Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
5 changes: 5 additions & 0 deletions public/__redirects
Original file line number Diff line number Diff line change
Expand Up @@ -2401,6 +2401,11 @@
/cloudflare-one/applications/configure-apps/* /cloudflare-one/access-controls/applications/http-apps/:splat 301
/cloudflare-one/applications/non-http/* /cloudflare-one/access-controls/applications/non-http/:splat 301
/cloudflare-one/identity/devices/* /cloudflare-one/reusable-components/posture-checks/:splat 301
/cloudflare-one/applications/casb/casb-integrations/* /cloudflare-one/integrations/cloud-and-saas/:splat 301
/cloudflare-one/applications/casb/troubleshooting/* /cloudflare-one/integrations/cloud-and-saas/troubleshooting/:splat 301
/cloudflare-one/applications/casb/ /cloudflare-one/cloud-and-saas-findings/ 301
/cloudflare-one/applications/casb/manage-findings/ /cloudflare-one/cloud-and-saas-findings/manage-findings/ 301
/cloudflare-one/applications/casb/casb-dlp/ /cloudflare-one/cloud-and-saas-findings/casb-dlp/ 301

# Learning paths

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -8,6 +8,6 @@ import { Render } from "~/components";

You can now use CASB to find security misconfigurations in your AWS cloud environment using [Data Loss Prevention](/cloudflare-one/data-loss-prevention/).

You can also [connect your AWS compute account](/cloudflare-one/applications/casb/casb-integrations/aws-s3/#compute-account) to extract and scan your S3 buckets for sensitive data while avoiding egress fees. CASB will scan any objects that exist in the bucket at the time of configuration.
You can also [connect your AWS compute account](/cloudflare-one/integrations/cloud-and-saas/aws-s3/#compute-account) to extract and scan your S3 buckets for sensitive data while avoiding egress fees. CASB will scan any objects that exist in the bucket at the time of configuration.

<Render file="casb/aws-compute-account" product="cloudflare-one" />
17 changes: 9 additions & 8 deletions src/content/changelog/casb/2025-08-26-casb-ai-integrations.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -11,15 +11,16 @@ date: 2025-08-26 16:00:00 UTC
![Cloudflare CASB showing selection of new findings for ChatGPT, Claude, and Gemini integrations.](~/assets/images/casb/changelog/casb-ai-integrations-preview.png)

### Key capabilities
- **Agentless connections** — connect ChatGPT, Claude, and Gemini tenants via API; no endpoint software required
- **Posture management** — detect insecure settings and misconfigurations that could lead to data exposure
- **DLP detection** — identify sensitive data in uploaded chat attachments or files
- **GenAI-specific insights** — surface risks unique to each provider’s capabilities

- **Agentless connections** — connect ChatGPT, Claude, and Gemini tenants via API; no endpoint software required
- **Posture management** — detect insecure settings and misconfigurations that could lead to data exposure
- **DLP detection** — identify sensitive data in uploaded chat attachments or files
- **GenAI-specific insights** — surface risks unique to each provider’s capabilities

### Learn more
- [ChatGPT integration docs](https://developers.cloudflare.com/cloudflare-one/applications/casb/casb-integrations/openai/)
- [Claude integration docs](https://developers.cloudflare.com/cloudflare-one/applications/casb/casb-integrations/anthropic/)
- [Gemini integration docs](https://developers.cloudflare.com/cloudflare-one/applications/casb/casb-integrations/google-workspace/gemini/)

These integrations are available to all Cloudflare One customers today.
- [ChatGPT integration docs](https://developers.cloudflare.com/cloudflare-one/integrations/cloud-and-saas/openai/)
- [Claude integration docs](https://developers.cloudflare.com/cloudflare-one/integrations/cloud-and-saas/anthropic/)
- [Gemini integration docs](https://developers.cloudflare.com/cloudflare-one/integrations/cloud-and-saas/google-workspace/gemini/)

These integrations are available to all Cloudflare One customers today.
Original file line number Diff line number Diff line change
Expand Up @@ -4,17 +4,17 @@ description: Get two free CASB integrations with your Email Security subscriptio
date: 2025-04-01T23:22:49Z
---

With Email Security, you get two free CASB integrations.
With Email Security, you get two free CASB integrations.

Use one SaaS integration for Email Security to sync with your directory of users, take actions on delivered emails, automatically provide EMLs for reclassification requests for clean emails, discover CASB findings and more.
Use one SaaS integration for Email Security to sync with your directory of users, take actions on delivered emails, automatically provide EMLs for reclassification requests for clean emails, discover CASB findings and more.

With the other integration, you can have a separate SaaS integration for CASB findings for another SaaS provider.
With the other integration, you can have a separate SaaS integration for CASB findings for another SaaS provider.

