Skip to content
Closed
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -3,21 +3,15 @@ pcx_content_type: concept
title: Scan for sensitive data
sidebar:
order: 3

---

import { Render } from "~/components"
import { Render } from "~/components";

:::note


Requires Cloudflare CASB and Cloudflare DLP.


Requires Cloudflare SaaS & Cloud Security and Cloudflare DLP.
:::

You can use [Cloudflare Data Loss Prevention (DLP)](/cloudflare-one/policies/data-loss-prevention/) to discover if files stored in your SaaS application contain sensitive data.
To perform DLP scans in a SaaS app, first configure a DLP profile with the data patterns you want to detect, then enable those profiles in a CASB integration.
You can use [Cloudflare Data Loss Prevention (DLP)](/cloudflare-one/policies/data-loss-prevention/) to discover if files stored in your SaaS or cloud application contain sensitive data. To perform DLP scans in an application, first configure a DLP profile with the data patterns you want to detect, then enable those profiles in a SaaS & Cloud Security integration.

## Supported integrations

Expand All @@ -31,47 +25,47 @@ You may either use DLP profiles predefined by Cloudflare, or create your own cus

<Render file="data-loss-prevention/predefined-profile" />

Your DLP profile is now ready to use with CASB.
Your DLP profile is now ready to use with SaaS & Cloud Security.

### Build a custom profile

<Render file="data-loss-prevention/custom-profile" />

Your DLP profile is now ready to use with CASB.
Your DLP profile is now ready to use with SaaS & Cloud Security.

For more information, refer to [Configure a DLP profile](/cloudflare-one/policies/data-loss-prevention/dlp-profiles/).

## Enable DLP scans in CASB
## Enable DLP scans in SaaS & Cloud Security

### Add a new integration

1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **CASB** > **Integrations**.
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **SaaS & Cloud Security** > **Integrations**.
2. Select **Add integration** and choose a [supported integration](#supported-integrations).
3. During the setup process, you will be prompted to select DLP profiles for the integration.
4. Select **Save integration**.

CASB will scan every publicly accessible file in the integration for text that matches the DLP profile. The initial scan may take up to a few hours to complete.
SaaS & Cloud Security will scan every publicly accessible file in the integration for text that matches the DLP profile. The initial scan may take up to a few hours to complete.

### Modify an existing integration

1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **CASB** > **Integrations**.
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **SaaS & Cloud Security** > **Integrations**.
2. Choose a [supported integration](#supported-integrations) and select **Configure**.
3. Under **DLP profiles**, select the profiles that you want the integration to scan for.
4. Select **Save integration**.

If you enable a DLP profile from the **Manage integrations** page, CASB will only scan publicly accessible files that have had a modification event since enabling the DLP profile. Modification events include changes to the following attributes:
If you enable a DLP profile from the **Manage integrations** page, SaaS & Cloud Security will only scan publicly accessible files that have had a modification event since enabling the DLP profile. Modification events include changes to the following attributes:

* Contents of the file
* Name of the file
* Visibility of the file (only if changed to publicly accessible)
* Owner of the file
* Location of the file (for example, moved to a different folder)
- Contents of the file
- Name of the file
- Visibility of the file (only if changed to publicly accessible)
- Owner of the file
- Location of the file (for example, moved to a different folder)

In order to scan historical data, you must enable the DLP profile during the [integration setup flow](#add-a-new-integration).

## Limitations

DLP will only scan:

* [Text-based files](/cloudflare-one/policies/data-loss-prevention/#supported-file-types) such as documents, spreadsheets, and PDFs. Images are not supported.
* Files 100 MB.
- [Text-based files](/cloudflare-one/policies/data-loss-prevention/#supported-file-types) such as documents, spreadsheets, and PDFs. Images are not supported.
- Files less than or equal to 100 MB in size.
Original file line number Diff line number Diff line change
Expand Up @@ -11,10 +11,6 @@ import { Render } from "~/components";
params={{ one: "Amazon Web Services (AWS) S3", two: "AWS account" }}
/>

:::note
The CASB integration for AWS S3 only supports posture-related findings.
:::

## Integration prerequisites

- An AWS account using AWS S3 (Simple Storage Service)
Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
---
pcx_content_type: how-to
title: Scan SaaS applications
title: Scan SaaS and cloud applications
sidebar:
order: 3
---
Expand All @@ -10,11 +10,11 @@ import { GlossaryTooltip, Render } from "~/components";
:::note[Availability]
Available for all Zero Trust users.

Free users can configure up to two CASB integrations. You must upgrade to an Enterprise plan to view the details of an individual finding instance.
Free users can configure up to two integrations. You must upgrade to an Enterprise plan to view the details of an individual finding instance.
:::

Cloudflare's API-driven Cloud Access Security Broker (CASB) scans SaaS applications for misconfigurations, unauthorized user activity, <GlossaryTooltip term="shadow IT" link="https://www.cloudflare.com/learning/access-management/what-is-shadow-it/">shadow IT</GlossaryTooltip>, and other data security issues that can occur after a user has successfully logged in.
Cloudflare's API-driven SaaS & Cloud Security (previously Cloudflare CASB) scans SaaS and cloud applications for misconfigurations, unauthorized user activity, <GlossaryTooltip term="shadow IT" link="https://www.cloudflare.com/learning/access-management/what-is-shadow-it/">shadow IT</GlossaryTooltip>, and other data security issues that can occur after a user has successfully logged in.

