Skip to content

Commit f59159e

Browse files
committed
Add DLP and RBI sections
1 parent 0d62719 commit f59159e

File tree

1 file changed

+32
-33
lines changed

1 file changed

+32
-33
lines changed

src/content/docs/cloudflare-one/tutorials/ai-wrapper-tenant-control.mdx

Lines changed: 32 additions & 33 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ pcx_content_type: tutorial
55
title: Create an AI agent wrapper using AI Gateway for Secure Web Gateway filtering and tenant control
66
---
77

8-
import { TabItem, Tabs, Details } from "~/components";
8+
import { TabItem, Tabs, Details, Render } from "~/components";
99

1010
This tutorial explains how to use [Cloudflare AI Gateway](/ai-gateway/) and Zero Trust to create a functional and secure AI agent wrapper. Cloudflare Zero Trust admins can protect access to the wrapper with [Cloudflare Access](/cloudflare-one/policies/access/). Additionally, you can enforce [Gateway](/cloudflare-one/policies/gateway/) controls on how your users interact with AI agents, including executing AI agents in an isolated browser with [Browser Isolation](/cloudflare-one/policies/browser-isolation/), enforcing [Data Loss Prevention](/cloudflare-one/policies/data-loss-prevention/) profiles to prevent sensitive data exfiltration, and scanning content to avoid answers from AI agents that violate internal corporate guidelines. Creating an AI agent wrapper is also an effective way to enforce tenant control if you have an enterprise plan of a specific AI provider, such as ChatGPT Enterprise.
1111

@@ -422,49 +422,48 @@ This ensures that public AI agents are not accessible using a managed endpoint.
422422

423423
Alternatively, you can prevent users from using public AI agents by displaying a [custom block message](/cloudflare-one/policies/gateway/block-page/#customize-the-block-page), [redirect](/cloudflare-one/policies/gateway/block-page/#redirect-to-a-block-page), or a [user notification](/cloudflare-one/policies/gateway/http-policies/#warp-client-block-notifications) directing users to the AI agent wrapper.
424424

425-
If you use another gateway for web filtering, try to replicate a similar policy.
425+
## 6. Enforce Data Loss Prevention and Clientless Browser Isolation
426426

427-
## Enforce DLP and agentless RBI
427+
Now that you have full control over access to your AI agent wrapper, you can enforce extra security methods such as Data Loss Prevention (DLP) and Clientless Web Isolation to protect and control data shared with the AI agent.
428428

429-
Since you have full control over access to your AI Agent wrapper, you can enforce extra security methods such as [**Data Loss Prevention**](/cloudflare-one/policies/data-loss-prevention/) and [**Remote Browser Isolation**](/cloudflare-one/policies/browser-isolation/).
429+
### Apply Data Loss Prevention profiles
430430

431-
### Data Loss Prevention
432-
433-
[**Data Loss Prevention**](/cloudflare-one/policies/data-loss-prevention/) can be used to avoid sensitive data to be used in prompts made to the AI agent. You will need to have an adequate HTTP policy in place for DLP to be enforced.
431+
You can use [Data Loss Prevention](/cloudflare-one/policies/data-loss-prevention/) to prevent your users from sending sensitive data to the AI agent.
434432

435433
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **DLP** > **DLP profiles**.
436-
2. Ensure that the DLP profiles you wish to enforce are properly configured.
437-
3. Then, go to **Gateway** > **Firewall policies**.
438-
4. Select **HTTP**.
439-
5. Select **Add a policy**.
440-
6. Under the **Traffic** section, select **Add condition**.
441-
7. Select **Host** and enter the custom domain of your AI Agent Wrapper.
442-
8. Select **Add** to add another condition.
443-
9. Select **DLP Profile** and choose the DLP profiles you would like to enforce.
444-
10. Add any other conditions that apply to your environment.
445-
11. Under **Action**, select **Block**.
434+
2. Ensure that the [DLP profiles](/cloudflare-one/policies/data-loss-prevention/dlp-profiles/) you want to enforce are properly configured.
435+
3. Add an HTTP policy to enforce the DLP profile for the hostname for your wrapper. For example:
436+
437+
| Selector | Operator | Value | Logic | Action |
438+
| ----------- | -------- | ------------------------ | ----- | ------ |
439+
| Host | is | `ai-wrapper.example.com` | And | Block |
440+
| DLP Profile | in | _AI DLP profile_ | | |
441+
442+
4. Select **Create policy**.
446443

447-
### Agentless Remote Browser Isolation
444+
### Execute in a clientless isolated browser
448445

449-
Since your AI Agent Wrapper has been published as a self-hosted Access application, we can enforce it to run as an isolated session by creating a new policy and attaching it to your application.
446+
Because you published your wrapper as a self-hosted Access application, you can execute it in an [isolated session](/cloudflare-one/policies/browser-isolation/setup/clientless-browser-isolation/) for your users by creating an [Access policy](/cloudflare-one/policies/access/) and configuring it for your application.
450447

451-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Access** > **Policies**.
452-
2. Select **Add a policy**.
453-
3. Set the **Action** to **Allow**.
454-
4. Within the **Add rules** section, add identity rules to define who the application should be isolated for.
455-
5. Within the **Additional settings (optional)** section, tick the **Isolate application** toggle.
448+
<Render file="clientless-browser-isolation" />
456449

457-
Once policy has been created, you can now attach it to your AI Agent wrapper.
450+
3. Go to **Access** > **Policies**.
451+
4. Select **Add a policy**.
452+
5. Set the **Action** to _Allow_.
453+
6. In **Add rules**, add identity rules to define who the application should be isolated for.
454+
7. In **Additional settings (optional)**, turn on **Isolate application**.
455+
456+
Once the Access policy has been created, you can attach it to your wrapper.
458457

459458
1. Go to **Access** > **Applications**.
460-
2. Select your AI Agent wrapper application.
461-
3. Select **Configure**.
462-
4. Go to the **Policies** tab.
463-
5. Select **Select existing policies**.
464-
6. Select the policy you previously created.
465-
7. Make sure that the order of your policies is correct.
466-
467-
Since agentless Remote Browser Isolation sessions honor your Secure Web Gateway HTTP policies, your DLP Profiles will be applied.
459+
2. Choose your wrapper application, then select **Configure**.
460+
3. In **Policies**, select **Select existing policies**.
461+
4. Choose the Access policy you previously created.
462+
5. Select **Confirm**, then select **Save application**.
463+
464+
Because Clientless Web Isolation traffic applies your Gateway HTTP policies, your configured DLP profiles will apply to isolated sessions.
465+
466+
For more information on isolating an Access application, refer to [Isolate self-hosted application](/cloudflare-one/policies/access/isolate-application/).
468467

469468
## Additional benefits
470469

0 commit comments

Comments
 (0)