Refer to [Add an integration](/cloudflare-one/applications/casb/#add-an-integration) to learn more about this feature.
Refer to [Add an integration](/cloudflare-one/integrations/cloud-and-saas/#add-an-integration) to learn more about this feature.

![CASB-EmailSecurity](~/assets/images/changelog/email-security/CASB-EmailSecurity.png)

This feature is available across these Email Security packages:
This feature is available across these Email Security packages:

- **Enterprise**
- **Enterprise + PhishGuard**
- **Enterprise**
- **Enterprise + PhishGuard**
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ sidebar:

import { Render, GlossaryTooltip } from "~/components";

The Application Library allows users to manage their SaaS applications in Cloudflare Zero Trust by consolidating views across all relevant products: [Gateway](/cloudflare-one/traffic-policies/), [Access](/cloudflare-one/access-controls/policies/), and [Cloud Access Security Broker (CASB)](/cloudflare-one/applications/casb/). The App Library provides visibility and control for available applications, as well as the ability to view categorized hostnames and manage configuration for Access for SaaS and Gateway policies. For example, you can use the App Library to review how Gateway uses specific hostnames to match against application traffic.
The Application Library allows users to manage their SaaS applications in Cloudflare Zero Trust by consolidating views across all relevant products: [Gateway](/cloudflare-one/traffic-policies/), [Access](/cloudflare-one/access-controls/policies/), and [Cloud Access Security Broker (CASB)](/cloudflare-one/integrations/cloud-and-saas/). The App Library provides visibility and control for available applications, as well as the ability to view categorized hostnames and manage configuration for Access for SaaS and Gateway policies. For example, you can use the App Library to review how Gateway uses specific hostnames to match against application traffic.

To access the App Library in [Zero Trust](https://one.dash.cloudflare.com/), go to **My team** > **App Library**. Each application card will list the number of hostnames associated with the application, the supported Zero Trust product usage, and the [app type](/cloudflare-one/traffic-policies/application-app-types/#app-types).

Expand All @@ -30,7 +30,7 @@ The **Overview** tab shows details about an application, including:

### Findings

The **Findings** tab shows any connected [CASB integrations](/cloudflare-one/applications/casb/#manage-casb-integrations) for the selected application, as well as instances of any detected [posture findings](/cloudflare-one/applications/casb/manage-findings/#posture-findings) and [content findings](/cloudflare-one/applications/casb/manage-findings/#content-findings) for each integration.
The **Findings** tab shows any connected [CASB integrations](/cloudflare-one/integrations/cloud-and-saas/#manage-casb-integrations) for the selected application, as well as instances of any detected [posture findings](/cloudflare-one/cloud-and-saas-findings/manage-findings/#posture-findings) and [content findings](/cloudflare-one/cloud-and-saas-findings/manage-findings/#content-findings) for each integration.

### Policies

Expand Down

This file was deleted.

2 changes: 1 addition & 1 deletion src/content/docs/cloudflare-one/changelog/casb.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -23,7 +23,7 @@ You can now scan your Bitbucket Cloud workspaces for a variety of contextualized

**Data-at-rest DLP for Box and Dropbox**

You can now scan your [Box](/cloudflare-one/applications/casb/casb-integrations/box/#data-loss-prevention-optional) and [Dropbox](/cloudflare-one/applications/casb/casb-integrations/dropbox/#data-loss-prevention-optional) files for DLP matches.
You can now scan your [Box](/cloudflare-one/integrations/cloud-and-saas/box/#data-loss-prevention-optional) and [Dropbox](/cloudflare-one/integrations/cloud-and-saas/dropbox/#data-loss-prevention-optional) files for DLP matches.

## 2024-04-16

Expand Down
2 changes: 1 addition & 1 deletion src/content/docs/cloudflare-one/changelog/dlp.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -41,7 +41,7 @@ You can now upload files with [multiple columns of data](/cloudflare-one/data-lo

**Data-at-rest DLP for Box and Dropbox**

You can now scan your [Box](/cloudflare-one/applications/casb/casb-integrations/box/#data-loss-prevention-optional) and [Dropbox](/cloudflare-one/applications/casb/casb-integrations/dropbox/#data-loss-prevention-optional) files for DLP matches.
You can now scan your [Box](/cloudflare-one/integrations/cloud-and-saas/box/#data-loss-prevention-optional) and [Dropbox](/cloudflare-one/integrations/cloud-and-saas/dropbox/#data-loss-prevention-optional) files for DLP matches.

