amongst network operators and cloud providers. Customers will gravitate to partners who can balance 5G network adoption with the most significant impact and the least cost and effort.</p>
    <div>
      <h3>The talent is out there; it’s “just not evenly distributed.”</h3>
      <a href="#the-talent-is-out-there-its-just-not-evenly-distributed">
        
      </a>
    </div>
    <p>For various reasons, large numbers of workers changed jobs this year. In what has been called “the great resignation,” some claim there’s now a shortage of experienced tech workers. I’d argue that it’s more of a “great reshuffle” and consequently a race to attract and hire the best talent.</p><p><a href="/the-future-of-work-at-cloudflare/">Work has changed profoundly</a> due to the global pandemic over the last two years. People are now searching, applying, interviewing, onboarding, and working entirely remotely. Anyone looking to change jobs is likely evaluating potential employers on the working environment more than they did pre-2020.</p><p>Jobseekers are evaluating employers on different criteria than in the past. Does video conferencing work reliably? How streamlined is access to the software and tools I use every day? Can I work securely from different locations, or do the company’s security controls and VPN make it difficult to work flexibly?</p><p>Employers must make working flexibly easy and secure to attract the best talent. Even small amounts of digital friction are frustrating for workers and wasteful for employers. CIOs must take the lead and optimize the fully-digital, flexible work experience to compete for the very best talent. In 2022, I predict technology and tools will increasingly tip the balance in the talent war, and companies will look for every technological advantage to attract the talent they need.</p>
    <div>
      <h3>Cloud Simply Increases</h3>
      <a href="#cloud-simply-increases">
        
      </a>
    </div>
    <p>To eliminate some strain on employees, companies will search for ways to simplify their business processes and automate as much as possible. IT leaders will look for tasks they can outsource altogether. The best collaboration software and productivity tools tend to be delivered as-a-service.</p><p>It’s easy to predict more cloud adoption. But I don’t expect most companies to keep pace with how fast the cloud evolves. I was recently struck by how many services are now part of cloud provider portfolios. It isn’t easy for many companies to train employees and absorb these products fast enough. Another challenge is more cloud adoption means CEOs are often caught off guard by how much they are spending on the cloud. Lastly, there’s the risk that employee turnover means your cloud expertise sometimes walks out the door.</p><p>I predict companies will continue to adopt the cloud quickly, but IT leaders will expect cloud services to simplify instead of adding more complexity. Companies need the cloud to solve problems, not just provide the building blocks. IT leaders will ask for more bang for the buck and squeeze more value from their cloud partners to keep costs under control.</p><p>I also look forward to CIOs putting pressure on cloud providers to play nice with others and stop holding companies hostage. We believe <a href="/aws-egregious-egress/">egregious egress charges</a> are a barrier to cloud adoption, and eliminating them would remove much of the cost and frustration associated with integrating services and leveraging multiple clouds.</p><blockquote><p>“Everything should be made as simple as possible, but not simpler.”— <b>Albert Einstein</b></p></blockquote>
    <div>
      <h3>Security is only getting more complicated. Companies must embrace zero trust</h3>
      <a href="#security-is-only-getting-more-complicated-companies-must-embrace-zero-trust">
        
      </a>
    </div>
    <p>Throughout 2021, Cloudflare observed a steady rise in bot traffic and ever-larger <a href="/ddos-attack-trends-for-2021-q3/">DDoS attacks</a>. As an industry, we’ve seen the trends of more phishing attempts and high-profile ransomware attacks. The recent emergence of the <a href="/cve-2021-44228-log4j-rce-0-day-mitigation/">Log4j</a> vulnerability has reminded us that security doesn’t take a holiday.</p><p>Given the current threat landscape, how do we protect our companies? Can we stop blaming users for clicking phishing emails? How do we isolate bad actors if they happen to find a new zero-day exploit like Log4j?</p><p>The only trend I see that brings me hope is <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">zero trust</a>. It’s been on the radar for a few years, and some companies have <a href="https://www.cloudflare.com/learning/access-management/how-to-implement-zero-trust/">implemented</a> point-products that are called zero trust. But <a href="/zero-trust-not-a-buzzword/">zero trust isn’t a product or industry buzzword</a>. Zero trust is an overarching security philosophy. In my opinion, far too few companies have embraced zero trust as such.</p><p>In 2022, CIOs and CISOs will increasingly evaluate (or reevaluate) technologies and practices in their security toolkit through the lens of zero trust. It should not matter how invested IT leaders are in existing security technology. Everything should be scrutinized, from managing networks and deploying firewalls to authenticating users and securing access to applications. If it doesn’t fit in the context of zero trust, IT managers should probably replace it.</p><p>The security-as-a-service model will tend to win for the same reasons I predicted more cloud. Namely, solving security problems as simply as possible with the fewest headcount required.</p>
    <div>
      <h3>The corporate network (WAN) is dead. Long live the (Internet-based) corporate network</h3>
      <a href="#the-corporate-network-wan-is-dead-long-live-the-internet-based-corporate-network">
        
      </a>
    </div>
    <p>I can’t pinpoint the official time of death of the corporate WAN, but it was sometime between the advent of fiber-to-the-home and 5G wireless broadband. The corporate network has long suffered from high costs and inflexibility. <a href="https://www.cloudflare.com/learning/network-layer/what-is-an-sd-wan/">SD-WAN</a> was the prescription that extended the corporate network’s life, but work-from-home made the corporate network an anachronism.</p><p>Video conferencing and SaaS apps now run better at home than at the office for many of us. And the broader rollout of 5G will make things even better for mobile users. Your old VPN will soon disappear too. Shutting down the legacy VPN should be a badge of honor for the CISO. It’s a sign that the company has <a href="/replace-your-hardware-firewalls-with-cloudflare-one/">replaced the castle-and-moat perimeter firewall</a> architecture and is embracing the zero trust security model.</p><p>In 2022 and beyond, the Internet will become the only network that matters for most users and companies. SaaS adoption and continued flexible work arrangements will lead companies to give up the idea of the traditional corporate network. IT leaders will likely cut budgets for existing WAN infrastructure to invest in more effective end-user productivity.</p>
    <div>
      <h3>Matters of Privacy</h3>
      <a href="#matters-of-privacy">
        
      </a>
    </div>
    <p>Social media whistleblowers, end-to-end encryption, and mobile device privacy were on the minds of consumers in 2021. Consumers want to know whom they’re buying from and sharing data with, are they trustworthy, and what these companies do with the collected data?</p><p>Data privacy for businesses is critical to get right due to the scope of the privacy issues at hand. Historically, as some digital enterprises grew, there was a race to collect as much data as possible about their users and use it to generate revenue. The EU Global Data Protection Regulation (GDPR) has turned that around and forced companies to reevaluate their data collection practices. It has put power back into the hands of users and consumers.</p><p>GDPR is just one set of rules regulating the use of data about citizens. The US, EU, China, Russia, India, and Brazil have different views and regulations on privacy. Data privacy rules will not evolve the same everywhere, and it will be increasingly difficult for companies to navigate the patchwork of regulations around the globe.</p><p>Just as security is now a part of every software delivery stage, privacy needs to be considered throughout the development process. I predict that in 2022 and beyond, companies will architect applications with privacy laws in mind from the outset. About a year ago, we announced <a href="/introducing-the-cloudflare-data-localization-suite/">Cloudflare Data Localization Suite</a>, which helps businesses take advantage of our global network's performance and security benefits while making it easy to set rules to control where their data is handled automatically.</p><p>Another trend that spans the domains of privacy, security, and remote work is user preference for a single device for both personal and work-related activities. Carrying two or more devices is a hassle, but maintaining privacy and security on an unmanaged device presents challenges for IT. We will move away from the traditional tightly controlled, IT-managed device with time. <a href="/tag/remote-browser-isolation/">Browser isolation</a> and the evolution of zero trust security controls will get us closer to this holy grail of end-user device independence.</p>
    <div>
      <h3>Conclusion</h3>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>We have much to be thankful for, even with the challenges we’ve all faced in 2021. 2022 may well be as challenging as this year has been, but I predict it will be a great year, nonetheless. We’ll work hard, learn from our mistakes, and ultimately adapt to whatever life and work throw at us. At least that’s my plan for next year!</p> ]]></content:encoded>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[VPN]]></category>
            <guid isPermaLink="false">4qAZmaob9lxJtdnTwANv9L</guid>
            <dc:creator>John Engates</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zero Trust — Not a Buzzword]]></title>
            <link>https://blog.cloudflare.com/zero-trust-not-a-buzzword/</link>
            <pubDate>Wed, 20 Oct 2021 01:00:23 GMT</pubDate>
            <description><![CDATA[ Over the last few years, Zero Trust, a term coined by Forrester, picked up a lot of steam. Zero Trust, in its core, is a network architecture and security framework focusing on not having a distinction between external and internal access environments, and never trusting users/roles.  ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Over the last few years, Zero Trust, a term coined by Forrester, has picked up a lot of steam. Zero Trust, at its core, is a network architecture and security framework focusing on not having a distinction between external and internal access environments, and never trusting users/roles.</p><p>In the <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust model</a>, the network only delivers applications and data to authenticated and authorized users and devices, and gives organisations visibility into what is being accessed and to apply controls based on behavioral analysis. It gained popularity as the media reported on several high profile breaches caused by misuse, abuse or exploitation of VPN systems, breaches into end-users’ devices with access to other systems within the network, or breaches through third parties — either by exploiting access or compromising software repositories in order to deploy malicious code. This would later be used to provide further access into internal systems, or to deploy malware and potentially ransomware into environments well within the <a href="https://www.cloudflare.com/learning/access-management/what-is-the-network-perimeter/">network perimeter</a>.</p><p>When we first started talking to CISOs about Zero Trust, it felt like it was just a buzzword, and CISOs were bombarded with messaging from different cybersecurity vendors offering them Zero Trust solutions. Recently, another term, <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/">SASE (Secure Access Services Edge)</a>, a framework released by Gartner, also came up and added even more confusion to the mix.</p><p>Then came COVID-19 in 2020, and with it the reality of lockdowns and remote work. And while some organizations took that as an opportunity to accelerate projects around modernising their access infrastructure, others, due to procurement processes, or earlier technology decisions, ended up having to take a more tactical approach, ramping up existing remote access infrastructure by adding more licenses or capacity without having an opportunity to rethink their approach, nor having an opportunity to take into account the impact of their employees’ experience while working remotely full time in the early days of the pandemic.</p><p>So we thought it might be a good time to check on organizations in Asia Pacific, and look at the following:</p><ul><li><p>The pandemic’s impact on businesses</p></li><li><p>Current IT security approaches and challenges</p></li><li><p>Awareness, adoption and <a href="https://www.cloudflare.com/learning/access-management/how-to-implement-zero-trust/">implementation of Zero Trust</a></p></li><li><p>Key drivers and challenges in adopting Zero Trust</p></li></ul><p>In August 2021, we commissioned a research company called <a href="https://theleadingedge.com/">The Leading Edge</a> to conduct a survey that touches on these topics. The <a href="https://www.cloudflare.com/press-releases/2021/asia-pacific-businesses-identify-zero-trust-as-key-to-addressing-cyberattacks/">survey</a> was conducted across five countries — Australia, India, Japan, Malaysia, and Singapore, and 1,006 IT and cybersecurity decision-makers and influencers from companies with more than 500 employees participated.</p><p>For example, 54% of organisations said they saw an increase in security incidents in 2021, when compared to the previous year, with 83% of respondents who experienced security incidents saying they had to make significant changes to their IT security procedures as a result.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/ClgGbTL0oXY82RdaYXIDw/e2a993b600cdf9779abdb38b9c4e0b0a/pasted-image-0.png" />
            
            </figure><p>Increase in security incidents when compared to 2020. ▲▼ Significantly higher/lower than total sample</p><p>And while the overall APAC stats are already quite interesting, I thought it would be even more fascinating to look at the unique characteristics of each of the five countries, so let’s have a look:</p>
    <div>
      <h3>Australia</h3>
      <a href="#australia">
        
      </a>
    </div>
    <p>Australian organisations reported the highest impact of COVID-19 when it comes to their IT security approach, with 87% of the 203 respondents surveyed saying the pandemic had a moderate to significant impact on their IT security posture. The two biggest cities in Australia (Sydney and Melbourne) were in lockdown for over 100 days, each in the second half of 2021 alone. With the extensive lockdowns, it’s not a surprise that 48% of respondents reported challenges with maximising remote workers’ productivity without exposing them or their devices to new risks.</p><p>With 94% of organisations in Australia having reported they will be implementing a combination of return to office and work from home, building an effective and uniform security approach can be quite challenging. If you combine that with the fact that 62% saw an increase in security incidents over the last year, we can safely assume IT and cybersecurity decision-makers and influencers in Australia have been working on improving their security posture over the last year, even though 40% of respondents indicated they struggled to secure the right level of funding for such projects.</p><p>Australia seems to be well advanced on the journey into implementing Zero Trust when compared to other four countries included in the report, with 45% of the organisations that have adopted Zero Trust starting their Zero Trust journey over the last one to four years. Australian organisations have always been known for fast cloud adoption, and even in the early 2010s Australians were already consuming IaaS quite heavily.</p>
    <div>
      <h3>India</h3>
      <a href="#india">
        
      </a>
    </div>
    <p>When compared to the other countries in the report, India has a very challenging environment when it comes to working from home, with Internet connectivity being inconsistent, even though there’s been significant improvement in internet speeds in the country, and problems like power outages regularly occurring in certain areas outside of city centres. Surprisingly, the biggest challenge reported by Indian organisations was that they could benefit from newer security functionality, which goes to show that legacy security approaches are still widely present in India. Likewise, 37% of the respondents reported that their access technologies are too complex, which supports the previous point that newer security functionality would be beneficial to the same organisations.</p><p>When asked about their concerns around the shift in how their users will access applications, one of the biggest concerns raised by 59% of the respondents was around applications being protected by VPN or IP address controls alone. This shows Zero Trust would fit really well with their IT strategy moving forward, as controls can now be applied to users and their devices.</p><p>Another interesting point to make, and where Zero Trust can be leveraged, is 65% of respondents saying internal IT and security staff shortage and cuts is a huge challenge. Most security technologies out there would require special skills to build, maintain and operate, and this is where simplifying access with the right Zero Trust approach could really help improve the productivity of those teams.</p>
    <div>
      <h3>Japan</h3>
      <a href="#japan">
        
      </a>
    </div>
    <p>When we look at the results of the survey across all five countries, it’s fairly obvious that Japan didn't seem to have quite the same challenges as the other countries when the pandemic started. Businesses continued to operate normally for most of 2020 and 2021, which would explain why the impact wasn’t in line with the other countries. Having said that, 51% of the respondents surveyed in Japan still reported they saw a moderate to significant impact in their IT security approach, which is still significant, even though lower than the other countries.</p><p>Japanese organisations also reported an increase in the number of security incidents, which supports the fact that even though the impact of the pandemic wasn’t as severe as in other countries, 45% of the respondents still reported an increase in security incidents, and 63% still had to make changes to their IT security procedures as a direct result of incidents.</p>
    <div>
      <h3>Malaysia</h3>
      <a href="#malaysia">
        
      </a>
    </div>
    <p>Malaysia rated second highest (at 80%) in our report on the impact the pandemic has had on organisations’ IT security approach, and rated highest on both employees using their home networks and using personal devices for work, at 94% and 92% respectively. From a security perspective, that poses a significant impact to an organization's security posture and <a href="https://www.cloudflare.com/learning/security/what-is-an-attack-surface/">increases the attack surface</a> for an organisation substantially.</p><p>From a risk perspective, Malaysian organisations rated lack of management over employees’ devices pretty highly, with 65% of them expressing concerns over it. Other areas worth calling out were applications and data being exposed to the public Internet, and lack of visibility into staff activity inside applications.</p><p>With 57% of the respondents calling out an increase in security incidents when compared to the previous year, 89% of the respondents said they had to make significant changes to their IT security procedures due to either security incidents or attack attempts against their environments.</p>
    <div>
      <h3>Singapore</h3>
      <a href="#singapore">
        
      </a>
    </div>
    <p>In Singapore, 79% of IT and cybersecurity decision-makers and influencers reported that the pandemic has impacted their IT security approach, and two in five organisations said they could benefit from more modern security functionality as a direct result of the impact caused by the pandemic. 52% of the organisations also reported an increase in security incidents compared to 2020, with almost half having seen an increase in phishing attempts.</p><p>Singaporean organisations were also not immune to a significant increase in IT security spend as a direct result of the pandemic, with 62% of them having reported more investment in security. Some of the challenges these organisations were facing were related to applications being directly exposed to the public Internet, limited oversight on <a href="https://www.cloudflare.com/products/zero-trust/third-party-access/">third party access</a> and applications being protected by username and password only.</p><p>While Singapore is known for high speed home Internet, it was quite a surprise for me to see that 40% of organisations surveyed reported issues with latency or slow connectivity into applications via VPN. This goes to show that the problem of concentrating traffic into a single location can impact application performance even across relatively small geographies, and even if bandwidth is not necessarily a problem, like what happens in Singapore.</p>
    <div>
      <h3>The work in IT security never stops</h3>
      <a href="#the-work-in-it-security-never-stops">
        
      </a>
    </div>
    <p>While there were distinct differences in each country around IT security posture and Zero Trust adoption, across Asia Pacific, the similarities are what stand out the most:</p><ul><li><p>Cyberattacks continue to rise</p></li><li><p>Flexible work is here to stay</p></li><li><p>Skilled in-house IT security workers are a scarce resource</p></li><li><p>Need to educate stakeholders around Zero Trust</p></li></ul><p>These challenges are not easy to tackle, add to these the required focus on improving employee experience, reducing operational complexities, better visibility into 3rd party activity, and tighter controls due to the increase in security incidents, and you’ve got a heck of a huge responsibility for IT.</p><p>And this is where <a href="https://www.cloudflare.com/teams/">Cloudflare</a> comes in. Not only have we been helping our <a href="https://www.cloudflare.com/products/zero-trust/remote-workforces/">employees work security</a> throughout the pandemic, we have also been helping organisations all over the globe streamline their IT security operations when it comes to users accessing applications through <a href="https://www.cloudflare.com/teams/access/">Cloudflare Access</a>, or securing their activity on the Internet through our <a href="https://www.cloudflare.com/teams/gateway/">Secure Web Gateway</a> services, which even includes controls around SaaS applications and <a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">browser isolation</a>, all with the best possible user experience.</p><p>So come <a href="https://www.cloudflare.com/lp/apac-zt-survey/">talk to us</a>!</p> ]]></content:encoded>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[VPN]]></category>
            <guid isPermaLink="false">3HCRPXIE4L2YTDnRAGFPRs</guid>
            <dc:creator>Fernando Serto</dc:creator>
        </item>
        <item>
            <title><![CDATA[Start building your own private network on Cloudflare today]]></title>
            <link>https://blog.cloudflare.com/build-your-own-private-network-on-cloudflare/</link>
            <pubDate>Tue, 20 Apr 2021 13:00:00 GMT</pubDate>
            <description><![CDATA[ Starting today, your team can build a private network on Cloudflare’s network. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Starting today, your team can create a private network on Cloudflare’s network. Team members click a single button to connect to private IPs in environments that you control. Cloudflare’s network routes their connection through a data center in one of over 200 cities around the world. On the other side, administrators deploy a lightweight software connector that replaces traditional VPN appliances.</p><p>Cloudflare’s private network combines IP level connectivity and <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust controls</a>. Thick clients like RDP software, SMB file viewers, or other programs can connect to the private IPs already in use in your deployment without any additional configuration. Coming soon, you’ll be able to layer additional identity-based network-level rules to control which users, from which devices, can reach specific IPs.</p><p>We are launching this feature as a follow-up to Cloudflare’s <a href="https://www.cloudflare.com/developer-week/">Developer Week</a> because we are excited to give your development team, and your entire organization, a seamless platform for building and connecting your internal resources. We built this solution based on feedback from customers who want to move to a Zero Trust model without sacrificing some convenience of a private network.</p><p>We’re excited to give any team the ability to run their internal network on Cloudflare’s global edge. Organizations that have 50 or fewer team members can use this feature, as well as nearly all of Cloudflare for Teams, at no cost by starting <a href="https://dash.cloudflare.com/sign-up/teams">here</a>.</p>
    <div>
      <h3>Challenges with non-web applications</h3>
      <a href="#challenges-with-non-web-applications">
        
      </a>
    </div>
    <p>Over the last three years, Cloudflare Access has helped thousands of organizations <a href="https://www.cloudflare.com/products/zero-trust/vpn-replacement/">replace their VPN with a Zero Trust model</a>. Most of those teams started with web applications like homegrown intranet sites or self-hosted tools. In less than 10 minutes, customers could connect an application to Cloudflare’s network, add Zero Trust rules, and make connectivity seamless and fast for their users.</p><p>Web applications make that flow easier thanks to client software that already runs on every device: the browser. Browsers send HTTP requests over the public Internet to the application. Cloudflare’s network checks every request against the Zero Trust rules configured for that application.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2VFpLsnlg33lc1tMecCMtA/ccde00124bab294c7e14c1de77bdf283/DES-3300-1.png" />
            
            </figure><p>Users are prompted to authenticate and, in some cases, present additional signals like <a href="/zero-trust-with-managed-devices/">device posture</a>. If the user should be able to reach the application, Cloudflare issues a JSON Web Token (JWT) that the browser stores in the form of a cookie. That token allows for <a href="/announcing-the-cloudflare-access-app-launch/">seamless authentication</a> to other applications because they all are available inside of the same web browser.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6RN10OWEzq5DyjW8cOP2ln/37efefd1269078b20dce7eb5537e47d9/2-17.png" />
            