## Manage CASB integrations
## Manage integrations

<Render file="casb/manage-integrations" />
Original file line number Diff line number Diff line change
@@ -1,27 +1,26 @@
---
{}

---

When you integrate a third-party SaaS application with Cloudflare CASB, you allow CASB to make API calls to the application and read relevant data on your behalf. The CASB integration permissions are read-only and follow the least privileged model. In other words, only the minimum access required to perform a scan is granted.
When you integrate a third-party SaaS or cloud application with Cloudflare SaaS & Cloud Security, you allow Zero Trust to make API calls to the application and read relevant data on your behalf. The SaaS & Cloud Security integration permissions are read-only and follow the least privileged model. In other words, only the minimum access required to perform a scan is granted.

### Prerequisites

Before you can integrate a SaaS application with CASB, your SaaS account must meet certain requirements. To view the prerequisites and permissions for your application, refer to its [integration guide](/cloudflare-one/applications/scan-apps/casb-integrations/).
Before you can integrate an application with SaaS & Cloud Security, your account for the application must meet certain requirements. To view the prerequisites and permissions for your application, refer to its [integration guide](/cloudflare-one/applications/scan-apps/casb-integrations/).

### Add an integration

1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **CASB** > **Integrations**.
2. Select **Add integration**.
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **SaaS & Cloud Security** > **Overview** or **Settings** > **Integrations**.
2. Select **Add an integration**.
3. Browse the available SaaS integrations and select the application you would like to add.
4. Follow the step-by-step integration instructions in the UI.
5. To run your first scan, select **Save integration**. You will be redirected to the [Findings page](/cloudflare-one/applications/scan-apps/manage-findings/) to see an in-depth listing of issues found.

After the first scan, CASB will automatically scan your application on a frequent basis to keep up with any changes. Due to each application having their own set of requirements, scan intervals will vary, but the frequency is typically between every 1 hour and every 24 hours.
After the first scan, SaaS & Cloud Security will automatically scan your application on a frequent basis to keep up with any changes. Due to each application having their own set of requirements, scan intervals will vary, but the frequency is typically between every 1 hour and every 24 hours.

### Pause an integration

1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **CASB** > **Integrations**.
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **SaaS & Cloud Security** > **Integrations**.
2. Find the integration you would like to pause and select **Manage**.
3. To stop scanning the application, turn off **Scan findings**.

Expand All @@ -30,13 +29,9 @@ You can resume application scanning at any time by turning on **Scan findings**.
### Delete an integration

:::caution


When you delete an integration, all keys and OAuth data will be deleted. This means you cannot restore a deleted integration or its scanned data.


:::

1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **CASB** > **Integrations**.
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **SaaS & Cloud Security** > **Integrations**.
2. Find the integration you would like to delete and select **Manage**.
3. Select **Delete**.
Original file line number Diff line number Diff line change
@@ -1,35 +1,25 @@
---
{}

---

import { Details } from "~/components"
import { Details } from "~/components";

1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **DLP** > **DLP Profiles**.

2. Select **Create profile**.

3. Enter a name and optional description for the profile.

4. Add custom or existing detection entries.


<Details header="Add a custom entry">

1. Select **Add custom entry** and give it a name.

2. In **Value**, enter a regular expression (or regex) that defines the text pattern you want to detect. For example, `test\d\d` will detect the word `test` followed by two digits.

* Regular expressions are written in Rust. We recommend validating your regex with [Rustexp](https://rustexp.lpil.uk/).
* DLP detects UTF-8 characters, which can be up to 4 bytes each. Custom text pattern detections are limited to 1024 bytes in length.
* DLP does not support regular expressions with `+` or `*` operators because they are prone to exceeding the length limit. For example, the regex pattern `a+` can detect an infinite number of `a` characters. We recommend using `a{min,max}` instead, such as `a{1,1024}`.

- Regular expressions are written in Rust. We recommend validating your regex with [Rustexp](https://rustexp.lpil.uk/).
- DLP detects UTF-8 characters, which can be up to 4 bytes each. Custom text pattern detections are limited to 1024 bytes in length.
- DLP does not support regular expressions with `+` or `*` operators because they are prone to exceeding the length limit. For example, the regex pattern `a+` can detect an infinite number of `a` characters. We recommend using `a{min,max}` instead, such as `a{1,1024}`.
3. To save the detection entry, select **Done**.


</Details>


<Details header="Add existing entries">

Existing entries include [predefined detection entries](/cloudflare-one/policies/data-loss-prevention/dlp-profiles/predefined-profiles/) and [DLP datasets](/cloudflare-one/policies/data-loss-prevention/datasets/).
Expand All @@ -38,9 +28,7 @@ import { Details } from "~/components"
2. Choose which entries you want to add, then select **Confirm**.
3. To save the detection entry, select **Done**.


</Details>

5. (Optional) Configure [**Advanced settings**](/cloudflare-one/policies/data-loss-prevention/dlp-profiles/advanced-settings/) for the profile.

6. Select **Save profile**.
Original file line number Diff line number Diff line change
Expand Up @@ -4,5 +4,5 @@

1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **DLP** > **DLP Profiles**.
2. Choose a [predefined profile](/cloudflare-one/policies/data-loss-prevention/dlp-profiles/predefined-profiles/) and select **Configure**.
3. Enable one or more **Detection entries** according to your preferences. The DLP Profile matches using the OR logical operator if multiple entries are enabled, your data needs to match only one of the entries.
3. Enable one or more **Detection entries** according to your preferences. The DLP Profile matches using the OR logical operator -- if multiple entries are enabled, your data needs to match only one of the entries.
4. Select **Save profile**.
Loading