Skip to content

Commit 4ec37a0

Browse files
maxvpOxyjuncrwaters16
authored
[CASB] CDS UI updates + AWS CDE (#18162)
Co-authored-by: Jun Lee <[email protected]> Co-authored-by: Claire Waters <[email protected]>
1 parent 092f81e commit 4ec37a0

File tree

52 files changed

+393
-346
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

52 files changed

+393
-346
lines changed

public/_redirects

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1790,6 +1790,7 @@
17901790
/cloudflare-one/connections/connect-apps/install-and-setup/deployment-guides/* /cloudflare-one/connections/connect-networks/deploy-tunnels/deployment-guides/:splat 301
17911791
/cloudflare-one/connections/connect-networks/deployment-guides/* /cloudflare-one/connections/connect-networks/deploy-tunnels/deployment-guides/:splat 301
17921792
/cloudflare-one/analytics/logs/* /cloudflare-one/insights/logs/:splat 301
1793+
/cloudflare-one/applications/scan-apps/* /cloudflare-one/applications/casb/:splat 301
17931794
/cloudflare-one/connections/connect-apps/use_cases/* /cloudflare-one/connections/connect-networks/use-cases/:splat 301
17941795
/cloudflare-one/connections/connect-apps/* /cloudflare-one/connections/connect-networks/:splat 301
17951796
/cloudflare-one/connections/connect-devices/warp/exclude-traffic/* /cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/:splat 301

src/content/changelogs/casb.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
link: "/cloudflare-one/changelog/casb/"
33
productName: CASB
4-
productLink: "/cloudflare-one/applications/scan-apps/"
4+
productLink: "/cloudflare-one/applications/casb/"
55
productArea: Cloudflare One
66
productAreaLink: /cloudflare-one/changelog/
77
entries:
@@ -12,7 +12,7 @@ entries:
1212
- publish_date: "2024-05-23"
1313
title: Data-at-rest DLP for Box and Dropbox
1414
description: |-
15-
You can now scan your [Box](/cloudflare-one/applications/scan-apps/casb-integrations/box/#data-loss-prevention-optional) and [Dropbox](/cloudflare-one/applications/scan-apps/casb-integrations/dropbox/#data-loss-prevention-optional) files for DLP matches.
15+
You can now scan your [Box](/cloudflare-one/applications/casb/casb-integrations/box/#data-loss-prevention-optional) and [Dropbox](/cloudflare-one/applications/casb/casb-integrations/dropbox/#data-loss-prevention-optional) files for DLP matches.
1616
- publish_date: "2024-04-16"
1717
title: Export CASB findings to CSV
1818
description: |-

src/content/changelogs/dlp.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ entries:
2020
- publish_date: "2024-05-23"
2121
title: Data-at-rest DLP for Box and Dropbox
2222
description: |-
23-
You can now scan your [Box](/cloudflare-one/applications/scan-apps/casb-integrations/box/#data-loss-prevention-optional) and [Dropbox](/cloudflare-one/applications/scan-apps/casb-integrations/dropbox/#data-loss-prevention-optional) files for DLP matches.
23+
You can now scan your [Box](/cloudflare-one/applications/casb/casb-integrations/box/#data-loss-prevention-optional) and [Dropbox](/cloudflare-one/applications/casb/casb-integrations/dropbox/#data-loss-prevention-optional) files for DLP matches.
2424
- publish_date: "2024-04-16"
2525
title: Optical character recognition
2626
description: |-

src/content/docs/cloudflare-one/applications/scan-apps/casb-dlp.mdx renamed to src/content/docs/cloudflare-one/applications/casb/casb-dlp.mdx

Lines changed: 10 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -3,21 +3,15 @@ pcx_content_type: concept
33
title: Scan for sensitive data
44
sidebar:
55
order: 3
6-
76
---
87

9-
import { Render } from "~/components"
8+
import { Render } from "~/components";
109

1110
:::note
12-
13-
1411
Requires Cloudflare CASB and Cloudflare DLP.
15-
16-
1712
:::
1813

19-
You can use [Cloudflare Data Loss Prevention (DLP)](/cloudflare-one/policies/data-loss-prevention/) to discover if files stored in your SaaS application contain sensitive data.
20-
To perform DLP scans in a SaaS app, first configure a DLP profile with the data patterns you want to detect, then enable those profiles in a CASB integration.
14+
You can use [Cloudflare Data Loss Prevention (DLP)](/cloudflare-one/policies/data-loss-prevention/) to discover if files stored in a SaaS application contains sensitive data. To perform DLP scans in a SaaS app, first configure a [DLP profile](#configure-a-dlp-profile) with the data patterns you want to detect, then [add the profile](#enable-dlp-scans-in-casb) to a CASB integration.
2115