            </figure><p>Cloudflare's network accelerates traffic to the applications and evaluates every request. Meanwhile, the browser handles authentication storage and HTTP requests trigger Zero Trust checks. No additional client software is required.</p><p>Customers gave us two consistent pieces of feedback:</p><ul><li><p>“Setup for web applications is seamless.”</p></li><li><p>“What about everything else outside of the browser?”</p></li></ul><p>Use cases outside of the browser introduce two challenges: they each rely on a different piece of client software and they each handle authentication in unique ways. For example, <a href="https://www.cloudflare.com/learning/access-management/what-is-ssh/">SSH sessions</a> can support client certificates or password authentication. RDP workflows rely on passwords and tend to lack multifactor requirements or SSO integration. Other protocols lack authentication altogether. Exposing any of these directly on the Internet would make them vulnerable to attack.</p><p>As a result, organizations hide these types of resources behind a private network as a band-aid. Users toggle their VPN and their client software connects to internal IPs and ports. Administrators suffer through maintaining VPN appliances while their users deal with the slower performance.</p><p>Cloudflare attempted to solve this type of use case a <a href="/cloudflare-access-now-supports-rdp/">couple of years ago</a>. We built an option that relied on a connector, `cloudflared`, that bridged user devices and the environment where the services ran.</p><p>The instance of <code>cloudflared</code> running in the data center or cloud environment created a WebSocket connection between the connector and Cloudflare’s edge. End users ran the same connector on their own devices. <code>cloudflared</code> running on the client device exposed a local port which could receive traffic from services like an SMB or RDP client and send it over WebSocket to the corresponding <code>cloudflared</code> in the data center.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5BTV6gVP4eBgYTgpyFl6Gn/5ae0a76e1c522adf1d2cbffe3cdbb75d/3-13.png" />
            
            </figure><p>This option was functional, but not viable for small teams without dedicated IT staff or enterprises who do not want to retrain tens of thousands of users. End users had to run a manual command for each service and change the configuration for every client. We had offered full Zero Trust control at the expense of usability.</p>
    <div>
      <h3>A private network on Cloudflare’s edge</h3>
      <a href="#a-private-network-on-cloudflares-edge">
        
      </a>
    </div>
    <p>Today’s announcement combines the usability of a VPN client with the performance and security of Cloudflare’s network while removing the maintenance overhead of networking appliances.</p><p>The architecture starts with Cloudflare Tunnel (<a href="/tunnel-for-everyone/">previously called Argo Tunnel</a>). Cloudflare Tunnel uses the same connector, <code>cloudflared</code>, to create an outbound-only TCP connection from your data center or public cloud environment to two nearby Cloudflare data centers.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3ECB9LuW8KEP4G7ViWUk3y/00ba18d6ae37873758cfeb2aecf37273/1-33.png" />
            
            </figure><p>Administrators configure the tunnel to represent a range of IP addresses where applications run in their environment. Those IPs can be RFC 1918 ranges or any IP addresses that <code>cloudflared</code> can address. Teams can also run redundant Tunnels for availability and separate Tunnels in different environments to connect other IP ranges.</p><p>Cloudflare’s edge then maps each Tunnel in the organization’s account to the IP range represented. Administrators can review the mapping from any active instance of <code>cloudflared</code>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5Y2xjLrghGXN0mCXv3OYdM/08c6a107c69026a38394d90298d12483/image9-1.png" />
            
            </figure><p>On the client side, end users run an agent, Cloudflare WARP, and authenticate with their <a href="/multi-sso-and-cloudflare-access-adding-linkedin-and-github-teams/">identity provider</a> into the same Cloudflare account that administers the Tunnels. They can then click a single button to connect and the WARP agent creates a Wireguard tunnel from the device to Cloudflare’s network.</p><p>The Cloudflare WARP agent routes traffic from the device to Cloudflare’s edge. By default, the client excludes traffic to RFC 1918 IP addresses and a <a href="https://developers.cloudflare.com/cloudflare-one/tutorials/split-tunnel">few other defaults</a>. In this mode, administrators can configure the client to instead pick up traffic bound for those IP ranges.</p><p>When that traffic arrives, Cloudflare’s edge locates the Tunnel in that account that represents the IP range enrolled. If the user connects to the same data center as the Tunnel, Cloudflare proxies a TCP connection by opening a bidirectional stream to the corresponding instance of <code>cloudflared</code>. If the user first reaches a different data center, Cloudflare’s smart routing technology finds the fastest path to the Tunnel.</p><p>Client applications that connect to specific IP addresses can continue to do so without any configuration changes. When those applications attempt to reach those IPs, the Cloudflare WARP agent handles routing that traffic to Cloudflare’s edge and to the instance of <code>cloudflared</code>.</p><p><code>cloudflared</code> then operates like a bastion inside of the data center and connects to the services running at those IP addresses.</p>
    <div>
      <h3>Security for the rest of the Internet</h3>
      <a href="#security-for-the-rest-of-the-internet">
        
      </a>
    </div>
    <p>The Cloudflare WARP agent that connects users to this private network can also keep them safe on the rest of the Internet.</p><p>You can start by using Cloudflare WARP to <a href="/protect-your-team-with-cloudflare-gateway/">filter DNS queries</a> for devices in any location. We've built that solution on top of the world's fastest DNS resolver, 1.1.1.1, to stop users from inadvertently connecting to phishing sites, malware, or other threats.</p><p>The agent can also help your team adopt a <a href="/gateway-swg/">faster Secure Web Gateway</a> and deprecate web filtering hardware. Cloudflare WARP will connect all Internet-bound traffic over a Wireguard tunnel to a nearby data center. Once there, Cloudflare will inspect the HTTP requests and accelerate traffic to its destination on our global backbone network. You can build rules that control where files can be uploaded, filter for viruses inside of traffic, or prevent users from going to certain parts of sites.</p>
    <div>
      <h3>How to get started</h3>
      <a href="#how-to-get-started">
        
      </a>
    </div>
    <p>You can start running your virtual private network on Cloudflare <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-networks">with just four steps</a>.</p><p>1. Install and authenticate <code>cloudflared</code> in a data center, public cloud environment, or even on a single server with the command below. Once authenticated, <code>cloudflared</code> will become part of your Cloudflare account and available.</p><p><code>cloudflared tunnel login</code></p><p>2. Create a Tunnel with a name that represents that service or environment.</p><p><code>cloudflared tunnel create grafana</code></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7E2AGQMxYQXGDC3kne4IWw/53b94cb57f907c31bbb24796e3ecd728/image6-6.png" />
            
            </figure><p>Next, configure <code>cloudflared</code> to represent the IP address range in your environment. The command below will tell Cloudflare to send traffic from your users to that IP range to this Tunnel.</p><p><code>cloudflared tunnel route ip add 100.64.0/10</code></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7CQw5brWUtTDVX0FPoIqkj/31a314b062cdeb817d7fcc8b8831b8ce/image1-31.png" />
            
            </figure><p>Once configured, you can start the tunnel with a single command or run it as a service.</p><p><code>cloudflared tunnel run grafana</code></p><ol><li><p>Configure traffic to private IP addresses to be <a href="https://developers.cloudflare.com/cloudflare-one/tutorials/split-tunnel">included through WARP</a>, as opposed to being run in the default split tunnel mode.</p></li><li><p>Enroll your device and enable WARP to connect.</p></li></ol>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5MhBwLmP8odlu8blEBE6Oj/026acfa8b2d223c1b346c363ed477ffa/image4-11.png" />
            
            </figure><p>We've provided a <a href="https://developers.cloudflare.com/cloudflare-one/tutorials/warp-to-tunnel">step-by-step tutorial</a> as well to help your team get started.</p>
    <div>
      <h3>What’s next?</h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>Available today, security teams can build rules to determine who can enroll into this private network and from which devices. That requirement and the connectivity features available make this option similar to a private network, although one accelerated by Cloudflare.</p><p>However, we want to give your team more granular control over who can reach specific resources. We’ll be launching support to build additional Zero Trust rules that apply distinct rules to individual IPs or IP ranges.</p><p>Additionally, this flow only works for client-to-server (WARP to <code>cloudflared</code>) connections. Coming soon, we’ll introduce support for east-west connections that will allow teams to connect <code>cloudflared</code> and other parts of Cloudflare One routing.</p> ]]></content:encoded>
            <category><![CDATA[Developer Week]]></category>
            <category><![CDATA[Developers]]></category>
            <category><![CDATA[Cloudflare Access]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[VPN]]></category>
            <category><![CDATA[Private Network]]></category>
            <category><![CDATA[Product News]]></category>
            <guid isPermaLink="false">6KQKp9C5NAyWwpLcWrypL6</guid>
            <dc:creator>Sam Rhea</dc:creator>
        </item>
        <item>
            <title><![CDATA[Dogfooding from Home: How Cloudflare Built our Cloud VPN Replacement]]></title>
            <link>https://blog.cloudflare.com/dogfooding-from-home/</link>
            <pubDate>Sat, 28 Mar 2020 12:00:00 GMT</pubDate>
            <description><![CDATA[ Rewind to 2015. Back then, as with many other companies, all of Cloudflare’s internally-hosted applications were reached via a hardware-based VPN.  ]]></description>
            <content:encoded><![CDATA[ <p></p><p><i>It’s never been more crucial to help remote workforces stay fully operational — for the sake of countless individuals, businesses, and the economy at large. In light of this, Cloudflare recently launched a program that offers our</i> <a href="https://teams.cloudflare.com/"><i>Cloudflare for Teams</i></a> <i>suite for free to any company, of any size, through September 1. Some of these firms have been curious about how Cloudflare itself uses these tools.</i></p><p><i>Here’s how Cloudflare’s next-generation </i><a href="https://www.cloudflare.com/products/zero-trust/vpn-replacement/"><i>VPN alternativ</i></a><i>e, Cloudflare Access, came to be.</i></p><p>Rewind to 2015. Back then, as with many other companies, all of Cloudflare’s internally-hosted applications were reached via a hardware-based VPN. When one of our on-call engineers received a notification (usually on their phone), they would fire up a clunky client on their laptop, connect to the VPN, and log on to Grafana.</p><p>It felt a bit like solving a combination lock with a fire alarm blaring overhead.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1loScoER3jSbV0Fx8ew5K3/d4529f071f20c8b92bc25613f8ca3050/1-4.png" />
            
            </figure><p>But for three of our engineers enough was enough. Why was a cloud network security company relying on clunky on-premise hardware?</p><p>And thus, Cloudflare Access was born.</p>
    <div>
      <h2>A Culture of Dogfooding</h2>
      <a href="#a-culture-of-dogfooding">
        
      </a>
    </div>
    <p>Many of the products Cloudflare builds are a direct result of the challenges our own team is looking to address, and Access is a perfect example. Development on Access originally began in 2015, when the project was known internally as EdgeAuth.</p><p>Initially, just one application was put behind Access. Engineers who received a notification on their phones could tap a link and, after authenticating via their browser, they would immediately have access to the key details of the alert in Grafana. We liked it a lot — enough to get excited about what we were building.</p><p>Access solved a variety of issues for our security team as well. Using our identity provider of choice, we were able to restrict access to internal applications at L7 using Access policies. This once onerous process of managing access control at the network layer with a VPN was replaced with a few clicks in the Cloudflare dashboard.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2r6zOhcoktU4SKn3GV40q9/5cd0d913e7ac1251a4a3f380d794ec4d/2-4.png" />
            
            </figure><p>After Grafana, our internal Atlassian suite including Jira and Wiki, and hundreds of other internal applications, the Access team began working to support non-HTTP based services. Support for git allowed Cloudflare’s developers to securely commit code from anywhere in the world in a fully audited fashion. This made Cloudflare’s security team very happy. Here’s a slightly modified example of a real authentication event that was generated while pushing code to our internal git repository.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6hRbK6bKTBmNnQhiaWF0Z6/9521336471e06597016619b326e3006f/3-5.png" />
            
            </figure><p>It didn’t take long for more and more of Cloudflare’s internal applications to make their way behind Access. As soon as people started working with the new authentication flow, they wanted it everywhere. Eventually our security team mandated that we move our apps behind Access, but for a long time it was totally organic: teams were eager to use it.</p><p>Incidentally, this highlights a perk of utilizing Access: you can start by protecting and streamlining the authentication flows for your most popular internal tools — but there’s no need for a wholesale rip-and-replace. For organizations that are experiencing limits on their hardware-based VPNs, it can be an immediate salve that is up and running after just one setup call with a Cloudflare onboarding expert (<a href="https://calendly.com/cloudflare-for-teams/onboarding?month=2020-03">you can schedule a time here).</a></p><p>That said, there are some upsides to securing everything with Access.</p>
    <div>
      <h2>Supporting a Global Team</h2>
      <a href="#supporting-a-global-team">
        
      </a>
    </div>
    <p>VPNs are notorious for bogging down Internet connections, and the one we were using was no exception. When connecting to internal applications, having all of our employees’ Internet connections pass through a standalone VPN was a serious performance bottleneck and single point of failure.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5v9QonqpsJsIHAQnskqPn4/fb16e5fa5e14c10e6b68ad52060db3b9/CLoudflare-access-vs-legacy-_2x.png" />
            
            </figure><p>Cloudflare Access is a much saner approach. Authentication occurs at our network edge, which extends to 200 cities in over 90 countries globally. Rather than having all of our employees route their network traffic through a single network appliance, employees connecting to internal apps are connecting to a data center just down the road instead.</p><p>As we support a globally-distributed workforce, our security team is committed to protecting our internal applications with the most secure and usable authentication mechanisms.</p><p>With Cloudflare Access we’re able to rely on the strong two-factor authentication mechanisms of our identity provider, which was much more difficult to do with our legacy VPN.</p>
    <div>
      <h2>On-Boarding and Off-Boarding with Confidence</h2>
      <a href="#on-boarding-and-off-boarding-with-confidence">
        
      </a>
    </div>
    <p>One of the trickiest things for any company is ensuring everyone has access to the tools and data they need — but no more than that. That’s a challenge that becomes all the more difficult as a team scales. As employees and contractors leave, it is similarly essential to ensure that their permissions are swiftly revoked.</p><p>Managing these access controls is a real challenge for IT organizations around the world — and it’s greatly exacerbated when each employee has multiple accounts strewn across different tools in different environments. Before using Access, our team had to put in a lot of time to make sure every box was checked.</p><p>Now that Cloudflare’s internal applications are secured with Access, on- and offboarding is much smoother. Each new employee and contractor is quickly granted rights to the applications they need, and they can reach them via a launchpad that makes them readily accessible. When someone leaves the team, one configuration change gets applied to every application, so there isn’t any guesswork.</p><p>Access is also a big win for network visibility. With a VPN, you get minimal insight into the activity of users on the network – you know their username and IP address. but that’s about it. If someone manages to get in, it’s difficult to retrace their steps.</p><p>Cloudflare Access is based on a zero-trust model, which means that every packet is authenticated. It allows us to assign granular permissions via Access Groups to employees and contractors. And it gives our security team the ability to detect unusual activity across any of our applications, with extensive logging to support analysis. Put simply: it makes us more confident in the security of our internal applications.</p>
    <div>
      <h2>But It’s Not Just for Us</h2>
      <a href="#but-its-not-just-for-us">
        
      </a>
    </div>
    <p>With the massive transition to a <a href="https://www.cloudflare.com/products/zero-trust/remote-workforces/">remote work model</a> for many organizations, Cloudflare Access can make you more confident in the security of your internal applications — while also driving increased productivity in your remote employees. Whether you rely on Jira, Confluence, SAP or custom-built applications, it can secure those applications and it can be live in minutes.</p><p>Cloudflare has made the decision to make Access completely free to all organizations, all around the world, through September 1. If you’d like to get started, follow our quick start guide here:Or, if you’d prefer to onboard with one of our specialists, schedule a 30 minute call at this link: <a href="https://calendly.com/cloudflare-for-teams/onboarding?month=2020-03">calendly.com/cloudflare-for-teams/onboarding?month=2020-03</a></p> ]]></content:encoded>
            <category><![CDATA[Cloudflare Access]]></category>
            <category><![CDATA[VPN]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <guid isPermaLink="false">3eOMZ4uPPsC6opFIkjbzOs</guid>
            <dc:creator>Evan Johnson</dc:creator>
        </item>
        <item>
            <title><![CDATA[Migrating from VPN to Access]]></title>
            <link>https://blog.cloudflare.com/migrating-from-vpn-to-access/</link>
            <pubDate>Sat, 28 Mar 2020 12:00:00 GMT</pubDate>
            <description><![CDATA[ With so many people at Cloudflare now working remotely, it's worth stepping back and looking at the systems we use to get work done and how we protect them. Over the years we've migrated from a traditional "put it behind the VPN!" company to a modern zero-trust architecture.  ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/HbcD2nz4oPww319S2cbBv/6b8fb8eb285b84cf4f18fa5de13ecc46/access-plus-Spectrum_2x-1.png" />
            
            </figure><p>With so many people at Cloudflare now working remotely, it's worth stepping back and looking at the systems we use to get work done and how we protect them. <a href="/dogfooding-from-home">Over the years we've migrated</a> from a traditional "put it behind the VPN!" company to a modern zero-trust architecture. Cloudflare hasn’t completed its journey yet, but we're pretty darn close. Our general strategy: protect every internal app we can with <a href="https://teams.cloudflare.com/access/index.html">Access</a> (our zero-trust access proxy), and simultaneously beef up our VPN’s security with <a href="https://www.cloudflare.com/products/cloudflare-spectrum/">Spectrum</a> (a product allowing the proxying of arbitrary TCP and UDP traffic, protecting it from DDoS).</p><p>Before Access, we had many services behind VPN (Cisco ASA running AnyConnect) to enforce strict authentication and authorization. But VPN always felt clunky: it's difficult to set up, maintain (securely), and scale on the server side. Each new employee we onboarded needed to learn how to configure their client. But migration takes time and involves many different teams. While we migrated services one by one, we focused on the high priority services first and worked our way down. Until the last service is moved to Access, we still maintain our VPN, keeping it protected with Spectrum.</p><p>Some of our services didn't run over HTTP or other Access-supported protocols, and still required the use of the VPN: source control (git+ssh) was a particular sore spot. If any of our developers needed to commit code they'd have to fire up the VPN to do so. To help in our new-found goal to destroy the <a href="/releasing-the-cloudflare-access-feature-that-let-us-smash-a-vpn-on-stage/">pinata</a>, we introduced support for <a href="https://www.cloudflare.com/learning/access-management/what-is-ssh/">SSH</a> over Access, which allowed us to replace the VPN as a protection layer for our source control systems.</p><p>Over the years, we've been whittling away at our services, one-by-one. We're nearly there, with only a few niche tools remaining behind the VPN and not behind Access. As of this year, we are no longer requiring new employees to set up VPN as part of their company onboarding! We can see this in our Access logs, with more users logging into more apps every month:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5V12QwR05YIkZ1PHUXvnw6/c5dd851801509785fa22233a454cf8b5/1-3.png" />
            
            </figure><p>During this transition period from VPN to Access, we've had to keep our VPN service up and running. As VPN is a key tool for people doing their work while remote, it's extremely important that this service is highly available and performant.</p><p>Enter Spectrum: our DDoS protection and performance product for any TCP and UDP-based protocol. We put Spectrum in front of our VPN very early on and saw immediate improvement in our security posture and availability, all without any changes in end-user experience.</p><p>With Spectrum sitting in front of our VPN, we now use the entire Cloudflare edge network to protect our VPN endpoints against DDoS and improve performance for VPN end-users.</p><p>Setup was a breeze, with only minimal configuration needed:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3ToKNn4OwfUURzIitlS0VV/39722c8c1b4634328e5180451d553cdf/2-3.png" />
            
