You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This tutorial explains how to use [Cloudflare AI Gateway](/ai-gateway/) and Zero Trust to create a functional and secure AI agent wrapper. Cloudflare Zero Trust admins can protect access to the wrapper with [Cloudflare Access](/cloudflare-one/policies/access/). Additionally, you can enforce [Gateway](/cloudflare-one/policies/gateway/) controls on how your users interact with AI agents, including executing AI agents in an isolated browser with [Browser Isolation](/cloudflare-one/policies/browser-isolation/), enforcing [Data Loss Prevention](/cloudflare-one/policies/data-loss-prevention/) profiles to prevent sensitive data exfiltration, and scanning content to avoid answers from AI agents that violate internal corporate guidelines. Creating an AI agent wrapper is also an effective way to enforce tenant control if you have an enterprise plan of a specific AI provider, such as ChatGPT Enterprise.
11
11
@@ -422,49 +422,48 @@ This ensures that public AI agents are not accessible using a managed endpoint.
422
422
423
423
Alternatively, you can prevent users from using public AI agents by displaying a [custom block message](/cloudflare-one/policies/gateway/block-page/#customize-the-block-page), [redirect](/cloudflare-one/policies/gateway/block-page/#redirect-to-a-block-page), or a [user notification](/cloudflare-one/policies/gateway/http-policies/#warp-client-block-notifications) directing users to the AI agent wrapper.
424
424
425
-
If you use another gateway for web filtering, try to replicate a similar policy.
425
+
## 6. Enforce Data Loss Prevention and Clientless Browser Isolation
426
426
427
-
## Enforce DLP and agentless RBI
427
+
Now that you have full control over access to your AI agent wrapper, you can enforce extra security methods such as Data Loss Prevention (DLP) and Clientless Web Isolation to protect and control data shared with the AI agent.
428
428
429
-
Since you have full control over access to your AI Agent wrapper, you can enforce extra security methods such as [**Data Loss Prevention**](/cloudflare-one/policies/data-loss-prevention/) and [**Remote Browser Isolation**](/cloudflare-one/policies/browser-isolation/).
429
+
### Apply Data Loss Prevention profiles
430
430
431
-
### Data Loss Prevention
432
-
433
-
[**Data Loss Prevention**](/cloudflare-one/policies/data-loss-prevention/) can be used to avoid sensitive data to be used in prompts made to the AI agent. You will need to have an adequate HTTP policy in place for DLP to be enforced.
431
+
You can use [Data Loss Prevention](/cloudflare-one/policies/data-loss-prevention/) to prevent your users from sending sensitive data to the AI agent.
434
432
435
433
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **DLP** > **DLP profiles**.
436
-
2. Ensure that the DLP profiles you wish to enforce are properly configured.
437
-
3. Then, go to **Gateway** > **Firewall policies**.
438
-
4. Select **HTTP**.
439
-
5. Select **Add a policy**.
440
-
6. Under the **Traffic** section, select **Add condition**.
441
-
7. Select **Host** and enter the custom domain of your AI Agent Wrapper.
442
-
8. Select **Add** to add another condition.
443
-
9. Select **DLP Profile** and choose the DLP profiles you would like to enforce.
444
-
10. Add any other conditions that apply to your environment.
445
-
11. Under **Action**, select **Block**.
434
+
2. Ensure that the [DLP profiles](/cloudflare-one/policies/data-loss-prevention/dlp-profiles/) you want to enforce are properly configured.
435
+
3. Add an HTTP policy to enforce the DLP profile for the hostname for your wrapper. For example:
| Host | is |`ai-wrapper.example.com`| And | Block |
440
+
| DLP Profile | in |_AI DLP profile_|||
441
+
442
+
4. Select **Create policy**.
446
443
447
-
### Agentless Remote Browser Isolation
444
+
### Execute in a clientless isolated browser
448
445
449
-
Since your AI Agent Wrapper has been published as a self-hosted Access application, we can enforce it to run as an isolated sessionby creating a new policy and attaching it to your application.
446
+
Because you published your wrapper as a self-hosted Access application, you can execute it in an [isolated session](/cloudflare-one/policies/browser-isolation/setup/clientless-browser-isolation/) for your users by creating an [Access policy](/cloudflare-one/policies/access/) and configuring it for your application.
450
447
451
-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Access** > **Policies**.
452
-
2. Select **Add a policy**.
453
-
3. Set the **Action** to **Allow**.
454
-
4. Within the **Add rules** section, add identity rules to define who the application should be isolated for.
455
-
5. Within the **Additional settings (optional)** section, tick the **Isolate application** toggle.
448
+
<Renderfile="clientless-browser-isolation" />
456
449
457
-
Once policy has been created, you can now attach it to your AI Agent wrapper.
450
+
3. Go to **Access** > **Policies**.
451
+
4. Select **Add a policy**.
452
+
5. Set the **Action** to _Allow_.
453
+
6. In **Add rules**, add identity rules to define who the application should be isolated for.
454
+
7. In **Additional settings (optional)**, turn on **Isolate application**.
455
+
456
+
Once the Access policy has been created, you can attach it to your wrapper.
458
457
459
458
1. Go to **Access** > **Applications**.
460
-
2.Select your AI Agent wrapper application.
461
-
3.Select**Configure**.
462
-
4.Go to the **Policies** tab.
463
-
5. Select **Select existing policies**.
464
-
6. Select the policy you previously created.
465
-
7. Make sure that the order of your policies is correct.
466
-
467
-
Since agentless Remote Browser Isolation sessions honor your Secure Web Gateway HTTP policies, your DLP Profiles will be applied.
459
+
2.Choose your wrapper application, then select **Configure**.
4.Choose the Access policy you previously created.
462
+
5. Select **Confirm**, then select **Save application**.
463
+
464
+
Because Clientless Web Isolation traffic applies your Gateway HTTP policies, your configured DLP profiles will apply to isolated sessions.
465
+
466
+
For more information on isolating an Access application, refer to [Isolate self-hosted application](/cloudflare-one/policies/access/isolate-application/).
0 commit comments