
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Wed, 15 Apr 2026 02:55:14 GMT</lastBuildDate>
        <item>
            <title><![CDATA[Integrating CrowdStrike Falcon Fusion SOAR with Cloudflare’s SASE platform]]></title>
            <link>https://blog.cloudflare.com/integrating-crowdstrike-falcon-fusion-soar-with-cloudflares-sase-platform/</link>
            <pubDate>Mon, 15 Sep 2025 16:17:51 GMT</pubDate>
            <description><![CDATA[ Cloudflare and CrowdStrike have partnered to help SOC teams minimize manual bottlenecks. By combining Cloudflare’s SASE platform with CrowdStrike’s Falcon® Fusion SOAR, security teams can now detect  ]]></description>
            <content:encoded><![CDATA[ 
    <div>
      <h2>The challenge of manual response</h2>
      <a href="#the-challenge-of-manual-response">
        
      </a>
    </div>
    <p>Security teams know all too well the grind of manual investigations and remediation. With the mass adoption of AI and increasingly automated attacks, defenders cannot afford to rely on overly manual, low priority, and complex workflows.</p><p>Heavily burdensome manual response introduces delays as analysts bounce between consoles and high alert volumes, contributing to alert fatigue. Even worse, it prevents security teams from dedicating time to high-priority threats and strategic, innovative work. To keep pace, <a href="https://www.cloudflare.com/learning/security/glossary/what-is-a-security-operations-center-soc/"><u>SOCs</u></a> need automated responses that contain and remediate common threats at machine speed before they become business-impacting incidents.</p>
    <div>
      <h2>Expanding our capabilities with CrowdStrike Falcon® Fusion’ SOAR</h2>
      <a href="#expanding-our-capabilities-with-crowdstrike-falcon-r-fusion-soar">
        
      </a>
    </div>
    <p>That’s why today, we’re excited to announce a new integration between the Cloudflare One platform and CrowdStrike's Falcon® Fusion SOAR.</p><p>As part of our ongoing partnership with CrowdStrike, this integration introduces two out-of-the-box integrations for Zero Trust and <a href="https://www.cloudflare.com/zero-trust/products/email-security/"><u>Email Security</u></a> designed for organizations already leveraging CrowdStrike Falcon® Insight XDR or CrowdStrike Falcon® Next-Gen SIEM.</p><p>This allows SOC teams to gain powerful new capabilities to <a href="https://www.cloudflare.com/learning/email-security/how-to-prevent-phishing/"><u>stop phishing</u></a>, <a href="https://www.cloudflare.com/learning/ddos/glossary/malware/"><u>malware</u></a>, and suspicious behavior faster, with less manual effort.</p>
    <div>
      <h2>Out-of-the-box integrations</h2>
      <a href="#out-of-the-box-integrations">
        
      </a>
    </div>
    <p>Although teams can always create custom automations, we’ve made it simple to get started with two pre-built integrations focused on Zero Trust Access and Email Security. Both follow the same general structure and are available directly in the CrowdStrike Content Library.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3laW9PA2y85HzMIo8n9azl/188a3c5286816e63f99c05c553493b95/Screenshot_2025-09-15_at_10.32.51.png" />
          </figure><p><b>Cloudflare within CrowdStrike Content Library</b></p><p>The actions you can take within CrowdStrike from these integrations are the following:</p><table><tr><td><p><b>Email Security</b></p><p>- Update Allow Policy </p><p>- Search Email Messages</p><p>- List Trusted Domains</p><p>- List Protected Domains</p><p>- List Blocked Senders</p><p>- List Allow Policies </p><p>- Get Trusted Domain</p><p>- Get Message Details</p><p>- Get Detection Details</p><p>- Get Allow Policy </p><p>- Delete Trusted Domain</p><p>- Delete Allow Policy</p><p>       Delete Blocked Sender</p><p>       Create Trusted Domain</p><p>       Create Blocked Sender</p><p>       Create Allow Policy</p><p>       Get Blocked Sender</p></td><td><p><b>Zero Trust Access </b></p><p>- Update Reusable Policy</p><p>- Update Access Group</p><p>- Revoke Application Tokens</p><p>- Read Metadata For A Key</p><p>- List Reusable Policies</p><p>- List Access Groups</p><p>- List Access Applications </p><p>- List Access App Policies </p><p>- Get Access Reusable Policy </p><p>- Get Access Group</p><p>- Get Access Application </p><p>- Get Access App Policy </p><p>- Delete Reusable Policy </p><p>- Delete Access Group </p><p>- Delete Access Application </p><p>- Delete Access App Policy </p><p>- Create Reusable Policy </p><p>- Create Access Group</p><p>- Create Access App Policy </p></td></tr></table><p>Using these signals, customers can create automated workflows that run with minimal to no human intervention. Falcon Fusion SOAR’s drag-and-drop editor makes it easy to chain together Cloudflare actions with other signals (from CrowdStrike or even third-party vendors) to automate large portions of the SOC workflow.</p><p>An example flow that you could create is: </p><ol><li><p>A phishing email is detected by Cloudflare Email Security.</p></li><li><p>Falcon Fusion SOAR automatically retrieves detection details, blocks the sender, and updates allow/deny lists.</p></li><li><p>Cloudflare Zero Trust revokes active session tokens for the impacted account.</p></li><li><p>If Falcon confirms the endpoint is compromised, the device is automatically isolated.</p></li></ol><p>Another example of how a workflow like above would show in the UI is the following:  </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3VAhAcZlZ6UlY7m8akijP6/b723b59a1f7099c2dd41e3c195cbf2ad/image_-_2025-09-15T103707.530.png" />
          </figure><p><b>An example automated flow using Cloudflare</b></p><p>From the Cloudflare UI, customers can navigate to the Logpush section where they can set up a job with CrowdStrike. To do this customers need to create a job with “HTTP destination”: </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4fb3bijbYCmZNVx1x3xNHI/d6c3e7bd28aca05514a3c704058cf1ab/image_-_2025-09-15T103911.429.png" />
          </figure><p>From here, customers can input the HTTP endpoint provided by CrowdStrike in the data connector setup to start sending logs over to Falcon Fusion SOAR. This URL will show up in the following way: <i>ingest.us-2.crowdstrike.com/api/ingest/hec/&lt;CRWDconnectionID&gt;/v1/services/collector/raw</i></p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7dNB9yDkmzsNQhd9vKnZEI/43267cdfec074608410bf316478ca40b/image_-_2025-09-15T104010.825.png" />
          </figure><p><b>CrowdStrike URL Location</b></p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7I9DtSd5yDgcWC9ko7ygNK/1af7ecc2459796284ca354ebb290d25e/image_-_2025-09-15T104048.857.png" />
          </figure><p><b>Working Logpush to CrowdStrike</b></p><p>This end-to-end automation allows teams to reduce mean time-to-response from minutes to seconds.</p>
    <div>
      <h2>How detection and remediation are made possible</h2>
      <a href="#how-detection-and-remediation-are-made-possible">
        