            </figure><p>Cisco AnyConnect uses HTTPS (TCP) to authenticate, after which the actual data is tunneled using a DTLS encrypted UDP protocol.</p><p>Although configuration and setup was a breeze, actually getting it to work was definitely not. Our early users quickly noted that although authenticating worked just fine, they couldn’t actually see any data flowing through the VPN. We quickly realized our arch nemesis, the MTU (maximum transmission unit) was to <a href="/path-mtu-discovery-in-practice/">blame</a>. As some of our readers might remember, we have historically always set a very small MTU size for IPv6. We did this because there might be IPv6 to IPv4 tunnels in between eyeballs and our edge. By setting it very low we prevented PTB (packet too big) packets from ever getting sent back to us, which causes problems due to our ECMP routing inside our data centers. But with a VPN, you always increase the packet size due to the VPN header. This means that the 1280 MTU that we had set would never be enough to run a UDP-based VPN. We ultimately settled on an <a href="/increasing-ipv6-mtu/">MTU of 1420</a>, which we still run today and allows us to protect our VPN entirely using Spectrum.</p><p>Over the past few years this has served us well, knowing that our VPN infrastructure is safe and people will be able to continue to work remotely no matter what happens. All in all this has been a very interesting journey, whittling down one service at a time, getting closer and closer to the day we can officially retire our VPN. To us, Access represents the future, with Spectrum + VPN to tide us over and protect our services until they’ve migrated over. In the meantime, as of the start of 2020, new employees no longer get a VPN account by default!</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare Access]]></category>
            <category><![CDATA[Election Security]]></category>
            <category><![CDATA[VPN]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <guid isPermaLink="false">UArmX2uXKhofwGIhZqNQ4</guid>
            <dc:creator>Achiel van der Mandele</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare During the Coronavirus Emergency]]></title>
            <link>https://blog.cloudflare.com/cloudflare-during-the-coronavirus-emergency/</link>
            <pubDate>Thu, 12 Mar 2020 21:57:24 GMT</pubDate>
            <description><![CDATA[ We know that organizations and individuals around the world depend on Cloudflare and our network. I wanted to send you a personal note to let you know how Cloudflare is dealing with the Coronavirus emergency. ]]></description>
            <content:encoded><![CDATA[ <p><i>This email was sent to all Cloudflare customers a short while ago</i></p><p>From: Matthew PrinceDate: Thu, Mar 12, 2020 at 4:20 PMSubject: Cloudflare During the Coronavirus Emergency</p><p>We know that organizations and individuals around the world depend on Cloudflare and our network. I wanted to send you a personal note to let you know how Cloudflare is dealing with the Coronavirus emergency.</p><p>First, the health and safety of our employees and customers is our top priority. We have implemented a number of sensible policies to this end, including encouraging many employees to work from home. This, however, hasn't slowed our operations. Our network operations center (NOC), <a href="https://www.cloudflare.com/learning/security/glossary/what-is-a-security-operations-center-soc/">security operations center (SOC)</a>, and customer support teams will remain fully operational and can do their jobs entirely remote as needed.</p><p>Second, we are tracking Internet usage patterns globally. As more people work from home, peak traffic in impacted regions has increased, on average, approximately 10%. In Italy, which has imposed a nationwide quarantine, peak Internet traffic is up 30%. Traffic patterns have also shifted so peak traffic is occurring earlier in the day in impacted regions. None of these traffic changes raise any concern for us. Cloudflare's network is well provisioned to handle significant spikes in traffic. We have not seen, and do not anticipate, any impact to our network's performance, reliability, or security globally.</p><p>Third, we are monitoring for any changes in cyberthreats. While we have seen more phishing attacks using the Coronavirus as a lure, we have not seen any significant increase in attack traffic or new threats. Again, our SOC remains fully operational and is continuously monitoring for any new security threats that may emerge.</p><p>Finally, we recognize that this emergency has put strain on the infrastructure of companies around the world as more employees work from home. On Monday, I wrote about how we are making our Cloudflare for Teams product, which helps support <a href="https://www.cloudflare.com/products/zero-trust/remote-workforces/">secure and efficient remote work</a>, free for small businesses for at least the next six months:</p><p><a href="/cloudflare-for-teams-free-for-small-businesses-during-coronavirus-emergency/">https://blog.cloudflare.com/cloudflare-for-teams-free-for-small-businesses-during-coronavirus-emergency/</a></p><p>As the severity of the emergency has become clearer over the course of this week, we decided to extend this offer to help any business, regardless of size. The healthy functioning of our economy globally depends on work continuing to get done, even as people need to do that work remotely. If Cloudflare can do anything to help ensure that happens, I believe it is our duty to do so.</p><p>If you are already a Cloudflare for Teams customer, we have removed the caps on usage during this emergency so you can scale to whatever number of seats you need without additional cost. If you are not yet using Cloudflare for Teams, and if you or your employer are struggling with limits on the capacity of your existing VPN or Firewall, we stand ready to help and have removed the limits on the free trials of our Access and Gateway products for at least the next six months. Cloudflare employees around the world have volunteered to run no-cost onboarding sessions so you can get set up quickly and ensure your business' continuity.</p><p>Details: <a href="https://developers.cloudflare.com/access/about/coronavirus-emergency/">https://developers.cloudflare.com/access/about/coronavirus-emergency/</a>Sign up for an onboarding session: <a href="https://calendly.com/cloudflare-for-teams/onboarding">https://calendly.com/cloudflare-for-teams/onboarding</a></p><p>Thank you for being a Cloudflare customer. These are challenging times but I want you to know that we stand ready to help however we can. We understand the critical role we play in the functioning of the Internet and we are continually humbled by the trust you place in us. Together, we can get through this.</p><p>--Matthew PrinceCo-founder &amp; CEOCloudflare</p><p><a href="https://twitter.com/eastdakota">@eastdakota</a><a href="https://twitter.com/cloudflare">@cloudflare</a></p> ]]></content:encoded>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Cloudflare Access]]></category>
            <category><![CDATA[Cloudflare Gateway]]></category>
            <category><![CDATA[VPN]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Speed & Reliability]]></category>
            <guid isPermaLink="false">3JQOe2eJK3a6VMUaXObRvb</guid>
            <dc:creator>Matthew Prince</dc:creator>
        </item>
        <item>
            <title><![CDATA[Open sourcing our Sentry SSO plugin]]></title>
            <link>https://blog.cloudflare.com/open-sourcing-our-sentry-sso-plugin/</link>
            <pubDate>Wed, 11 Mar 2020 12:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare Access replaces legacy corporate VPNs with Cloudflare’s global network. Using your existing identity provider, Access lets your end users to login from anywhere. ]]></description>
            <content:encoded><![CDATA[ <p>Cloudflare Access, part of <a href="https://teams.cloudflare.com/">Cloudflare for Teams</a>, replaces legacy corporate VPNs with Cloudflare’s global network. Using your existing identity provider, Access enables your end users to login from anywhere — without a clunky agent or traffic backhaul through a centralized appliance or VPN.</p><p>Today, we are <a href="https://github.com/cloudflare/cloudflare-access-for-sentry">open sourcing a plugin</a> that continues to improve that experience by making it easier for teams to use Cloudflare Access with one of the software industry’s most popular engineering tools, <a href="https://sentry.io/welcome/">Sentry</a>.</p>
    <div>
      <h2>What is Sentry?</h2>
      <a href="#what-is-sentry">
        
      </a>
    </div>
    <p><a href="https://sentry.io/welcome/">Sentry</a> is an application that helps software teams find and diagnose errors in their products. We use Sentry here at Cloudflare. When you encounter an error when using a Cloudflare product, like our dashboard, we log that event. We then use Sentry to determine what went wrong.</p><p>Sentry can categorize and roll up errors, making it easy to identify new problems before investigating them with the tool’s event logging. Engineering managers here can use the dashboards to monitor the health of a new release. Product managers often use those reports as part of prioritizing what to fix next. Engineers on our team can dig into the individual errors as they release a fix.</p><p>Sentry is available in two forms: a SaaS model and a <a href="https://docs.sentry.io/server/">self-hosted version</a>. Both modes give engineering teams comprehensive insight into the behavior of their deployed applications and the issues their users encounter.</p>
    <div>
      <h2>Connecting users to Sentry</h2>
      <a href="#connecting-users-to-sentry">
        
      </a>
    </div>
    <p>Organizations can deploy the self-hosted version on-premise or in a cloud environment they control. However, they still need to create a secure way to allow their teams to connect to the app.</p><p>Historically, most opt for a VPN to solve that challenge. End users outside of the office need to configure a VPN client on their laptop and try to login with credentials that are often different from the ones used for a corporate SSO. Administrators had to make sure their VPN appliance could scale for a few users, but with most in the office, the VPN was a serious inconvenience for a smaller set of users.</p><p>Over the last few years, that group of users working outside of the office has grown. Users are working from BYOD laptops, mobile phones, and in unfamiliar networks that all struggle with a VPN. Even worse, a VPN has a load limit because it relies on an actual appliance (whether virtual or physical hardware). Organizations can attempt to stress test their VPN, but will always have a limit that administrators need to continuously monitor.</p><p>Cloudflare Access gives administrators the scale of Cloudflare’s global network and provides end users with a SaaS-like experience that just works from any device or network. When teams secure Sentry with Cloudflare Access, end users visit the hostname of the application, login with their identity provider, and are redirected from Cloudflare’s edge to the app if they have permission to reach it.</p><p>However, in the case of an app like Sentry, end users need to login one more time to the application itself. That small step adds real friction, which Access can now solve through this open source plugin.</p>
    <div>
      <h2>JWT Security with Cloudflare for Teams</h2>
      <a href="#jwt-security-with-cloudflare-for-teams">
        
      </a>
    </div>
    <p>When a user logs in to their identity provider when connecting to an application protected by Access, Cloudflare signs a JSON Web Token (JWT).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5dmK31q5XXNfv3Zoe32frf/b43a4d349f21ce70abf18c08b4f219e3/pasted-image-0.png" />
            
            </figure><p>Cloudflare Access uses that JWT, and its contents, to confirm a user identity before allowing or denying access to sensitive resources. Cloudflare securely creates these through the OAUTH or SAML integration between Cloudflare Access and the configured identity provider. Each JWT consists of three Base64-URL strings: the header, the payload, and the signature.</p><ul><li><p>The header defines the cryptographic operation that encrypts the data in the JWT.</p></li><li><p>The payload consists of name-value pairs for at least one and typically multiple claims, encoded in JSON. For example, the payload can contain the identity of a user</p></li><li><p>The signature allows the receiving party to confirm that the payload is authentic.</p></li></ul><p>The token is signed using a public private key pair and saved in the user’s browser. Inside of that token, we store the following details in addition to some general metadata:</p><ul><li><p><b>User identity</b>: typically the email address of the user retrieved from your identity provider.</p></li><li><p><b>Authentication domain</b>: the domain that signs the token. For Access, we use “example.cloudflareaccess.com” where “example” is a subdomain you can configure.</p></li><li><p><b>Audience</b>: The domain of the application you are attempting to reach.</p></li><li><p><b>Expiration</b>: the time at which the token is no longer valid for use.</p></li></ul><p>When a request is made to an application behind Access, Cloudflare looks for the presence of that token. If available, we decrypt it, validate its authenticity, and then read the payload. If the payload contains information about a user who should be able to reach the application, we send their request to an origin.</p><p>The Sentry plugin takes that JWT and reuses it, instead of prompting the visitor to login again with separate credentials. The plugin parses the user identity, checks it against the directory of users in Sentry, and maps that token to a Sentry profile and its assigned permissions.</p><p>All of this is seamless to the end user and takes just a few milliseconds. The user is instantly redirected to the application, fully authenticated, and only needs to remember their SSO login. Administrators now have one fewer set of credentials to worry about managing and the associated onboarding and offboarding.</p>
    <div>
      <h2>Building your own SSO plugin</h2>
      <a href="#building-your-own-sso-plugin">
        
      </a>
    </div>
    <p>We believe that the JSON Web Token is a simple and efficient method for sending identity. Applications that use JWTs for authorization only need to support the JWT standard, instead of attempting to integrate with different versions of SAML or other formats like OIDC and OAUTH. A JWT is also information dense and built in a format, JSON, that can be easily parsed by the target application.</p><p>Some products, like <a href="https://github.com/getredash/redash/blob/master/redash/authentication/jwt_auth.py">Redash</a>, already have native support for JWT integration. The <a href="https://github.com/cloudflare/cloudflare-access-for-sentry">Sentry plugin</a> we built joins our <a href="https://github.com/cloudflare/cloudflare-access-for-atlassian">Atlassian plugin</a> as both options to extend support to those apps, but also examples that can be used for integration with other products. Other teams, like Auth0, have also <a href="https://auth0.com/blog/5-steps-to-add-modern-authentication-to-legacy-apps-using-jwts/">published materials</a> to add JWT integration to legacy apps.</p>
    <div>
      <h2>What’s next?</h2>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>Cloudflare Access is available on every Cloudflare account and 5 free seats are included by default. You can follow <a href="https://developers.cloudflare.com/access/setting-up-access/">these instructions</a> to get started.</p><p>If you are a small business, you can sign up for the Cloudflare for Teams program right now at the link below.</p><p><b></b><a href="https://www.cloudflare.com/small-business/"><b>https://www.cloudflare.com/small-business/</b></a></p> ]]></content:encoded>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Cloudflare Access]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Single Sign On (SSO)]]></category>
            <category><![CDATA[VPN]]></category>
            <guid isPermaLink="false">66FP5kREHBF2IPLYuVXlyD</guid>
            <dc:creator>Sam Rhea</dc:creator>
        </item>
        <item>
            <title><![CDATA[How Replicated Developers Develop Remotely]]></title>
            <link>https://blog.cloudflare.com/how-replicated-secured-our-remote-dev-environment-with-cloudflare-access/</link>
            <pubDate>Tue, 10 Mar 2020 13:00:00 GMT</pubDate>
            <description><![CDATA[ Replicated is a 5-year old infrastructure software company with a focus on enabling a new model of enterprise software delivery that we call Kubernetes Off-The-Shelf (KOTS) Software. ]]></description>
            <content:encoded><![CDATA[ <p><i>This is a guest post by </i><a href="https://www.linkedin.com/in/campbe79/"><i>Marc Campbell</i></a><i> and </i><a href="https://www.linkedin.com/in/grantlmiller/"><i>Grant Miller</i></a><i>, co-founders of </i><a href="https://www.replicated.com/"><i>Replicated</i></a><i>.</i></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/59tDCgf4qQsApNapuOKDTx/e70a691ccf5af8ecff9e4847a2956c25/BDES-429_Replicated-Guest-Blog-Post-_2x.png" />
            
            </figure><p>Replicated is a 5-year old infrastructure software company with a focus on enabling a new model of enterprise software delivery that we call Kubernetes Off-The-Shelf (KOTS) Software. Our team of 22 is largely technical with a geographic focus on Los Angeles and a few remote team members throughout the US. Our goal is to make it easy to install and operate third party software, so that sending your data to multi-tenant SaaS providers isn’t the only way to use their services. We think that it’s possible and easy to bring the applications to your data, securely and without a lot of operational overhead. While building Replicated, we began using Cloudflare first for DNS and DDoS protection, and over time started to use other Cloudflare services to help keep our services available and secure.</p><p>At Replicated, our development environment needs to be run on Kubernetes. Our product, <a href="http://github.com/replicatedhq/kots">KOTS</a>, runs in Kubernetes and manages the lifecycle of 3rd-party applications in the Kubernetes cluster. Building and validating the product requires a developer to have access to a cluster. As our engineering team has grown to include dedicated front end engineers and other specialists who shouldn’t have to worry about building and maintaining their own cluster, the complexity of managing a local environment became a burden, and we needed to simplify in order to maintain developer productivity.</p><p>We’ve designed a solution that uses cloud-based infrastructure components, accessed and secured with Cloudflare Access and Argo, to move our development environment to Infrastructure as a Service (IaaS) resources; meaning our entire development environment is in the cloud. As a result, we’ve reduced the amount of time that a developer spends troubleshooting their local environment and allow every engineer on the team to maintain a full stack development environment, even if they are without deep Kubernetes expertise.</p>
    <div>
      <h3>Previous Dev Environments with Docker for Mac</h3>
      <a href="#previous-dev-environments-with-docker-for-mac">
        
      </a>
    </div>
    <p>We started with each developer building their own local environments, using whatever tools they were comfortable with. Our first attempt to build a standard development environment that works for our engineering team was to use <a href="https://hub.docker.com/editions/community/docker-ce-desktop-mac">Docker for Mac</a> and its <a href="https://www.docker.com/blog/docker-desktop-certified-kubernetes/">built-in Kubernetes distribution</a>. We would buy the best MacBook Pros available (16 GB, then 32 GB, now 64 GB), and everyone would have the entire stack running on their laptop.</p><p>This worked pretty well, except that there was a set of problems that our engineers would continue to hit--battery life was terrible because of the constant CPU usage, Docker For Mac was different from “real Kubernetes” in some meaningful ways, and Docker for Mac’s built-in K8s regularly would just sometimes stop working and the developer would need to uninstall and reinstall the entire stack. It was miserable.</p><p>We’d lose hours every week from engineers troubleshooting their local environments. When a front end engineer (who wasn’t expected to be a Kubernetes expert) would have issues, they’d need to pair and get help from a backend engineer; consuming not just one but two people’s valuable time.</p><p>We needed something better.</p>
    <div>
      <h3>To The Cloud</h3>
      <a href="#to-the-cloud">
        
      </a>
    </div>
    <p>Rather than running Docker locally, we now create an instance in Google Cloud for each developer. These instances have no public IP and are based on our machine image which has all of our prerequisites installed. This includes many tools, including a Kubernetes distribution that’s completely local to the server. We run a docker registry in each developer’s cluster as a cluster add-on. The cloud server has a magical tool called cloudflared running on it that replaces all of the network configuration and security work we would otherwise have had to do.‌‌</p><p>Cloudflared powers Argo Tunnel. When it starts, cloudflared creates four secure HTTP/2 tunnels to two Cloudflare data centers. When a request comes in for a development machine, Cloudflare routes that request over one of those tunnels directly to the machine running that developer’s environment. For example, my hostname is “marc.repl.dev”. Whenever I connect to that, from anywhere on earth, Cloudflare will see that I reach my development environment securely. If I need to spin up a new development environment, there is no configuration to do, wherever is running cloudflared with the appropriate credentials will receive the traffic. This all works on any cloud and in any cloud region.</p><p>‌‌This configuration has several advantages over a traditional deployment. For one, the server does not have a public IP and we don’t need to have any ports open in the Google Load Balancer, including for SSH. The only way to connect to these servers is through the Argo Tunnel, secured by Cloudflare Access. Access provides a <a href="/cloudflare-access-now-teams-of-any-size-can-turn-off-their-vpn/">BeyondCorp-style</a> method of authentication, this ensures that the environment can be reached from anywhere in the world without the use of a VPN.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/yTvHLFlopPBrpiKavwp9M/20930601bc80ab1c00700271c8df8a70/access-replicated_2x--1-.png" />
            
            </figure><p>BeyondCorp is an elaborate way of saying that all our authentication is managed in a single place. We can write a policy which defines which machines a user should have access to and trust it will be applied everywhere. This means rather than managing SSH certificates which are hard to revoke and long-living, we can allow developers to login with the same Google credentials we use everywhere else! Should, knock on wood, a developer leave, we can revoke those credentials instantly; no more worrying what public keys they still might have lying around.</p>
    <div>
      <h3>What happens on the developer’s machines?</h3>
      <a href="#what-happens-on-the-developers-machines">
        
      </a>
    </div>
    <p>Through Argo Tunnel and Access we now have the ability to connect to our new development instances, but that isn’t enough to allow our engineers to work. They need to be able to write and execute code on that remote machine in a seamless way. To solve that problem we turned to the <a href="https://code.visualstudio.com/docs/remote/ssh">Remote SSH extension</a> for VS Code. In the words of the documentation for that project:</p><p>The Visual Studio Code Remote SSH extension allows you to open a remote folder on any remote machine, virtual machine, or container with a running SSH server and take full advantage of VS Code's feature set. Once connected to a server, you can interact with files and folders anywhere on the remote filesystem.</p><p>With Remote SSH, VS Code seamlessly reads and writes files to the developer’s remote server. When a developer opens a project, it feels local and seamless, but everything is authenticated by Access and proxied through Argo over SSH. Our developers can travel anywhere in the world, and trust their development environment will be accessible and fast.</p><p>Locally, a developer has a .ssh/config file to define local ports to forward through the SSH connection to a port that’s only available on the remote server. For example, my .ssh/config file contains:‌‌</p>
            <pre><code>Host marc.repl.dev
HostName marc.repl.dev
User marc
LocalForward 8080 127.0.0.1:30080
LocalForward 8005 127.0.0.1:30015
...</code></pre>
            <p>To build and execute code our developers open the embedded terminal in VS Code. This automatically connects them to the remote server. We use <a href="https://github.com/GoogleContainerTools/skaffold">skaffold</a>, a Kubernetes CLI for local development. A simple skaffold dev starts the stack on their remote machine which feels local because it’s all happening inside VS Code. Once it’s started, the developer can access localhost in their browser to view the results of their work by visiting <a href="http://localhost:8080">http://localhost:8080</a>. The SSH config above will forward this traffic to port 30080 on the remote server. Port 30080 on the remote server is a NodePort configured in the local cluster, that has the web server running in it. All of our APIs and web servers have static NodePorts for local development environments.</p><p>Now, when a developer starts at Replicated, their first day (or even week) isn’t consumed by setting up the development environment--now it takes less than an hour. We have a Terraform script that makes it easy to replace any one of our developer’s machines in seconds.</p>
    <div>
      <h3>The Aftermath</h3>
      <a href="#the-aftermath">
        
      </a>
    </div>
    <p>All developers at Replicated have now been using this environment for nine months. We haven’t eliminated the problems that occasionally come up where Kubernetes isn’t playing nicely, or Docker uses too much disk space. However, these problems do occur much less frequently than they did on Docker for Mac. We now have two new options that weren’t easily available when everyone ran their environment locally.</p><p>First, a backend engineer can just ssh through the Argo Tunnel into the other developers server to troubleshoot and help. Every development environment has become a collaborative place. This is great when two engineers aren’t in the same room.  Also, we’re less attached to our development environments--if my server isn’t working properly for unknown reasons, instead of troubleshooting it for hours, I can delete it and get a new clean one.</p><p>Some additional benefits include:</p><ul><li><p>Developers can have multiple envs easily (to try out a new k8s version, for example)</p></li><li><p>Battery life is awesome again on laptops</p></li><li><p>We don’t need the biggest and most powerful laptops anymore (Hello Chromebooks and Tablets)</p></li><li><p>Developers can choose their local OS and environment (MacOS, Windows, Linux) because they are all supported, as long as SSH is supported.</p></li><li><p>Code does not live on a developer laptop; it doesn’t travel with them to coffee shops and other insecure places. This is great for security purposes--a lost laptop no longer means the codebase is out there with it.</p></li></ul>
    <div>
      <h3>How To</h3>
      <a href="#how-to">
        
      </a>
    </div>
    <p>Beyond just telling you what we did, we’d like to show you how to replicate it for yourself! This assumes you have a domain which is already configured to use Cloudflare.</p><ol><li><p>Create an instance to represent your development environment in the cloud of your choice.</p></li></ol>
            <pre><code>gcloud compute instances create my-dev-universe`</code></pre>
            <p>2.   Configure your instance to run cloudflared when it starts up, and give it a helpful hostname like dev.mysite.com.‌‌</p>
            <pre><code>cat “hostname: dev.mysite.com\n” &gt; ~/.cloudflared/config.yml
cloudflared login
sudo cloudflared service install</code></pre>
            <p>3.  Write an Access policy to allow only you to access your machine‌‌</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4k99GpxptgqdnQe90zpZPe/9d2eaadfd89f8539345f7aa8e9ddc781/AccessPolicy.png" />
            
            </figure><p>‌4. Configure your local machine to SSH via Cloudflare:‌‌</p>
            <pre><code>sudo apt-get install cloudflare/cloudflare/cloudflared
cloudflared access ssh-config --hostname dev.mysite.com --short-lived-cert
&gt;&gt; ~/.ssh/config</code></pre>
            <p>4. Install <a href="https://code.visualstudio.com/">VS Code</a> and the <a href="https://marketplace.visualstudio.com/items?itemName=ms-vscode-remote.vscode-remote-extensionpack">Remote Development extension pack</a></p><p>5. In VS Code select ‘Remote-SSH: Connect to Host…’ from the Command Palette and enter <a>user@dev.mysite.com</a>. A browser window will open where you will be prompted to login with the identity provider you configured with Cloudflare.</p><p>6. You’re done! If you select File &gt; Open you will be seeing files on your remote machine. The embedded terminal will also execute code on that remote machine.</p><p>7. Once you’re ready to get a production-ready setup for your team, take a look at the <a href="https://gist.github.com/marccampbell/28585dfddafd25fe63be71e91cc0da0b">instructions</a> we share with our team.</p>
    <div>
      <h3>Conclusion</h3>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>There is no doubt that the world is becoming more Internet-connected, and that deployment environments are becoming more complex. It stands to reason that it’s only a matter of time before all software development happens through and in concert with the Internet.</p><p>While it might not be the best solution for every team, it has resulted in a dramatically better experience for Replicated and we hope it does for you as well.</p>
    <div>
      <h3>How to get started‌‌</h3>
      <a href="#how-to-get-started">
        