2216
## Supported integrations
2317

@@ -61,17 +55,17 @@ CASB will scan every publicly accessible file in the integration for text that m
6155

6256
If you enable a DLP profile from the **Manage integrations** page, CASB will only scan publicly accessible files that have had a modification event since enabling the DLP profile. Modification events include changes to the following attributes:
6357

64-
* Contents of the file
65-
* Name of the file
66-
* Visibility of the file (only if changed to publicly accessible)
67-
* Owner of the file
68-
* Location of the file (for example, moved to a different folder)
58+
- Contents of the file
59+
- Name of the file
60+
- Visibility of the file (only if changed to publicly accessible)
61+
- Owner of the file
62+
- Location of the file (for example, moved to a different folder)
6963

7064
In order to scan historical data, you must enable the DLP profile during the [integration setup flow](#add-a-new-integration).
7165

7266
## Limitations
7367

74-
DLP will only scan:
68+
DLP in CASB will only scan:
7569

76-
* [Text-based files](/cloudflare-one/policies/data-loss-prevention/#supported-file-types) such as documents, spreadsheets, and PDFs. Images are not supported.
77-
* Files 100 MB.
70+
- [Text-based files](/cloudflare-one/policies/data-loss-prevention/#supported-file-types) such as documents, spreadsheets, and PDFs. Images are not supported.
71+
- Files less than or equal 100 MB in size.
Lines changed: 35 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -11,10 +11,6 @@ import { Render } from "~/components";
1111
params={{ one: "Amazon Web Services (AWS) S3", two: "AWS account" }}
1212
/>
1313

14-
:::note
15-
The CASB integration for AWS S3 only supports posture-related findings.
16-
:::
17-
1814
## Integration prerequisites
1915

2016
- An AWS account using AWS S3 (Simple Storage Service)
@@ -30,6 +26,41 @@ For the AWS S3 integration to function, Cloudflare CASB requires the following a
3026

3127
These permissions follow the principle of least privilege to ensure that only the minimum required access is granted. To learn more about each permission scope, refer to the [AWS S3 Permissions documentation](https://docs.aws.amazon.com/AmazonS3/latest/userguide/using-with-s3-policy-actions.html).
3228

29+
## Compute account
30+
31+
You can connect an AWS compute account to your CASB integration to perform [Data Loss Prevention](/cloudflare-one/policies/data-loss-prevention/) scans within your S3 bucket and avoid data egress. CASB will scan any objects that exist in the bucket at the time of configuration.
32+
33+
### Add a compute account
34+
35+
To connect a compute account to your AWS integration:
36+
37+
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **CASB** > **Integrations**.
38+
2. Find and select your AWS integration.
39+
3. Select **Open connection instructions**.
40+
4. Follow the instructions provided to connect a new compute account.
41+
5. Select **Refresh**.
42+
43+
You can only connect one computer account to an integration. To remove a compute account, select **Manage compute accounts**.
44+
45+
### Configure compute account scanning
46+
47+
Once your AWS compute account has successfully connected to your CASB integration, you can configure where and how to scan for sensitive data:
48+
49+
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **CASB** > **Integrations**.
50+
2. Find and select your AWS integration.
51+
3. Select **Create new configuration**.
52+
4. In **Resources**, choose the buckets you want to scan. Select **Continue**.
53+
5. Choose the file types, sampling percentage, and [DLP profiles](/cloudflare-one/policies/data-loss-prevention/dlp-profiles/) to scan for.
54+
6. (Optional) Configure additional settings, such as the limit of API calls over time for CASB to adhere to.
55+
7. Select **Continue**.
56+
8. Review the details of the scan, then select **Start scan**.
57+
58+
CASB will take up to an hour to begin scanning. To view the scan results, go to **CASB** > **Content** > **Cloud**.
59+
60+
To manage your resources, go to **CASB** > **Integrations**, then find and select your AWS integration. From here, you can pause all or individual scans, add or remove resources, and change scan settings.
61+
62+
For more information, refer to [Content findings](/cloudflare-one/applications/casb/manage-findings/#content-findings).
63+
3364
## Security findings
3465

3566
<Render

0 commit comments

Comments
 (0)