You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/applications/scan-apps/casb-dlp.mdx
+17-23Lines changed: 17 additions & 23 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,21 +3,15 @@ pcx_content_type: concept
3
3
title: Scan for sensitive data
4
4
sidebar:
5
5
order: 3
6
-
7
6
---
8
7
9
-
import { Render } from"~/components"
8
+
import { Render } from"~/components";
10
9
11
10
:::note
12
-
13
-
14
-
Requires Cloudflare CASB and Cloudflare DLP.
15
-
16
-
11
+
Requires Cloudflare SaaS & Cloud Security and Cloudflare DLP.
17
12
:::
18
13
19
-
You can use [Cloudflare Data Loss Prevention (DLP)](/cloudflare-one/policies/data-loss-prevention/) to discover if files stored in your SaaS application contain sensitive data.
20
-
To perform DLP scans in a SaaS app, first configure a DLP profile with the data patterns you want to detect, then enable those profiles in a CASB integration.
14
+
You can use [Cloudflare Data Loss Prevention (DLP)](/cloudflare-one/policies/data-loss-prevention/) to discover if files stored in your SaaS or cloud application contain sensitive data. To perform DLP scans in an application, first configure a DLP profile with the data patterns you want to detect, then enable those profiles in a SaaS & Cloud Security integration.
21
15
22
16
## Supported integrations
23
17
@@ -31,47 +25,47 @@ You may either use DLP profiles predefined by Cloudflare, or create your own cus
Your DLP profile is now ready to use with SaaS & Cloud Security.
41
35
42
36
For more information, refer to [Configure a DLP profile](/cloudflare-one/policies/data-loss-prevention/dlp-profiles/).
43
37
44
-
## Enable DLP scans in CASB
38
+
## Enable DLP scans in SaaS & Cloud Security
45
39
46
40
### Add a new integration
47
41
48
-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **CASB** > **Integrations**.
42
+
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **SaaS & Cloud Security** > **Integrations**.
49
43
2. Select **Add integration** and choose a [supported integration](#supported-integrations).
50
44
3. During the setup process, you will be prompted to select DLP profiles for the integration.
51
45
4. Select **Save integration**.
52
46
53
-
CASB will scan every publicly accessible file in the integration for text that matches the DLP profile. The initial scan may take up to a few hours to complete.
47
+
SaaS & Cloud Security will scan every publicly accessible file in the integration for text that matches the DLP profile. The initial scan may take up to a few hours to complete.
54
48
55
49
### Modify an existing integration
56
50
57
-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **CASB** > **Integrations**.
51
+
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **SaaS & Cloud Security** > **Integrations**.
58
52
2. Choose a [supported integration](#supported-integrations) and select **Configure**.
59
53
3. Under **DLP profiles**, select the profiles that you want the integration to scan for.
60
54
4. Select **Save integration**.
61
55
62
-
If you enable a DLP profile from the **Manage integrations** page, CASB will only scan publicly accessible files that have had a modification event since enabling the DLP profile. Modification events include changes to the following attributes:
56
+
If you enable a DLP profile from the **Manage integrations** page, SaaS & Cloud Security will only scan publicly accessible files that have had a modification event since enabling the DLP profile. Modification events include changes to the following attributes:
63
57
64
-
* Contents of the file
65
-
* Name of the file
66
-
* Visibility of the file (only if changed to publicly accessible)
67
-
* Owner of the file
68
-
* Location of the file (for example, moved to a different folder)
58
+
- Contents of the file
59
+
- Name of the file
60
+
- Visibility of the file (only if changed to publicly accessible)
61
+
- Owner of the file
62
+
- Location of the file (for example, moved to a different folder)
69
63
70
64
In order to scan historical data, you must enable the DLP profile during the [integration setup flow](#add-a-new-integration).
71
65
72
66
## Limitations
73
67
74
68
DLP will only scan:
75
69
76
-
*[Text-based files](/cloudflare-one/policies/data-loss-prevention/#supported-file-types) such as documents, spreadsheets, and PDFs. Images are not supported.
77
-
* Files ≤ 100 MB.
70
+
-[Text-based files](/cloudflare-one/policies/data-loss-prevention/#supported-file-types) such as documents, spreadsheets, and PDFs. Images are not supported.
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **DLP** > **DLP Profiles**.
9
-
10
8
2. Select **Create profile**.
11
-
12
9
3. Enter a name and optional description for the profile.
13
-
14
10
4. Add custom or existing detection entries.
15
11
16
-
17
12
<Detailsheader="Add a custom entry">
18
13
19
14
1. Select **Add custom entry** and give it a name.
20
-
21
15
2. In **Value**, enter a regular expression (or regex) that defines the text pattern you want to detect. For example, `test\d\d` will detect the word `test` followed by two digits.
22
-
23
-
* Regular expressions are written in Rust. We recommend validating your regex with [Rustexp](https://rustexp.lpil.uk/).
24
-
* DLP detects UTF-8 characters, which can be up to 4 bytes each. Custom text pattern detections are limited to 1024 bytes in length.
25
-
* DLP does not support regular expressions with `+` or `*` operators because they are prone to exceeding the length limit. For example, the regex pattern `a+` can detect an infinite number of `a` characters. We recommend using `a{min,max}` instead, such as `a{1,1024}`.
26
-
16
+
- Regular expressions are written in Rust. We recommend validating your regex with [Rustexp](https://rustexp.lpil.uk/).
17
+
- DLP detects UTF-8 characters, which can be up to 4 bytes each. Custom text pattern detections are limited to 1024 bytes in length.
18
+
- DLP does not support regular expressions with `+` or `*` operators because they are prone to exceeding the length limit. For example, the regex pattern `a+` can detect an infinite number of `a` characters. We recommend using `a{min,max}` instead, such as `a{1,1024}`.
27
19
3. To save the detection entry, select **Done**.
28
20
29
-
30
21
</Details>
31
22
32
-
33
23
<Detailsheader="Add existing entries">
34
24
35
25
Existing entries include [predefined detection entries](/cloudflare-one/policies/data-loss-prevention/dlp-profiles/predefined-profiles/) and [DLP datasets](/cloudflare-one/policies/data-loss-prevention/datasets/).
@@ -38,9 +28,7 @@ import { Details } from "~/components"
38
28
2. Choose which entries you want to add, then select **Confirm**.
39
29
3. To save the detection entry, select **Done**.
40
30
41
-
42
31
</Details>
43
32
44
33
5. (Optional) Configure [**Advanced settings**](/cloudflare-one/policies/data-loss-prevention/dlp-profiles/advanced-settings/) for the profile.
Copy file name to clipboardExpand all lines: src/content/partials/cloudflare-one/data-loss-prevention/predefined-profile.mdx
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,5 +4,5 @@
4
4
5
5
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **DLP** > **DLP Profiles**.
6
6
2. Choose a [predefined profile](/cloudflare-one/policies/data-loss-prevention/dlp-profiles/predefined-profiles/) and select **Configure**.
7
-
3. Enable one or more **Detection entries** according to your preferences. The DLP Profile matches using the OR logical operator — if multiple entries are enabled, your data needs to match only one of the entries.
7
+
3. Enable one or more **Detection entries** according to your preferences. The DLP Profile matches using the OR logical operator -- if multiple entries are enabled, your data needs to match only one of the entries.
0 commit comments