Skip to content

Commit ae64d80

Browse files
Minor change to ZTNA guide
1 parent 3b0f61a commit ae64d80

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

src/content/docs/reference-architecture/design-guides/designing-ztna-access-policies.mdx

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -31,13 +31,12 @@ By the end of this guide, you will be equipped to implement granular access poli
3131

3232
## Prerequisites
3333

34-
This section covers the essential architectural components and concepts to understand before you can design granular access policies.
34+
This section covers the essential architectural components and concepts to understand before you can design granular access policies.
3535

36-
:::note[Header]
36+
:::note[Note]
3737
We recommend reading the [SASE reference architecture](/reference-architecture/architectures/sase/) to get a deeper understanding of connecting applications, identity providers, and device posture providers.
3838
:::
3939

40-
4140
Cloudflare allows organizations to facilitate application access using our [connectivity cloud](https://www.cloudflare.com/connectivity-cloud/), which securely connects users, applications and data regardless of their location. Core to the platform is Cloudflare's [extensive global network](https://www.cloudflare.com/network/) which delivers low-latency connectivity for users worldwide. By running every service in every data center, Cloudflare applies networking, performance and security functions in a single pass, eliminating the need to route traffic through multiple, specialized security servers, and therefore reduces latency and avoids performance bottlenecks.
4241

4342
![Figure 1 shows the basic components involved in remote access with Cloudflare's ZTNA service.](~/assets/images/reference-architecture/designing-ztna-access-policies-for-cloudflare-access/figure1.svg "Figure 1 shows the basic components involved in remote access with Cloudflare's ZTNA service.")
@@ -300,7 +299,7 @@ Now we define the first policy in the application. First, select the Access Grou
300299
| **Additional settings** | |
301300
| Isolate Application | No |
302301

303-
This policy ensures that users can gain full access to your company wiki only if they have passed the following requirements:
302+
This policy ensures that users can gain full access to your company wiki only if they have passed the following requirements:
304303

305304
- They are full-time employees on devices with the latest operating system.
306305
- Users have authenticated using MFA.
@@ -436,7 +435,7 @@ Other posture elements here include:
436435

437436
- Requiring the latest OS.
438437
- The user's device is joined to a Microsoft Active Directory domain.
439-
- The user's device is explicitly a company-managed device (shown by referencing a list of managed device serial numbers).
438+
- The user's device is explicitly a company-managed device (shown by referencing a list of managed device serial numbers).
440439

441440
These combined posture checks ensure that only up-to-date, company-controlled devices within your managed environment can access the database, further reducing the attack surface and the risk of access from potentially compromised or uncontrolled endpoints.
442441

@@ -474,6 +473,7 @@ Inside the policy, we have made this application available to our new access gro
474473
[External evaluation](/cloudflare-one/policies/access/external-evaluation/) means we have an API endpoint containing some sort of [access logic](https://github.com/cloudflare/workers-access-external-auth-example) — in this case, time of day access. We are making an API call to this endpoint, and defining the key that Cloudflare is using to verify that the response came from the API. This is useful for several reasons:
475474

476475
External evaluation allows users to create bespoke security posture checks based on criteria that may not be covered by the default set of posture checks. For this example, we will be using a service built on [Cloudflare Workers](https://workers.cloudflare.com/).
476+
477477
- Restricting access to the terminal outside of business hours implements a form of time-based access control. This adds an extra layer of security by limiting the window of opportunity for potential attackers.
478478

479479
Now, you will learn how to secure RDP access as a private IP application:

0 commit comments

Comments
 (0)