Skip to content

Commit ec6a326

Browse files
securitypedanthyperlint-ai[bot]maxvp
authored
New reference architecture diagram: Zero Trust and Virtual Desktop Infrastructure (#18817)
* New reference architecture diagram * Update src/content/docs/reference-architecture/diagrams/sase/zero-trust-and-virtual-desktop-infrastructure.mdx Co-authored-by: hyperlint-ai[bot] <154288675+hyperlint-ai[bot]@users.noreply.github.com> * Apply suggestions from code review Co-authored-by: Max Phillips <[email protected]> --------- Co-authored-by: hyperlint-ai[bot] <154288675+hyperlint-ai[bot]@users.noreply.github.com> Co-authored-by: Max Phillips <[email protected]>
1 parent 30eb97f commit ec6a326

File tree

6 files changed

+1159
-2
lines changed

6 files changed

+1159
-2
lines changed

src/assets/images/reference-architecture/zero-trust-and-virtual-desktop-infrastructure/figure1.svg

Lines changed: 114 additions & 0 deletions
Loading

src/assets/images/reference-architecture/zero-trust-and-virtual-desktop-infrastructure/figure2.svg

Lines changed: 567 additions & 0 deletions
Loading

src/assets/images/reference-architecture/zero-trust-and-virtual-desktop-infrastructure/figure3.svg

Lines changed: 180 additions & 0 deletions
Loading

src/assets/images/reference-architecture/zero-trust-and-virtual-desktop-infrastructure/figure4.svg

Lines changed: 198 additions & 0 deletions
Loading

src/content/docs/reference-architecture/diagrams/sase/gateway-dns-for-isp.mdx

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: DNS filtering solution for Internet service providers
33
pcx_content_type: reference-architecture-diagram
44
products:
5-
- Cloudflare Gateway
5+
- Gateway
66
sidebar:
77
order: 1
88
label: DNS filtering solution for Internet service providers
@@ -54,7 +54,8 @@ In cases of a miscategorization of domains, raise a [categorization change reque
5454
Service providers can enhance their offerings by using Cloudflare Gateway DNS policies to deliver additional value-added services alongside the base DNS security service. By using the same solution, service providers can develop customized content category filtering services. These services can be easily constructed using Cloudflare's built-in [content categories](/cloudflare-one/policies/gateway/domain-categories/#content-categories) and [application types](/cloudflare-one/policies/gateway/application-app-types/), as well as the service provider's own custom allow and block lists.
5555

5656
Some potential applications include:
57-
- **Parental Control Services**: This service can block categories such as adult themes, child abuse, violence, and questionable content to ensure a safer online environment for children.
57+
58+
- **Parental Control Services**: This service can block categories such as adult themes, child abuse, violence, and questionable content to ensure a safer online environment for children.
5859
- **Educational Services**: Designed for schools and educational organizations, this service can extend beyond parental controls by blocking additional categories like CIPA, gambling, and entertainment, thereby promoting a focused learning atmosphere.
5960
- **Enterprise Services**: This offering allows businesses to easily restrict access to non-work-related domains, including categories such as entertainment, social networking, gambling, shopping & auctions, society & lifestyle, and sports.
6061

