Skip to content

Commit c2ef9da

Browse files
authored
[Gateway] Global indicator feeds (#16514)
1 parent 21ed24b commit c2ef9da

File tree

8 files changed

+83
-77
lines changed

8 files changed

+83
-77
lines changed

public/_redirects

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -913,6 +913,10 @@
913913
/rules/url-forwarding/single-redirects/examples/ /rules/url-forwarding/examples/ 301
914914
/rules/url-forwarding/dynamic-redirects/parameters/ /rules/url-forwarding/single-redirects/settings/ 301
915915

916+
# security center
917+
/security-center/indicator-feeds/getting-started/ /security-center/indicator-feeds/ 301
918+
/security-center/indicator-feeds/get-started/ /security-center/indicator-feeds/ 301
919+
916920
# spectrum
917921
/spectrum/getting-started/ /spectrum/get-started/ 301
918922
/spectrum/getting-started/byoip/ /spectrum/about/byoip/ 301
-178 KB
Binary file not shown.

src/content/changelogs/gateway.yaml

Lines changed: 16 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -5,15 +5,19 @@ productLink: "/cloudflare-one/policies/gateway/"
55
productArea: Cloudflare One
66
productAreaLink: /cloudflare-one/changelog/
77
entries:
8-
- publish_date: '2024-07-14'
9-
title: Gateway DNS filter non-authenticated queries
10-
description: |-
11-
Gateway users can now select which endpoints to use for a given DNS location. Available endpoints include IPv4, IPv6, DNS over HTTPS (DoH), and DNS over TLS (DoT). Users can protect each configured endpoint by specifying allowed source networks. Additionally, for the DoH endpoint, users can filter traffic based on source networks and/or authenticate user identity tokens.
12-
- publish_date: '2024-06-25'
13-
title: Gateway DNS policy setting to ignore CNAME category matches
14-
description: |-
15-
Gateway now offers the ability to selectively ignore CNAME domain categories in DNS policies via the [**Ignore CNAME domain categories** setting](/cloudflare-one/policies/gateway/domain-categories/#ignore-cname-domain-categories) in the policy builder and the [`ignore_cname_category_matches` setting](/api/operations/zero-trust-gateway-rules-create-zero-trust-gateway-rule) in the API.
16-
- publish_date: '2024-04-05'
17-
title: Gateway file type control improvements
18-
description: |-
19-
Gateway now offers a more extensive, categorized [list of files](/cloudflare-one/policies/gateway/http-policies/#download-and-upload-file-types) to control uploads and downloads.
8+
- publish_date: "2024-07-30"
9+
title: UK NCSC indicator feed publicly available in Gateway
10+
description: |-
11+
Gateway users on any plan can now use the [PDNS threat intelligence feed](/security-center/indicator-feeds/#publicly-available-feeds) provided by the UK National Cyber Security Centre (NCSC) in DNS policies.
12+
- publish_date: "2024-07-14"
13+
title: Gateway DNS filter non-authenticated queries
14+
description: |-
15+
Gateway users can now select which endpoints to use for a given DNS location. Available endpoints include IPv4, IPv6, DNS over HTTPS (DoH), and DNS over TLS (DoT). Users can protect each configured endpoint by specifying allowed source networks. Additionally, for the DoH endpoint, users can filter traffic based on source networks and/or authenticate user identity tokens.
16+
- publish_date: "2024-06-25"
17+
title: Gateway DNS policy setting to ignore CNAME category matches
18+
description: |-
19+
Gateway now offers the ability to selectively ignore CNAME domain categories in DNS policies via the [**Ignore CNAME domain categories** setting](/cloudflare-one/policies/gateway/domain-categories/#ignore-cname-domain-categories) in the policy builder and the [`ignore_cname_category_matches` setting](/api/operations/zero-trust-gateway-rules-create-zero-trust-gateway-rule) in the API.
20+
- publish_date: "2024-04-05"
21+
title: Gateway file type control improvements
22+
description: |-
23+
Gateway now offers a more extensive, categorized [list of files](/cloudflare-one/policies/gateway/http-policies/#download-and-upload-file-types) to control uploads and downloads.
Lines changed: 55 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,55 @@
1+
---
2+
pcx_content_type: concept
3+
title: Custom Indicator Feeds
4+
sidebar:
5+
order: 8
6+
---
7+
8+
import { Render } from "~/components";
9+
10+
Cloudflare's threat intelligence team crowdsources attack trends and protects users automatically, such as from zero-day vulnerabilities like the [HTTP/2 Rapid Reset attack](https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/). However, in some cases, Cloudflare will partner with external entities that have their own feeds which can be shared with eligible Cloudflare users.
11+
12+
With Custom Indicator Feeds, Cloudflare provides a threat intelligence feed based on data received from various Cyber Defense Collaboration groups. The security filtering capabilities are available to eligible public and private sector organizations.
13+
14+
## Publicly available feeds
15+
16+
Cloudflare provides some feeds to Gateway users without the need to establish a provider relationship.
17+
18+
| Name | Description | Availability |
19+
| ----------------------------------------------------------------------------------------------------------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ----------------------------------------- |
20+
| [Treasury Early Indicator Feed](https://www.cloudflare.com/press-releases/2024/us-department-of-treasury-pnnl-finserv-threat-intel-feed/) | Threat data for financial institutions provided by the US Department of Treasury and Pacific Northwest National Laboratory (PNNL). For more information, contact your account team. | Approved financial services organizations |
21+
| [UK NCSC Public Threat Indicators](https://www.ncsc.gov.uk/information/pdns) | Recursive DNS service supplied by the UK National Cyber Security Centre (NCSC) to block DNS-based malware. | All users |
22+
23+
## Get started
24+
25+
<Render file="indicator-feeds-overview" />
26+
27+
If your organization is interested in becoming a provider or a subscriber, contact your account team.
28+
29+
### Create a Custom Indicator Feed
30+
31+
Providers can create and manage a Custom Indicator Feed with the [Indicator API endpoints](/api/operations/custom-indicator-feeds-get-indicator-feeds):
32+
33+
1. Create a feed with the [Create new indicator feed endpoint](/api/operations/custom-indicator-feeds-create-indicator-feeds). Feeds are lists of indicators.
34+
2. Upload data to the feed with the [Update indicator feed data endpoint](/api/operations/custom-indicator-feeds-update-indicator-feed-data). Uploaded indicator data must be in a [`.stix2`](https://oasis-open.github.io/cti-documentation/stix/intro) formatted file.
35+
:::note
36+
Indicator feeds use a snapshot system. To update feeds with new data, providers must upload a file containing all previous and new indicators.
37+
:::
38+
3. Grant access to subscribers with the [Grant permission to indicator feed endpoint](/api/operations/custom-indicator-feeds-add-permission). Any administrator of the account that owns the feed must add subscribers' `account_tag`s to the feed's allowed subscribers list.
39+
40+
### Use a feed in Gateway
41+
42+
Once an account is granted access to a feed, it will be available to match traffic as a [selector in Gateway DNS policies](/cloudflare-one/policies/gateway/dns-policies/#indicator-feeds).
43+
44+
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Gateway** > **Firewall Policies**. Select **DNS**.
45+
2. To create a new DNS policy, select **Add a policy**.
46+
3. Name your policy.
47+
4. In **Traffic**, add a condition with the **Indicator Feeds** selector. If your account has been granted access to a Custom Indicator Feed, Gateway will list the feed in **Value**. For example, you can block sites that appear in a feed:
48+
49+
| Selector | Operator | Value | Action |
50+
| --------------- | -------- | ------------------- | ------ |
51+
| Indicator Feeds | in | _Threat Intel Feed_ | Block |
52+
53+
5. Select **Create policy**.
54+
55+
For more information on creating Gateway policies, refer to [DNS policies](/cloudflare-one/policies/gateway/dns-policies/).