## 2024-04-16

Expand Down
Original file line number Diff line number Diff line change
@@ -1,8 +1,8 @@
---
pcx_content_type: how-to
title: Cloud Access Security Broker
title: Cloud and SaaS findings
sidebar:
order: 3
order: 9
learning_center:
title: What is CASB? | Cloud access security brokers
link: https://www.cloudflare.com/learning/access-management/what-is-a-casb/
Expand All @@ -18,6 +18,8 @@ Free users can configure up to two CASB integrations. You must upgrade to an Ent

Cloudflare's API-driven [Cloud Access Security Broker](https://www.cloudflare.com/learning/access-management/what-is-a-casb/) (CASB) integrates with SaaS applications and cloud environments to scan for misconfigurations, unauthorized user activity, <GlossaryTooltip term="shadow IT" link="https://www.cloudflare.com/learning/access-management/what-is-shadow-it/">shadow IT</GlossaryTooltip>, and other data security issues that can occur after a user has successfully logged in.

For a list of available findings, refer to [Cloud and SaaS integrations](/cloudflare-one/integrations/cloud-and-saas/).

## Manage CASB integrations

<Render file="casb/manage-integrations" product="cloudflare-one" />
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ Findings are security issues detected within SaaS and cloud applications that in

## Prerequisites

- You have [added](/cloudflare-one/applications/casb/#add-an-integration) a CASB integration.
- You have added a [CASB integration](/cloudflare-one/integrations/cloud-and-saas/).
- Your scan has surfaced at least one security finding.

## Posture findings
Expand Down Expand Up @@ -64,11 +64,11 @@ To view details about the content findings that CASB found:

CASB will display details about your content finding, including the file name, a link to the file, matching DLP profiles, associated integration, and date detected.

AWS users can configure a [compute account](/cloudflare-one/applications/casb/casb-integrations/aws-s3/#compute-account) to scan for data security resources within their S3 resources.
AWS users can configure a [compute account](/cloudflare-one/integrations/cloud-and-saas/aws-s3/#compute-account) to scan for data security resources within their S3 resources.

## View shared files

File findings for some integrations (such as [Microsoft 365](/cloudflare-one/applications/casb/casb-integrations/microsoft-365/#file-sharing) and [Box](/cloudflare-one/applications/casb/casb-integrations/box/#file-sharing)) may link to an inaccessible file. To access the actual shared file:
File findings for some integrations (such as [Microsoft 365](/cloudflare-one/integrations/cloud-and-saas/microsoft-365/#file-sharing) and [Box](/cloudflare-one/integrations/cloud-and-saas/box/#file-sharing)) may link to an inaccessible file. To access the actual shared file:

<Tabs> <TabItem label="Posture finding">

Expand Down Expand Up @@ -114,7 +114,7 @@ The instance will be moved from **Active** to **Hidden** within the finding. If

In addition to detecting and surfacing misconfigurations or issues with SaaS and cloud applications, CASB can also remediate findings directly in applications.

CASB supports remediation for findings from the [Microsoft 365 integration](/cloudflare-one/applications/casb/casb-integrations/microsoft-365/):
CASB supports remediation for findings from the [Microsoft 365 integration](/cloudflare-one/integrations/cloud-and-saas/microsoft-365/):

<Details header="Supported CASB findings for remediation">

Expand All @@ -127,7 +127,7 @@ CASB supports remediation for findings from the [Microsoft 365 integration](/clo

### Configure remediation permissions

Before you can remediate findings, [add a new integration](/cloudflare-one/applications/casb/#add-an-integration) and choose _Read-Write mode_ during setup. Alternatively, you can update an existing integration:
Before you can remediate findings, [add a new integration](/cloudflare-one/integrations/cloud-and-saas/#add-an-integration) and choose _Read-Write mode_ during setup. Alternatively, you can update an existing integration:

1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **CASB** > **Integrations**.
2. Choose your integration, then select **Configure**.
Expand Down Expand Up @@ -170,7 +170,7 @@ CASB will log remediation actions in **Logs** > **Admin**. For more information,

Using the security findings from CASB allows for fine-grained Gateway policies which prevent future unwanted behavior while still allowing usage that aligns to your organization's security policy. You can view a CASB finding, like the use of an unapproved application, then immediately prevent or control access with Gateway.

CASB supports creating a Gateway policy for findings from the [Google Workspace integration](/cloudflare-one/applications/casb/casb-integrations/google-workspace/):
CASB supports creating a Gateway policy for findings from the [Google Workspace integration](/cloudflare-one/integrations/cloud-and-saas/google-workspace/):

<Details header="Supported CASB findings for Gateway policies">

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -17,10 +17,10 @@ A DLP profile is a collection of regular expressions and [detection entries](/cl
product="cloudflare-one"
/>

You can now use this profile in a [DLP policy](/cloudflare-one/data-loss-prevention/dlp-policies/#2-create-a-dlp-policy) or [CASB integration](/cloudflare-one/applications/casb/casb-dlp/).
You can now use this profile in a [DLP policy](/cloudflare-one/data-loss-prevention/dlp-policies/#2-create-a-dlp-policy) or [CASB integration](/cloudflare-one/cloud-and-saas-findings/casb-dlp/).