      </a>
    </div>
    <p>At a technical level, the integration relies on webhook and API integrations between <a href="https://www.cloudflare.com/zero-trust/"><u>Cloudflare’s SASE platform </u></a>and CrowdStrike Falcon Fusion SOAR. For example:</p><ul><li><p><b>From endpoint to network:</b> When the CrowdStrike Falcon® platform detects an endpoint compromise, it triggers a workflow to Cloudflare’s API, which enforces step-up authentication or session revocation across SaaS, private apps, or email access. This is done via Cloudflare’s <a href="https://www.cloudflare.com/zero-trust/products/access/"><u>Access</u></a> product. </p></li><li><p><b>From network to endpoint:</b> When Cloudflare flags suspicious behavior (e.g., abnormal login patterns, anomalous traffic, or unsafe email activity), it notifies CrowdStrike Falcon Fusion SOAR, which then isolates the device and launches remediation playbooks.</p></li></ul><p>This bidirectional exchange makes sure threats are contained from both sides, endpoint and network, without requiring manual intervention from analysts.</p>
    <div>
      <h2>How to get started</h2>
      <a href="#how-to-get-started">
        
      </a>
    </div>
    <p>If your organization already uses CrowdStrike Falcon Fusion SOAR with Cloudflare’s <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/">SASE</a> platform, you can enable these workflows today directly from the Cloudflare Dashboard and CrowdStrike Falcon console (<a href="https://falcon.us-2.crowdstrike.com/workflow/fusion/content-library/apps/313f46ae74dd42939cbfd7f519986631"><u>Zero Trust</u></a>, <a href="https://falcon.us-2.crowdstrike.com/workflow/fusion/content-library/apps/dbccb19e577f44b49c561fac70518913"><u>Email Security</u></a>). You can also search for Cloudflare within the content library in CrowdStrike to find the integrations. </p><p>For organizations looking to customize further, both platforms allow extensibility through APIs and custom playbooks so SOC teams can tailor response actions to their unique risk posture.</p><p>To learn more about our integrations, feel free to <a href="https://www.cloudflare.com/zero-trust/trial/"><u>reach out to us</u></a> to get started with a consultation.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <guid isPermaLink="false">4pnRemZNUf37u3e5pPlaAV</guid>
            <dc:creator>Ayush Kumar</dc:creator>
            <dc:creator>Andrew Meyer</dc:creator>
            <dc:creator>Michael Mcgrory</dc:creator>
            <dc:creator>Gavin Chen</dc:creator>
        </item>
        <item>
            <title><![CDATA[Protect against identity-based attacks by sharing Cloudflare user risk scores with Okta]]></title>
            <link>https://blog.cloudflare.com/protect-against-identity-based-attacks-by-sharing-cloudflare-user-risk-with-okta/</link>
            <pubDate>Tue, 15 Oct 2024 13:00:00 GMT</pubDate>
            <description><![CDATA[ Uphold Zero Trust principles and protect against identity-based attacks by sharing Cloudflare user risk scores with Okta. Learn how this new integration allows your organization to mitigate risk in real time, make informed access decisions, and free up security resources with automation. ]]></description>
            <content:encoded><![CDATA[ <p>Cloudflare One, our <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/"><u>secure access service edge (SASE)</u></a> platform, is introducing a new integration with Okta, the <a href="https://www.cloudflare.com/learning/access-management/what-is-identity-and-access-management/"><u>identity and access management (IAM)</u></a> vendor, to share risk indicators in real-time and simplify how organizations can dynamically manage their security posture in response to changes across their environments.</p><p>For many organizations, it is becoming increasingly challenging and inefficient to adapt to risks across their growing <a href="https://www.cloudflare.com/learning/security/what-is-an-attack-surface/"><u>attack surface</u></a>. In particular, security teams struggle with multiple siloed tools that fail to share risk data effectively with each other, leading to excessive manual effort to extract signals from the noise. To address this complexity, Cloudflare launched <a href="https://blog.cloudflare.com/unified-risk-posture/"><u>risk posture management capabilities</u></a> earlier this year to make it easier for organizations to accomplish three key jobs on one platform: </p><ol><li><p>Evaluating risk posed by people by using first-party <a href="https://www.cloudflare.com/learning/security/what-is-ueba/"><u>user entity and behavior analytics (UEBA)</u></a> models</p></li><li><p>Exchanging risk telemetry with best-in-class security tools, and</p></li><li><p>Enforcing risk controls based on those dynamic first- and third-party risk scores.</p></li></ol><p>Today’s announcement builds on these capabilities (particularly job #2) and <a href="https://www.cloudflare.com/partners/technology-partners/okta/"><u>our partnership with Okta</u></a> by enabling organizations to share Cloudflare’s real-time <a href="https://blog.cloudflare.com/cf1-user-risk-score/"><u>user risk scores</u></a> with Okta, which can then automatically enforce policies based on that user’s risk. In this way, organizations can adapt to evolving risks in less time with less manual effort.</p>
    <div>
      <h2>Cloudflare’s user risk scoring</h2>
      <a href="#cloudflares-user-risk-scoring">
        
      </a>
    </div>
    <p><a href="https://blog.cloudflare.com/cf1-user-risk-score/"><u>Introduced earlier this year</u></a>, Cloudflare’s user risk scoring analyzes real-time telemetry of user activities and behaviors and assigns a risk score of high, medium, or low. For example, if Cloudflare detects risky or suspicious activity from a user — such as impossible travel, where a user logs in from multiple geographically dispersed locations within a short time frame, data loss prevention (DLP) detections, or endpoint detections suggesting that the device is infected — the user’s risk score will increase. The activity leading to that scoring is logged for analysis.</p><p>Cloudflare includes <a href="https://developers.cloudflare.com/cloudflare-one/insights/risk-score/"><u>predefined risk behaviors</u></a> to help you get started. Administrators can create policies based on specific risk behaviors and adjust the risk level for each behavior based on their company’s tolerance.</p>
    <div>
      <h2>Share risk scores with Okta and take action automatically</h2>
      <a href="#share-risk-scores-with-okta-and-take-action-automatically">
        
      </a>
    </div>
    <p>Customers that opt in to this new integration will be able to share continually updated Cloudflare user risk scores with <a href="https://www.okta.com/products/identity-threat-protection/"><u>Identity Threat Protection with Okta AI</u></a>. If a user is deemed too risky, Okta will automatically take action to mitigate the risk, such as enforcing <a href="https://www.cloudflare.com/en-gb/learning/access-management/what-is-multi-factor-authentication/"><u>multi-factor authentication (MFA)</u></a> verification or universally logging the user out from all applications. </p><p>For example, a user has a low risk score from Cloudflare that was shared with Okta, but after exhibiting “impossible travel” behavior, the user’s risk level is raised to high. Cloudflare sends the updated score to Okta, which triggers a Universal Logout and an MFA challenge if the user attempts to log in again. Access to sensitive systems may be revoked completely until the user is verified. </p>
    <div>
      <h2>How it works: continuous risk evaluation and exchange</h2>
      <a href="#how-it-works-continuous-risk-evaluation-and-exchange">
        