Lines changed: 97 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,97 @@
1+
---
2+
title: Zero Trust and Virtual Desktop Infrastructure
3+
pcx_content_type: reference-architecture-diagram
4+
products:
5+
- Gateway
6+
- Access
7+
sidebar:
8+
order: 1
9+
label: Zero Trust and Virtual Desktop Infrastructure
10+
updated: 2024-12-17
11+
---
12+
13+
## Introduction
14+
15+
Virtual Desktop Infrastructure (VDI) is old, costly, and clunky for a number of reasons including poor user experience, high upfront investments, ongoing operational costs, and many others of which you can read about in detail [here](https://blog.cloudflare.com/decommissioning-virtual-desktop/). We recognize and empathize with the challenges many organizations face that result in continued reliance on this approach. This reference architecture describes how Cloudflare's Zero Trust solution can help organizations secure their virtual desktop infrastructure (VDI) and in most cases offload it entirely. Many organizations use expensive and poor performing VDI only to provide a secure web browser to their remote users. In these cases, Cloudflare can help offload the use of VDI entirely for web-based applications or SaaS apps.
16+
17+
In other cases, a full virtualized desktop may be necessary for legacy apps, yet organizations still need help securing remote access to their VDI or securing the virtualized desktops themselves once users are interacting with them. This document provides a reference and guidance for using Cloudflare's Zero Trust services and is split into two main sections.
18+
19+
- Replacing your VDI for secure remote access to web-based applications. Accessing a full blown desktop environment to just use a web browser isn't the best experience for users. Cloudflare offers a vast improvement over remote access to web applications and can do so with greater security.
20+
- Securing your VDI desktops...
21+
- From unauthorized access.
22+
- From risky public Internet destinations.
23+
24+
### Who is this document for and what will you learn?
25+
26+
This reference architecture is designed for IT or security professionals who are looking at using Cloudflare to replace or secure their Virtual Desktop Infrastructure. To build a stronger baseline understanding of Cloudflare, we recommend the following resources:
27+
28+
- [Decommissioning your VDI Blog Post](https://blog.cloudflare.com/decommissioning-virtual-desktop/)
29+
- [Leveraging Cloudflare's Secure Web Gateway with PAC files for VDI](/learning-paths/secure-internet-traffic/configure-device-agent/pac-files/#use-cases)
30+
31+
## Replacing Your VDI
32+
33+
In today's IT landscape, most applications and services that companies rely on are accessible through a web browser and often delivered by a SaaS provider. In these cases VDI is overkill and an incredibly expensive and burdensome way to provide a secure browser to a remote user. Instead, many organizations are turning to alternatives such as a [Remote Browser Isolation](https://www.cloudflare.com/zero-trust/products/browser-isolation/) (RBI) service. These services lower costs and overhead, provide a better user experience and most importantly offer robust security and logging features.
34+
35+
![Figure 1: Remote browser isolation can provide a secure, controlled browser environment for accessing sensitive company applications.](~/assets/images/reference-architecture/zero-trust-and-virtual-desktop-infrastructure/figure1.svg "Figure 1: Remote browser isolation can provide a secure, controlled browser environment for accessing sensitive company applications.")
36+
37+
The diagram above shows the general flow of how user traffic goes from their local browser to Cloudflare's remote browser and then to applications hosted on their infrastructure over a secure tunnel. Figure 2 below shows how users can access applications using remote browser isolation either directly in a browser or, if you require greater privacy and security for the traffic, using our device agent to create a tunnel from the device to Cloudflare. Both methods provide secure access to internal and external resources.
38+
39+
![Figure 2: Two different traffic flow options: clientless RBI & RBI using the device agent.](~/assets/images/reference-architecture/zero-trust-and-virtual-desktop-infrastructure/figure2.svg "Figure 2: Two different traffic flow options: clientless RBI & RBI using the device agent.")
40+
41+
**Option 1: Clientless RBI**
42+
43+
- Device agent not required
44+
- RBI URL can be protected by an [Access policy](/cloudflare-one/policies/access/) with authentication
45+
- A simpler way to begin rolling out Cloudflare Zero trust while transitioning away from VDI
46+
- A great option for third party contractor access who cannot install software on their device
47+
48+
