-
Notifications
You must be signed in to change notification settings - Fork 10.4k
[CASB] CDS UI updates + AWS CDE #18162
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Merged
Merged
Changes from 19 commits
Commits
Show all changes
20 commits
Select commit
Hold shift + click to select a range
be3d3bd
Initial commit
maxvp bb61597
Remove SaaS
maxvp 2bb99e7
Revamp instructions
maxvp 00bb7bd
Reword
maxvp 4b72662
Improve wording
maxvp 597a446
Improve more wording
maxvp 5c0c618
Update title
maxvp 2d5bf7a
Rename scan-apps --> casb
maxvp fe668d0
Update CASB links
maxvp ecfa137
Rearrange page
maxvp 105ee28
Update procedures
maxvp e066453
Add findings context
maxvp ba02bc6
Refine finding details
maxvp 557b972
Add AWS compute section
maxvp b8c0132
Merge branch 'production' into max/casb/aws
maxvp a25c94e
Add compute account procedures
maxvp 5f980fc
Add AWS callout
maxvp 5bc5e46
Fix broken GCP link
maxvp 45fad2e
Merge branch 'production' into max/casb/aws
crwaters16 9e22c41
Apply suggestions from code review
maxvp File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
File renamed without changes.
File renamed without changes.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
29 changes: 29 additions & 0 deletions
29
src/content/docs/cloudflare-one/applications/casb/casb-integrations/index.mdx
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,29 @@ | ||
| --- | ||
| pcx_content_type: navigation | ||
| title: Available integrations | ||
| sidebar: | ||
| order: 3 | ||
| --- | ||
|
|
||
| You can integrate the following SaaS applications and cloud environments with Cloudflare CASB: | ||
|
|
||
| - [Amazon Web Services (AWS) S3](/cloudflare-one/applications/casb/casb-integrations/aws-s3/) | ||
| - [Atlassian Confluence](/cloudflare-one/applications/casb/casb-integrations/atlassian-confluence/) | ||
| - [Atlassian Jira](/cloudflare-one/applications/casb/casb-integrations/atlassian-jira/) | ||
| - [Bitbucket Cloud](/cloudflare-one/applications/casb/casb-integrations/bitbucket-cloud/) | ||
| - [Box](/cloudflare-one/applications/casb/casb-integrations/box/) | ||
| - [Dropbox](/cloudflare-one/applications/casb/casb-integrations/dropbox/) | ||
| - [GitHub](/cloudflare-one/applications/casb/casb-integrations/github/) | ||
| - [Google Workspace](/cloudflare-one/applications/casb/casb-integrations/google-workspace/) | ||
| - [Google Drive](/cloudflare-one/applications/casb/casb-integrations/google-workspace/google-drive/) | ||
| - [Gmail](/cloudflare-one/applications/casb/casb-integrations/google-workspace/gmail/) | ||
| - [Google Admin](/cloudflare-one/applications/casb/casb-integrations/google-workspace/google-admin/) | ||
| - [Google Calendar](/cloudflare-one/applications/casb/casb-integrations/google-workspace/google-calendar/) | ||
| - [Microsoft 365](/cloudflare-one/applications/casb/casb-integrations/microsoft-365/) | ||
| - [Admin Center](/cloudflare-one/applications/casb/casb-integrations/microsoft-365/admin-center/) | ||
| - [OneDrive](/cloudflare-one/applications/casb/casb-integrations/microsoft-365/onedrive/) | ||
| - [SharePoint](/cloudflare-one/applications/casb/casb-integrations/microsoft-365/sharepoint/) | ||
| - [Outlook](/cloudflare-one/applications/casb/casb-integrations/microsoft-365/outlook/) | ||
| - [Salesforce](/cloudflare-one/applications/casb/casb-integrations/salesforce/) | ||
| - [ServiceNow](/cloudflare-one/applications/casb/casb-integrations/servicenow/) | ||
| - [Slack](/cloudflare-one/applications/casb/casb-integrations/slack/) |
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
20 changes: 20 additions & 0 deletions
20
src/content/docs/cloudflare-one/applications/casb/index.mdx
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,20 @@ | ||
| --- | ||
| pcx_content_type: how-to | ||
| title: Cloud Access Security Broker | ||
| sidebar: | ||
| order: 3 | ||
| --- | ||
|
|
||
| import { GlossaryTooltip, Render } from "~/components"; | ||