      </a>
    </div>
    
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/79JiNwP0P5bbXpW6dy6ORQ/b0dc91943840b44bbcc8e447af64f392/image1.png" />
          </figure><p><sup><b><i>Figure 1.</i></b></sup><sup><i> Diagram showing risky behavior by a user, resulting in sign-out.</i></sup></p><p>We begin by detecting risky behavior from a user (such as an “impossible travel” event between two geographic locations). Instances of risky behavior are called Risk Events. We perform two actions when we observe a Risk Event: logging the event and evaluating whether further action is required. For customers that have enabled <a href="https://developers.cloudflare.com/cloudflare-one/insights/risk-score/#send-risk-score-to-okta"><u>Risk Score Sharing with Okta</u></a>, any change in Risk Score is transmitted to Okta’s Identity Threat Protection (ITP).</p><p>Upon receiving a new event, Okta evaluates the change in user risk against the organization's policies. These policies may include actions such as re-authenticating the user if they become high risk.</p><p>When we design new features, we aim for them to be extensible across the industry. For this reason, we chose the <a href="https://openid.net/specs/openid-sharedsignals-framework-1_0.html"><u>OpenID Shared Signals Framework Specification (SSF)</u></a> to be the foundation of our transmission format. By doing this, we are able to leverage current and future providers that support the standard. The core functionality of SSF revolves around sharing <a href="https://www.rfc-editor.org/rfc/rfc8417.html"><u>Security Event Tokens (SETs)</u></a>, a specialized version of a JSON Web Token (JWT). Providers can produce and consume Security Event Tokens, forming a “network” of shared user risk information between providers.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/SaWKy4UWPZfa8hf6rHcF8/571a08ddeab08b01b9a38e740ec89644/image2.png" />
          </figure><p><sup><b><i>Figure 2.</i></b></sup><sup><i> Diagram showing a Security Event Token being transmitted from Cloudflare to Okta.</i></sup></p><p>The diagram above (<b>Figure 2</b>) details the process of sharing risk. When sharing Risk Score changes with Okta, we bundle metadata about the risk event and user into the body of a Security Event Token. Following this, the JWT/SET is signed using our private key. This is an important step, as the signature is used to verify the sender's identity (cryptographic authenticity) and that the payload body has not been tampered with (cryptographic integrity). In plain terms, this signature is used by Okta to verify that the event is unaltered and was sent by Cloudflare.</p><p>Once Okta has verified the authenticity and integrity of the SET token, they may use the risk metadata within the body to execute Identity Threat Protection policies defined by the customer. These policies could include actions such as “if a high risk score is received from Cloudflare, sign out the offending user”.</p><p>Learn more about the Shared Signals Framework and CAEP in <a href="https://www.okta.com/blog/2024/08/identity-threat-protection-with-okta-ai/"><u>Okta’s announcement blog post</u></a>.</p>
    <div>
      <h2>Get started today</h2>
      <a href="#get-started-today">
        
      </a>
    </div>
    <p>Cloudflare customers can easily <a href="https://developers.cloudflare.com/cloudflare-one/insights/risk-score/#send-risk-score-to-okta"><u>enable risk score sharing from the Cloudflare One SSO setup page</u></a>. This is available to customers whether you’ve already integrated with Okta or are setting up the integration for the first time. You will also be able to confirm that the feature was enabled in your audit logs.</p><p>If you’ve already integrated Okta within your Cloudflare One dashboard:</p><ol><li><p>As an admin, navigate to Settings &gt; Authentication and select the Okta login method.</p></li><li><p>Select “send risk score to Okta.”</p></li></ol><p>If you haven’t yet integrated Okta within your Cloudflare One dashboard:</p><ol><li><p>As an admin, navigate to Settings &gt; Authentication and select a new login method.</p></li><li><p>Follow the instructions to add Okta as an SSO.</p></li><li><p>Select “send risk score to Okta.”</p></li></ol><p>Now, whenever a user’s risk score changes within the organization, information is sent to Okta automatically and an audit log is documented.</p>
    <div>
      <h2>Uphold Zero Trust principles</h2>
      <a href="#uphold-zero-trust-principles">
        
      </a>
    </div>
    <p>In conclusion, the ability to incorporate rich context is essential for making accurate and informed access decisions. With vast amounts of data — including user logins, logouts, websites visited, and emails sent — human analysts would struggle to keep pace with modern security challenges. Cloudflare provides context in the form of a risk score, enabling Okta’s risk engine to make more informed policy decisions about users. This sharing of information powers the continuous evaluation required to enforce Zero Trust policies within your organization, ultimately strengthening your organization’s security posture.</p><p>Not yet a Cloudflare One customer? <a href="https://www.cloudflare.com/products/zero-trust/plans/enterprise/"><u>Reach out for a consultation</u></a> or contact your account manager.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Okta]]></category>
            <category><![CDATA[Partners]]></category>
            <guid isPermaLink="false">7LZCXzvQgHwLVGoT4O4Pj6</guid>
            <dc:creator>Noelle Kagan</dc:creator>
            <dc:creator>Andrew Meyer</dc:creator>
            <dc:creator>James Chang</dc:creator>
            <dc:creator>Gavin Chen</dc:creator>
            <dc:creator>Matt Davis</dc:creator>
        </item>
        <item>
            <title><![CDATA[Customers get increased integration with Cloudflare Email Security and Zero Trust through expanded partnership with CrowdStrike]]></title>
            <link>https://blog.cloudflare.com/customers-get-increased-integration-with-cloudflare-email-security-and-zero-trust/</link>
            <pubDate>Wed, 11 Sep 2024 13:00:00 GMT</pubDate>
            <description><![CDATA[ This post explains how our integrations with CrowdStrike Falcon® Next-Gen SIEM allow customers to identify and investigate risky user behavior and analyze data combined with other log sources to uncover hidden threats. ]]></description>
            <content:encoded><![CDATA[ <p>Today, we’re excited to expand <a href="https://blog.cloudflare.com/unified-risk-posture"><u>our recent Unified Risk Posture announcement</u></a> with more information on our latest integrations with <a href="https://www.crowdstrike.com/"><u>CrowdStrike</u></a>. We <a href="https://blog.cloudflare.com/unified-risk-posture"><u>previously shared</u></a> that our CrowdStrike Falcon Next-Gen SIEM integration allows for deeper analysis and further investigations by unifying first- and third-party data, native threat intelligence, AI, and workflow automation to allow your security teams to focus on work that matters.</p><p>This post explains how Falcon Next-Gen SIEM allows customers to identify and investigate risky user behavior and analyze data combined with other log sources to uncover hidden threats. By combining Cloudflare and CrowdStrike, organizations are better equipped to manage risk and decisively take action to stop cyberattacks.</p><p>By leveraging the combined capabilities of Cloudflare and CrowdStrike, organizations combine Cloudflare’s email security and <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">zero trust </a>logging capabilities with CrowdStrike’s dashboards and custom workflows to get better visibility into their environments and remediate potential threats. <a href="https://www.happycog.com/">Happy Cog</a>, a full-service digital agency, currently leverages the integration. Co-Founder and President Matthew Weinberg said: </p><blockquote><p>'The integration of Cloudflare’s robust Zero Trust capabilities with CrowdStrike Falcon Next-Gen SIEM enables organizations to gain a more comprehensive view of the threat landscape and take action to mitigate both internal and external risks posed by today’s security challenges.'</p></blockquote>
    <div>
      <h3>Cloudflare Email Security with Falcon Next-Gen SIEM</h3>
      <a href="#cloudflare-email-security-with-falcon-next-gen-siem">
        