      </a>
    </div>
    <p>‌‌Replicated develops remotely with <a href="https://teams.cloudflare.com/access/">Cloudflare Access</a>, a remote access gateway that helps you secure access to internal applications and infrastructure without a VPN.</p><p>Effective until September 1, 2020, Cloudflare is making Access and other Cloudflare for Teams products free to small businesses. We're doing this to help ensure that small businesses that implement work from home policies in order to combat the spread of the Coronavirus (COVID-19) can ensure business continuity.</p><p>‌You can learn more and apply at c<a href="https://www.cloudflare.com/smallbusiness/">loudflare.com/smallbusiness</a> now.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare Access]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[VPN]]></category>
            <guid isPermaLink="false">j6s3ejkEeD09XyPZ2mW7g</guid>
            <dc:creator>Guest Author</dc:creator>
        </item>
        <item>
            <title><![CDATA[How to Build a Highly Productive Remote Team (or Team of Contractors) with Cloudflare for Teams]]></title>
            <link>https://blog.cloudflare.com/how-to-build-a-highly-productive-remote-team-or-team-of-contractors-with-cloudflare-for-teams/</link>
            <pubDate>Mon, 09 Mar 2020 20:00:00 GMT</pubDate>
            <description><![CDATA[ Much of IT has been built on two outdated assumptions. First, employees all sit in the same building or branch offices. Second, that those employees will work full-time at the same company for years. ]]></description>
            <content:encoded><![CDATA[ <p>Much of IT has been built on two outdated assumptions about how work is done. First, that employees all sit in the same building or branch offices. Second, that those employees will work full-time at the same company for years.</p><p>Both of these assumptions are no longer true.</p><p>Employees now work from anywhere. In the course of writing this blog post, I opened review tickets in our internal JIRA from my dining table at home. I reviewed internal wiki pages on my phone during my commute on the train. And I spent time reviewing some marketing materials in staging in our CMS.</p><p>In a past job, I would have suffered trying to connect to these tools through a VPN. That would have slowed down my work on a laptop and made it nearly impossible to use a phone to catch up on my commute.</p><p>The second challenge is ramp-up. I joined Cloudflare a few months ago. As a member of the marketing team, I work closely with our product organization and there are several dozen tools that I need to do that.</p><p>I’m hardly alone. The rise of SaaS and custom internal applications means that employees need access to all kinds of tools to effectively do their job. The <a href="https://www.npr.org/2018/01/22/578825135/rise-of-the-contract-workers-work-is-different-now">increasing prevalence of contractors and part-time employees</a> is compounding the challenge of how to get employees productive. On-boarding (and off-boarding) is now not an occasional thing, but has become a regular rhythm of how companies operate.</p><p>All these factors are combining to cause a bigger question: how can I make teams that reflect the new modern workforce — often remote, and increasingly not the traditional full time, permanent employee — as productive as possible?</p>
    <div>
      <h2>Step one: put the VPN on a performance improvement plan</h2>
      <a href="#step-one-put-the-vpn-on-a-performance-improvement-plan">
        
      </a>
    </div>
    <p>We’ve <a href="/cloudflare-access-now-teams-of-any-size-can-turn-off-their-vpn/">blogged extensively</a> about our own troubles with VPNs. As we became a complex, multinational organization made up of contractors and full-time employees, the private network we deployed to host internal applications began to slow our teams down. We built Cloudflare Access to address our own challenges with the VPN, and since then hundreds of customers have used it to accelerate access for their remote workforces.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6JcYSyZogeA6J0TtSFstLR/1ef1aaf1c9d112a36659a5b3858cd226/1.png" />
            
            </figure><p>India’s largest B2B e-commerce platform, <a href="https://www.cloudflare.com/case-studies/udaan-access/">Udaan</a>, is one example. They used Access to avoid ever having to deploy a VPN in the first place. As Udaan grew to new locations around the world, their IT team needed fast ways to give access to the thousands of users — including contractors, employees, interns and vendors — that needed to connect to their internal systems.</p><p>Now that their internal applications are protected with Cloudflare, Udaan’s IT team doesn’t need to spend time manually onboarding contractors and issuing them corporate accounts. And logging into Udaan’s tools, whether they’re SaaS apps or private applications, looks and feels the same every time, for every user.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5hWZWhebNPaCOOyjZPhd46/6f4603102cd318e4c4d73554de0b3c75/2.png" />
            
            </figure><blockquote><p>“VPNs are frustrating and lead to countless wasted cycles for employees and the IT staff supporting them," said Amod Malviya, Cofounder and CTO, Udaan.  Furthermore, conventional VPNs can lull people into a false sense of security. With Cloudflare Access, we have a far more reliable, intuitive, secure solution that operates on a per user, per access basis. I think of it as Authentication 2.0 — even 3.0”</p></blockquote><p><a href="https://teams.cloudflare.com/access/index.html">Cloudflare Access</a> can help speed up remote teams by replacing VPNs with Cloudflare’s network. Instead of placing internal tools on a private network, teams can deploy them in any environment, including hybrid or multi-cloud models, and <a href="https://www.cloudflare.com/products/zero-trust/remote-workforces/">secure them consistently with Cloudflare’s network</a>.  Remote teams get work done faster without having to deal with a VPN client, and IT teams spend less time troubleshooting their VPN issues.</p>
    <div>
      <h2>Step two: make tools easier to find</h2>
      <a href="#step-two-make-tools-easier-to-find">
        
      </a>
    </div>
    <p>High performing remote teams get new employees started fast. That starts with day-one access to the right tools. If you’re like me and you recently joined a new organization, you know how hard it can be to find the right applications you need to do your job. I am drowning in an ocean of new productivity tools.</p><p><a href="/announcing-the-cloudflare-access-app-launch/">App launchpads</a> were designed to be a life-raft in the tools ocean. They make discovering apps easier by bringing every application a user can access into one easy, graphical dashboard. But they’re hard for IT teams to customize for different types of users with different permission levels (intern/contractor/full-time), and often not comprehensive of every kind of app (internal/SaaS).</p><p><a href="https://developers.cloudflare.com/access/setting-up-access/app-launch/">Cloudflare Access’ App Launch</a> is a dashboard for all the applications protected by Access. Once enabled, end users can login and connect to every app behind Access with a single click.  IT teams that are setting up contractors can send contractors a custom launchpad of everything they need to access on day one.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/67LLsNN5BZNZyTH1DSUFDm/36ee90da5ae152f168a676b67ab9204b/3.png" />
            
            </figure><p>When administrators secure an application with Access, any request to the hostname of that application stops at Cloudflare’s network first. Once there, Cloudflare Access checks the request against the list of users who have permission to reach the application.</p><p>To check identity, Access relies on the identity provider that the team already uses. Access integrates with providers like OneLogin, Okta, AzureAD, G Suite and others to determine who a user is. If the user has not logged in yet, Access will prompt them to do so at the identity provider configured.</p>
    <div>
      <h2>Step 3: fast-track your contractors</h2>
      <a href="#step-3-fast-track-your-contractors">
        
      </a>
    </div>
    <p>Modern remote teams are made up of whatever combination of people can get online and get the work done. That means many different kinds of users are working together in the same tools –full-time employees, contractors, freelancers, vendors and partners.</p><p>IT models predicated on full-time workforces imagined identifying users as a straight line process, where users could be identified and validated against one source of truth - the corporate directory. The old model breaks down when users join organizations temporarily to work on isolated projects, and you need to figure out how to authenticate them based on <i>their</i> organizational identity, not yours.</p><p>In response, many organizations deploy VPNs to temporary users, scotch-tape together federations between multiple SSO providers, or even have administrators spend hours issuing contracted users new corporate identities to complete one-off projects.</p><p>Meanwhile, contractors waste valuable cycles getting set up with the tools they need, and feel like second-class citizens in the IT hierarchy.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6HqOnEZmezB9TRUrMfWFB5/c6ae845eefe6ce3429998d9402444c44/4.png" />
            
            </figure><p>Cloudflare Access prevents contractor onboarding slowdown by simultaneously integrating with <a href="/multi-sso-and-cloudflare-access-adding-linkedin-and-github-teams/">multiple identity providers</a>, including popular services like Gmail or GitHub that do not require corporate subscriptions.</p><p>External users login with these accounts and still benefit from the same ease-of-use available to internal employees. Meanwhile, administrators avoid the burden in legacy deployments that require onboarding and offboarding new accounts for each project.</p>
    <div>
      <h2>How to get started - at no cost</h2>
      <a href="#how-to-get-started-at-no-cost">
        
      </a>
    </div>
    <p><a href="https://teams.cloudflare.com/">Cloudflare for Teams</a> lets your team use all the same features to stay productive from anywhere in the world.</p><p>Effective until September 1, 2020, we're making Cloudflare for Teams products free to <a href="https://www.cloudflare.com/small-business/">small businesses</a>. We're doing this to help ensure that small businesses that implement work from home policies in order to combat the spread of the Coronavirus (COVID-19) can ensure business continuity.</p><p>You can learn more and apply at cloudflare.com/smallbusiness now.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Cloudflare Access]]></category>
            <category><![CDATA[VPN]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">7zOygUAqCuNeA7aLNgv2hr</guid>
            <dc:creator>Lane Billings</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare for Teams Free for Small Businesses During Coronavirus Emergency]]></title>
            <link>https://blog.cloudflare.com/cloudflare-for-teams-free-for-small-businesses-during-coronavirus-emergency/</link>
            <pubDate>Mon, 09 Mar 2020 12:00:00 GMT</pubDate>
            <description><![CDATA[ Beginning today, we are making our Cloudflare for Teams products free to small businesses around the world. Teams enables remote workers to operate securely and easily. We will continue this policy for at least the next 6 months. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>There are a lot of people and businesses worldwide that are currently suffering, so I don't want to waste any time in getting to the point.</p><p>Beginning today, we are making our <a href="https://teams.cloudflare.com/">Cloudflare for Teams</a> products free to small businesses around the world. Teams enables remote workers to operate securely and easily. We will continue this policy for at least the next 6 months. We're doing this to help ensure that small businesses that implement work from home policies in order to combat the spread of the virus can ensure business continuity. You can learn more and apply at: <a href="https://www.cloudflare.com/smallbusiness">https://www.cloudflare.com/smallbusiness</a></p><p>We've also helped launch an online hub where small businesses can see technology services available to them for free or a substantial discount from multiple companies, during the Coronavirus Emergency: <a href="https://openforbusiness.org">https://openforbusiness.org</a></p><p>To understand more about why we're doing this, read on.</p>
    <div>
      <h2>The IT Strain of WFH</h2>
      <a href="#the-it-strain-of-wfh">
        
      </a>
    </div>
    <p>We have a team at Cloudflare carefully monitoring the spread of the SARS-Coronavirus-2, which is responsible for the COVID-19 respiratory disease. Like at many other companies, we have heeded the advice of medical professionals and government agencies and are increasingly allowing employees to work from home in impacted regions in order to hopefully help slow the spread of the disease.</p><p>While this is prudent advice to help control the spread of the disease, employees working from home put a different load on a company's IT resources than if they are working from the office. In-person meetings are instead held online, so you need to ensure your video conferencing systems are up for the task. Critical documents can't be signed in person, so electronic signature systems need to be in place. There's an increased importance on online chat and other communication tools.</p><p>And, importantly, the systems that ensure online authorized access to these tools can no longer use the physical location of an employee as evidence they are authorized to use a service.</p>
    <div>
      <h2>WFH Strains IT Security</h2>
      <a href="#wfh-strains-it-security">
        
      </a>
    </div>
    <p>We've seen some large companies struggle in ways both serious and silly with increased loads on their traditional firewall and VPN infrastructures over the last week.</p><blockquote><p>An emergency WFH declaration for all employees caused at least one company's VPN infrastructure to fall over. Please plan ahead. ;)</p>— Gregory P? Smith (he/him) (@gpshead) <a href="https://twitter.com/gpshead/status/1232854899714490369?ref_src=twsrc%5Etfw">February 27, 2020</a></blockquote> 

<blockquote><p>Today in unexpected mass work from home problems:<br /><br />Facebook's VPN IP got banned from DoorDash because so many people were trying to order food from home while connected to the corporate network.</p>— Jacob Rossi (@jacobrossi) <a href="https://twitter.com/jacobrossi/status/1236082889613176832?ref_src=twsrc%5Etfw">March 7, 2020</a></blockquote> 
<p>Large organizations, undoubtedly, can work through these issues by either increasing the number of licenses for their firewalls and VPNs or moving to a more modern, cloud-based solution. What's been concerning to us is the number of small businesses that don't have the ability to quickly provision the resources they need to support their employees when they're not physically in the office.</p><br />
    <div>
      <h2>What We're Seeing</h2>
      <a href="#what-were-seeing">
        
      </a>
    </div>
    <p>The story that hit home to me came last week when I heard about a small business who had reached out to us. The company—a travel agency—has approximately 100 employees in a region hard-hit by viral infections and thousands of partners who use their platform. They, responsibly, allowed their employees to work from home. Unfortunately, their small office VPN was limited in terms of the number of simultaneous users as well as capacity. Their outsourced IT team said getting a new one up and running would take at least a week. And, at a time when travel bookings were already waning, the owner was legitimately concerned that his business would not survive this crisis.</p><p>I happened to be sitting with a group of our sales engineers over lunch last week when I heard this story. They were proud that we'd been able to offer Cloudflare for Teams as a solution to quickly replace the travel agency's VPN. And that's great—the owner of the travel agency was thrilled—but it still felt like we should be doing more.</p><p>I spent some time digging into recent inquiries for Cloudflare for Teams coming from small businesses and found that the travel agency was hardly alone. Small businesses around the world are struggling to maintain some semblance of business continuity as increasingly their employees aren't physically coming into the office. While firewalls and VPNs were hardly their only concern, the limitations they imposed were becoming real threats to business continuity.</p>
    <div>
      <h2>The Fragility of Small Businesses</h2>
      <a href="#the-fragility-of-small-businesses">
        
      </a>
    </div>
    <p>Small businesses are the lifeblood of most countries' economies. In the United States, for instance, small businesses employ half of all non-government employees. They are responsible for the creation of two-thirds of net new jobs. Unfortunately, they are much more vulnerable to even minor interruptions in their operations. Oftentimes their margins are so thin that any significant new expense or reduction in revenue can cause them to fail.</p><p>Today Cloudflare makes most of our money selling to large enterprises. But serving small businesses has always been in our DNA. We began as a small business ourselves and spent our early years providing the tools previously available only to the big guys to every individual developer and small business. We wouldn't be the company we are today if small businesses hadn't trusted us in our early years.</p><p>So while the impact of the Coronavirus is being felt by businesses large and small, I am worried the impact on small businesses could be especially devastating. Small businesses have always been there for us and we want to be there for them during this time of increased strain, therefore today we're announcing two initiatives:</p>
    <div>
      <h2>Free Cloudflare for Teams</h2>
      <a href="#free-cloudflare-for-teams">
        
      </a>
    </div>
    <p>First, we are making <a href="https://teams.cloudflare.com">Cloudflare for Teams</a> available to small businesses worldwide for free for at least the next six months. We will evaluate the situation in six months and make a determination about whether we will extend the length of the free offer.</p><p>We are using the US Small Business Administration’s definition of a small business to define what businesses qualify, but the offer is not limited to US companies. The Coronavirus is an issue for small businesses globally and we have an extensive global network that can serve customers worldwide.</p><p>To apply, visit: <a href="https://www.cloudflare.com/smallbusiness">https://www.cloudflare.com/smallbusiness</a></p><p>Our team is standing by and will move quickly evaluating applications.</p><p>Moreover, since small businesses often don't have sophisticated IT teams, Cloudflare team members from all over the world have volunteered to host onboarding sessions to help small businesses get setup quickly and correctly. We've worked hard to make Cloudflare for Teams easy for any business to be able to use, but we understand that it can still be intimidating if your expertise isn’t IT. Our team stands ready to help.</p>
    <div>
      <h2>The Open for Business Hub</h2>
      <a href="#the-open-for-business-hub">
        
      </a>
    </div>
    <p>Second, we realize that Cloudflare for Teams solves only one little part of a small business' challenges as their employees increasingly work from home. They also need communication, video conferencing, collaboration, document management, and other IT resources. We don't provide them all, but we know the leaders at a lot of companies who do.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3Ht2eXZdmEWuEkft38z0bL/dd1fc5712a7ef3b2fd69f910c7a24183/image2-1.png" />
            
            </figure><p>I spent the weekend talking with other companies that I admire and that provide cloud-based solutions that could help solve the challenges many businesses are currently facing. Many shared the same concerns that we had about the fragility of small businesses and wanted to help. Together we are helping launch a hub of resources for small businesses working to ensure business continuity over the months to come: <a href="https://openforbusiness.org/">https://openforbusiness.org/</a></p><p>The hub features free and deeply discounted services for small businesses from several technology companies. And I expect more will step up to this challenge over the days to come. To request inclusion, companies can email: <a>contact@openforbusiness.org</a>.</p>
    <div>
      <h2>We're In This Together</h2>
      <a href="#were-in-this-together">
        
      </a>
    </div>
    <p>The news of the spread of the Coronavirus has made it clear it is no longer business as usual for any business worldwide. Every responsible business leader spent the weekend worried about how they're going to get through the weeks and months ahead: ensuring their employees' safety, delivering for their customers, and protecting their business. I believe we have a duty to step up where we can to help each other out during times of stress like the one we're in. Together, we can get through this.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[VPN]]></category>
            <category><![CDATA[Cloudflare Access]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">L6sPqqtOtnT9Nxw9nLDsN</guid>
            <dc:creator>Matthew Prince</dc:creator>
        </item>
        <item>
            <title><![CDATA[How Cloudflare keeps employees productive from any location]]></title>
            <link>https://blog.cloudflare.com/how-cloudflare-keeps-employees-productive-from-any-location/</link>
            <pubDate>Fri, 06 Mar 2020 21:30:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare employs more than 1,200 people in 13 different offices and maintains a network that operates in 200 cities. To do that, we used to suffer through a traditional corporate VPN that backhauled traffic through a physical VPN appliance. ]]></description>
            <content:encoded><![CDATA[ <p>Cloudflare employs more than 1,200 people in 13 different offices and maintains a network that operates in 200 cities. To do that, we used to suffer through a traditional corporate VPN that backhauled traffic through a physical VPN appliance. It was, frankly, horrible to work with as a user or IT person.</p><p>With today’s mix of on-prem, public cloud and SaaS and a workforce that needs to work from anywhere, be it a coffee shop or home, that model is no longer sustainable. As we grew in headcount, we were spending too much time resolving VPN helpdesk tickets. As offices around the world opened, we could not ask our workforce to sit as every connection had to go back through a central location.</p><p>We also had to be ready to scale. We could not let a single physical appliance constrain our ability to deliver 26M Internet properties to audiences around the world.</p><p>To run a network like Cloudflare, we needed to use Cloudflare’s network to stay fast and secure.</p><p>We built Cloudflare Access, part of Cloudflare for Teams, as an internal project several years ago to start replacing our VPN with a faster, safer, alternative that made internal applications, no matter where they live ,seamless for our users.</p><p>To address the scale challenge, we built Cloudflare Access to run on <a href="https://workers.cloudflare.com/">Workers</a>, Cloudflare’s serverless platform. Each data center in the Cloudflare network becomes a comprehensive identity proxy node, giving us the scale to stay productive from any location - and to do it for our customers as well.</p><p>Over the last two years, we’ve continued to expand its feature set by prioritizing the use cases we had to address to remove our reliance on a VPN. We’re excited to help customers stay online and productive with the same tools and services we use to run Cloudflare.</p>
    <div>
      <h2>How does Cloudflare Access work?</h2>
      <a href="#how-does-cloudflare-access-work">
        
      </a>
    </div>
    <p><a href="https://teams.cloudflare.com/access/index.html">Cloudflare Access</a> is one-half of <a href="https://teams.cloudflare.com/">Cloudflare for Teams</a>, a security platform that runs on Cloudflare’s network and focuses on keeping users, devices, and data safe without compromising experience or  performance. We built Cloudflare Access to solve our own headaches with private networks as we grew from a team concentrated in a single office to a globally distributed organization.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1WbDwweONr9iVM5l503CPx/0cb490d4dd94f6c83d669d8e42dfe958/how-access-works.png" />
            
            </figure><p>Cloudflare Access replaces corporate VPNs with Cloudflare’s network. Instead of placing internal tools on a private network, teams deploy them in any environment, including hybrid or multi-cloud models, and secure them consistently with Cloudflare’s network.</p><p>Administrators build rules to decide who should be able to reach the tools protected by Access. In turn, when users need to connect to those tools, they are prompted to authenticate with their team’s identity provider. Cloudflare Access checks their login against the list of allowed users and, if permitted, allows the request to proceed.</p><p>Deploying Access does not require exposing new holes in corporate firewalls. Teams connect their resources through a secure outbound connection, Argo Tunnel, which runs in your infrastructure to connect the applications and machines to Cloudflare. That tunnel makes outbound-only calls to the Cloudflare network and organizations can replace complex firewall rules with just one: disable all inbound connections.</p><p>To defend against attackers addressing IPs directly, Argo Tunnel can help secure the interface and force outbound requests through Cloudflare Access. With Argo Tunnel, and firewall rules preventing inbound traffic, no request can reach those IPs without first hitting Cloudflare, where Access can evaluate the request for authentication.</p><p>Administrators then build rules to decide who should authenticate to and reach the tools protected by Access. Whether those resources are virtual machines powering business operations or internal web applications, like Jira or iManage, when a user needs to connect, they pass through Cloudflare first.</p><p>When users need to connect to the tools behind Access, they are prompted to authenticate with their team’s SSO and, if valid, instantly connected to the application without being slowed down. Internally managed apps suddenly feel like SaaS products, and the login experience is seamless and familiar.</p><p>Behind the scenes, every request made to those internal tools hits Cloudflare first where we enforce identity-based policies. Access evaluates and logs every request to those apps for identity, giving administrators more visibility and security than a traditional VPN.</p>
    <div>
      <h2>Our team members SSO into the Atlassian suite with one-click</h2>
      <a href="#our-team-members-sso-into-the-atlassian-suite-with-one-click">
        