|
|
||
| :::note[Availability] | ||
| Available for all Zero Trust users. | ||
|
|
||
| Free users can configure up to two CASB integrations. You must upgrade to an Enterprise plan to view the details of a finding instance. | ||
| ::: | ||
|
|
||
| Cloudflare's API-driven Cloud Access Security Broker (CASB) integrates with SaaS applications and cloud environments to scan for misconfigurations, unauthorized user activity, <GlossaryTooltip term="shadow IT" link="https://www.cloudflare.com/learning/access-management/what-is-shadow-it/">shadow IT</GlossaryTooltip>, and other data security issues that can occur after a user has successfully logged in. | ||
|
|
||
| ## Manage CASB integrations | ||
|
|
||
| <Render file="casb/manage-integrations" /> |
145 changes: 145 additions & 0 deletions
145
src/content/docs/cloudflare-one/applications/casb/manage-findings.mdx
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,145 @@ | ||
| --- | ||
| pcx_content_type: how-to | ||
| title: Manage findings | ||
| sidebar: | ||
| order: 1 | ||
| head: | ||
| - tag: title | ||
| content: Manage security findings | ||
| --- | ||
|
|
||
| import { TabItem, Tabs, Details } from "~/components"; | ||
|
|
||
| Findings are security issues detected within SaaS and cloud applications that involve users, data at rest, and other configuration settings. With Cloudflare CASB, you can review a comprehensive list of findings in Zero Trust and immediately start taking action on the issues found. | ||
maxvp marked this conversation as resolved.
Show resolved
Hide resolved
|
||
|
|
||
| ## Prerequisites | ||
|
|
||
| - You have [added](/cloudflare-one/applications/casb/#add-an-integration) a CASB integration. | ||
| - Your scan has surfaced at least one security finding. | ||
|
|
||
| ## Posture findings | ||
|
|
||
| Posture findings include misconfigurations, unauthorized user activity, and other data security issues. | ||
|
|
||
| To view details about the posture findings that CASB found: | ||
maxvp marked this conversation as resolved.
Show resolved
Hide resolved
|
||
|
|
||
| 1. In [Zero Trust](https://one.dash.cloudflare.com), go to **CASB** > **Posture**. | ||
| 2. Choose **SaaS** or **Cloud**. | ||
| 3. To view details about a finding, select the finding's name | ||
|
|
||
| CASB will display details about your posture finding, including the finding type, [severity level](#severity-levels), number of instances, associated integration, current status, and date detected. For more information on each instance of the finding, select **Manage**. | ||
|
|
||
| To manage the finding's visibility, you can update the finding's [severity level](#severity-levels) or [hide the finding](#hide-findings) from view. Additionally, some findings provide a remediation guide to resolve the issue or support [creating a Gateway HTTP policy](#resolve-finding-with-a-gateway-policy) to block the traffic. | ||
|
|
||
| ### Severity levels | ||
|
|
||
| Cloudflare CASB labels each finding with one of the following severity levels: | ||
|
|
||
| | Severity level | Urgency | | ||
| | -------------- | ---------------------------------------------------------------------------- | | ||
| | Critical | Suggests the finding is something your team should act on today. | | ||
| | High | Suggests the finding is something your team should act on this week. | | ||
| | Medium | Suggests the finding should be reviewed sometime this month. | | ||
| | Low | Suggests the finding is informational or part of a scheduled review process. | | ||
|
|
||
| #### Change the severity level | ||
|
|
||
| You can change the severity level for a finding at any time in case the default assignment does not suit your environment: | ||
|
|
||
| 1. In [Zero Trust](https://one.dash.cloudflare.com), go to **CASB** > **Posture**. | ||
| 2. Find the finding you want to modify and select **Manage**. | ||
maxvp marked this conversation as resolved.