      </a>
    </div>
    <p>With <a href="https://developers.cloudflare.com/email-security/"><u>Cloudflare Email Security’s</u></a> configurable policies, organizations can now push indicators of compromise (IoC) alerts to Falcon Next-Gen SIEM, notifying analysts about suspicious activity, such as a user engaging with a phishing email. By proactively alerting analysts when suspicious activity is detected, Cloudflare and CrowdStrike can provide early detection of account compromises or insider threats.</p>
    <div>
      <h3>Cloudflare Zero Trust Logs with Falcon Next-Gen SIEM</h3>
      <a href="#cloudflare-zero-trust-logs-with-falcon-next-gen-siem">
        
      </a>
    </div>
    <p>We are also integrating <a href="https://developers.cloudflare.com/cloudflare-one/"><u>Cloudflare’s Zero Trust</u></a> platform with Falcon Next-Gen SIEM. This allows our mutual customers to push Cloudflare Zero Trust logs from Cloudflare Access and Cloudflare Gateway to Falcon Next-Gen SIEM for better visualization, analysis, and remediation. This integration allows Cloudflare logs to be used to customize and enhance Falcon Next-Gen SIEM detections and trigger CrowdStrike workflows to automatically configure a response action. An example workflow: based on a new detection of a user’s access request being deemed fraudulent, or if a user is engaging with risky websites, the Falcon platform can trigger Cloudflare to move users to affected user groups and apply adaptive access control policies, such as access isolating or quarantining the user.</p>
    <div>
      <h3>How To Get Started</h3>
      <a href="#how-to-get-started">
        
      </a>
    </div>
    <p>To connect Cloudflare Zero Trust logs, start with the Falcon Next-Gen SIEM module. Navigate to the Data Connectors tab of your Falcon Next-Gen SIEM dashboard and select the Cloudflare Data Connector.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/68WBQjl9Y4v8FFZQ8GD7gd/9e2bfa370303f1a3ccfe7a858089b195/image3.png" />
          </figure><p>Give the connector a name and select “Save”, and you will receive two pieces of information: an API key and an API URL. Be sure to make note of the key, as it will only be shown once.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6VqTqVgB9mf3CHeYomnfkP/6ae503472ca78969f2a8e26201b5b276/image1.png" />
          </figure><p>Next, in Cloudflare, create an <a href="https://developers.cloudflare.com/logs/get-started/enable-destinations/http/"><u>HTTP logpush job via API</u></a>, and format the "destination_conf" field as follows:</p><p><code>"destination_conf": "&lt;API URL&gt;?header_Authorization=Bearer%20&lt;API KEY&gt;&amp;tags=&lt;ZONE&gt;,dataset:&lt;DATASET&gt;"</code></p><p>Note: </p><ul><li><p>&lt;ZONE&gt; is optional for account-level logpush jobs </p></li><li><p>&lt;DATASET&gt; follows a dot delimited syntax, so <code>http_requests</code> becomes <code>http.requests</code></p></li></ul>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6hWaxWcelja9tY4q6ZSRwT/659bd80980cba2b5988279209fe6fdff/image2.png" />
          </figure><p>Once the job is created and active, you will start to see events populating in the My Connectors section of your Falcon dashboard. Once Cloudflare data is populated in Falcon Next-Gen SIEM, you can now search events and create Falcon Fusion SOAR automation workflows and correlation rules, all based on Cloudflare log events.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7g7PFWfKkHyT8gtKjROCbB/7a09065ff88e2cae7b905b8cc30f6442/image5.png" />
          </figure>
    <div>
      <h3>In Summary</h3>
      <a href="#in-summary">
        
      </a>
    </div>
    <p>Together, CrowdStrike and Cloudflare’s shared telemetry will further decrease the mean time to containment and expedite any organization’s ability to decisively respond to risks within their environment. The two platforms work together as one, allowing organizations to block suspicious activity and deliver high-fidelity alerts to security analysts for further investigation.</p><p>To learn more about these integrations, feel free to <a href="https://www.cloudflare.com/zero-trust/trial/"><u>reach out to us</u></a> to get started with a consultation. We can discuss your existing environment and ensure that you are best equipped to achieve better visibility and remediation in the face of emerging threats.</p> ]]></content:encoded>
            <category><![CDATA[Partners]]></category>
            <category><![CDATA[CrowdStrike]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <guid isPermaLink="false">2oxT0UhMM8loVoSuUom7W8</guid>
            <dc:creator>Corey Mahan</dc:creator>
            <dc:creator>Andrew Meyer</dc:creator>
            <dc:creator>Ayush Kumar</dc:creator>
            <dc:creator>Michael Mcgrory</dc:creator>
            <dc:creator>Gavin Chen</dc:creator>
        </item>
        <item>
            <title><![CDATA[Introducing Cloudflare for Unified Risk Posture]]></title>
            <link>https://blog.cloudflare.com/unified-risk-posture/</link>
            <pubDate>Tue, 07 May 2024 13:00:20 GMT</pubDate>
            <description><![CDATA[ Cloudflare for Unified Risk Posture, a new suite of cybersecurity risk management capabilities built on our global network, can help enterprises with automated and dynamic risk posture enforcement across their expanding attack surface ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/12txl9X9aO1mdmmdNUBM9U/9544e21096e2c3233982efa99acd984b/image5.png" />
            
            </figure><p>Managing risk posture — how your business assesses, prioritizes, and mitigates risks — has never been easy. But as <a href="https://www.cloudflare.com/learning/security/what-is-an-attack-surface/">attack surfaces</a> continue to expand rapidly, doing that job has become increasingly complex and inefficient. (One global survey <a href="https://securityintelligence.com/articles/socs-spend-32-percent-day-incidents-pose-no-threat/">found</a> that SOC team members spend, on average, one-third of their workday on incidents that pose no threat).  </p><p>But what if you could <b>mitigate risk</b> with <b>less effort</b> and <b>less noise</b>?</p><p>This post explores how Cloudflare can help customers do that, thanks to a new suite that converges capabilities across our <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/">Secure Access Services Edge (SASE)</a> and <a href="https://www.cloudflare.com/application-services/">web application and API (WAAP)</a> security portfolios. We’ll explain:</p><ul><li><p>Why this approach helps protect more of your attack surface, while also reducing SecOps effort</p></li><li><p>Three key use cases — including enforcing Zero Trust with our expanded CrowdStrike partnership</p></li></ul>
    <div>
      <h2>Cloudflare for Unified Risk Posture</h2>
      <a href="#cloudflare-for-unified-risk-posture">
        