**Option 2: RBI via the device agent**
49+
50+
- Provides full security capabilities including device posture checks, split tunneling and the ability to use the Secure Web Gateway service to filter Internet-bound traffic.
51+
- More robust end state to transition to once workflows and confidence is built with users and internal teams
52+
- Gather end user metrics around user experience, reliability and performance
53+
54+
## Securing Your VDI
55+
56+
### Securing access to your VDI using Zero Trust policies
57+
58+
When replacing your VDI is not an option and a fully virtualized desktop is required for legacy applications, Cloudflare's [SASE platform](https://www.cloudflare.com/zero-trust/) can still help secure these environments by authorizing the access to them using identity based Zero Trust policies, as well as securing the Internet bound traffic from the devices themselves.
59+
60+
![Figure 3: Using Cloudflare Access ZTNA to secure VDI.](~/assets/images/reference-architecture/zero-trust-and-virtual-desktop-infrastructure/figure3.svg "Figure 3: Figure 3: Using Cloudflare Access ZTNA to secure VDI.")
61+
62+
The diagram above displays a general Zero Trust deployment using best practices for authenticating your remote users to the VDI infrastructure
63+
64+
1. The user device sends traffic to Cloudflare's network over a secure tunnel using the device agent.
65+
2. Traffic destined to the VDI resources reaches ZTNA policies where it is evaluated for any combination of conditional access criteria, including device posture, identity and traffic context or type.
66+
3. Traffic that passes the ZTNA policies is allowed to reach the VDI resources where the user can interact with the VDI normally.
67+
68+
This model could also benefit from the below options demonstrating how to filter traffic sourced from the VDI hosts as well (refer to below).
69+
70+
### Securing traffic from your VDI using secure web gateway policies
71+
72+
Cloudflare's SASE platform is capable of much more than replacing VPNs and bolstering policies towards internal services. It is just as important to protect users from accessing high risk sites on the Internet. Policies in Cloudflare's Secure Web Gateway can be tuned to filter DNS requests or become a sophisticated full forward proxy, inspecting both network and HTTP traffic as it heads towards the open Internet.
73+
74+
![Figure 4: Using Cloudflare's Secure Web Gateway to filter and protect traffic coming from VDI.](~/assets/images/reference-architecture/zero-trust-and-virtual-desktop-infrastructure/figure4.svg "Figure 4: Using Cloudflare's Secure Web Gateway to filter and protect traffic coming from VDI.")
75+
76+
1. **DNS configurations** (Resolver IPs, DoH, DoT) or **PAC files** for **Non-persistent virtual desktop infrastructure (VDI) environments** can be configured within the infrastructure or directly on the VDI hosts
77+
78+
a. DNS configurations allow for DNS policies to be enforced while PAC files allow for all gateway policy types (DNS, Network and HTTP).
79+
80+
2. Traffic is sent from the VDI to the secure web gateway where it is filtered by DNS, network or HTTP policies.
81+
3. Traffic is sent to the Internet if it is allowed past Gateway policies
82+
83+
## Summary
84+
85+
As shown, we have seen several ways to incorporate Cloudflare's Zero Trust services with your existing VDI, either by replacing it completely in favor of Remote Browser Isolation technology or further securing it with our [Access](/cloudflare-one/policies/access/) or [Gateway](/cloudflare-one/policies/gateway/) services.
86+
87+
For more thorough background, explanation and action steps to a smooth migration be sure to read the following resources:
88+
89+
- [Decommissioning your VDI Blog Post](https://blog.cloudflare.com/decommissioning-virtual-desktop/)
90+
- [Leveraging Cloudflare's Secure Web Gateway with PAC files for VDI](/learning-paths/secure-internet-traffic/configure-device-agent/pac-files/#use-cases)
91+
- [Connect to private network services with Browser Isolation](https://blog.cloudflare.com/browser-isolation-private-network/)
92+
- [Clientless Web Isolation](/cloudflare-one/policies/browser-isolation/setup/clientless-browser-isolation)
93+
- [Determine When to use PAC Files](/learning-paths/secure-internet-traffic/configure-device-agent/pac-files/#use-cases)
94+
- [Agentless DNS Configurations](/cloudflare-one/connections/connect-devices/agentless/dns/)
95+
- [PAC Files for Agentless HTTP Filtering](/cloudflare-one/connections/connect-devices/agentless/pac-files/)
96+
97+
As always, if you have any questions on these services, be sure to reach out to your Cloudflare team or contact us to [talk to an expert](https://www.cloudflare.com/products/zero-trust/plans/enterprise/).

0 commit comments

Comments
 (0)