Outdated
Show resolved
Hide resolved
|
||
| 3. In the severity level drop-down menu, choose your desired setting (_Critical_, _High_, _Medium_, or _Low_). | ||
|
|
||
| The new severity level will only apply to the posture finding within this specific integration. If you added multiple integrations of the same application, the other integrations will not be impacted by this change. | ||
|
|
||
| ## Content findings | ||
|
|
||
| Content findings include instances of potential data exposure as identified by [DLP](/cloudflare-one/policies/data-loss-prevention/). | ||
|
|
||
| To view details about the content findings that CASB found: | ||
maxvp marked this conversation as resolved.
Show resolved
Hide resolved
|
||
|
|
||
| 1. In [Zero Trust](https://one.dash.cloudflare.com), go to **CASB** > **Content**. | ||
| 2. Choose **SaaS** or **Cloud**. | ||
| 3. To view details about a finding, select the finding's name. | ||
|
|
||
| CASB will display details about your content finding, including the file name, a link to the file, matching DLP profiles, associated integration, and date detected. | ||
|
|
||
| AWS users can configure a [compute account](/cloudflare-one/applications/casb/casb-integrations/aws-s3/#compute-account) to scan for data security resources within their S3 resources. | ||
|
|
||
| ## View shared files | ||
|
|
||
| File findings for some integrations (such as [Microsoft 365](/cloudflare-one/applications/casb/casb-integrations/microsoft-365/#file-sharing) and [Box](/cloudflare-one/applications/casb/casb-integrations/box/#file-sharing)) may link to an inaccessible file. To access the actual shared file: | ||
|
|
||
| <Tabs> <TabItem label="Posture finding"> | ||
|
|
||
| 1. In [Zero Trust](https://one.dash.cloudflare.com), go to **CASB** > **Posture**. | ||
| 2. Choose **SaaS** or **Cloud**. | ||
| 3. Find the individual finding, then select **Manage**. | ||
maxvp marked this conversation as resolved.
Outdated
Show resolved
Hide resolved
|
||
| 4. In **Active Instances**, select the file name. | ||
| 5. In **Shared Links**, select the linked file instance. | ||
|
|
||
| </TabItem> | ||
|
|
||
| <TabItem label="Content finding"> | ||
|
|
||
| 1. In [Zero Trust](https://one.dash.cloudflare.com), go to **CASB** > **Content**. | ||
| 2. Choose **SaaS** or **Cloud**. | ||
| 3. Select the file name of the detected asset. | ||
| 4. In **Sharing details**, select the linked file instance. | ||
|
|
||
| </TabItem> </Tabs> | ||
|
|
||
| ## Hide findings | ||
|
|
||
| After reviewing your findings, you may decide that certain posture findings are not applicable to your organization. Cloudflare CASB allows you to remove findings or individual instances of findings from your list of active issues. CASB will continue to scan for these issues, but any detections will appear in a separate tab. | ||
|
|
||
| ### Hide a finding | ||
|
|
||
| 1. In [Zero Trust](https://one.dash.cloudflare.com), go to **CASB** > **Posture**. | ||
| 2. Find the active finding you want to hide. | ||
maxvp marked this conversation as resolved.