      </a>
    </div>
    <p>Today, we’re announcing <a href="https://www.cloudflare.com/cybersecurity-risk-management/"><b>Cloudflare for Unified Risk Posture</b></a>, a new suite of cybersecurity risk management capabilities that can help enterprises with <b>automated and dynamic risk posture enforcement</b> across their expanding attack surface. Today, one unified platform enables organizations to:</p><ul><li><p><b>Evaluate risk across people and applications:</b> Cloudflare evaluates risk posed by people via <a href="https://www.cloudflare.com/learning/security/what-is-ueba/">user entity and behavior analytics (UEBA)</a> models and risks to apps, APIs, and sites via malicious payload, zero-day threat, and bot detection models.</p></li><li><p><b>Exchange risk indicators with best-in-class partners:</b> Cloudflare ingests risk scores from best-in-class <a href="https://www.cloudflare.com/learning/security/glossary/endpoint-security/">endpoint protection (EPP)</a> and <a href="https://www.cloudflare.com/learning/access-management/what-is-an-identity-provider/">identity provider (IDP)</a> partners and shares telemetry back with <a href="https://www.cloudflare.com/learning/security/what-is-siem/">security information and event management (SIEM)</a> and extended detection and response (XDR) platforms for further analysis, all via one-time integrations with our unified API.</p></li><li><p><b>Enforce automated risk controls at scale:</b> Based on these dynamic first- and third-party risk scores, Cloudflare enforces consistent risk controls for people and apps across any location around the world.</p></li></ul><p><b>Figure 1: Unified Risk Posture Diagram</b></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3WLbotRM1RL1VFQwZbNZ8y/8bf5d12d3ed85dba51448b4fad75b4e9/image3.png" />
            
            </figure><p>As mentioned above, this suite converges capabilities from our SASE and WAAP security portfolios onto our global network. Customers can now take advantage of built-in risk management functionality packaged as part of these existing portfolios.</p><p>This launch builds on our progressive efforts to extend first-party visibility and controls and third-party integrations that make it easier for organizations to adapt to evolving risks. For example, as part of the 2024 <a href="https://www.cloudflare.com/security-week/">Security Week</a>, we announced the general availability of <a href="/cf1-user-risk-score">behavior-based user risk scoring</a> and the beta availability of an <a href="/security-analytics-ai-assistant">AI-enabled assistant</a> to help you analyze risks facing your applications. And in a <a href="/cloudflare-email-security-now-works-with-crowdstrike-falcon-logscale">recent integration in the Fall of 2023</a>, we announced that our cloud email security customers can ingest and display our threat detections within the CrowdStrike Falcon® Next-Gen SIEM dashboard.</p><p>To further manage your risk posture, you will be able to take advantage of new Cloudflare capabilities and integrations, including:</p><ul><li><p>A new integration to share Cloudflare Zero Trust and email log data with the CrowdStrike Falcon Next-Gen SIEM <i>(available now)</i></p></li><li><p>A new integration to share Cloudflare’s user risk score with Okta to enforce access policies <i>(coming by the end of Q2 2024)</i></p></li><li><p>New first-party UEBA models, including user risk scores based on device posture checks <i>(coming by the end of Q2 2024)</i></p></li></ul><p>Unifying the evaluation, exchange, and enforcement stages of risk management onto Cloudflare’s platform helps security leaders mitigate risk with less effort. As a cybersecurity vendor defending both public-facing and internal infrastructure, Cloudflare is uniquely positioned to protect wide swathes of your expanding attack surface. Bringing together dynamic first-party risk scoring, flexible integrations, and automated enforcement helps drive two primary business outcomes:</p><ol><li><p><b>Reducing effort in SecOps</b> with less manual policy building and greater agility in responding to incidents. This means fewer clicks to build policies, more automated workflows, and lower mean times to detect (MTTD) and mean times to respond (MTTR) to incidents.</p></li><li><p><b>Reducing cyber risk</b> with visibility and controls that span people and apps. This means fewer critical incidents and more threats blocked automatically.</p></li></ol><p>Customers like <a href="https://www.indeed.com/about">Indeed</a>, the #1 job site in the world, are already seeing these impacts by partnering with Cloudflare:</p><blockquote><p><i>“Cloudflare is helping us mitigate risk more effectively with less effort and simplifies how we deliver Zero Trust across my organization.”</i>— <b>Anthony Moisant</b>, SVP, Chief Information Officer and Chief Security Officer at <b>Indeed</b>.</p></blockquote>
    <div>
      <h2>Problem: Too many risks across too much attack surface</h2>
      <a href="#problem-too-many-risks-across-too-much-attack-surface">
        
      </a>
    </div>
    <p>Managing risk posture is an inherently broad challenge, covering internal dangers and external threats across attack vectors. Below is just a sampling of risk factors CISOs and their security teams track across three everyday dimensions including people, apps, and data:</p><ul><li><p><b>People risks:</b> Phishing, social engineering, malware, ransomware, remote access, insider threats, physical access compromise, third party / supply chain, mobile devices / BYOD</p></li><li><p><b>App risks:</b> denial of service, zero-day exploits, SQL injection, cross-site scripting, remote code execution, credential stuffing, account takeover, shadow IT usage, API abuse</p></li><li><p><b>Data risks:</b> data loss / exposure, data theft / breach, privacy violation, compliance violation, data tampering</p></li></ul><p>Point solutions emerged to lock down some of these specific risks and attack vectors. But over time, organizations have accumulated many services with a limited ability to talk to one another and build a more holistic view of risk. The granular telemetry generated by each tool has led to information overload for security staff who are often stretched thin already. Security Information and Event Management (SIEM) and Extended Detection &amp; Response (XDR) platforms play a critical role in aggregating risk data across environments and mitigating threats based on analysis, but these tools still demand time, resources, and expertise to operate effectively. All these challenges have gotten worse as attack surfaces have expanded rapidly, as businesses embrace hybrid work, build new digital apps, and more recently, experiment with AI.</p>
    <div>
      <h2>How Cloudflare helps manage risk posture</h2>
      <a href="#how-cloudflare-helps-manage-risk-posture">
        
      </a>
    </div>
    <p>To help restore control over this complexity, Cloudflare for Unified Risk Posture provides one platform to evaluate risk, exchange indicators, and enforce dynamic controls throughout IT environments and around the world, all while complementing the security tools your business already relies on.</p><p>Although the specific risks Cloudflare can mitigate are wide-ranging (including all those in the sample bullets above), the following three use cases represent the full range of our capabilities, which you can start taking advantage of today.</p>
    <div>
      <h3>Use Case #1: Enforce Zero Trust with Cloudflare &amp; CrowdStrike</h3>
      <a href="#use-case-1-enforce-zero-trust-with-cloudflare-crowdstrike">
        
