Firewall Rules are one of the best security features we released this year and have been an overwhelming success. Customers have been using Firewall Rules to solve interesting security related use cases; for example, advanced hotlink protection, restricting access to embargoed content (e.g. productId=1234), locking down sensitive API endpoints, and more.
One of the biggest pieces of feedback from the Cloudflare community, Twitter, and via customer support, has been around the order in which rules are actioned. By default, Firewall Rules have a default precedence, based on the actions set on the rule:
If two or more rules match a request, but have different actions, the above precedence will take effect. However, what happens if you've got a bad actor who needs to be blocked from your API, and you have other specific allow or challenge rules already created for their originating ASN or a perhaps one of your URLs? Once a Firewall Rule is matched, it will not continue processing other rule, unless you are using the Log action. Without a method of overriding the default precedence, you cannot easily achieve what's needed.
Today, we’re launching the ability for customers to change the ordering of their rules. Continue reading
The technology is still in its infancy with only a handful of vendors shipping products. We expect to see more action in 2019.
Service meshes will be an important component of your containerized environments whether on-premises or in the cloud.
It’s been a long year – over 230 blog posts, 30 live webinar sessions, three online courses, half-dozen workshops, tons of presentations… it’s time Irena and myself disconnect, and so should you.
Wish you a quiet and merry Christmas with your loved ones and all the best in 2019! We’ll be back in early January.
While the government didn’t name the network providers, Reuters reports that HPE and IBM were among the compromised networks.
In the fall I did a blog post and talk on RPKI about how the current methods of measuring RPKI deployment are broken because they do not take
The Kubernetes project made a lot of progress in 2018 in terms of maturity, stability, and scalability, which helped drive M&A activity and a greater focus on security.
It concludes that IT teams are looking to new technologies like artificial intelligence to meet their data center demands.
Oracle had previously tried to create its own SD-WAN technology, but it couldn’t get it to market fast enough for its customers.
As we wrap up the year, I want to reflect on some lessons learned and preview a few changes coming to SDxCentral in 2019. When 2018 started, we took a hard look at what was valued by our audience and realized we had overextended ourselves in some areas and underinvested in others. As part of... ...