Skip to content

Scan for sensitive data

You can use Cloudflare Data Loss Prevention (DLP) to discover if files stored in a SaaS application contain sensitive data. To perform DLP scans in a SaaS app, first configure a DLP profile (a set of patterns that define what counts as sensitive data) with the data patterns you want to detect, then add the profile to a CASB integration.

Supported integrations

Configure a DLP profile

You may either use DLP profiles predefined by Cloudflare, or create your own custom profiles based on regex, predefined detection entries, datasets, and document fingerprints.

Configure a predefined profile

  1. In the Cloudflare dashboard, go to Zero Trust > Data loss prevention > Profiles.
  2. Choose a predefined profile and select Edit.
  3. Enable one or more Detection entries according to your preferences.
  4. Select Save profile.

Most predefined profiles match when any enabled detection entry matches. The Personally Identifiable Information (PII) Record profile is an exception and requires at least three unique detection entries in close proximity before the profile matches.

Your DLP profile is now ready to use with CASB.

Build a custom profile

  1. In the Cloudflare dashboard, go to Zero Trust > Data loss prevention > Profiles.

  2. Select Create profile.

  3. Enter a name and optional description for the profile.

  4. Add new or existing detection entries to the profile.

    Add a custom entry

    1. Select Add custom entry.

    2. Choose the type of detection entry you want to create and configure its values.

      For information on supported detection entry types, refer to Configure detection entries.

    3. To save the detection entry, select Done.

    Add existing entries

    Existing entries include predefined and user-defined detection entries that you manage from the Detection entries section.

    1. Select Add existing entries.
    2. Choose which entries you want to add, then select Confirm.
    3. To save the detection entry, select Done.
  5. (Optional) Add data classes to include reusable classification rules.

    1. Select Add data classes.
    2. Choose the data classes you want to add, then select Confirm.
  6. (Optional) Use labels as match criteria for the profile.

    • Select a sensitivity schema and minimum sensitivity level.
    • Select a data tag group and one or more data tags.

    For more information on labels, templates, and data classes, refer to Data Classification.

  7. (Optional) Configure profile settings for the profile.

  8. Select Save profile.

Your DLP profile is now ready to use with CASB.

For more information, refer to Configure a DLP profile.

Enable DLP scans in CASB

Add a new integration

  1. In the Cloudflare dashboard, go to Zero Trust > Integrations > Cloud & Saas.
  2. Select Add integration and choose a supported integration.
  3. During the setup process, you will be prompted to select DLP profiles for the integration.
  4. Select Save integration.

CASB will scan every publicly accessible file in the integration for text that matches the DLP profile. The initial scan may take up to a few hours to complete.

Modify an existing integration

  1. In the Cloudflare dashboard, go to Zero Trust > Integrations > Cloud & SaaS.
  2. Choose a supported integration and select Configure.
  3. Under DLP profiles, select the profiles that you want the integration to scan for.
  4. Select Save integration.

If you enable a DLP profile from the Manage integrations page, CASB will only scan publicly accessible files that have had a modification event since enabling the DLP profile. Modification events include changes to the following attributes:

  • Contents of the file
  • Name of the file
  • Visibility of the file (only if changed to publicly accessible)
  • Owner of the file
  • Location of the file (for example, moved to a different folder)

Limitations

DLP in CASB will only scan:

  • Files less than or equal to 100 MB in size.
  • Java and R source code files that are at least 5 KB. Smaller files in these languages are skipped.