      </a>
    </div>
    <p>We rely on a set of productivity tools built by Atlassian, including Jira and Confluence. We secure them with Cloudflare Access.</p><p>In the past, when our team members wanted to reach those applications, they first logged into the VPN with a separate set of credentials unique to their VPN client. They navigated to one of the applications, and then broke out a second set of credentials, specific to the Atlassian suite, to reach Jira or Wiki.</p><p>All of this was clunky, reliant on the VPN, and not integrated with our SSO provider.</p><p>We decided to put the Atlassian suite behind Access and <a href="https://github.com/cloudflare/cloudflare-access-for-atlassian">to build a plugin</a> that could use the login from Access to SSO the end user into the application. Users login with their SSO provider and are instantly redirected into Jira or Wiki or Bitbucket, authorized without managing extra credentials.</p><p>We selected Atlassian because nearly every member of our global team uses the product each day. Saving the time to input a second set of credentials, daily, has real impact. Additionally, removing the extra step makes reaching these critical tools easier from mobile devices.</p><p>When we rolled this out at Cloudflare, team members had one fewer disruption in their day. We all became accustomed to it. We only received real feedback when we disabled it, briefly, to test a new release. And that response was loud. When we returned momentarily to the old world of multiple login flows, we started to appreciate just how convenient SSO is for a team. The lesson motivated us to make this available, quickly, to our customers.</p><p><i>You can read more about using our Atlassian plugin in your organization, check out the announcement</i> <a href="/cloudflare-access-sharing-our-single-sign-on-plugin-for-atlassian/"><i>here</i></a><i>.</i></p>
    <div>
      <h2>Our engineers can SSH to the resources they need</h2>
      <a href="#our-engineers-can-ssh-to-the-resources-they-need">
        
      </a>
    </div>
    <p>When we launched Cloudflare Access, we started with browser-based applications. We built a command-line tool to make CLI operations a bit easier, but SSH connections still held us back from removing the VPN altogether.</p><p>To solve that challenge, we released support for SSH connections through Cloudflare Access. The feature builds on top of our Argo Tunnel and Argo Smart Routing products.</p><p>Argo Smart Routing intelligently routes traffic around Cloudflare’s network, so that our engineers can connect to any data center in our fleet without suffering from Internet congestion. The Argo Tunnel product creates secure, outbound-only, connections from our data centers back to our network.</p><p>Team members can then use their SSH client to connect without any special wrappers or alternate commands. Our command-line tool, `cloudflared`, generates a single config file change and our engineers are ready to reach servers around the world.</p><p>We started by making our internal code repositories available in this flow. Users login with our SSO and can pull and submit new code without the friction of a private network. We then expanded the deployment to make it possible for our reliability engineering team to connect to the data centers that power Cloudflare’s network without a VPN.</p><p><i>You can read more about using our SSH workflow in your organization in the post</i> <a href="/releasing-the-cloudflare-access-feature-that-let-us-smash-a-vpn-on-stage/"><i>here</i></a><i>.</i></p>
    <div>
      <h2>We can onboard users rapidly</h2>
      <a href="#we-can-onboard-users-rapidly">
        
      </a>
    </div>
    <p>Cloudflare continues to grow as we add new team members in locations around the world. Keeping a manual list of bookmarks for new users no longer scales.</p><p>With Cloudflare Access, we have the pieces that we need to remove that step in the onboarding flow. We released a feature, the Access App Launch, that gives our users a single location from which they can launch any application they should be able to reach with a single click.</p><p>For administrators, the App Launch does not require additional configuration for each app. The dashboard reads an organization’s Access policies and only presents apps to the end user that they already have permission to reach. Each team member has a personalized dashboard, out of the box, that they can use to navigate and find the tools they need. No onboarding sessions required.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4o2Z5TuZ8FdUqQO7v1bitv/dcf44d97b85910354274ae265db1c6e0/app-launch-2.png" />
            
            </figure><p><i>You can read more about using our App Launch feature in your organization in the post</i> <a href="/announcing-the-cloudflare-access-app-launch/"><i>here</i></a><i>.</i></p>
    <div>
      <h2>Our security team can add logging everywhere with one-click</h2>
      <a href="#our-security-team-can-add-logging-everywhere-with-one-click">
        
      </a>
    </div>
    <p>When users leave the office, security teams can lose a real layer of a defense-in-depth strategy. Employees do not badge into a front desk when they work remotely.</p><p>Cloudflare Access addresses remote work blindspots by adding additional visibility into how applications are used. Access logs every authentication event and, if enabled, every user request made to a resource protected by the platform. Administrators can capture every request and attribute it to a user and IP address without any code changes. Cloudflare Access can help teams meet compliance and regulatory requirements for distributed users without any additional development time.</p><p>Our Security team uses this data to audit every request made to internal resources without interrupting any application owners.</p><p><i>You can read more about using our per-request logging in your organization in the post</i> <a href="/log-every-request-to-corporate-apps-no-code-changes-required/"><i>here</i></a><i>.</i></p>
    <div>
      <h2>How to get started</h2>
      <a href="#how-to-get-started">
        
      </a>
    </div>
    <p>Your team can use all the same features to stay productive from any location with Cloudflare for Teams. And until September 1, it's available to any organization for free.</p><p>We recognize that the Coronavirus emergency has put a strain on the infrastructure of companies around the world as more employees work from home. On March 9, Cloudflare made our Teams product, which helps support secure and efficient remote work, <a href="/cloudflare-for-teams-free-for-small-businesses-during-coronavirus-emergency/">free for small businesses through September 1.</a></p><p>As the severity of the outbreak has become clearer over the course of this week, we decided to extend this offer to help any business, regardless of size. The healthy functioning of our economy globally depends on work continuing to get done, even as people need to do that work remotely. If Cloudflare can do anything to help ensure that happens, we believe it is our duty to do so.</p><p>If you are already a Cloudflare for Teams customer, we have removed the caps on usage during the COVID-19 emergency, so you can scale to whatever number of seats you need without additional cost.</p><p>If you are not yet using Cloudflare for Teams, and if you or your employer are struggling with limits on the capacity of your existing VPN or Firewall, we stand ready to help and have removed the limits on the free trials of our Access and Gateway products for at least the next six months. Cloudflare employees are running no-cost onboarding sessions so you can get set up quickly.</p><p>You can review the details and sign up for an onboarding session here:</p><p><a href="https://developers.cloudflare.com/access/about/coronavirus-emergency/">developers.cloudflare.com/access/about/coronavirus-emergency/</a></p> ]]></content:encoded>
            <category><![CDATA[Cloudflare Access]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[VPN]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">2T3SCliwzRVW984d0OohrO</guid>
            <dc:creator>Sam Rhea</dc:creator>
        </item>
        <item>
            <title><![CDATA[Seamless remote work with Cloudflare for Teams]]></title>
            <link>https://blog.cloudflare.com/seamless-remote-work-with-cloudflare-access/</link>
            <pubDate>Mon, 24 Feb 2020 20:27:21 GMT</pubDate>
            <description><![CDATA[ The novel coronavirus is actively changing how organizations work in real-time. According to Fortune, the virus has led to the “world’s largest work-from-home experiment.” As the epidemic crosses borders, employees are staying home and putting new stress on how companies manage remote work. ]]></description>
            <content:encoded><![CDATA[ <p>The novel coronavirus is actively changing how organizations work in real-time. <a href="https://fortune.com/2020/02/03/coronavirus-offices-closed-work-from-home/">According</a> to Fortune, the virus has led to the “world’s largest work-from-home experiment.” As the epidemic crosses borders, employees are staying home and <a href="https://www.wsj.com/articles/coronavirus-cabin-fever-working-from-home-tests-employees-endurance-11581965410?ns=prod/accounts-wsj">putting new stress</a> on how companies manage remote work.</p><p>This is only accelerating an existing trend, however. Remote work has gained <a href="https://www.techrepublic.com/article/how-remote-work-rose-by-400-in-the-past-decade/">real traction</a> in the last decade and Gartner <a href="https://www.gartner.com/en/newsroom/press-releases/2020-02-05-gartner-identifies-six-trends-for-chief-human-resourc">projects</a> that it will only continue. However, teams which are moving to a distributed model tend to do so slowly. When those timelines are accelerated, IT and security administrators need to be able to help their workforce respond without disrupting their team members.</p><p>Cloudflare Access can help teams migrate to a model that makes it seamless for users to work from any location, or any device, without the need for lengthy migrations or onboarding sessions. Cloudflare Access can be deployed in less than one hour and bring SaaS-like convenience and speed to the self-hosted applications that previously lived behind a VPN.</p>
    <div>
      <h2>Leaving the castle-and-moat</h2>
      <a href="#leaving-the-castle-and-moat">
        
      </a>
    </div>
    <p>When users share a physical space, working on a private network is easy. Users do not need clunky VPN clients to connect to the resources they need. Team members physically sit close to the origin servers and code repositories that power their corporate apps.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/vb3IxNBaaz58vi5ZdG7ZQ/2f758d1ae9964e73bedefd0c47565aee/castle.png" />
            
            </figure><p>In this castle-and-moat model, every team member is assumed to be trusted simply by their presence inside of the walls of the office. They can silently attempt to connect to any resource without any default checks. Administrators must build complex <a href="https://www.cloudflare.com/learning/access-management/what-is-network-segmentation/">network segmentation</a> to avoid breaches and logging is mostly absent.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7w8rQ7XkrR7OMlgYnOsCYY/ed017c7dbade801f7980c58f60de56c7/new-trend.png" />
            
            </figure><p>This model has begun to fall apart for two reasons: the shift to cloud-hosted applications and the distribution of employees around the world.</p><p>The first trend, cloud-hosted applications, shifts resources outside of the castle-and-moat. Corporate apps no longer live in on-premise data centers but operate from centralized cloud providers. Those environments can sit hundreds or thousands of miles away from users, slowing down the connections to the applications hosted in those providers.</p><p>The second shift, users working outside of the office or from branch offices, introduces both a performance challenge in addition to a security concern. Organizations need to poke holes in their perimeter to allow users to connect back into their private network, before sending those users on to their target destination.</p><p>The spread of the coronavirus has accelerated the trend of users working away from home. Remote workers are putting new strain on the VPN appliances that sit in corporate headquarters, and that adds to the burden of IT teams attempting to manage a workplace shift that is happening much faster than planned.</p>
    <div>
      <h2>Cloudflare Access</h2>
      <a href="#cloudflare-access">
        
      </a>
    </div>
    <p>Cloudflare Access is one-half of <a href="https://teams.cloudflare.com/">Cloudflare for Teams</a>, a security platform that runs on Cloudflare’s network and focuses on keeping users, devices, and data safe without compromising for performance. We built Cloudflare Access to solve our own headaches with private networks as we grew from a team concentrated in a single office to a globally distributed organization.</p><p>Cloudflare Access <a href="https://www.cloudflare.com/products/zero-trust/vpn-replacement/">replaces corporate VPNs</a> with Cloudflare’s network. Instead of placing internal tools on a private network, teams deploy them in any environment, including hybrid or multi-cloud models, and secure them consistently with Cloudflare’s network.</p><p>Administrators build rules to decide who should be able to reach the tools protected by Access. In turn, when users need to connect to those tools, they are prompted to authenticate with their team’s identity provider. Cloudflare Access checks their login against the list of allowed users and, if permitted, allows the request to proceed.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/Ua0D0p1gHjBwCzHIMUL64/8e805da7dcff9b70fc046a64dba99ab1/access-diagram.png" />
            
            </figure><p>Deploying Access does not require exposing new holes in corporate firewalls. Teams connect their resources through a secure outbound connection, Argo Tunnel, which runs in your infrastructure to connect the applications and machines to Cloudflare. That tunnel makes outbound-only calls to the Cloudflare network and organizations can replace complex firewall rules with just one: disable all inbound connections.</p><p>To defend against attackers addressing IPs directly, Argo Tunnel can help secure the interface and force outbound requests through Cloudflare Access. With Argo Tunnel, and firewall rules preventing inbound traffic, no request can reach those IPs without first hitting Cloudflare, where Access can evaluate the request for authentication.</p><p>Administrators then build rules to decide who should authenticate to and reach the tools protected by Access. Whether those resources are virtual machines powering business operations or internal web applications, like Jira or iManage, when a user needs to connect, they pass through Cloudflare first.</p><p>When users need to connect to the tools behind Access, they are prompted to authenticate with their team’s SSO and, if valid, instantly connected to the application without being slowed down. Internally managed apps suddenly feel like SaaS products, and the login experience is seamless and familiar.</p><p>Behind the scenes, every request made to those internal tools hits Cloudflare first where we enforce identity-based policies. Access evaluates and logs every request to those apps for identity, giving administrators more visibility and security than a traditional VPN.</p>
    <div>
      <h2>Work from any device</h2>
      <a href="#work-from-any-device">
        
      </a>
    </div>
    <p>The coronavirus is not only changing where employees work, but also the devices they use to do their work. Digitimes <a href="https://www.digitimes.com/news/a20200221PD204.html">reports</a> that the demand for tablets continues to grow as workers find alternatives to the desktops sitting in corporate offices, a trend they attribute to the rise in cases of coronavirus and increasing percentages of employees working outside of the office.</p><p>Tablets and other mobile devices introduce new challenges for teams. Users need to install and configure a VPN profile to connect, if they can connect at all.</p><p>Cloudflare Access offers an alternative that requires no user action or IT administration. End users can login and reach their corporate apps from any device, no client or agent required.</p>
    <div>
      <h2>Rapid remote development</h2>
      <a href="#rapid-remote-development">
        
      </a>
    </div>
    <p>Working remotely can be difficult for users doing their job on browser-based applications. It becomes much more difficult for engineers and developers who need to do their work over RDP or <a href="https://www.cloudflare.com/learning/access-management/what-is-ssh/">SSH</a>.</p><p>In the event that teams need to connect to the desktops back inside of the office, Access also <a href="/cloudflare-access-now-supports-rdp/">supports</a> RDP connections. Team members can reach desktops over Cloudflare’s global network, reducing the latency of traditional VPN-based RDP clients. Organizations do not need to deploy new credentials or run the risk of leaving remote desktops open to the Internet. Cloudflare Access integrates with a team’s identity provider to bring SSO login to remote desktops.</p><p>Cloudflare Access also includes <a href="/releasing-the-cloudflare-access-feature-that-let-us-smash-a-vpn-on-stage/">support</a> for native SSH workflows. With Access, developers and engineers can connect over SSH to the code repositories or build systems they need to stay productive. Users can connect remotely, from low-end devices, to powerful servers and machines hosted in cloud environments.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1ZPbmgm5NxNPDj9npCUDUE/340e061053114ae628da01adb9d11a6a/access-ssh.png" />
            
            </figure><p>Additionally, with the SSH feature in Cloudflare Access, organizations can <a href="/public-keys-are-not-enough-for-ssh-security/">replace the static SSH keys</a> that live on user devices with short-lived certificates generated when a user logs in to Okta, AzureAD, or any other supported identity provider. If team members working from home are using personal devices, organizations can prevent those devices from ever storing long-lived keys that can reach production systems or code repositories.</p><p><a href="https://www.replicated.com/">Replicated</a> is an infrastructure software company that uses Cloudflare Access to embrace remote development work. Their team of developers is spread out across the continental US. Before they found Cloudflare Access, IT provisioned new MacBook pros to each member of their development team. Every developer deployed the entire development stack on their local machine. Users were spending hours every week just setting up their development environment, and even more time troubleshooting their setup. They use Cloudflare Access and Argo Tunnel to secure developer access to their Google Cloud Platform (GCP) infrastructure. Everything is authenticated by Access and proxied over Argo through SSH. Now, Replicated’s team of developers can work safely from coffee shops and home offices without running code locally on their machines.</p>
    <div>
      <h2>One-click logging and compliance</h2>
      <a href="#one-click-logging-and-compliance">
        
      </a>
    </div>
    <p>When users leave the office, security teams can lose a real layer of a defense-in-depth strategy. Employees do not badge into a front desk when they work remotely.</p><p>Cloudflare Access addresses <a href="https://www.cloudflare.com/products/zero-trust/remote-workforces/">remote work blindspots</a> by adding additional visibility into how applications are used. Access logs every authentication event and, if enabled, every user request made to a resource protected by the platform. Administrators can capture every request and attribute it to a user and IP address <a href="/log-every-request-to-corporate-apps-no-code-changes-required/">without any code changes</a>. Cloudflare Access can help teams meet compliance and regulatory requirements for distributed users without any additional development time.</p>
    <div>
      <h2>Onboard users without onboarding sessions</h2>
      <a href="#onboard-users-without-onboarding-sessions">
        
      </a>
    </div>
    <p>When IT departments change how users do their work, even to faster and safer models, those shifts can still require teams to invest time in training employees. Discoverability becomes a real problem. If users cannot find the applications they need, teams lose the benefit of faster connections and maintenance overhead.</p><p>Cloudflare Access includes an application launchpad , available to every user with additional configuration. With the <a href="/multi-sso-and-cloudflare-access-adding-linkedin-and-github-teams/">Access App Launch</a>, administrators can also skip sending custom emails or lists of links to new contractors and replace them with a single URL. When external users login with LinkedIn, GitHub, or any other provider, the Access App Launch will display only the applications they can reach. In a single view, users can find and launch the tools that they need.</p><p>Whether those users are employees or contractors and partners, every team member can quickly find the tools they need to avoid losing a step as they shift from working on a private network to a model built on Cloudflare’s global network.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4NFANT6KtmN8N1VvYgp2FD/d6bda3515e3a3708ab05ead906e0b3a3/app-launch-1.png" />
            
            </figure>
    <div>
      <h2>How to get started</h2>
      <a href="#how-to-get-started">
        
      </a>
    </div>
    <p>It’s really very simple. To find out more about Cloudflare for Teams, visit <a href="https://teams.cloudflare.com/">teams.cloudflare.com</a>.</p><p>If you’re looking to get started with Cloudflare Access today, it’s available on any Cloudflare plan. The first five seats are free. Follow the link <a href="https://teams.cloudflare.com/access/index.html">here</a> to get started.</p><p>Finally, need help in getting it up? A quick start guide is available <a href="https://developers.cloudflare.com/access/about/how-access-works/">here</a>.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare Access]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[VPN]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Product News]]></category>
            <guid isPermaLink="false">50bs59vGOLEqNJrOodAC0r</guid>
            <dc:creator>Sam Rhea</dc:creator>
        </item>
        <item>
            <title><![CDATA[Using your devices as the key to your apps]]></title>
            <link>https://blog.cloudflare.com/using-your-devices-as-the-key-to-your-apps/</link>
            <pubDate>Fri, 21 Feb 2020 17:14:04 GMT</pubDate>
            <description><![CDATA[ I keep a very detailed budget. I have for the last 7 years. I manually input every expense into a spreadsheet app and use a combination of sumifs functions to track spending. ]]></description>
            <content:encoded><![CDATA[ <p>I keep a very detailed budget. I have for the last 7 years. I manually input every expense into a spreadsheet app and use a combination of <code>sumifs</code> functions to track spending.</p><p>Opening the spreadsheet app, and then the specific spreadsheet, every time that I want to submit an expense is a little clunky. I'm working on a new project to make that easier. I'm building a simple web app, with a very basic form, into which I will enter one-off expenses. This form will then append those expenses as rows into the budget workbook.</p><p>I want to lock down this project; I prefer that I am the only person with the power to wreck my budget. To do that, I'm going to use <a href="https://teams.cloudflare.com/access/index.html">Cloudflare Access</a>. With Access, I can require a login to reach the page - no server-side changes required.</p><p>Except, I don't want to allow logins from any device. For this project, I want to turn my iPhone into the only device that can reach this app.</p><p>To do that, I'll use Cloudflare Access in combination with an open source toolkit from Cloudflare, <code>cfssl</code>. Together, I can convert my device into a secure key for this application in about 45 minutes.</p><p>While this is just one phone and a simple project, a larger organization could scale this up to hundreds of thousands or millions - without spending 45 minutes per device. Authentication occurs in the Cloudflare network and lets teams focus on securely deploying devices, from IoT sensors to corporate laptops, that solve new problems.</p><p><b>? I have a few goals for this project:</b></p><ul><li><p>Protect my prototype budget-entry app with authentication</p></li><li><p>Avoid building a custom login flow into the app itself</p></li><li><p>Use mutual TLS (mTLS) authentication so that only requests from my iPhone are allowed</p></li></ul><p><b>?️ This walkthrough covers how to:</b></p><ul><li><p>Build an Access policy to enforce mutual TLS authentication</p></li><li><p>Use Cloudflare's PKI toolkit to create a Root CA and then generate a client certificate</p></li><li><p>Use OpenSSL to convert that client certificate into a format for iPhone usage</p></li><li><p>Place that client certificate on my iPhone</p></li></ul><p><b>⏲️Time to complete: ~45 minutes</b></p>
    <div>
      <h2>Cloudflare Access</h2>
      <a href="#cloudflare-access">
        
      </a>
    </div>
    <p><a href="https://teams.cloudflare.com/access/index.html">Cloudflare Access</a> is a bouncer that checks ID at the door. Any and every door.</p><p>Old models of security built on private networks operate like a guard at the front door of a large apartment building, except this apartment building does not have locks on any of the individual units. If you can walk through the front door, you could walk into any home. By default, private networks assume that a user on that network is trusted until proven malicious - you're free to roam the building until someone reports you. None of us want to live in that complex.</p><p>Access replaces that model with a bouncer in front of each apartment unit. Cloudflare checks every attempt to reach a protected app, machine, or remote desktop against rules that define who is allowed in.</p><p>To perform that check, Access needs to confirm a user's identity. To do that, teams can integrate Access with identity providers like G Suite, AzureAD, Okta or even Facebook and GitHub.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3uaC7WZ67qVTXZV1wsG10t/f4022ec5da0d1dcefadad9520abfbba7/image-1.png" />
            