Outdated
Show resolved
Hide resolved
|
||
| 3. In the three-dot menu, select **Move to ignore**. | ||
|
|
||
| The finding's status will change from **Active** to **Ignored**. CASB will continue to scan for these findings and report detections. You can change ignored findings back to **Active** with the same process at any time. | ||
|
|
||
| ### Hide an instance of a finding | ||
|
|
||
| 1. In [Zero Trust](https://one.dash.cloudflare.com), go to **CASB** > **Posture**. | ||
| 2. Choose the active finding you want to hide, then select **Manage**. | ||
| 3. In **Active**, find the instance you want to hide. | ||
| 4. In the three-dot menu, select **Move to hidden**. | ||
|
|
||
| The instance will be moved from **Active** to **Hidden** within the finding. If the finding occurs again for the same user, CASB will report the new instance in the **Hidden** tab. You can move hidden instances back to the **Active** tab at any time. | ||
|
|
||
| ## Resolve finding with a Gateway policy | ||
|
|
||
| Using the security findings from CASB allows for fine-grained Gateway policies which prevent future unwanted behavior while still allowing usage that aligns to your organization's security policy. This means going from viewing a CASB finding, like the use of an unapproved application, to preventing or controlling access in minutes. | ||
|
|
||
| CASB supports creating a Gateway policy with findings from the [Google Workspace integration](/cloudflare-one/applications/casb/casb-integrations/google-workspace/): | ||
|
|
||
| <Details header="Supported CASB findings for Gateway policies"> | ||
|
|
||
| - Google Workspace: File publicly accessible with edit access | ||
| - Google Workspace: File publicly accessible with view access | ||
| - Google Workspace: File shared outside company with edit access | ||
| - Google Workspace: File shared outside company with view access | ||
|
|
||
| </Details> | ||
|
|
||
| :::note[Before you begin] | ||
| Ensure that you have [enabled HTTP filtering](/cloudflare-one/policies/gateway/initial-setup/http/) for your organization. | ||
| ::: | ||
|
|
||
| To create a Gateway policy directly from a CASB finding: | ||
|
|
||
| 1. In [Zero Trust](https://one.dash.cloudflare.com), go to **CASB** > **Posture** or **CASB** > **Content**. | ||
| 2. Choose **SaaS** or **Cloud**. | ||
| 3. Choose the finding you want to modify, then select **Manage**. | ||
| 4. Find the instance you want to block and select its three-dot menu. | ||
| 5. Select **Block with Gateway HTTP policy**. A new browser tab will open with a pre-filled HTTP policy. | ||
| :::note | ||
| Not all CASB findings will have the **Block with Gateway HTTP policy** option. Unsupported findings can only be resolved from your application dashboard or through your domain provider. | ||
| ::: | ||
| 6. (Optional) [Configure the HTTP policy](/cloudflare-one/policies/gateway/http-policies/). For example, if the policy blocks an unsanctioned third-party app, you can apply the policy to some or all users, or only block uploads or downloads. | ||
| 7. Select **Save**. | ||
|
|
||
| Your HTTP policy will now prevent future instances of the security finding. | ||
38 changes: 38 additions & 0 deletions
38
src/content/docs/cloudflare-one/applications/casb/troubleshooting.mdx
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,38 @@ | ||
| --- | ||
| pcx_content_type: troubleshooting | ||
| title: Troubleshoot integrations | ||
| sidebar: | ||
| order: 3 | ||
| --- | ||
|
|
||
| import { TabItem, Tabs } from "~/components"; | ||
|
|
||
| Cloudflare CASB detects when integrations are unhealthy or outdated. | ||
|
|
||
| Common integration issues include changes to SaaS app or cloud environment configurations, user access, or permission scope. Integrations may need to be updated to support new features or permissions. | ||
|
|
||
| ## Identify unhealthy or outdated integrations | ||
|
|
||
| To identify unhealthy CASB integrations, go to **CASB** > **Integrations**. If an integration is unhealthy, CASB will set its status to **Broken**. If an integration is outdated, CASB will set its status to **Upgrade**. | ||
|
|
||
| ## Repair an unhealthy integration | ||
|
|
||
| :::note[Repair limitation] | ||
| If CASB does not support self-service repairs for an integration, you will need to [delete](/cloudflare-one/applications/casb/#delete-an-integration) and recreate the integration to continue scanning. | ||
| ::: | ||
|
|
||
| You can repair unhealthy CASB integrations through your list of integrations or findings. | ||
|
|
||
| 1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **CASB** > **Integrations**. | ||
| 2. Choose your unhealthy integration. | ||
| 3. Select **Reauthorize**. | ||
| 4. In your SaaS app or cloud environment, reauthorize your account. | ||
|
|
||
| ## Upgrade an integration | ||
|
|
||
| Upgrading an outdated integration will allow the integration to access new features and permissions. | ||
|
|
||
| 1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **CASB** > **Integrations**. | ||
| 2. Choose your outdated integration. | ||
| 3. Select **Upgrade integration**. | ||
| 4. In your SaaS app or cloud environment, upgrade your app and reauthorize your account. |
Oops, something went wrong.
Oops, something went wrong.
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Uh oh!
There was an error while loading. Please reload this page.