Skip to content

Commit 66d842f

Browse files
committed
Remove FedRAMP TLS compliance
1 parent bd57720 commit 66d842f

File tree

1 file changed

+1
-31
lines changed

1 file changed

+1
-31
lines changed

src/content/docs/cloudflare-one/policies/gateway/http-policies/tls-decryption.mdx

Lines changed: 1 addition & 31 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ Cloudflare Gateway can perform [SSL/TLS decryption](https://www.cloudflare.com/l
1717

1818
When you turn on TLS decryption, Gateway will decrypt all traffic sent over HTTPS, apply your HTTP policies, and then re-encrypt the request with a [user-side certificate](/cloudflare-one/connections/connect-devices/user-side-certificates/).
1919

20-
Cloudflare prevents interference by decrypting, inspecting, and re-encrypting HTTPS requests in its data centers in memory only. Gateway only stores eligible cache content at rest. All cache disks are encrypted at rest. You can configure where TLS decryption takes place with [Regional Services](/data-localization/regional-services/) in the [Cloudflare Data Localization Suite (DLS)](/data-localization/).
20+
Cloudflare prevents traffic interference by decrypting, inspecting, and re-encrypting HTTPS requests in its data centers in memory only. Gateway only stores eligible cache content at rest. All cache disks are encrypted at rest. You can configure where TLS decryption takes place with [Regional Services](/data-localization/regional-services/) in the [Cloudflare Data Localization Suite (DLS)](/data-localization/).
2121

2222
Cloudflare supports connections from users to Gateway over TLS 1.1, 1.2, and 1.3.
2323

@@ -115,39 +115,9 @@ When FIPS compliance is enabled, Gateway will only choose [FIPS-compliant cipher
115115

116116
FIPS-compliant traffic defaults to [HTTP/3](/cloudflare-one/policies/gateway/http-policies/http3/). To enforce HTTP policies for UDP traffic, you must turn on the [Gateway proxy for UDP](/cloudflare-one/policies/gateway/http-policies/http3/#enable-http3-inspection).
117117

118-
### Cipher suites
119-
120-
<<<<<<< HEAD
121-
When you use the WARP client to on-ramp TLS traffic to Gateway, traffic will egress from a Cloudflare data center within Cloudflare's FedRAMP boundary. If a user's closest data center is non-FedRAMP compliant, their traffic will still egress from a FedRAMP compliant data center, maintaining FedRAMP compliance for the traffic.
122-
123-
```mermaid
124-
flowchart LR
125-
subgraph s1["Non-FedRAMP data center"]
126-
n2["WARP TLS encryption terminated"]
127-
end
128-
subgraph s2["FedRAMP data center"]
129-
n3["Gateway TLS encryption (FIPS) terminated"]
130-
end
131-
subgraph s3["Private internal network"]
132-
n5["FedRAMP-compliant cloudflared"]
133-
n6(["Private server"])
134-
end
135-
n1(["User near non-FedRAMP compliant data center"]) -- Gateway TLS connection wrapped with WARP TLS --> n2
136-
n2 --> n3
137-
n3 --> n4(["HTTPS server"]) & n5
138-
n5 --> n6
139-
140-
n5@{ shape: rect}
141-
```
142-
143-
To further control what data centers traffic egresses from, you can use [dedicated egress IPs](/cloudflare-one/policies/gateway/egress-policies/dedicated-egress-ips/).
144-
145118
## Cipher suites
146119

147120
<GlossaryDefinition term="cipher suite" prepend="A cipher suite is " />
148-
=======
149-
<GlossaryDefinition term="cipher suite" />
150-
>>>>>>> parent of 7b231e336a ([Gateway] TLS FedRAMP compliance (#20927))
151121

152122
The following table lists the default cipher suites Gateway uses for TLS decryption.
153123

0 commit comments

Comments
 (0)