      </a>
    </div>
    <p>This first use case spotlights the flexibility with which Cloudflare fits into your current security ecosystem to make it easier to adopt <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust best practices</a>.</p><p>Cloudflare integrates with and ingests security signals from best-in-class <a href="https://developers.cloudflare.com/cloudflare-one/identity/devices/service-providers/">EPP</a> and <a href="https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/">IDP</a> partners to enforce identity and device posture checks for any access request to any destination. You can even onboard multiple providers at once to enforce different policies in different contexts. For example, by integrating with CrowdStrike Falcon®, joint customers can <a href="/cloudflare-crowdstrike-partnership">enforce policies based on the Falcon Zero Trust Assessment (ZTA) score</a>, which delivers continuous real-time security posture assessments across all endpoints in an organization regardless of the location, network or user. Plus, customers can then <a href="https://developers.cloudflare.com/logs/about/">push activity logs</a> generated by Cloudflare, including all access requests, to whichever <a href="https://developers.cloudflare.com/fundamentals/reference/partners/">cloud storage or analytics providers</a> they prefer.</p><p>Today, we are <a href="https://www.cloudflare.com/press-releases/2024/cloudflare-announces-unified-risk-posture-to-provide-comprehensive-and">announcing</a> an expanded partnership with CrowdStrike for a new integration that enables organizations to share logs with Falcon Next-Gen SIEM for deeper analysis and further investigation. Falcon Next-Gen SIEM unifies first- and third-party data, native threat intelligence, AI, and workflow automation to drive SOC transformation and enforce better threat protection. The integration of Cloudflare Zero Trust and email logs with Falcon Next-Gen SIEM allows joint customers to identify and investigate Zero Trust networking and email risks and analyze data with other log sources to uncover hidden threats.</p><blockquote><p><i>“CrowdStrike Falcon Next-Gen SIEM delivers up to 150x faster search performance over legacy SIEMs and products positioned as SIEM alternatives. Our transformative telemetry, paired with Cloudflare’s robust Zero Trust capabilities provides an unprecedented partnership. Together, we are converging two of the most critical pieces of the risk management puzzle that organizations of every size must address in order to combat today’s growing threats.”</i>— <b>Daniel Bernard</b>, Chief Business Officer at <b>CrowdStrike</b></p></blockquote><p>Below is a sample workflow of how Cloudflare and CrowdStrike work together to enforce Zero Trust policies and mitigate emerging risks. Together, Cloudflare and CrowdStrike complement each other by exchanging activity and risk data and enforcing risk-based policies and remediation steps.</p><p><b>Figure 2: Enforce Zero Trust with Cloudflare &amp; CrowdStrike</b></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1sKCifQqdVmtJO1K7BIGP5/9536d135c30aad7f2367bb96dd84031c/image4.png" />
            
            </figure><table><colgroup><col></col><col></col><col></col></colgroup><tbody><tr><td><p><span>Phase 1: Automated investigation</span></p></td><td><p><span>Phase 2: Zero Trust enforcement</span></p></td><td><p><span>Phase 3: Remediation</span></p></td></tr><tr><td><p><span>Cloudflare and CrowdStrike help an organization detect that a user is compromised.</span></p><br /><p><span>In this example, Cloudflare has recently blocked web browsing to risky websites and phishing emails, serving as the first line of defense. Those logs are then sent to CrowdStrike Falcon Next-Gen SIEM, which alerts your organization’s analyst about suspicious activity.</span></p><br /><p><span>At the same time, CrowdStrike Falcon Insight XDR automatically scans that user’s device and detects that it is infected. As a result, the Falcon ZTA score reflecting the device’s health is lowered.</span></p></td><td><p><span>This org has set up device posture checks via Cloudflare’s </span><a href="https://www.cloudflare.com/learning/access-management/what-is-ztna/"><span>Zero Trust Network Access</span></a><span> (ZTNA), only allowing access when the Falcon ZTA risk score is above a specific threshold they have defined. </span></p><br /><p><span>Our ZTNA denies the user’s next request to access an application because the Falcon ZTA score falls below that threshold.</span></p><br /><p><span>Because of this failed device posture check, Cloudflare increases the risk score for that user, which places them in a group with more restrictive controls. </span></p><br /><br /><br /></td><td><p><span>In parallel, CrowdStrike’s Next-GenSIEM has continued to analyze the specific user’s activity and broader risks throughout the organization’s environment. Using machine learning models, CrowdStrike surfaces top risks and proposes solutions for each risk to your analyst.</span></p><br /><p><span>The analyst can then review and select remediation tactics — for example, quarantining the user’s device — to further reduce risk throughout the organization. </span></p><br /></td></tr></tbody></table>
    <div>
      <h3>Use Case #2: Protect apps, APIs, &amp; websites</h3>
      <a href="#use-case-2-protect-apps-apis-websites">
        
      </a>
    </div>
    <p>This next use case is focused on protecting apps, APIs, and websites from threat actors and bots. Many customers first adopt Cloudflare for this use case, but may not be aware of the risk evaluation algorithms underpinning their protection.</p><p><b>Figure 3: Protect apps, APIs &amp; sites with ML-backed threat intelligence</b></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/68uD20AuCjTQwmC5lLzE1U/cb4a75aaa0af26941d404555dbb6d9f8/image1.png" />
            
            </figure><p>Cloudflare’s <a href="https://www.cloudflare.com/application-services/">Application Services</a> detect and mitigate malicious payloads and bots using risk models backed by <a href="https://www.cloudflare.com/learning/ai/what-is-machine-learning/">machine learning</a> (ML) including:</p><ul><li><p>Our <a href="https://developers.cloudflare.com/waf/about/waf-attack-score/"><b>WAF attack score</b></a>, which scores whether a request contains a zero-day exploit, or common OWASP Top 10 risks such as a <a href="https://www.cloudflare.com/learning/security/threats/sql-injection/">SQL injection</a>, <a href="https://www.cloudflare.com/learning/security/threats/cross-site-scripting/">cross-site scripting</a>, or <a href="https://www.cloudflare.com/learning/security/what-is-remote-code-execution/">remote code execution</a> payload</p></li><li><p>Our <a href="https://developers.cloudflare.com/bots/concepts/bot-score/"><b>bot score</b></a>, which scores the likelihood that a request came from a bot</p></li><li><p>Our <a href="https://developers.cloudflare.com/page-shield/how-it-works/malicious-script-detection/"><b>malicious script classifier</b></a><b>,</b> which looks at the dangers of browser scripts for your website visitors</p></li></ul><p>These risk models are trained largely on telemetry from Cloudflare’s global network, which is used as a reverse proxy by <a href="https://www.cloudflare.com/what-is-cloudflare/">nearly 20% of all websites</a> and sees about 3 trillion DNS queries per day. This unique real-time visibility powers threat intelligence and even enables us to <a href="/detecting-zero-days-before-zero-day">detect and mitigate zero-days before others</a>.</p><p>Cloudflare also uses ML to <a href="/ml-api-discovery-and-schema-learning">discover new API endpoints and schemas</a> without requiring any prerequisite customer input. This helps organizations uncover unauthenticated APIs and map their <a href="https://www.cloudflare.com/2024-api-security-management-report/#:~:text=APIs%20%E2%80%94%20the%20programmable%20interfaces%20comprising,throughout%20the%20API%2Dcentric%20world.">growing attack surface</a> before applying protections.</p><p>Unlike other vendors, Cloudflare’s network architecture enables risk evaluation models and security controls on public-facing and internal infrastructure to be shared across all of our services. This means that organizations can apply protections against app vulnerability exploits, DDoS, and bots in front of internal apps like self-hosted Jira and Confluence servers, protecting them from emerging and even zero-day threats.</p><p>Organizations can review the potential misconfigurations, data leakage risks, and vulnerabilities that impact the risk posture for their apps, APIs, and websites within <a href="https://www.cloudflare.com/application-services/products/securitycenter/">Cloudflare Security Center</a>. We are investing in this centralized view of risk posture management by integrating alerts and insights across our security portfolio. In fact, we <a href="/security-insights-quick-ciso-view">recently announced updates</a> focused on highlighting where gaps exist in how your organization has deployed Cloudflare services.</p><p>Finally, we are also making it easier for organizations to investigate security events directly and <a href="/log-explorer">recently announced beta availability of Log Explorer</a>. In this beta, security teams can view all of their HTTP traffic in one place with search, analytics dashboards, and filters built-in. These capabilities can help customers monitor more risk factors within the Cloudflare platform versus exporting to third party tools.</p>
    <div>
      <h3>Use Case #3: Protect sensitive data with UEBA</h3>
      <a href="#use-case-3-protect-sensitive-data-with-ueba">
        