            </figure><p>For this project, I want to limit not just <b>who</b> can reach the app, but also <b>what</b> can reach it. I want to only allow my particular iPhone to connect. Since my iPhone does not have its own GitHub account, I need to use a workflow that allows devices to authenticate: certificates, specifically mutual TLS (mTLS) certificate authentication.</p><p><b>? Please reach out.</b> Today, the mTLS feature in Access is only available to Enterprise plans. Are you on a self-serve plan and working on a project where you want to use mTLS? IoT, service-to-service, corporate security included. If so, please reach out to me at <code>srhea@cloudflare.com</code> and let's chat.</p>
    <div>
      <h2>mTLS and cfssl</h2>
      <a href="#mtls-and-cfssl">
        
      </a>
    </div>
    <p>Public key infrastructure (PKI) makes it possible for your browser to trust that this blog really is <code>blog.cloudflare.com</code>. When you visit this blog, the site presents a certificate to tell your browser that it is the real <code>blog.cloudflare.com</code>.</p><p>Your browser is skeptical. It keeps a short list of root certificates that it will trust. Your browser will only trust certificates signed by authorities in that list. Cloudflare <a href="https://support.cloudflare.com/hc/en-us/articles/204151138-Understanding-Universal-SSL">offers free certificates</a> for hostnames using its reverse proxy. You can also get origin certificates from other services like Let's Encrypt. Either way, when you visit a web page with a certificate, you can ensure you are on the authentic site and that the traffic between you and the blog is encrypted.</p><p>For this project, I want to go the other direction. I want my device to present a certificate to Cloudflare Access demonstrating that it is my authentic iPhone. To do that, I need to create a chain that can issue a certificate to my device.</p><p>Cloudflare publishes an <a href="https://github.com/cloudflare/cfssl">open source</a> PKI toolkit, <code>cfssl</code>, which can solve that problem for me. <code>cfssl</code> lets me quickly create a Root CA and then use that root to generate a client certificate, which will ultimately live on my phone.</p><p>To begin, I'll follow the instructions <a href="https://github.com/cloudflare/cfssl#installation">here</a> to set up <code>cfssl</code> on my laptop. Once installed, I can start creating certificates.</p>
    <div>
      <h2>Generating a Root CA and an allegory about Texas</h2>
      <a href="#generating-a-root-ca-and-an-allegory-about-texas">
        
      </a>
    </div>
    <p>First, I need to create the Root CA. This root will give Access a basis for trusting client certificates. Think of the root as the Department of Motor Vehicles (DMV) in Texas. Only the State of Texas, through the DMV, can issue Texas driver licenses. Bouncers do not need to know about every driver license issued, but they do know to trust the State of Texas and how to validate Texas-issued licenses.</p><p>In this case, Access does not need to know about every client cert issued by this Root CA. The product only needs to know to trust this Root CA and how to validate if client certificates were issued by this root.</p><p>I'm going to start by creating a new directory, <code>cert-auth</code> to keep things organized. Inside of that directory, I'll create a folder, <code>root</code>, where I'll store the Root CA materials</p><p>Next, I'll define some details about the Root CA. I'll create a file, <code>ca-csr.json</code> and give it some specifics that relate to my deployment.</p>
            <pre><code>{
    "CN": "Sam Money App",
    "key": {
      "algo": "rsa",
      "size": 4096
    },
    "names": [
      {
        "C": "PT",
        "L": "Lisboa",
        "O": "Money App Test",
        "OU": "Sam Projects",
        "ST": "Lisboa"
      }
    ]
  }</code></pre>
            <p>Now I need to configure how the CA will be used. I'll create another new file, <code>ca-config.json</code>, and add the following details.</p>
            <pre><code>{
    "signing": {
      "default": {
        "expiry": "8760h"
      },
      "profiles": {
        "server": {
          "usages": ["signing", "key encipherment", "server auth"],
          "expiry": "8760h"
        },
        "client": {
          "usages": ["signing","key encipherment","client auth"],
          "expiry": "8760h"
        }
      }
    }
  }</code></pre>
            <p>The <code>ca-csr.json</code> file gives the Root CA a sense of identity and the <code>ca-config.json</code> will later define the configuration details when signing new client certificates.</p><p>With that in place, I can go ahead and create the Root CA. I'll run the following command in my terminal from within the <code>root</code> folder.</p>
            <pre><code>$ cfssl genkey -initca ca-csr.json | cfssljson -bare ca</code></pre>
            <p>The “Root CA” here is really a composition of three files, all of which are created by that command. <code>cfssl</code> generates a private key, a certificate signing request, and the certificate itself. The output should resemble this screenshot:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2Qmo84Y4hqJYdZmzRyXIVm/c335a9fc7b57fb60c28a7ed01c0c79a4/root-output-1.png" />
            
            </figure><p>I need to guard the private key like it's the only thing that matters. In real production deployments, most organizations will create an intermediate certificate and sign client certificates with that intermediate. This allows administrators to keep the root locked down even further, they only need to handle it when creating new intermediates (and those intermediates can be quickly revoked). For this test, I'm just going to use a root to create the client certificates.</p><p>Now that I have the Root CA, I can upload the certificate in PEM format to Cloudflare Access. Cloudflare can then use that certificate to authenticate incoming requests for a valid client certificate.</p><p>In the Cloudflare Access dashboard, I'll use the card titled “Mutual TLS Root Certificates”. I can click “Add A New Certificate” and then paste the content of the <code>ca.pem</code> file directly into it.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3AJkIr7XXnZWhGARxwrtzk/7cd9e4f598f4d721f6a1b4537d10087e/ca-upload-1.png" />
            
            </figure><p>I need to associate this certificate with a fully qualified domain name (FQDN). In this case, I'm going to use the certificate to authenticate requests for <code>money.samrhea.com</code>, so I'll just input that subdomain, but I could associate this cert with multiple FQDNs if needed.</p><p>Once saved, the Access dashboard will list the new Root CA.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/bEIhYcE8oLTrVEgpzT99d/6de974802e52c3f5e45c789bd2e0220c/dash-list-1.png" />
            
            </figure>
    <div>
      <h2>Building an Access Policy</h2>
      <a href="#building-an-access-policy">
        
      </a>
    </div>
    <p>Before I deploy the budget app prototype to <code>money.samrhea.com</code>, I need to lock down that subdomain with an Access policy.</p><p>In the Cloudflare dashboard, I'll select the zone <code>samrhea.com</code> and navigate to the Access tab. Once there, I can click <code>Create Access Policy</code> in the <code>Access Policies</code> card. That card will launch an editor where I can build out the rule(s) for reaching this subdomain.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/24POemu9X41I2c4TaAxhuD/2f1a92e4b3b395e1a63922824b1718b1/access-policy.png" />
            
            </figure><p>In the example above, the policy will be applied to just the subdomain <code>money.samrhea.com</code>. I could make it more granular with path-based rules, but I'll keep it simple for now.</p><p>In the <code>Policies</code> section, I'm going to create a rule to allow client certificates signed by the Root CA I generated to reach the application. In this case, I'll pick “Non Identity” from the <code>Decision</code> drop-down. I'll then choose “Valid Certificate” under the <code>Include</code> details.</p><p>This will allow any valid certificate signed by the “Money App Test” CA I uploaded earlier. I could also build a rule using Common Names, but I'll stick with valid cert for now. I'll hit <code>Save</code> and finish the certificate deployment.</p>
    <div>
      <h2>Issuing client certs and converting to PKCS #12</h2>
      <a href="#issuing-client-certs-and-converting-to-pkcs-12">
        
      </a>
    </div>
    <p>So far, I have a Root CA and an Access policy that enforces mTLS with client certs issued by that Root CA. I've stationed a bouncer outside of my app and told them to only trust ID cards issued by The State of Texas. Now I need to issue a license in the form of a client certificate.</p><p>To avoid confusion, I'm going to create a new folder in the same directory as the <code>root</code> folder, this one called <code>client</code>. Inside of this directory, I'll create a new file: <code>client-csr.json</code> with the following <code>.json</code> blob:</p>
            <pre><code>{
    "CN": "Rhea Group",
    "hosts": [""],
    "key": {
      "algo": "rsa",
      "size": 4096
    },
    "names": [
      {
        "C": "PT",
        "L": "Lisboa",
        "O": "Money App Test",
        "OU": "Sam Projects",
        "ST": "Lisboa"
      }
    ]
  }</code></pre>
            <p>This sets configuration details for the client certificate that I'm about to request.</p><p>I can now use <code>cfssl</code> to generate a client certificate against my Root CA. The command below uses the <code>-profile</code> flag to create the client cert using the JSON configuration I just saved. This also gives the file the name <code>iphone-client</code>.</p>
            <pre><code>$ cfssl gencert -ca=../root/ca.pem -ca-key=../root/ca-key.pem -config=../root/ca-config.json -profile=client client-csr.json | cfssljson -bare iphone-client</code></pre>
            <p>The combined output should resemble the following:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5JwgtLX24Yo9QI7iNU6080/f0ad1d7022faf0a872c1463b59841bb5/folder-client-2.png" />
            
            </figure><p><b>FileDescription</b><code>client-csr.json</code>The JSON configuration created earlier to specify client cert details.<code>iphone-client-key.pem</code>The private key for the client certificate generated.<code>iphone-client.csr</code>The certificate signing request used to request the client cert.<code>iphone-client.pem</code>The client certificate created.</p><p>With my freshly minted client certificate and key, I can go ahead and test that it works with my Access policy with a quick <code>cURL</code> command.</p>
            <pre><code>$ curl -v --cert iphone-client.pem --key iphone-client-key.pem https://money.samrhea.com</code></pre>
            <p>That works, but I'm not done yet. I need to get this client certificate on my iPhone. To do so, I need to convert the certificate and key into a format that my iPhone understands, PKCS #12.</p><p><a href="https://tools.ietf.org/html/rfc7292">PKCS 12</a> is a file format used for storing cryptographic objects. To convert the two <code>.pem</code> files, the certificate and the key, into PKCS 12, I'm going to use the <a href="https://www.openssl.org/">OpenSSL</a> command-line tool.</p><p>OpenSSL is a popular toolkit for TLS and SSL protocols that can solve a wide variety of certificate use cases. In my example, I just need it for one command:</p>
            <pre><code>$ openssl pkcs12 -export -out sam-iphone.p12 -inkey iphone-client-key.pem -in iphone-client.pem -certfile ../root/ca.pem</code></pre>
            <p>The command above takes the key and certificate generated previously and converts them into a single <code>.p12</code> file. I'll also be prompted to create an “Export Password”. I'll use something that I can remember, because I'm going to need it in the next section.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5MAG6HR9az3gjZpzAZYXEP/e7ea4ba3957b0b820583db65f029ea96/convert-twelve.png" />
            
            </figure>
    <div>
      <h2>Authenticating from my iPhone</h2>
      <a href="#authenticating-from-my-iphone">
        
      </a>
    </div>
    <p>I now need to get the <code>.p12</code> file on my iPhone. In corporate environments, organizations distribute client certificates via mobile device management (MDM) programs or other tools. I'm just doing this for a personal test project, so I'm going to use AirDrop.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6TvhEiK3T77V6lN4XJZpRt/745731293c1554ab9128aad6ec99f65f/airdrop.png" />
            
            </figure><p>Once my iPhone receives the file, I'll be prompted to select a device where the certificate will be installed as a device profile.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/b0wJT1rQzV8XCDVihx4ar/6ab8c4d3afe1ee39cfda1878d16bdacb/choose-device-1.png" />
            
            </figure><p>I'll then be prompted to enter my device password and the password set in the “Export” step above. Once complete, I can view the certificate under <code>Profiles</code> in <code>Settings</code>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2MEPK4uly4715ECJTYv66I/4051c6f7ea9b1826238303248313bfe9/cert-view-1.png" />
            
            </figure><p>Now, when I visit <code>money.samrhea.com</code> for the first time from my phone, I'll be prompted to use the profile created.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5ZblzD1kalEVc1MrzoFrAY/12448ed0e99c5800d20bd699470db163/cert-prompt-1.png" />
            
            </figure><p>Browsers can exhibit strange behavior when handling client certificate prompts. This should be the only time I need to confirm this profile should be used, but it might happen again.</p>
    <div>
      <h2>What's next?</h2>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>My prototype personal finance app now is only accessible from my iPhone. This also makes it easy to login through Access from my device.</p><p>Access policies can be pretty flexible. If I want to reach it from a different device, I could build a rule to allow logins through Google as an alternative. I can also create a policy to require <b>both</b> a certificate and SSO login.</p><p>Beyond just authentication, I can also build something with this client cert flow now. Cloudflare Access makes the details from the client cert, the ones I created earlier in this tutorial, <a href="https://developers.cloudflare.com/access/service-auth/mtls-headers/">available</a> to Cloudflare Workers. I can start to create routing rules or trigger actions based on the details about this client cert.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare Access]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[VPN]]></category>
            <guid isPermaLink="false">4KuVEgx9J7ZCJezd1zYBhO</guid>
            <dc:creator>Sam Rhea</dc:creator>
        </item>
        <item>
            <title><![CDATA[Announcing the Cloudflare Access App Launch]]></title>
            <link>https://blog.cloudflare.com/announcing-the-cloudflare-access-app-launch/</link>
            <pubDate>Thu, 16 Jan 2020 16:13:02 GMT</pubDate>
            <description><![CDATA[ Since launch, Cloudflare Access has helped improve how users connect to secured applications. When you protect an application with Access, users never have to connect to a private network and never have to deal with a clunky VPN client.  ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7xf3pw9gUCzsu7j4CxkBLH/c48dfd20ca99d564fb6dcaa6a037376f/Cloudflare-access_3x.png" />
            
            </figure><p>Every person joining your team has the same question on Day One: how do I find and connect to the applications I need to do my job?</p><p>Since launch, Cloudflare Access has helped improve how users connect to those applications. When you protect an application with Access, users never have to connect to a private network and never have to deal with a clunky VPN client. Instead, they reach on-premise apps as if they were SaaS tools. Behind the scenes, Access evaluates and logs every request to those apps for identity, giving administrators more visibility and security than a traditional VPN.</p><p>Administrators need about an hour to deploy Access. End user logins take about 20 ms, and that response time is consistent globally. Unlike VPN appliances, Access runs in every data center in Cloudflare’s network in <a href="/cloudflare-expanded-to-200-cities-in-2019/">200 cities</a> around the world. When Access works well, it should be easy for administrators and invisible to the end user.</p><p>However, users still need to locate the applications behind Access, and for internally managed applications, traditional dashboards require constant upkeep. As organizations grow, that roster of links keeps expanding. Department leads and IT administrators can create and publish manual lists, but those become a chore to maintain. Teams need to publish custom versions for contractors or partners that only make certain tools visible.</p><p>Starting today, teams can use Cloudflare Access to solve that challenge. We’re excited to announce the first feature in Access built specifically for end users: the Access App Launch portal.</p><p>The Access App Launch is a dashboard for all the applications protected by Access. Once enabled, end users can login and connect to every app behind Access with a single click.</p>
    <div>
      <h2>How does it work?</h2>
      <a href="#how-does-it-work">
        
      </a>
    </div>
    <p>When administrators secure an application with Access, any request to the hostname of that application stops at Cloudflare’s network first. Once there, Cloudflare Access checks the request against the list of users who have permission to reach the application.</p><p>To check identity, Access relies on the identity provider that the team already uses. Access integrates with providers like OneLogin, Okta, AzureAD, G Suite and others to determine who a user is. If the user has not logged in yet, Access will prompt them to do so at the identity provider configured.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7yNiimYXl24VVzkJCVTJRc/ac405b8050df3eb754b3fb73098f320f/access-solution-diagram_3x-1.png" />
            
            </figure><p>When the user logs in, they are redirected through a subdomain unique to each Access account. Access assigns that subdomain based on a hostname already active in the account. For example, an account with the hostname “widgetcorp.tech” will be assigned “widgetcorp.cloudflareaccess.com”.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1dofxJ68JdSDrFj4o7VBwg/928a8605a2c3153fb5bf32ad6c539bd9/app-launch-1.gif" />
            
            </figure><p>The Access App Launch uses the unique subdomain assigned to each Access account. Now, when users visit that URL directly, Cloudflare Access checks their identity and displays only the applications that the user has permission to reach. When a user clicks on an application, they are redirected to the application behind it. Since they are already authenticated, they do not need to login again.</p><p>In the background, the Access App Launch decodes and validates the token stored in the cookie on the account’s subdomain.</p>
    <div>
      <h2>How is it configured?</h2>
      <a href="#how-is-it-configured">
        
      </a>
    </div>
    <p>The Access App Launch can be configured in the Cloudflare dashboard in three steps. First, navigate to the Access tab in the dashboard. Next, enable the feature in the “App Launch Portal” card. Finally, define who should be able to use the Access App Launch in the modal that appears and click “Save”. Permissions to use the Access App Launch portal do not impact existing Access policies for who can reach protected applications.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/62ACS4wHPyldfWY95GEgKC/f291c90f79fc8b8ce068bb8aa3bbffd0/pasted-image-0-2.png" />
            
            </figure><p>Administrators do not need to manually configure each application that appears in the portal. Access App Launch uses the policies already created in the account to generate a page unique to each individual user, automatically.</p>
    <div>
      <h2>Defense-in-depth against phishing attacks</h2>
      <a href="#defense-in-depth-against-phishing-attacks">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/learning/security/threats/phishing-attack/">Phishing attacks</a> attempt to trick users by masquerading as a legitimate website. In the case of business users, team members think they are visiting an authentic application. Instead, an attacker can present a spoofed version of the application at a URL that looks like the real thing.</p><p>Take “example.com” vs “examрle.com” - they look identical, but one uses the Cyrillic “р” and becomes an entirely different hostname. If an attacker can lure a user to visit “examрle.com”, and make the site look like the real thing, that user could accidentally leak credentials or information.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1JyDTPAA98ZB0Bc0Qs4v10/cee7a5b88d02a2b6b2057b35314b1188/pasted-image-0--1--1.png" />
            
            </figure><p>To be successful, the attacker needs to get the victim to visit that fraudulent URL. That frequently happens via <a href="https://www.cloudflare.com/learning/email-security/what-is-email-fraud/">email from untrusted senders</a>.</p><p>The Access App Launch can help prevent these attacks from targeting internal tools. Teams can instruct users to only navigate to internal applications through the Access App Launch dashboard. When users select a tile in the page, Access will send users to that application using the organization’s SSO.</p><p>Cloudflare Gateway can take it one step further. Gateway’s DNS resolver filtering can help <a href="https://www.cloudflare.com/learning/email-security/how-to-prevent-phishing/">defend from phishing attacks</a> that utilize sites that resemble legitimate applications that do not sit behind Access. To learn more about adding Gateway, in conjunction with Access, sign up to join the beta <a href="https://teams.cloudflare.com/gateway/index.html">here</a>.</p>
    <div>
      <h2>What’s next?</h2>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>As part of last week’s announcement of Cloudflare for Teams, the Access App Launch is now available to all Access customers today. You can get started with instructions <a href="https://developers.cloudflare.com/access/setting-up-access/app-launch/">here</a>.</p><p>Interested in learning more about Cloudflare for Teams? Read more about the announcement and features <a href="https://teams.cloudflare.com/">here</a>.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Cloudflare Access]]></category>
            <category><![CDATA[VPN]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Product News]]></category>
            <guid isPermaLink="false">6DMH2LWgInsog7Y4s3dHsA</guid>
            <dc:creator>Sam Rhea</dc:creator>
        </item>
        <item>
            <title><![CDATA[Introducing Cloudflare for Teams]]></title>
            <link>https://blog.cloudflare.com/introducing-cloudflare-for-teams/</link>
            <pubDate>Tue, 07 Jan 2020 14:00:24 GMT</pubDate>
            <description><![CDATA[ Ten years ago, when Cloudflare was created, the Internet was a place that people visited. People still talked about ‘surfing the web’ and the iPhone was less than two years old, but on July 4, 2009 large scale DDoS attacks were launched against websites in the US and South Korea. ]]></description>
            <content:encoded><![CDATA[ <p>Ten years ago, when Cloudflare was created, the Internet was a place that people visited. People still talked about ‘surfing the web’ and the iPhone was less than two years old, but on July 4, 2009 <a href="https://en.wikipedia.org/wiki/July_2009_cyberattacks">large scale DDoS attacks were launched against websites in the US and South Korea</a>.</p><p>Those attacks highlighted how fragile the Internet was and how all of us were becoming dependent on access to the web as part of our daily lives.</p><p>Fast forward ten years and the speed, reliability and safety of the Internet is paramount as our private and work lives depend on it.</p><p>We started Cloudflare to solve one half of every IT organization's challenge: how do you ensure the resources and infrastructure that you expose to the Internet are safe from attack, fast, and reliable. We saw that the world was moving away from hardware and software to solve these problems and instead wanted a scalable service that would work around the world.</p><p>To deliver that, we built one of the world's largest networks. Today our network spans more than 200 cities worldwide and is within milliseconds of nearly everyone connected to the Internet. We have built the capacity to stand up to nation-state scale cyberattacks and a threat intelligence system powered by the immense amount of Internet traffic that we see.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/29NT6mgxYSHDrBtJSRljO8/b85e9762d9305fc5bf35eab3ad821b29/image5-2.png" />
            
            </figure><p>Today we're <a href="https://teams.cloudflare.com/">expanding</a> Cloudflare's product offerings to solve the other half of every IT organization's challenge: ensuring the people and teams within an organization can access the tools they need to do their job and are safe from malware and other online threats.</p><p>The speed, reliability, and protection we’ve brought to public infrastructure is extended today to everything your team does on the Internet.</p><p>In addition to protecting an organization's infrastructure, IT organizations are charged with ensuring that employees of an organization can access the tools they need safely. Traditionally, these problems would be solved by hardware products like VPNs and Firewalls. VPNs let authorized users access the tools they needed and Firewalls kept malware out.</p>
    <div>
      <h2>Castle and Moat</h2>
      <a href="#castle-and-moat">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2RZULB97tfS61r6e7EiXfD/e8ffc6be052c96cf56a5e9940da3e174/image8-1.png" />
            
