Skip to content

Commit d2afc9d

Browse files
committed
Update CASB DLP
1 parent 7a628e5 commit d2afc9d

File tree

3 files changed

+22
-40
lines changed

3 files changed

+22
-40
lines changed

src/content/docs/cloudflare-one/applications/scan-apps/casb-dlp.mdx

Lines changed: 17 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -3,21 +3,15 @@ pcx_content_type: concept
33
title: Scan for sensitive data
44
sidebar:
55
order: 3
6-
76
---
87

9-
import { Render } from "~/components"
8+
import { Render } from "~/components";
109

1110
:::note
12-
13-
14-
Requires Cloudflare CASB and Cloudflare DLP.
15-
16-
11+
Requires Cloudflare SaaS & Cloud Security and Cloudflare DLP.
1712
:::
1813

19-
You can use [Cloudflare Data Loss Prevention (DLP)](/cloudflare-one/policies/data-loss-prevention/) to discover if files stored in your SaaS application contain sensitive data.
20-
To perform DLP scans in a SaaS app, first configure a DLP profile with the data patterns you want to detect, then enable those profiles in a CASB integration.
14+
You can use [Cloudflare Data Loss Prevention (DLP)](/cloudflare-one/policies/data-loss-prevention/) to discover if files stored in your SaaS or cloud application contain sensitive data. To perform DLP scans in an application, first configure a DLP profile with the data patterns you want to detect, then enable those profiles in a SaaS & Cloud Security integration.
2115

2216
## Supported integrations
2317

@@ -31,47 +25,47 @@ You may either use DLP profiles predefined by Cloudflare, or create your own cus
3125

3226
<Render file="data-loss-prevention/predefined-profile" />
3327

34-
Your DLP profile is now ready to use with CASB.
28+
Your DLP profile is now ready to use with SaaS & Cloud Security.
3529

3630
### Build a custom profile
3731

3832
<Render file="data-loss-prevention/custom-profile" />
3933

40-
Your DLP profile is now ready to use with CASB.
34+
Your DLP profile is now ready to use with SaaS & Cloud Security.
4135

4236
For more information, refer to [Configure a DLP profile](/cloudflare-one/policies/data-loss-prevention/dlp-profiles/).
4337

44-
## Enable DLP scans in CASB
38+
## Enable DLP scans in SaaS & Cloud Security
4539

4640
### Add a new integration
4741

48-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **CASB** > **Integrations**.
42+
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **SaaS & Cloud Security** > **Integrations**.
4943
2. Select **Add integration** and choose a [supported integration](#supported-integrations).
5044
3. During the setup process, you will be prompted to select DLP profiles for the integration.
5145
4. Select **Save integration**.
5246

53-
CASB will scan every publicly accessible file in the integration for text that matches the DLP profile. The initial scan may take up to a few hours to complete.
47+
SaaS & Cloud Security will scan every publicly accessible file in the integration for text that matches the DLP profile. The initial scan may take up to a few hours to complete.
5448

5549
### Modify an existing integration
5650

57-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **CASB** > **Integrations**.
51+
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **SaaS & Cloud Security** > **Integrations**.
5852
2. Choose a [supported integration](#supported-integrations) and select **Configure**.
5953
3. Under **DLP profiles**, select the profiles that you want the integration to scan for.
6054
4. Select **Save integration**.
6155

62-
If you enable a DLP profile from the **Manage integrations** page, CASB will only scan publicly accessible files that have had a modification event since enabling the DLP profile. Modification events include changes to the following attributes:
56+
If you enable a DLP profile from the **Manage integrations** page, SaaS & Cloud Security will only scan publicly accessible files that have had a modification event since enabling the DLP profile. Modification events include changes to the following attributes:
6357

64-
* Contents of the file
65-
* Name of the file
66-
* Visibility of the file (only if changed to publicly accessible)
67-
* Owner of the file
68-
* Location of the file (for example, moved to a different folder)
58+
- Contents of the file
59+
- Name of the file
60+
- Visibility of the file (only if changed to publicly accessible)
61+
- Owner of the file
62+
- Location of the file (for example, moved to a different folder)
6963