      </a>
    </div>
    <p>This third use case summarizes one common way many customers plan to leverage our <a href="https://developers.cloudflare.com/cloudflare-one/insights/risk-score/">user risk / UEBA scores</a> to prevent leaks and mishandling of sensitive data:</p><p><b>Figure 4: Protect apps, APIs &amp; sites with ML-backed threat intelligence</b></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/DA2cbnXZDIx3sGMXGvwfJ/b8cf1f547ec36cbc1e976d554ecf05b5/image2.jpg" />
            
            </figure><ul><li><p><b>Phase 1:</b> In this example, the security team has already configured <a href="https://www.cloudflare.com/learning/access-management/what-is-dlp/">data loss prevention (DLP)</a> policies to detect and block traffic with sensitive data. These policies prevent one user’s multiple, repeated attempts to upload <a href="/dlp-ocr-sourcecode">source code</a> to a public GitHub repository.</p></li><li><p><b>Phase 2</b>: Because this user has now violated a high number of DLP policies within a short time frame, Cloudflare scores that suspicious user as high risk, regardless of whether those uploads had malicious or benign intent. The security team can now further investigate that specific user, including reviewing all of his recent log activity.</p></li><li><p><b>Phase 3</b>: For that specific high-risk user or for a group of high-risk users, administrators can then set ZTNA or even <a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">browser isolation</a> rules to block or isolate access to applications that contain other sensitive data.</p></li></ul><p>Altogether, this workflow highlights how Cloudflare’s risk posture controls adapt to suspicious behavior from evaluation through to enforcement.</p>
    <div>
      <h2>How to get started with unified risk posture management</h2>
      <a href="#how-to-get-started-with-unified-risk-posture-management">
        
      </a>
    </div>
    <p>The above use cases reflect how our customers are unifying risk management with Cloudflare. Through these customer conversations, a few themes emerged for why they feel confident in our vision to help them manage risk across their expanding attack surface:</p><ul><li><p>The <b>simplicity of our unified platform</b>: We bring together SASE and WAAP risk scoring and controls for people and apps. Plus, with a single API for all Cloudflare services, organizations can automate and customize workflows with infrastructure-as-code tools like <a href="https://developers.cloudflare.com/terraform/">Terraform</a> with ease.</p></li><li><p>The <b>flexibility of our integrations</b>: We exchange risk signals with the EPP, IDP, XDR, and SIEM providers you already use, so you can do more with your tools and data. Plus, with one-time integrations that work across all our services, you can extend controls across your IT environments with agility.</p></li><li><p>The <b>scale of our global network</b>: Every security service is available for customers to run in every location across our network spanning 320+ locations and 13K+ interconnects. In this way, single-pass inspection and risk policy enforcement is always fast, consistent, and resilient, delivered close to your users and apps.</p></li></ul><p>If you’re ready to see how Cloudflare can help you manage risk, <a href="https://www.cloudflare.com/plans/enterprise/contact/">request a consultation today</a>. Or if you’re at RSA Conference 2024, <a href="https://www.cloudflare.com/rsa-conference-2024/">come to any of our in-person events</a>.</p><p>To continue learning more about how Cloudflare can help you evaluate risk, exchange risk indicators, and enforce risk controls, <a href="https://www.cloudflare.com/cybersecurity-risk-management/">explore more resources on our website</a>.</p> ]]></content:encoded>
            <category><![CDATA[Risk Management]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[SASE]]></category>
            <category><![CDATA[CrowdStrike]]></category>
            <category><![CDATA[Connectivity Cloud]]></category>
            <guid isPermaLink="false">2lDPGVJ136ZtHceoXGZAxY</guid>
            <dc:creator>James Chang</dc:creator>
            <dc:creator>Andrew Meyer</dc:creator>
        </item>
        <item>
            <title><![CDATA[Enhancing security analysis with Cloudflare Zero Trust logs and Elastic SIEM]]></title>
            <link>https://blog.cloudflare.com/enhancing-security-analysis-with-cloudflare-zero-trust-logs-and-elastic-siem/</link>
            <pubDate>Thu, 22 Feb 2024 14:00:26 GMT</pubDate>
            <description><![CDATA[ Today, we are thrilled to announce new Cloudflare Zero Trust dashboards on Elastic. Shared customers using Elastic can now use these pre-built dashboards to store, search, and analyze their Zero Trust logs ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/696ov5uPtgNwN7Qm735ESm/6f88ef27e4cacb8057d6e600fd20d378/image3-7.png" />
            
            </figure><p>Today, we are thrilled to announce new Cloudflare Zero Trust dashboards on Elastic. Shared customers using Elastic can now use these pre-built <a href="https://docs.elastic.co/integrations/cloudflare_logpush#zero-trust-events">dashboards to store, search, and analyze</a> their Zero Trust logs.</p><p>When organizations look to adopt a <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust architecture</a>, there are many components to get right. If products are configured incorrectly, used maliciously, or security is somehow breached during the process, it can open your organization to underlying security risks without the ability to get insight from your data quickly and efficiently.</p><p>As a Cloudflare technology partner, Elastic helps Cloudflare customers find what they need faster, while keeping applications running smoothly and <a href="https://www.cloudflare.com/products/zero-trust/threat-defense/">protecting against cyber threats</a>. “I'm pleased to share our collaboration with Cloudflare, making it even easier to deploy log and analytics dashboards. This partnership combines Elastic's open approach with Cloudflare's practical solutions, offering straightforward tools for enterprise search, observability, and security deployment,” explained Mark Dodds, Chief Revenue Officer at Elastic.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7kDqbu2kQvUL1P47N6aDMY/8dacf9b75432a900b32cb900f080366a/image5-3.png" />
            
            </figure>
    <div>
      <h2>Value of Zero Trust logs in Elastic</h2>
      <a href="#value-of-zero-trust-logs-in-elastic">
        
