Skip to content

Commit 916ad42

Browse files
committed
Update definitions
1 parent e98a791 commit 916ad42

File tree

1 file changed

+23
-12
lines changed

1 file changed

+23
-12
lines changed

src/content/docs/cloudflare-one/policies/gateway/http-policies/granular-controls.mdx

Lines changed: 23 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -37,27 +37,38 @@ To create a Gateway HTTP policy with Application Granular Controls:
3737

3838
For more information, refer to [HTTP policies](/cloudflare-one/policies/gateway/http-policies/).
3939

40-
## Application Controls vs Operations
40+
## Control definitions
4141

42-
Application Granular Controls can be defined at two levels of granularity:
42+
Gateway defines Application Granular Controls at different levels of granularity, including Application Controls and Operations.
4343

44-
- **Application Controls** are pre-defined controls which represent user intent for example Upload or Download. They are defined by Cloudflare and consist of a set of operations (see below) that have been deemed to be related to that intent. Using application controls within a policy is a quick way of enforcing common controls. For the mapping of operations to application controls, see [Application Controls](/cloudflare-one/policies/gateway/application-app-types/#application-controls).
45-
- **Operations**: These are the individual API-level actions that an app uses. Defining controls at operation level allows for more fine-grained policies to support advanced use cases for example _block only certain types of downloads_, or to define controls where there is not an existing application control that covers the required intent for example _block comments_. However, because each SaaS application uses a unique set of operations each of which has its own scope, nuances and behaviors, the use of operation level controls often requires analysis to determine applicability for the desired use case. Operation-level controls can also be used in cases where variations to the Cloudflare-defined application controls are needed for example to include or exclude certain operations.
44+
### Application Controls
4645

47-
**Operation Groups** are groupings of operations that are defined by the application vendor. Typically these are based on a categorization of the application's capabilities \- different functional areas of the application for example _signature requests_ \- or the entities that the application defines for example _files_ or _folders_. These definitions vary by application. In the Gateway policy builder, operations are shown grouped into these operation groups to facilitate correlating the operations with available vendor API documentation.
46+
Application Controls are pre-defined controls which represent user intent, such as uploads or downloads. Cloudflare defines and organizes sets of operations deemed related to specific intents with an application. Application Controls represent the most commonly used controls.
4847

49-
The **Contains Payload** column in [Application Controls](/cloudflare-one/policies/gateway/application-app-types/#application-controls) indicates whether a given operation is likely to contain content that is suitable for DLP scanning. This includes operations that contain the content of uploaded or downloaded files, or AI prompts. When a user performs a file upload for example, a sequence of API operations may result, for example setting up the file metadata, uploading the file content, and then finalizing the upload. From a DLP perspective, it can be advantageous to specifically target the operation that contains the file content; the _contains payload_ column identifies which operation that is.
48+
### Operations
5049

51-
## Application APIs
50+
Operations are the individual API-level actions that an application uses. Defining controls at operation level allows for more fine-grained policies to support use cases such as blocking only certain types of downloads. You can also define controls where there is not an existing application control that covers the required intent, such as blocking comments. However, because each SaaS application uses a unique set of operations with its own scope and behaviors, the use of operation level controls often requires analysis for each desired use case. You can also use operation-level controls in cases where you need variations to the Cloudflare-defined application controls, such as including or excluding certain operations.
51+
52+
Cloudflare provides Operations based on the [available APIs for an application](#application-apis).
53+
54+
#### Operation Groups
55+
56+
Operation Groups are groupings of operations defined by the application vendor. Operation Groups are typically based on a categorization of the different functional areas of the application, such as signature requests, or the entities that the application defines, such as files or folders. These definitions vary by application. Gateway groups operations into these operation groups to match the operations with the corresponding vendor API documentation.
5257

53-
SaaS applications typically provide multiple APIs to interact with. For each application, we may support the following API types:
58+
### DLP payloads
59+
60+
Application Granular Controls can apply [Data Loss Prevention (DLP)](/cloudflare-one/policies/data-loss-prevention/) for operations that contain scannable content. This includes operations that contain the content of uploaded or downloaded files or AI prompts. For example, when a user performs a file upload, a sequence of API operations may result, such as setting up the file metadata, uploading the file content, and finalizing the upload. When applying DLP to your Zero Trust traffic, it can be helpful to specifically target an operation that contains file content.
61+
62+
For more information on which operations support DLP payload scanning, refer to the **Contains payload** column in [Compatible applications](#compatible-applications).
63+
64+
## Application APIs
5465

55-
- **Web Application API:** these APIs are consumed by the web application that users interact with through their browser.
56-
- **Platform API**: these APIs are exposed to users to allow for programmatic interaction with the SaaS application. These are typically used by automations, scripts, or even other applications.
66+
SaaS applications typically provide multiple APIs to interact with. For each application, Application Granular Controls may support the following API types:
5767

58-
When building your HTTP rules using Operations, if both API types are available, you should select Operations that align to the API being used, or include both for greater coverage.
68+
- Web Application API: These APIs are consumed by the web application that users interact with through their browser.
69+
- Platform API: These APIs are exposed to users to allow for programmatic interaction with the SaaS application. These are typically used by automations, scripts, or other applications.
5970

60-
Application controls include Operations for both API types.
71+
[Application Controls](#application-controls) use both API types. If both API types are available when creating HTTP policies using [Operations](#operations), you should select the Operations that align to the API being used, or include both for greater coverage.
6172

6273
## Compatible applications
6374

0 commit comments

Comments
 (0)