7064
In order to scan historical data, you must enable the DLP profile during the [integration setup flow](#add-a-new-integration).
7165

7266
## Limitations
7367

7468
DLP will only scan:
7569

76-
* [Text-based files](/cloudflare-one/policies/data-loss-prevention/#supported-file-types) such as documents, spreadsheets, and PDFs. Images are not supported.
77-
* Files 100 MB.
70+
- [Text-based files](/cloudflare-one/policies/data-loss-prevention/#supported-file-types) such as documents, spreadsheets, and PDFs. Images are not supported.
71+
- Files less than or equal to 100 MB in size.
Lines changed: 4 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -1,35 +1,25 @@
11
---
22
{}
3-
43
---
54

6-
import { Details } from "~/components"
5+
import { Details } from "~/components";
76

87
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **DLP** > **DLP Profiles**.
9-
108
2. Select **Create profile**.
11-
129
3. Enter a name and optional description for the profile.
13-
1410
4. Add custom or existing detection entries.
1511

16-
1712
<Details header="Add a custom entry">
1813

1914
1. Select **Add custom entry** and give it a name.
20-
2115
2. In **Value**, enter a regular expression (or regex) that defines the text pattern you want to detect. For example, `test\d\d` will detect the word `test` followed by two digits.
22-
23-
* Regular expressions are written in Rust. We recommend validating your regex with [Rustexp](https://rustexp.lpil.uk/).
24-
* DLP detects UTF-8 characters, which can be up to 4 bytes each. Custom text pattern detections are limited to 1024 bytes in length.
25-
* DLP does not support regular expressions with `+` or `*` operators because they are prone to exceeding the length limit. For example, the regex pattern `a+` can detect an infinite number of `a` characters. We recommend using `a{min,max}` instead, such as `a{1,1024}`.
26-
16+
- Regular expressions are written in Rust. We recommend validating your regex with [Rustexp](https://rustexp.lpil.uk/).
17+
- DLP detects UTF-8 characters, which can be up to 4 bytes each. Custom text pattern detections are limited to 1024 bytes in length.
18+
- DLP does not support regular expressions with `+` or `*` operators because they are prone to exceeding the length limit. For example, the regex pattern `a+` can detect an infinite number of `a` characters. We recommend using `a{min,max}` instead, such as `a{1,1024}`.
2719
3. To save the detection entry, select **Done**.
2820

29-
3021
</Details>
3122

32-
3323
<Details header="Add existing entries">
3424

3525
Existing entries include [predefined detection entries](/cloudflare-one/policies/data-loss-prevention/dlp-profiles/predefined-profiles/) and [DLP datasets](/cloudflare-one/policies/data-loss-prevention/datasets/).
@@ -38,9 +28,7 @@ import { Details } from "~/components"
3828
2. Choose which entries you want to add, then select **Confirm**.
3929
3. To save the detection entry, select **Done**.
4030

41-
4231
</Details>
4332

4433
5. (Optional) Configure [**Advanced settings**](/cloudflare-one/policies/data-loss-prevention/dlp-profiles/advanced-settings/) for the profile.
45-
4634
6. Select **Save profile**.

src/content/partials/cloudflare-one/data-loss-prevention/predefined-profile.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,5 +4,5 @@
44

55
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **DLP** > **DLP Profiles**.
66
2. Choose a [predefined profile](/cloudflare-one/policies/data-loss-prevention/dlp-profiles/predefined-profiles/) and select **Configure**.
7-
3. Enable one or more **Detection entries** according to your preferences. The DLP Profile matches using the OR logical operator if multiple entries are enabled, your data needs to match only one of the entries.
7+
3. Enable one or more **Detection entries** according to your preferences. The DLP Profile matches using the OR logical operator -- if multiple entries are enabled, your data needs to match only one of the entries.
88
4. Select **Save profile**.

0 commit comments

Comments
 (0)