One among our favourite ask-me-anything questions for firm conferences or panels at safety conferences is the basic: “What keeps you up at night?”
For a CISO, that query is perhaps a little bit of a nightmare in itself. It doesn’t have one single reply; it has dozens. It’s the fixed rigidity between enabling a globally distributed workforce to do their finest work, and making certain that “best work” doesn’t inadvertently open the door to a catastrophic breach.
We regularly discuss concerning the “zero trust journey,” however the actuality is that the journey is sort of actually paved with friction. If safety is just too cumbersome, customers discover artistic (and harmful) methods round it. If it’s seamless at the price of effectiveness, it may not be safe sufficient to cease a decided adversary.
At this time, we’re excited to announce two new instruments in Cloudflare’s SASE toolbox designed to modernize distant entry by eliminating the “dark corners” of your community safety with out including friction to the consumer expertise: obligatory authentication and Cloudflare’s personal multi-factor authentication (MFA).
Addressing the hole between set up and enforcement
If you deploy the Cloudflare One Shopper, you acquire unbelievable visibility and management. You’ll be able to apply insurance policies for permitted locations, outline the Web visitors that routes by means of Cloudflare, and arrange visitors inspection at each the applying and community layer. However there has all the time been a visibility problem from when there isn’t a consumer really authenticated.
This hole happens in two major eventualities:
A brand new machine: Cloudflare One Shopper is put in by way of cell machine administration (MDM), however the consumer has not authenticated but.
Re-authentication gray zone: The session expires, and the consumer, both out of forgetfulness or a want to bypass restrictions, doesn’t log again in.
In both case, the machine is now unknown. That is harmful. You lose visibility, and your safety posture reverts to regardless of the native machine permits.
Introducing obligatory authentication
To shut this loop, we’re introducing obligatory authentication. When enabled by way of your MDM configuration, the Cloudflare One Shopper turns into the gatekeeper of Web entry from the second the machine boots up.
If a consumer shouldn’t be actively authenticated, the Cloudflare One consumer will:
Block all Web visitors by default utilizing the system firewall.
Enable visitors from the machine consumer’s authentication stream utilizing a process-specific exception.
Immediate customers to authenticate, guiding them by means of the method, so that they don’t need to hunt for the best buttons.
By making authentication a prerequisite for connectivity, you make sure that each managed machine is accounted for, on a regular basis.
Be aware: obligatory authentication will develop into accessible in our Cloudflare One consumer on Home windows initially, with help for different platforms to observe.
When one supply of belief shouldn’t be sufficient
Most organizations have moved towards single sign-on (SSO) as their major safety anchor. If you happen to use Okta, Entra ID, or Google, you seemingly require MFA on the preliminary login. That’s a terrific begin, however in a contemporary menace panorama, it’s now not the end line.
The exhausting fact is that identification suppliers (IdPs) are high-value targets. If an attacker efficiently compromises a consumer’s SSO session, maybe by means of a classy session hijacking or social engineering, they successfully maintain the keys to each utility behind that SSO.
Cloudflare’s impartial MFA: a secondary root of belief
That is the place Cloudflare’s MFA may help. Consider this as a “step-up MFA” that lives on the community edge, impartial of your IdP.
By remaining separate out of your IdP, this introduces one other authority that has to “sign off” on any consumer attempting to entry a protected useful resource. Which means even when your major IdP credentials are compromised or spoofed, an attacker will hit a wall when attempting to entry one thing like your manufacturing database—as a result of they don’t have entry to the second issue.
Cloudflare Entry will supply just a few totally different technique of offering MFA:
Biometrics (i.e., Home windows Hey, Apple Contact ID, and Apple Face ID)
Safety key (WebAuthn and FIDO2 in addition to PIV for SSH with Entry for Infrastructure)
Time-based one-time password (TOTP) by means of authenticator apps
Directors could have the flexibleness to outline how customers should authenticate and the way typically. This may be configured not solely at a world degree (i.e., set up obligatory MFA for all Entry purposes), but additionally with extra granular controls for particular purposes or insurance policies. For instance, your group might resolve to permit decrease assurance MFA strategies for chat apps, however require a safety key for entry to supply code.
Or, you may implement sturdy MFA to delicate assets for third-parties like contractors, who in any other case might use a private electronic mail or social identification like LinkedIn. It’s also possible to simply add trendy MFA strategies to legacy apps that don’t in any other case help it natively, with out touching a line of code.
Finish customers will have the ability to enroll an MFA machine simply by means of their App Launcher.
Instance of what customizing MFA settings for an Entry coverage might appear to be. Be aware: It is a mockup and will change.
Cloudflare’s impartial MFA is in closed beta with new clients being onboarded every week. You’ll be able to request entry right here to check out this new characteristic!
Serving to CISOs sleep at night time
Safety is usually a sport of “closing the loop.” By making certain that units are registered and authenticated earlier than they will contact the open Web and by requiring an impartial second layer of verification in your most valuable belongings, we’re making the “blast radius” of a possible assault considerably smaller.
These options do not simply add safety; they add certainty. Certainty that your insurance policies are being enforced and certainty {that a} single compromised password will not result in a complete breach.
We’re transferring past easy entry management and right into a world of steady, automated posture enforcement. And we’re simply getting began.
Able to lock down your fleet? You’ll be able to get began right now with Cloudflare One at no cost for as much as 50 customers.
We’re excited to see how you utilize these instruments to harden your perimeter and simplify your customers’ day-to-day workflows. As all the time, we’d love to listen to your suggestions! Be part of us within the Cloudflare Neighborhood or attain out to your account crew to share your ideas.