## Build a custom profile

<Render file="data-loss-prevention/custom-profile" product="cloudflare-one" />

You can now use this profile in a [DLP policy](/cloudflare-one/data-loss-prevention/dlp-policies/#2-create-a-dlp-policy) or [CASB integration](/cloudflare-one/applications/casb/casb-dlp/).
You can now use this profile in a [DLP policy](/cloudflare-one/data-loss-prevention/dlp-policies/#2-create-a-dlp-policy) or [CASB integration](/cloudflare-one/cloud-and-saas-findings/casb-dlp/).
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ sidebar:

:::note

Integration profiles require [Cloudflare CASB](/cloudflare-one/applications/casb/).
Integration profiles require [Cloudflare CASB](/cloudflare-one/integrations/cloud-and-saas/).
:::

Cloudflare DLP integration profiles enable data loss prevention support for third-party data classification providers. Data classification information is retrieved from the third-party platform and populated into a DLP Profile. You can then enable detection entries in the profile and create a DLP policy to allow or block matching data.
Expand All @@ -20,7 +20,7 @@ Microsoft provides [Purview Information Protection sensitivity labels](https://l

### Setup

To add MIP sensitivity labels to a DLP Profile, simply integrate your Microsoft account with [Cloudflare CASB](/cloudflare-one/applications/casb/casb-integrations/microsoft-365/). A new integration profile will appear under **Data loss prevention** > **DLP profiles**. The profile is named **MIP Sensitivity Labels** followed by the name of the CASB integration.
To add MIP sensitivity labels to a DLP Profile, simply integrate your Microsoft account with [Cloudflare CASB](/cloudflare-one/integrations/cloud-and-saas/microsoft-365/). A new integration profile will appear under **Data loss prevention** > **DLP profiles**. The profile is named **MIP Sensitivity Labels** followed by the name of the CASB integration.

MIP sensitivity labels can also be added to a [custom DLP profile](/cloudflare-one/data-loss-prevention/dlp-profiles/#build-a-custom-profile) as an existing entry.

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
pcx_content_type: concept
title: Data loss prevention
sidebar:
order: 10
order: 12
learning_center:
title: What is DLP (data loss prevention)?
link: https://www.cloudflare.com/learning/access-management/what-is-dlp/
Expand Down Expand Up @@ -30,9 +30,9 @@ To get started, refer to [Scan HTTP traffic with DLP](/cloudflare-one/data-loss-

## Data at rest

Data Loss Prevention complements [Cloudflare CASB](/cloudflare-one/applications/casb/) to detect sensitive data stored in your SaaS applications. Unlike data in transit scans which read files sent through Cloudflare Gateway, CASB retrieves files directly via the API. Therefore, Gateway and WARP settings (such as [Do Not Inspect](/cloudflare-one/traffic-policies/http-policies/#do-not-inspect) policies and [Split Tunnel](/cloudflare-one/team-and-resources/devices/warp/configure-warp/route-traffic/split-tunnels/) configurations) will not affect data at rest scans.
Data Loss Prevention complements [Cloudflare CASB](/cloudflare-one/integrations/cloud-and-saas/) to detect sensitive data stored in your SaaS applications. Unlike data in transit scans which read files sent through Cloudflare Gateway, CASB retrieves files directly via the API. Therefore, Gateway and WARP settings (such as [Do Not Inspect](/cloudflare-one/traffic-policies/http-policies/#do-not-inspect) policies and [Split Tunnel](/cloudflare-one/team-and-resources/devices/warp/configure-warp/route-traffic/split-tunnels/) configurations) will not affect data at rest scans.

To get started, refer to [Scan SaaS applications with DLP](/cloudflare-one/applications/casb/casb-dlp/).
To get started, refer to [Scan SaaS applications with DLP](/cloudflare-one/cloud-and-saas-findings/casb-dlp/).

## Supported file types

Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
---
pcx_content_type: navigation
title: Scan SaaS apps
external_link: /cloudflare-one/applications/casb/casb-dlp/
external_link: /cloudflare-one/cloud-and-saas-findings/casb-dlp/
sidebar:
order: 2
---
2 changes: 1 addition & 1 deletion src/content/docs/cloudflare-one/email-security/index.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
title: Email Security
pcx_content_type: overview
sidebar:
order: 9
order: 10
---

import { Description, Render } from "~/components";
Expand Down
Loading
Loading