            </figure><p>The dominant model was the idea of a castle and a moat. You put all your valuable assets inside the castle. Your Firewall created the moat around the castle to keep anything malicious out. When you needed to let someone in, a VPN acted as the drawbridge over the moat.</p><p>This is still the model most businesses use today, but it's showing its age. The first challenge is that if an attacker is able to find its way over the moat and into the castle then it can cause significant damage. Unfortunately, few weeks go by without reading a news story about how an organization had significant data compromised because an employee fell for a phishing email, or a contractor was compromised, or someone was able to sneak into an office and plug in a rogue device.</p><p>The second challenge of the model is the rise of cloud and SaaS. Increasingly an organization's resources aren't in the just one castle anymore, but instead in different public cloud and SaaS vendors.</p><p>Services like Box, for instance, provide better storage and collaboration tools than most organizations could ever hope to build and manage themselves. But there's literally nowhere you can ship a hardware box to Box in order to build your own moat around their SaaS castle. Box provides some great security tools themselves, but they are different from the tools provided by every other SaaS and public cloud vendor. Where IT organizations used to try to have a single pane of glass with a complex mess of hardware to see who was getting stopped by their moats and who was crossing their drawbridges, SaaS and cloud make that visibility increasingly difficult.</p><p>The third challenge to the traditional castle and moat strategy of IT is the rise of mobile. Where once upon a time your employees would all show up to work in your castle, now people are working around the world. Requiring everyone to login to a limited number of central VPNs becomes obviously absurd when you picture it as villagers having to sprint back from wherever they are across a drawbridge whenever they want to get work done. It's no wonder VPN support is one of the top IT organization tickets and likely always will be for organizations that maintain a castle and moat approach.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4ACMBi5NvKMLBiuvA4swh0/b2b3a2649d452bdbe02119dbd4160c17/image2-5.png" />
            
            </figure><p>But it's worse than that. Mobile has also introduced a culture where employees bring their own devices to work. Or, even if on a company-managed device, work from the road or home — beyond the protected walls of the castle and without the security provided by a moat.</p><p>If you'd looked at how we managed our own IT systems at Cloudflare four years ago, you'd have seen us following this same model. We used firewalls to keep threats out and required every employee to login through our VPN to get their work done. Personally, as someone who travels extensively for my job, it was especially painful.</p><p>Regularly, someone would send me a link to an internal wiki article asking for my input. I'd almost certainly be working from my mobile phone in the back of a cab running between meetings. I'd try and access the link and be prompted to login to our VPN in San Francisco. That's when the frustration would start.</p><p>Corporate mobile VPN clients, in my experience, all seem to be powered by some 100-sided die that only will allow you to connect if the number of miles you are from your home office is less than 25 times whatever number is rolled. Much frustration and several IT tickets later, with a little luck I may be able to connect. And, even then, the experience was horribly slow and unreliable.</p><p>When we audited our own system, we found that the frustration with the process had caused multiple teams to create workarounds that were, effectively, unauthorized drawbridges over our carefully constructed moat. And, as we increasingly adopted SaaS tools like Salesforce and Workday, we lost much visibility into how these tools were being used.</p><p>Around the same time we were realizing the traditional approach to IT security was untenable for an organization like Cloudflare, Google published their paper titled "<a href="https://research.google/pubs/pub43231/">BeyondCorp: A New Approach to Enterprise Security</a>." The core idea was that a company's intranet should be no more trusted than the Internet. And, rather than the <a href="https://www.cloudflare.com/learning/access-management/what-is-the-network-perimeter/">perimeter</a> being enforced by a singular moat, instead each application and data source should authenticate the individual and device each time it is accessed.</p><p>The BeyondCorp idea, which has come to be known as a <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust model</a> for IT security, was influential for how we thought about our own systems. Powerfully, because Cloudflare had a flexible global network, we were able to use it both to enforce policies as our team accessed tools as well as to protect ourselves from malware as we did our jobs.</p>
    <div>
      <h2>Cloudflare for Teams</h2>
      <a href="#cloudflare-for-teams">
        
      </a>
    </div>
    <p>Today, we're excited to announce <a href="https://teams.cloudflare.com/">Cloudflare for Teams</a>™: the suite of tools we built to protect ourselves, now available to help any IT organization, from the smallest to the largest.</p><p>Cloudflare for Teams is built around two complementary products: Access and Gateway. <a href="https://teams.cloudflare.com/access/">Cloudflare Access</a>™ is the modern VPN — a way to ensure your team members get fast access to the resources they need to do their job while keeping threats out. <a href="https://teams.cloudflare.com/gateway/">Cloudflare Gateway</a>™ is the modern <a href="https://www.cloudflare.com/learning/security/what-is-next-generation-firewall-ngfw/">Next Generation Firewall</a> — a way to ensure that your team members are protected from malware and follow your organization's policies wherever they go online.</p><p>Powerfully, both Cloudflare Access and Cloudflare Gateway are built atop the existing Cloudflare network. That means they are fast, reliable, scalable to the largest organizations, DDoS resistant, and located everywhere your team members are today and wherever they may travel. Have a senior executive going on a photo safari to see giraffes in Kenya, gorillas in Rwanda, and lemurs in Madagascar — don't worry, we have <a href="https://www.cloudflare.com/network/">Cloudflare data centers</a> in all those countries (and many more) and they all support Cloudflare for Teams.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6H15vMsCPp8cGkoczT7dEg/86b4be286983e7f2be0b7527920ab52f/image4-3.png" />
            
            </figure><p>All Cloudflare for Teams products are informed by the threat intelligence we see across all of Cloudflare's products. We see such a large diversity of Internet traffic that we often see new threats and malware before anyone else. We've supplemented our own proprietary data with additional data sources from leading security vendors, ensuring Cloudflare for Teams provides a broad set of <a href="https://www.cloudflare.com/products/zero-trust/threat-defense/">protections against malware and other online threats</a>.</p><p>Moreover, because Cloudflare for Teams runs atop the same network we built for our infrastructure protection products, we can deliver them very efficiently. That means that we can offer these products to our customers at extremely competitive prices. Our goal is to make the return on investment (ROI) for all Cloudflare for Teams customers nothing short of a no brainer. If you’re considering another solution, <a href="https://teams.cloudflare.com/gateway/index.html#get-notified">contact us before you decide</a>.</p><p>Both Cloudflare Access and Cloudflare Gateway also build off products we've launched and battle tested already. For example, Gateway builds, in part, off our <a href="https://one.one.one.one/">1.1.1.1 Public DNS resolver</a>. Today, more than 40 million people trust 1.1.1.1 as the fastest public DNS resolver globally. By adding malware scanning, we were able to create our entry-level Cloudflare Gateway product.</p><p>Cloudflare Access and Cloudflare Gateway build off our WARP and WARP+ products. We intentionally built a consumer mobile VPN service because we knew it would be hard. The millions of WARP and WARP+ users who have put the product through its paces have ensured that it's ready for the enterprise. That we have 4.5 stars across more than 200,000 ratings, just on iOS, is a testament of how reliable the underlying WARP and WARP+ engines have become. Compare that with the ratings of any corporate mobile VPN client, which are unsurprisingly abysmal.</p><p>We’ve partnered with some incredible organizations to create the ecosystem around Cloudflare for Teams. These include endpoint security solutions including VMWare Carbon Black, Malwarebytes, and Tanium. SEIM and analytics solutions including Datadog, Sumo Logic, and Splunk. Identity platforms including Okta, OneLogin, and Ping Identity. Feedback from these partners and more is at the end of this post.</p><p>If you’re curious about more of the <a href="/cloudflare-for-teams-products/">technical details about Cloudflare for Teams, I encourage you to read Sam Rhea’s post</a>.</p>
    <div>
      <h2>Serving Everyone</h2>
      <a href="#serving-everyone">
        
      </a>
    </div>
    <p>Cloudflare has always believed in the power of serving everyone. That’s why we’ve offered a free version of Cloudflare for Infrastructure since we launched in 2010. That belief doesn’t change with our launch of Cloudflare for Teams. For both Cloudflare Access and Cloudflare Gateway, there will be free versions to protect individuals, home networks, and small businesses. We remember what it was like to be a startup and believe that everyone deserves to be safe online, regardless of their budget.</p><p>With both Cloudflare Access and Gateway, the products are segmented along a Good, Better, Best framework. That breaks out into Access Basic, Access Pro, and Access Enterprise. You can see the features available with each tier in the table below, including Access Enterprise features that will roll out over the coming months.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1nMYnIZxACcGXUn5k8nTb7/24c7be735e4669cdf42155e45e0cd344/access-features-2.png" />
            
            </figure><p>We wanted a similar Good, Better, Best framework for Cloudflare Gateway. Gateway Basic can be provisioned in minutes through a simple change to your network’s recursive DNS settings. Once in place, network administrators can set rules on what domains should be allowed and filtered on the network. Cloudflare Gateway is informed both by the malware data gathered from our global sensor network as well as a rich corpus of domain categorization, allowing network operators to set whatever policy makes sense for them. Gateway Basic leverages the speed of 1.1.1.1 with granular network controls.</p><p>Gateway Pro, which we’re announcing today and you can <a href="https://teams.cloudflare.com/gateway/">sign up to beta test</a> as its features roll out over the coming months, extends the DNS-provisioned protection to a full proxy. Gateway Pro can be provisioned via the WARP client — which we are extending beyond iOS and Android mobile devices to also support Windows, MacOS, and Linux — or network policies including MDM-provisioned proxy settings or GRE tunnels from office routers. This allows a network operator to filter on policies not merely by the domain but by the specific URL.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2Dcd8KHZDz2MEvjJKQ7jHO/ee5a355382809c4a81b19520d71fc3ce/gateway-features-1.png" />
            
            </figure>
    <div>
      <h2>Building the Best-in-Class Network Gateway</h2>
      <a href="#building-the-best-in-class-network-gateway">
        
      </a>
    </div>
    <p>While Gateway Basic (provisioned via <a href="https://www.cloudflare.com/learning/dns/what-is-dns/">DNS</a>) and Gateway Pro (provisioned as a proxy) made sense, we wanted to imagine what the best-in-class network gateway would be for Enterprises that valued the highest level of performance and <a href="https://www.cloudflare.com/learning/network-layer/network-security/">security</a>. As we talked to these organizations we heard an ever-present concern: just surfing the Internet created risk of unauthorized code compromising devices. With every page that every user visited, third party code (JavaScript, etc.) was being downloaded and executed on their devices.</p><p>The solution, they suggested, was to isolate the local browser from third party code and have websites render in the network. This technology is known as <a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">browser isolation</a>. And, in theory, it’s a great idea. Unfortunately, in practice with current technology, it doesn’t perform well. The most common way the browser isolation technology works is to render the page on a server and then push a bitmap of the page down to the browser. This is known as pixel pushing. The challenge is that can be slow, bandwidth intensive, and it breaks many sophisticated web applications.</p><p>We were hopeful that we could solve some of these problems by moving the rendering of the pages to Cloudflare’s network, which would be closer to end users. So we talked with many of the leading browser isolation companies about potentially partnering. Unfortunately, as we experimented with their technologies, even with our vast network, we couldn’t overcome the sluggish feel that plagues existing browser isolation solutions.</p>
    <div>
      <h2>Enter S2 Systems</h2>
      <a href="#enter-s2-systems">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1j8dv8moDJzcw5qgLhvjI6/fe406bdaaae80ec0c13b8b5a64585e47/image7-1.png" />
            
            </figure><p>That’s when we were introduced to S2 Systems. I clearly remember first trying the S2 demo because my first reaction was: “This can’t be working correctly, it’s too fast.” The S2 team had taken a different approach to browser isolation. Rather than trying to push down a bitmap of what the screen looked like, instead they pushed down the vectors to draw what’s on the screen. The result was an experience that was typically at least as fast as browsing locally and without broken pages.</p><p>The best, albeit imperfect, analogy I’ve come up with to describe the difference between S2’s technology and other browser isolation companies is the difference between WindowsXP and MacOS X when they were both launched in 2001. WindowsXP’s original graphics were based on bitmapped images. MacOS X were based on vectors. Remember the magic of watching an application “genie” in and out the MacOS X doc? Check it out in a video from the launch…</p><p>At the time watching a window slide in and out of the dock seemed like magic compared with what you could do with bitmapped user interfaces. You can hear the awe in the reaction from the audience. That awe that we’ve all gotten used to in UIs today comes from the power of vector images. And, if you’ve been underwhelmed by the pixel-pushed bitmaps of existing browser isolation technologies, just wait until you see what is possible with S2’s technology.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5Q7xlinXbjgxCT4Orr0reA/b36b3bc5b3d2cb9d6c123ed8886eda55/image6-1.png" />
            
            </figure><p>We were so impressed with the team and the technology that we acquired the company. We will be integrating the S2 technology into Cloudflare Gateway Enterprise. The browser isolation technology will run across Cloudflare’s entire global network, bringing it within milliseconds of virtually every Internet user. You can learn more about this approach in Darren Remington's <a href="/cloudflare-and-remote-browser-isolation">blog post</a>.</p><p>Once the rollout is complete in the second half of 2020 we expect we will be able to offer the first full browser isolation technology that doesn’t force you to sacrifice performance. In the meantime, if you’d like a demo of the S2 technology in action, <a href="https://teams.cloudflare.com/gateway/">let us know</a>.</p>
    <div>
      <h2>The Promise of a Faster Internet for Everyone</h2>
      <a href="#the-promise-of-a-faster-internet-for-everyone">
        
      </a>
    </div>
    <p>Cloudflare’s mission is to help build a better Internet. With Cloudflare for Teams, we’ve extended that network to protect the people and organizations that use the Internet to do their jobs. We’re excited to help a more modern, mobile, and cloud-enabled Internet be safer and faster than it ever was with traditional hardware appliances.</p><p>But the same technology we’re deploying now to <a href="https://www.cloudflare.com/network-services/solutions/enterprise-network-security/">improve enterprise security</a> holds further promise. The most interesting Internet applications keep getting more complicated and, in turn, requiring more bandwidth and processing power to use.</p><p>For those of us fortunate enough to be able to afford the latest iPhone, we continue to reap the benefits of an increasingly powerful set of Internet-enabled tools. But try and use the Internet on a mobile phone from a few generations back, and you can see how quickly the latest Internet applications leaves legacy devices behind. That’s a problem if we want to bring the next 4 billion Internet users online.</p><p>We need a paradigm shift if the sophistication of applications and complexity of interfaces continues to keep pace with the latest generation of devices. To make the best of the Internet available to everyone, we may need to shift the work of the Internet off the end devices we all carry around in our pockets and let the network — where power, bandwidth, and CPU are relatively plentiful — carry more of the load.</p><p>That’s the long term promise of what S2’s technology combined with Cloudflare’s network may someday power. If we can make it so a less expensive device can run the latest Internet applications — using less battery, bandwidth, and CPU than ever before possible — then we can make the Internet more affordable and accessible for everyone.</p><p>We started with Cloudflare for Infrastructure. Today we’re announcing Cloudflare for Teams. But our ambition is nothing short of Cloudflare for Everyone.</p>
    <div>
      <h2>Early Feedback on Cloudflare for Teams from Customers and Partners</h2>
      <a href="#early-feedback-on-cloudflare-for-teams-from-customers-and-partners">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/35Ri79dQywu4XOnKywLmvX/d7ecaa23631253a5d33981aae840ce4f/Screen-Shot-2020-01-10-at-9.17.54-AM.png" />
            
            </figure><p><i>"Cloudflare Access has enabled Ziff Media Group to seamlessly and securely deliver our suite of internal tools to employees around the world on any device, without the need for complicated network configurations,” said </i><b><i>Josh Butts, SVP Product &amp; Technology, Ziff Media Group</i></b><i>.</i></p><hr />
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1pQMNPhCQq9S4DIHFbXBdX/5ea00d3ece09dc10b4e9984df2b77ec1/udaan.png" />
            
            </figure><p><i>“VPNs are frustrating and lead to countless wasted cycles for employees and the IT staff supporting them,” said </i><b><i>Amod Malviya, Cofounder and CTO, Udaan</i></b><i>. “Furthermore, conventional VPNs can lull people into a false sense of security. With Cloudflare Access, we have a far more reliable, intuitive, secure solution that operates on a per user, per access basis. I think of it as Authentication 2.0 — even 3.0”</i></p><hr />
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6wBjJBRZEag7VjBBCeDQxw/df61ae36d3e080ef6c52377468e8f329/roman.jpg" />
            
            </figure><p><i>“Roman makes healthcare accessible and convenient,” said </i><b><i>Ricky Lindenhovius, Engineering Director, Roman Health</i></b><i>. “Part of that mission includes connecting patients to physicians, and Cloudflare helps Roman securely and conveniently connect doctors to internally managed tools. With Cloudflare, Roman can evaluate every request made to internal applications for permission and identity, while also improving speed and user experience.”</i></p><hr />
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/AWCF1huBkikdFLf3etDce/5755778551ad05caa4ad66f5b99f543b/VMware-Carbon-Black_-Logo_black.png" />
            
            </figure><p><i>“We’re excited to partner with Cloudflare to provide our customers an innovative approach to enterprise security that combines the benefits of endpoint protection and network security," said </i><b><i>Tom Barsi, VP Business Development, VMware</i></b><i>. "VMware Carbon Black is a leading endpoint protection platform (EPP) and offers visibility and control of laptops, servers, virtual machines, and cloud infrastructure at scale. In partnering with Cloudflare, customers will have the ability to use VMware Carbon Black’s device health as a signal in enforcing granular authentication to a team’s internally managed application via Access, Cloudflare’s Zero Trust solution. Our joint solution combines the benefits of endpoint protection and a zero trust authentication solution to keep teams working on the Internet more secure."</i></p><hr />
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3N6QIr5hSdaoqVXwgmwsQG/fcd08a138fd180b46b90e9eef57d6299/Rackspace_Wordmark_Black--black-version-vs-red--chose-what-works-better-.png" />
            
            </figure><p><i>“Rackspace is a leading global technology services company accelerating the value of the cloud during every phase of our customers’ digital transformation,” said </i><b><i>Lisa McLin, vice president of alliances and channel chief at Rackspace</i></b><i>. “Our partnership with Cloudflare enables us to deliver cutting edge networking performance to our customers and helps them leverage a software defined networking architecture in their journey to the cloud.”</i></p><hr />
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/JLJmRL7MbWHOtO5o6Kixt/24001a499fde0b7ce0e15c5657491f66/IMC-landscape.png" />
            
            </figure><p><i>“Employees are increasingly working outside of the traditional corporate headquarters. Distributed and remote users need to connect to the Internet, but today’s security solutions often require they backhaul those connections through headquarters to have the same level of security,” said </i><b><i>Michael Kenney, head of strategy and business development for Ingram Micro Cloud</i></b><i>. “We’re excited to work with Cloudflare whose global network helps teams of any size reach internally managed applications and securely use the Internet, protecting the data, devices, and team members that power a business.”</i></p><hr />
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/25LoZN22bBHHWOO5enD5lR/55959f1869c45730d9fb56da8b6400c7/Okta_Logo_BrightBlue_Medium.png" />
            
            </figure><p><i>"At Okta, we’re on a mission to enable any organization to securely use any technology. As a leading provider of identity for the enterprise, Okta helps organizations remove the friction of managing their corporate identity for every connection and request that their users make to applications. We’re excited about our partnership with Cloudflare and bringing seamless authentication and connection to teams of any size,” said </i><b><i>Chuck Fontana, VP, Corporate &amp; Business Development, Okta</i></b><i>.</i></p><hr />
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7anUBMhnvjE8SMl6PK4Ud7/8998fc32e8547b3bd3f917c67e08b1bf/Tanium_logo.png" />
            
            </figure><p><i>"Organizations need one unified place to see, secure, and manage their endpoints,” said </i><b><i>Matt Hastings, Senior Director of Product Management at Tanium</i></b><i>. “We are excited to partner with Cloudflare to help teams secure their data, off-network devices, and applications. Tanium’s platform provides customers with a risk-based approach to operations and security with instant visibility and control into their endpoints. Cloudflare helps extend that protection by incorporating device data to enforce security for every connection made to protected resources.”</i></p><hr />
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1G8rBE3rzCwaAL5Up0vHr2/e276f53a21efe796a657852d461acabb/Onelogin_Logotype_black_RGB.png" />
            
            </figure><p><i>“OneLogin is happy to partner with Cloudflare to advance security teams' identity control in any environment, whether on-premise or in the cloud, without compromising user performance," said </i><b><i>Gary Gwin, Senior Director of Product at OneLogin</i></b><i>. "OneLogin’s identity and access management platform securely connects people and technology for every user, every app, and every device. The OneLogin and Cloudflare for Teams integration provides a comprehensive identity and network control solution for teams of all sizes.”</i></p><hr />
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3rzDIOUS0zTujL3gLU2rbW/1f0dcc0bfe234d8336f2394e0ee869ee/PING-WEB-logo_20190918.png" />
            
            </figure><p><i>“Ping Identity helps enterprises improve security and user experience across their digital businesses,” said </i><b><i>Loren Russon, Vice President of Product Management, Ping Identity</i></b><i>. “Cloudflare for Teams integrates with Ping Identity to provide a comprehensive identity and network control solution to teams of any size, and ensures that only the right people get the right access to applications, seamlessly and securely."</i></p><hr />
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4X5sCeeJ405hfzeMqp0zOR/4b5552ce1f20a78e59623fd1fbc189f1/dd_logo_h_rgb.png" />
            
            </figure><p><i>"Our customers increasingly leverage deep observability data to address both operational and security use cases, which is why we launched Datadog Security Monitoring," said </i><b><i>Marc Tremsal, Director of Product Management at Datadog</i></b><i>. "Our integration with Cloudflare already provides our customers with visibility into their web and DNS traffic; we're excited to work together as Cloudflare for Teams expands this visibility to corporate environments."</i></p><hr />
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1Tospn8rS8zZxhGBTII1VF/9bf775501b1693a9ce11ebf9c8890a88/SumoLogic_Logo_SumoBlue_RGB__3x.png" />
            