src/content/docs/security-center/indicator-feeds/getting-started.mdx

Lines changed: 0 additions & 43 deletions
This file was deleted.

src/content/docs/security-center/indicator-feeds/index.mdx

Lines changed: 0 additions & 14 deletions
This file was deleted.
Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,13 @@
11
---
22
inputParameters: API_param
3-
43
---
54

6-
import { Markdown } from "~/components"
5+
import { Markdown } from "~/components";
6+
7+
Use this selector to match against custom indicator feeds.
78

8-
Use this selector to match against custom indicator feeds. To enable this selector, a designated third-party vendor must assign a custom indicator feed to your account.
9+
You can use a [publicly available indicator feed](/security-center/indicator-feeds/#publicly-available-feeds) or a custom indicator feed assigned to your account by a designated third-party vendor. For more information on indicator feeds, refer to [Custom Indicator Feeds](/security-center/indicator-feeds/).
910

10-
| UI name | API example | Evaluation phase |
11-
| --------------- | ------------------- | --------------------- |
11+
| UI name | API example | Evaluation phase |
12+
| --------------- | --------------------------------------- | --------------------- |
1213
| Indicator Feeds | <code>{props.one}.indicator_feed</code> | Before DNS resolution |

src/content/partials/security-center/indicator-feeds-overview.mdx

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,10 @@
11
---
22
{}
3-
43
---
54

6-
import { Markdown } from "~/components"
5+
import { Markdown } from "~/components";
76

8-
In the simplest terms, there are providers and subscribers of our threat intelligence data.
7+
Cloudflare threat intelligence data consists of a data exchange between providers and subscribers.
98

109
A provider is an organization that has a set of data that they are interested in sharing with other Cloudflare organizations. Any organization can be a provider. Examples of current providers are Government Cyber Defense groups.
1110

0 commit comments

Comments
 (0)