      </a>
    </div>
    <p>With this joint solution, we’ve made it easy for customers to seamlessly forward their Zero Trust logs to Elastic via Logpush jobs. This can be achieved directly via a Restful API or through an intermediary storage solution like AWS S3 or Google Cloud. Additionally, Cloudflare's integration with Elastic has undergone improvements to encompass all categories of Zero Trust logs generated by Cloudflare.</p><p><b>Here are detailed some highlights of what the integration offers:</b></p><ul><li><p><b>Comprehensive Visibility:</b> Integrating Cloudflare Logpush into Elastic provides organizations with a real-time, comprehensive view of events related to Zero Trust. This enables a detailed understanding of who is accessing resources and applications, from where, and at what times. Enhanced visibility helps detect anomalous behavior and potential security threats more effectively, allowing for early response and mitigation.</p></li><li><p><b>Field Normalization:</b> By unifying data from Zero Trust logs in Elastic, it's possible to apply consistent field normalization not only for Zero Trust logs but also for other sources. This simplifies the process of search and analysis, as data is presented in a uniform format. Normalization also facilitates the creation of alerts and the identification of patterns of malicious or unusual activity.</p></li><li><p><b>Efficient Search and Analysis:</b> Elastic provides powerful data search and analysis capabilities. Having Zero Trust logs in Elastic enables quick and precise searching for specific information. This is crucial for investigating security incidents, understanding workflows, and making informed decisions.</p></li><li><p><b>Correlation and Threat Detection:</b> By combining Zero Trust data with other security events and data, Elastic enables deeper and more effective correlation. This is essential for detecting threats that might go unnoticed when analyzing each data source separately. Correlation aids in pattern identification and the detection of sophisticated attacks.</p></li><li><p><b>Prebuilt Dashboards:</b> The integration provides out-of-the-box dashboards offering a quick start to visualizing key metrics and patterns. These dashboards help security teams visualize the security landscape in a clear and concise manner. The integration not only provides the advantage of prebuilt dashboards designed for Zero Trust datasets but also empowers users to curate their own visualizations.</p></li></ul>
    <div>
      <h2>What’s new on the dashboards</h2>
      <a href="#whats-new-on-the-dashboards">
        
      </a>
    </div>
    <p>One of the main assets of the integration is the out-of-the-box dashboards tailored specifically for each type of Zero Trust log. Let's explore some of these dashboards in more detail to find out how they can help us in terms of visibility.</p>
    <div>
      <h3>Gateway HTTP</h3>
      <a href="#gateway-http">
        
      </a>
    </div>
    <p>This dashboard focuses on HTTP traffic and allows for monitoring and analyzing HTTP requests passing through Cloudflare's <a href="https://www.cloudflare.com/zero-trust/products/gateway/">Secure Web Gateway</a>.</p><p>Here, patterns of traffic can be identified, potential threats detected, and a better understanding gained of how resources are being used within the network.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2C5VeJ6U4MfZjn7cmHgAPn/0e2600c2f5cfdd83d9f9713d60454cc0/image2-10.png" />
            
            </figure><p>Every visualization in the stage is interactive. Therefore, the whole dashboard adapts to enabled filters, and they can be pinned across dashboards for pivoting. For instance, if clicking on one of the sections of the donut showing the different actions, a filter is automatically applied on that value and the whole dashboard is oriented around it.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5oHgZ74rXxV1we32WHqsye/ae9d1d99546257b6a6140e0a94947ca8/image1-9.png" />
            
            </figure>
    <div>
      <h3>CASB</h3>
      <a href="#casb">
        
      </a>
    </div>
    <p>Following with a different perspective, the <a href="https://www.cloudflare.com/learning/access-management/what-is-a-casb/">CASB (Cloud Access Security Broker)</a> dashboard provides visibility over cloud applications used by users. Its visualizations are targeted to detect threats effectively, helping in the risk management and regulatory compliance.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/79LR83kaKlJg7kzZS5ewTq/5e86a9bcf83db0940d14aef082c7fdde/image4-5.png" />
            
            </figure><p>These examples illustrate how dashboards in the integration between Cloudflare and Elastic offer practical and effective data visualization for Zero Trust. They enable us to make data-driven decisions, identify behavioral patterns, and proactively respond to threats. By providing relevant information in a visual and accessible manner, these dashboards strengthen security posture and allow for more efficient risk management in the Zero Trust environment.</p>
    <div>
      <h2>How to get started</h2>
      <a href="#how-to-get-started">
        
      </a>
    </div>
    <p>Setup and deployment is simple. Use the Cloudflare dashboard or API to create Logpush jobs with all fields enabled for each dataset you’d like to ingest on Elastic. There are eight account-scoped datasets available to use today (Access Requests, Audit logs, CASB findings, Gateway logs including DNS, Network, HTTP; Zero Trust Session Logs) that can be ingested into Elastic.</p><p>Setup <a href="https://developers.cloudflare.com/logs/get-started/enable-destinations/elastic/">Logpush jobs</a> to your Elastic destination via one of the following methods:</p><ul><li><p><b>HTTP Endpoint mode</b> - Cloudflare pushes logs directly to an HTTP endpoint hosted by your Elastic Agent.</p></li><li><p><b>AWS S3 polling mode</b> - Cloudflare writes data to S3 and Elastic Agent polls the S3 bucket by listing its contents and reading new files.</p></li><li><p><b>AWS S3 SQS mode</b> - Cloudflare writes data to S3, S3 pushes a new object notification to SQS, Elastic Agent receives the notification from SQS, and then reads the S3 object. Multiple Agents can be used in this mode.</p></li></ul>
    <div>
      <h3>Enabling the integration in Elastic</h3>
      <a href="#enabling-the-integration-in-elastic">
        
      </a>
    </div>
    <ol><li><p>In Kibana, go to Management &gt; Integrations</p></li><li><p>In the integrations search bar type Cloudflare Logpush.</p></li><li><p>Click the Cloudflare Logpush integration from the search results.</p></li><li><p>Click the Add Cloudflare Logpush button to add Cloudflare Logpush integration.</p></li><li><p>Enable the Integration with the HTTP Endpoint, AWS S3 input or GCS input.</p></li><li><p>Under the AWS S3 input, there are two types of inputs: using AWS S3 Bucket or using SQS.</p></li><li><p>Configure Cloudflare to send logs to the Elastic Agent.</p></li></ol>
    <div>
      <h2>What’s next</h2>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>As organizations increasingly adopt a Zero Trust architecture, understanding your organization’s security posture is paramount. The dashboards help with necessary tools to build a robust security strategy, centered around visibility, early detection, and effective threat response.  By <a href="https://www.cloudflare.com/learning/security/what-is-siem/">unifying data</a>, normalizing fields, facilitating search, and enabling the creation of custom dashboards, this integration becomes a valuable asset for any cybersecurity team aiming to strengthen their security posture.</p><p>We’re looking forward to continuing to connect Cloudflare customers with our community of technology partners, to help in the adoption of a Zero Trust architecture.</p><p>Explore this new integration today.</p> ]]></content:encoded>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Logs]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[SIEM]]></category>
            <category><![CDATA[Elastic]]></category>
            <category><![CDATA[Partners]]></category>
            <guid isPermaLink="false">6amHiWxrNpxWRyQhTWFUSu</guid>
            <dc:creator>Corey Mahan</dc:creator>
            <dc:creator>Gavin Chen</dc:creator>
            <dc:creator>Andrew Meyer</dc:creator>
            <dc:creator>Chema Martínez (Guest Author)</dc:creator>
        </item>
    </channel>
</rss>