Skip to content

Commit 11c47ec

Browse files
maxvpharshil1712
authored andcommitted
[DLP] Update example policies (#18215)
1 parent 2bfb73c commit 11c47ec

File tree

2 files changed

+19
-18
lines changed

2 files changed

+19
-18
lines changed

src/content/docs/cloudflare-one/policies/data-loss-prevention/dlp-policies/common-policies.mdx

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -16,10 +16,10 @@ The following in-line DLP policies are commonly used to secure data in uploaded
1616

1717
The **Allow** action functions as an implicit logger, providing visibility into where your sensitive data is going without impacting the end user experience. The following example scans for your enabled Financial Information profile entries when users upload or download data to file sharing apps.
1818

19-
| Selector | Operator | Value | Logic | Action |
20-
| ---------------- | -------- | ----------------------- | ----- | ------ |
21-
| DLP Profile | in | `Financial Information` | And | Allow |
22-
| Content Category | in | `File Sharing` | | |
19+
| Selector | Operator | Value | Logic | Action |
20+
| ------------------ | -------- | ----------------------- | ----- | ------ |
21+
| DLP Profile | in | _Financial Information_ | And | Allow |
22+
| Content Categories | in | _File Sharing_ | | |
2323

2424
<Render file="gateway/policies/block-file-types" />
2525

@@ -29,11 +29,11 @@ For more information on what file formats DLP can scan, refer to [Supported file
2929

3030
You can configure access on a per-user or group basis by adding [identity-based conditions](/cloudflare-one/policies/gateway/identity-selectors/) to your policies. The following example blocks only contractors from uploading/downloading Financial Information to file sharing apps.
3131

32-
| Selector | Operator | Value | Logic | Action |
33-
| ---------------- | -------- | ----------------------- | ----- | ------ |
34-
| DLP Profile | in | `Financial Information` | And | Block |
35-
| Content Category | in | `File Sharing` | And | |
36-
| User Group Names | in | `Contractors` | | |
32+
| Selector | Operator | Value | Logic | Action |
33+
| ------------------ | -------- | ----------------------- | ----- | ------ |
34+
| DLP Profile | in | _Financial Information_ | And | Block |
35+
| Content Categories | in | _File Sharing_ | And | |
36+
| User Group Names | in | _Contractors_ | | |
3737

3838
## Exclude Android applications
3939

@@ -45,8 +45,8 @@ Many Android applications (such as Google Drive) use <GlossaryTooltip term="cert
4545

4646
| Selector | Operator | Value | Logic | Action |
4747
| ---------------------------- | -------- | -------------------- | ----- | -------------- |
48-
| Passed Device Posture Checks | in | `OS Version Android` | And | Do Not Inspect |
49-
| Application | in | `Google Drive` | | |
48+
| Application | in | _Google Drive_ | And | Do Not Inspect |
49+
| Passed Device Posture Checks | in | _OS Version Android_ | | |
5050

5151
Android users can now use the app, but the app traffic will bypass DLP scanning.
5252

@@ -60,6 +60,6 @@ In your [DLP logs](/cloudflare-one/policies/data-loss-prevention/dlp-policies/#4
6060

6161
| Selector | Operator | Value | Logic | Action |
6262
| ----------- | ----------- | ----------------------- | ----- | ------ |
63-
| DLP Profile | in | `Financial Information` | And | Block |
64-
| Application | in | `Google Drive` | And | |
65-
| Domain | not in list | `Do not DLP - SSN` | | |
63+
| DLP Profile | in | _Financial Information_ | And | Block |
64+
| Application | in | _Google Drive_ | And | |
65+
| Domain | not in list | _Do not DLP - SSN_ | | |

src/content/docs/cloudflare-one/policies/data-loss-prevention/dlp-policies/index.mdx

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -33,10 +33,11 @@ DLP Profiles may be used alongside other Zero Trust rules in a [Gateway HTTP pol
3333

3434
3. Build an [HTTP policy](/cloudflare-one/policies/gateway/http-policies/) using the [DLP Profile](/cloudflare-one/policies/gateway/http-policies/#dlp-profile) selector. For example, the following policy prevents users from uploading sensitive data to any location other than an approved corporate application:
3535

36-
| Selector | Operator | Value | Logic | Action |
37-
| ------------ | -------- | ------------------------------ | ----- | ------ |
38-
| DLP Profiles | in | `U.S. Social Security Numbers` | And | Block |
39-
| Application | not in | `Workday` | | |
36+
| Selector | Operator | Value | Logic | Action |
37+
| ----------- | -------- | -------------------------------------------------------- | ----- | ------ |
38+
| DLP Profile | in | _Social Security, Insurance, Tax, and Identifer Numbers_ | And | Block |
39+
| HTTP Method | in | _POST_ | And | |
40+
| Application | not in | _Workday_ | | |
4041

4142
4. Select **Create policy**.
4243

0 commit comments

Comments
 (0)