            </figure><p><i>“As more companies support employees who work on corporate applications from outside of the office, it is vital that they understand each request users are making. They need real-time insights and intelligence to react to incidents and audit secure connections," said </i><b><i>John Coyle, VP of Business Development, Sumo Logic</i></b><i>. "With our partnership with Cloudflare, customers can now log every request made to internal applications and automatically push them directly to Sumo Logic for retention and analysis."</i></p><hr />
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6x2dNLTEyJ6v68tVPm53X1/36d113946a4e0f8372c803d6c8d74897/CloudGenix_GRD_CLR_RGB-800.png" />
            
            </figure><p><i>“Cloudgenix is excited to partner with Cloudflare to provide an end-to-end security solution from the branch to the cloud. As enterprises move off of expensive legacy MPLS networks and adopt branch to internet breakout policies, the CloudGenix CloudBlade platform and Cloudflare for Teams together can make this transition seamless and secure. We’re looking forward to Cloudflare’s roadmap with this announcement and partnership opportunities in the near term.” said </i><b><i>Aaron Edwards, Field CTO, Cloudgenix</i></b><i>.</i></p><hr />
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3RotYCvz7olpGESN3i1KmJ/a18bcb2a682ba897141001eb7d1242b3/Malwarebytes---logotype_0D3ECC_Nov18_PNG.png" />
            
            </figure><p><i>“In the face of limited cybersecurity resources, organizations are looking for highly automated solutions that work together to reduce the likelihood and impact of today’s cyber risks,” said </i><b><i>Akshay Bhargava, Chief Product Officer, Malwarebytes</i></b><i>. “With Malwarebytes and Cloudflare together, organizations are deploying more than twenty layers of security defense-in-depth. Using just two solutions, teams can secure their entire enterprise from device, to the network, to their internal and external applications.”</i></p><hr />
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1H0Z1ZcIPeX1mIeX8nyaOj/b0a4cfe7810d985ec2384f239dfb5d0c/CC-Logo_V1.png" />
            
            </figure><p><i>"Organizations' sensitive data is vulnerable in-transit over the Internet and when it's stored at its destination in public cloud, SaaS applications and endpoints,” said </i><b><i>Pravin Kothari, CEO of CipherCloud</i></b><i>. “CipherCloud is excited to partner with Cloudflare to secure data in all stages, wherever it goes. Cloudflare’s global network secures data in-transit without slowing down performance. CipherCloud CASB+ provides a powerful cloud security platform with end-to-end data protection and adaptive controls for cloud environments, SaaS applications and BYOD endpoints. Working together, teams can rely on integrated Cloudflare and CipherCloud solution to keep data always protected without compromising user experience.”</i></p><hr /><p></p> ]]></content:encoded>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Cloudflare Access]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[VPN]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Cloudflare Gateway]]></category>
            <guid isPermaLink="false">63bNlczJwVxsoQKOm4iUtF</guid>
            <dc:creator>Matthew Prince</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare + Remote Browser Isolation]]></title>
            <link>https://blog.cloudflare.com/cloudflare-and-remote-browser-isolation/</link>
            <pubDate>Tue, 07 Jan 2020 14:00:04 GMT</pubDate>
            <description><![CDATA[ Cloudflare announced today that it has purchased S2 Systems Corporation, a Seattle-area startup that has built an innovative remote browser isolation solution unlike any other currently in the market. ]]></description>
            <content:encoded><![CDATA[ <p>Cloudflare announced today that it has purchased S2 Systems Corporation, a Seattle-area startup that has built an innovative remote browser isolation solution unlike any other currently in the market. The majority of endpoint compromises involve web browsers — by putting space between users’ devices and where web code executes, browser isolation makes endpoints substantially more <a href="https://www.cloudflare.com/network-services/solutions/enterprise-network-security/">secure</a>. In this blog post, I’ll discuss what browser isolation is, why it is important, how the S2 Systems cloud browser works, and how it fits with Cloudflare’s mission to help build a better Internet.</p>
    <div>
      <h3>What’s wrong with web browsing?</h3>
      <a href="#whats-wrong-with-web-browsing">
        
      </a>
    </div>
    <p>It’s been more than 30 years since Tim Berners-Lee wrote the project proposal defining the technology underlying what we now call the world wide web. What Berners-Lee envisioned as being useful for “<i>several thousand people, many of them very creative, all working toward common goals</i>”<sup>[1]</sup> has grown to become a fundamental part of commerce, business, the global economy, and an integral part of society used by more than 58% of the world’s population<sup>[2]</sup>.</p><p>The world wide web and web browsers have unequivocally become the platform for much of the productive work (and play) people do every day. However, as the pervasiveness of the web grew, so did opportunities for bad actors. Hardly a day passes without a major new cybersecurity breach in the news. Several contributing factors have helped propel cybercrime to unprecedented levels: the commercialization of hacking tools, the emergence of malware-as-a-service, the presence of well-financed nation states and organized crime, and the development of cryptocurrencies which enable malicious actors of all stripes to anonymously monetize their activities.</p><p>The vast majority of security breaches originate from the web. This should not be surprising. Although modern web browsers are remarkable, many fundamental architectural decisions were made in the 1990’s before concepts like <i>security</i>, <i>privacy</i>, <i>corporate oversight</i>, and <i>compliance</i> were issues or even considerations. Core web browsing functionality (including the entire underlying WWW architecture) was designed and built for a different era and circumstances.</p><p>In today’s world, several web browsing assumptions are outdated or even dangerous. Web browsers and the underlying server technologies encompass an extensive – and growing – list of complex interrelated technologies. These technologies are constantly in flux, driven by vibrant open source communities, content publishers, search engines, advertisers, and competition between browser companies. As a result of this underlying complexity, web browsers have become primary attack vectors.</p><p>The very structure and underlying technologies that power the web are inherently difficult to secure. Some browser vulnerabilities result from <i>illegitimate use of legitimate functionality</i>: enabling browsers to download files and documents is good, but allowing downloading of files infected with malware is bad; dynamic loading of content across multiple sites within a single webpage is good, but cross-site scripting is bad; enabling an extensive advertising ecosystem is good, but the inability to detect hijacked links or malicious redirects to malware or phishing sites is bad; etc.</p>
    <div>
      <h3>Enterprise Browsing Issues</h3>
      <a href="#enterprise-browsing-issues">
        
      </a>
    </div>
    <p>Enterprises have additional challenges with traditional browsers.</p><p>Paradoxically, IT departments have the least amount of control over the most ubiquitous app in the enterprise – the web browser. The most common complaints about web browsers from enterprise security and IT professionals are:</p><ol><li><p><b>Security</b> (obviously). The public internet is a constant source of security breaches and the problem is growing given an 11x escalation in attacks since 2016 (Meeker<sup>[3]</sup>). Costs of detection and remediation are escalating and the reputational damage and financial losses for breaches can be substantial.</p></li><li><p><b>Control</b>. IT departments have little visibility into user activity and limited ability to leverage content disarm and reconstruction (CDR) and data loss prevention (DLP) mechanisms including when, where, or who downloaded/upload files.</p></li><li><p><b>Compliance</b>. The inability to control data and activity across geographies or capture required audit telemetry to meet increasingly strict regulatory requirements. This results in significant exposure to penalties and fines.</p></li></ol><p>Given vulnerabilities exposed through everyday user activities such as <a href="https://www.cloudflare.com/learning/email-security/what-is-email-fraud/">email</a> and web browsing, some organizations attempt to restrict these activities. As both are legitimate and critical business functions, efforts to limit or curtail web browser use inevitably fail or have a substantive negative impact on business productivity and employee morale.</p><p>Current approaches to mitigating security issues inherent in browsing the web are largely based on <i>signature</i> technology for data files and executables, and lists of known good/bad URLs and <a href="https://www.cloudflare.com/learning/dns/what-is-dns/">DNS addresses</a>. The challenge with these approaches is the difficulty of keeping current with known attacks (file signatures, URLs and DNS addresses) and their inherent vulnerability to zero-day attacks. Hackers have devised automated tools to defeat signature-based approaches (e.g. generating hordes of files with unknown signatures) and create millions of transient websites in order to defeat URL/DNS blocklists.</p><p>While these approaches certainly prevent some attacks, the growing number of incidents and severity of security breaches clearly indicate more effective alternatives are needed.</p>
    <div>
      <h3>What is browser isolation?</h3>
      <a href="#what-is-browser-isolation">
        
      </a>
    </div>
    <p>The core concept behind <a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">browser isolation</a> is security-through-physical-isolation to create a “gap” between a user’s web browser and the endpoint device thereby protecting the device (and the <a href="https://www.cloudflare.com/learning/network-layer/enterprise-networking/">enterprise network</a>) from exploits and attacks. Unlike <a href="https://www.cloudflare.com/learning/access-management/what-is-a-secure-web-gateway/">secure web gateways</a>, antivirus software, or firewalls which rely on known threat patterns or signatures, this is a zero-trust approach.</p><p>There are two primary browser isolation architectures: (1) client-based <i>local</i> isolation and (2) <i>remote</i> isolation.</p><p><b>Local</b> <b>browser isolation</b> attempts to isolate a browser running on a local endpoint using app-level or OS-level sandboxing. In addition to leaving the endpoint at risk when there is an isolation failure, these systems require significant endpoint resources (memory + compute), tend to be brittle, and are difficult for IT to manage as they depend on support from specific hardware and software components.</p><p>Further, local browser isolation does nothing to address the control and compliance issues mentioned above.</p><p><b>Remote browser isolation</b> (RBI) protects the endpoint by moving the browser to a remote service in the cloud or to a separate on-premises server within the enterprise network:</p><ul><li><p>On-premises isolation simply relocates the risk from the endpoint to another location within the enterprise without actually eliminating the risk.</p></li><li><p>Cloud-based remote browsing isolates the end-user device and the enterprise’s network while fully enabling IT control and compliance solutions.</p></li></ul><p>Given the inherent advantages, most browser isolation solutions – including S2 Systems – leverage cloud-based remote isolation. Properly <a href="https://www.cloudflare.com/learning/access-management/how-to-implement-zero-trust/">implemented</a>, remote browser isolation can <a href="https://www.cloudflare.com/products/zero-trust/threat-defense/">protect the organization</a> from browser exploits, plug-ins, zero-day vulnerabilities, malware and other attacks embedded in web content.</p>
    <div>
      <h3>How does Remote Browser Isolation (RBI) work?</h3>
      <a href="#how-does-remote-browser-isolation-rbi-work">
        
      </a>
    </div>
    <p>In a typical cloud-based RBI system (the blue-dashed box ❶ below), individual remote browsers ❷ are run in the cloud as disposable containerized instances – typically, one instance per user. The remote browser sends the rendered contents of a web page to the user endpoint device ❹ using a specific protocol and data format ❸. Actions by the user, such as keystrokes, mouse and scroll commands, are sent back to the isolation service over a secure encrypted channel where they are processed by the remote browser and any resulting changes to the remote browser webpage are sent back to the endpoint device.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5l1yyuFXw1RmZwr1K4hP7R/bb18c2acb117429473fb08e32015fbf8/image3-2.png" />
            
            </figure><p>In effect, the endpoint device is “remote controlling” the cloud browser. Some RBI systems use proprietary clients installed on the local endpoint while others leverage existing HTML5-compatible browsers on the endpoint and are considered ‘clientless.’</p><p>Data breaches that occur in the remote browser are isolated from the local endpoint and enterprise network. Every remote browser instance is treated as if compromised and terminated after each session. New browser sessions start with a fresh instance. Obviously, the RBI service must prevent browser breaches from leaking outside the browser containers to the service itself. Most RBI systems provide remote file viewers negating the need to download files but also have the ability to inspect files for malware before allowing them to be downloaded.</p><p>A critical component in the above architecture is the specific remoting technology employed by the cloud RBI service. The remoting technology has a significant impact on the operating cost and scalability of the RBI service, website fidelity and compatibility, bandwidth requirements, endpoint hardware/software requirements and even the user experience. Remoting technology also determines the effective level of security provided by the RBI system.</p><p>All current cloud RBI systems employ one of two remoting technologies:</p><p>(1)    <b>Pixel pushing</b> is a video-based approach which captures pixel images of the remote browser ‘window’ and transmits a sequence of images to the client endpoint browser or proprietary client. This is similar to how remote desktop and VNC systems work. Although considered to be relatively secure, there are several inherent challenges with this approach:</p><ul><li><p>Continuously encoding and transmitting <a href="https://www.cloudflare.com/developer-platform/solutions/live-streaming/">video streams</a> of remote webpages to user endpoint devices is very costly. Scaling this approach to millions of users is financially prohibitive and logistically complex.</p></li><li><p>Requires significant bandwidth. Even when highly optimized, pushing pixels is bandwidth intensive.</p></li><li><p>Unavoidable latency results in an unsatisfactory user experience. These systems tend to be slow and generate a lot of user complaints.</p></li><li><p>Mobile support is degraded by high bandwidth requirements compounded by inconsistent connectivity.</p></li><li><p>HiDPI displays may render at lower resolutions. Pixel density increases exponentially with resolution which means remote browser sessions (particularly fonts) on HiDPI devices can appear fuzzy or out of focus.</p></li></ul><p>(2) <b>DOM reconstruction</b> emerged as a response to the shortcomings of pixel pushing. DOM reconstruction attempts to clean webpage HTML, CSS, etc. before forwarding the content to the local endpoint browser. The underlying HTML, CSS, etc., are <i>reconstructed</i> in an attempt to eliminate active code, known exploits, and other potentially malicious content. While addressing the latency, operational cost, and user experience issues of pixel pushing, it introduces two significant new issues:</p><ul><li><p>Security. The underlying technologies – HTML, CSS, web fonts, etc. – are the attack vectors hackers leverage to breach endpoints. Attempting to remove malicious content or code is like washing mosquitos: you can attempt to clean them, but they remain inherent carriers of dangerous and malicious material. It is impossible to identify, in advance, all the means of exploiting these technologies even through an RBI system.</p></li><li><p>Website fidelity. Inevitably, attempting to remove malicious active code, reconstructing HTML, CSS and other aspects of modern websites results in broken pages that don’t render properly or don’t render at all. Websites that work today may not work tomorrow as site publishers make daily changes that may break DOM reconstruction functionality. The result is an infinite tail of issues requiring significant resources in an endless game of whack-a-mole. Some RBI solutions struggle to support common enterprise-wide services like Google G Suite or Microsoft Office 365 even as malware laden web email continues to be a significant source of breaches.</p></li></ul>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3074OF2d8kfVti4LDhE8n/44951340e82764f4296ba2718f982993/image2-4.png" />
            
            </figure><p>Customers are left to choose between a secure solution with a bad user experience and high operating costs, or a faster, much less secure solution that breaks websites. These tradeoffs have driven some RBI providers to implement both remoting technologies into their products. However, this leaves customers to pick their poison without addressing the fundamental issues.</p><p>Given the significant tradeoffs in RBI systems today, one common optimization for current customers is to deploy remote browsing capabilities to only the most vulnerable users in an organization such as high-risk executives, finance, business development, or HR employees. Like vaccinating half the pupils in a classroom, this results in a false sense of security that does little to protect the larger organization.</p><p>Unfortunately, the largest “gap” created by current remote browser isolation systems is the void between the potential of the underlying isolation concept and the implementation reality of currently available RBI systems.</p>
    <div>
      <h3>S2 Systems Remote Browser Isolation</h3>
      <a href="#s2-systems-remote-browser-isolation">
        
      </a>
    </div>
    <p>S2 Systems remote browser isolation is a fundamentally different approach based on S2-patented technology called Network Vector Rendering (NVR).</p><p>The S2 remote browser is based on the open-source Chromium engine on which Google Chrome is built. In addition to powering Google Chrome which has a ~70% market share<sup>[3]</sup>, Chromium powers twenty-one other web browsers including the new Microsoft Edge browser.<sup>[4]</sup> As a result, significant ongoing investment in the Chromium engine ensures the highest levels of website support, compatibility and a continuous stream of improvements.</p><p>A key architectural feature of the Chromium browser is its use of the <a href="https://skia.org/">Skia</a> graphics library. Skia is a widely-used cross-platform graphics engine for Android, Google Chrome, Chrome OS, Mozilla Firefox, Firefox OS, FitbitOS, Flutter, the <a href="https://electronjs.org/">Electron</a> application framework and many other products. Like Chromium, the pervasiveness of Skia ensures ongoing broad hardware and platform support.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3lYcOcL5Qe2u4bRnOWsyvK/66ebf8f94ed8bd9ba7e20ad023484ee2/image1-1.png" />
            
            </figure><p><i>Skia code fragment</i></p><p>Everything visible in a Chromium browser window is rendered through the Skia rendering layer. This includes application window UI such as menus, but more importantly, the entire contents of the webpage window are rendered through Skia. Chromium compositing, layout and rendering are extremely complex with multiple parallel paths optimized for different content types, device contexts, etc. The following figure is an egregious simplification for illustration purposes of how S2 works (apologies to Chromium experts):</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1aNyrGQsHYeXIbfxArYYEI/2bccc8b326b6b82b8af56bfb92e9a14c/image4-2.png" />
            
            </figure><p>S2 Systems NVR technology intercepts the remote Chromium browser’s Skia draw commands ❶, tokenizes and compresses them, then encrypts and transmits them across the wire ❷ to any HTML5 compliant web browser ❸ (Chrome, Firefox, Safari, etc.) running locally on the user endpoint desktop or mobile device. The Skia API commands captured by NVR are pre-rasterization which means they are highly compact.</p><p>On first use, the S2 RBI service transparently pushes an NVR <a href="https://webassembly.org/">WebAssembly</a> (Wasm) library ❹ to the local HTML5 web browser on the endpoint device where it is cached for subsequent use. The NVR Wasm code contains an embedded Skia library and the necessary code to unpack, decrypt and “replay” the Skia draw commands from the remote RBI server to the local browser window. A WebAssembly’s ability to “<i>execute at native speed by taking advantage of common hardware capabilities available on a wide range of platforms</i>”[5] results in near-native drawing performance.</p><p>The S2 remote browser isolation service uses headless Chromium-based browsers in the cloud, transparently intercepts draw layer output, transmits the draw commands efficiency and securely over the web, and redraws them in the windows of local HTML5 browsers. This architecture has a number of technical advantages:</p><p>(1)    Security: the underlying data transport is not an existing attack vector and customers aren’t forced to make a tradeoff between security and performance.</p><p>(2)    Website compatibility: there are no website compatibility issues nor long tail chasing evolving web technologies or emerging vulnerabilities.</p><p>(3)    Performance: the system is very fast, typically faster than local browsing (subject of a future blog post).</p><p>(4)    Transparent user experience: S2 remote browsing feels like native browsing; users are generally unaware when they are browsing remotely.</p><p>(5)    Requires less bandwidth than local browsing for most websites. Enables advanced caching and other proprietary optimizations unique to web browsers and the nature of web content and technologies.</p><p>(6)    Clientless: leverages existing HTML5 compatible browsers already installed on user endpoint desktop and mobile devices.</p><p>(7)    Cost-effective scalability: although the details are beyond the scope of this post, the S2 backend and NVR technology have substantially lower operating costs than existing RBI technologies. Operating costs translate directly to customer costs. The S2 system was designed to make deployment to an entire enterprise and not just targeted users (aka: vaccinating half the class) both feasible and attractive for customers.</p><p>(8)    RBI-as-a-platform: enables implementation of related/adjacent services such as DLP, content disarm &amp; reconstruction (CDR), phishing detection and prevention, etc.</p><p>S2 Systems Remote Browser Isolation Service and underlying NVR technology eliminates the disconnect between the conceptual potential and promise of browser isolation and the unsatisfying reality of current RBI technologies.</p>
    <div>
      <h3>Cloudflare + S2 Systems Remote Browser Isolation</h3>
      <a href="#cloudflare-s2-systems-remote-browser-isolation">
        
      </a>
    </div>
    <p>Cloudflare’s global cloud platform is uniquely suited to remote browsing isolation. Seamless integration with our cloud-native performance, reliability and advanced security products and services provides powerful capabilities for our customers.</p><p>Our Cloudflare Workers architecture enables edge computing in 200 cities in more than 90 countries and will put a remote browser within 100 milliseconds of 99% of the Internet-connected population in the developed world. With more than 20 million Internet properties directly connected to our network, Cloudflare remote browser isolation will benefit from locally cached data and builds on the impressive connectivity and performance of our network. Our Argo Smart Routing capability leverages our communications backbone to route traffic across faster and more reliable network paths resulting in an average 30% faster access to web assets.</p><p>Once it has been integrated with our Cloudflare for Teams suite of advanced security products, remote browser isolation will provide protection from browser exploits, zero-day vulnerabilities, malware and other attacks embedded in web content. Enterprises will be able to secure the browsers of all employees without having to make trade-offs between security and user experience. The service will enable IT control of browser-conveyed enterprise data and compliance oversight. Seamless integration across our products and services will enable users and enterprises to browse the web without fear or consequence.</p><p>Cloudflare’s mission is to help build a better Internet. This means protecting users and enterprises as they work and play on the Internet; it means making Internet access fast, reliable and transparent. Reimagining and modernizing how web browsing works is an important part of helping build a better Internet.</p><hr /><p>[1] <a href="https://www.w3.org/History/1989/proposal.html">https://www.w3.org/History/1989/proposal.html</a></p><p>[2] “<a href="https://www.internetworldstats.com/stats.htm">Internet World Stats</a>,”<a href="https://www.internetworldstats.com/">https://www.internetworldstats.com/</a>, retrieved 12/21/2019.</p><p>[3] “Kleiner Perkins 2018 Internet Trends”, Mary Meeker.</p><p>[4] <a href="https://www.statista.com/statistics/544400/market-share-of-internet-browsers-desktop/">https://www.statista.com/statistics/544400/market-share-of-internet-browsers-desktop/</a>, retrieved December 21, 2019</p><p>[5] <a href="https://en.wikipedia.org/wiki/Chromium_(web_browser)">https://en.wikipedia.org/wiki/Chromium_(web_browser)</a>, retrieved December 29, 2019</p><p>[6] <a href="https://webassembly.org/">https://webassembly.org/</a>, retrieved December 30, 2019</p> ]]></content:encoded>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Cloudflare Access]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[VPN]]></category>
            <category><![CDATA[Acquisitions]]></category>
            <guid isPermaLink="false">2KCfpxmDGelu1MHmkLmOuy</guid>
            <dc:creator>Darren Remington</dc:creator>
        </item>
    </channel>
</rss>