You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/api-shield/management-and-monitoring/endpoint-labels.mdx
+36-3Lines changed: 36 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -59,9 +59,9 @@ Use managed labels to identify endpoints by use case. Cloudflare may automatical
59
59
60
60
Cloudflare automatically runs risk scans every 24 hours on your saved endpoints. API Shield applies these labels when a scan finds security risks on your endpoints. A corresponding Security Center Insight is also raised when risks are found.
61
61
62
-
`cf-risk-missing-auth`: Automatically added when all successful requests lack a session identifier. Refer to the table below for more information.
62
+
`cf-risk-missing-auth`: Automatically added when all successful requests lack a session identifier. Refer to [Authentication Posture](/api-shield/security/authentication-posture/#process) for more information.
63
63
64
-
`cf-risk-mixed-auth`: Automatically added when some successful requests contain a session identifier and some successful requests lack a session identifier. Refer to the table below for more information.
64
+
`cf-risk-mixed-auth`: Automatically added when some successful requests contain a session identifier and some successful requests lack a session identifier. Refer to [Authentication Posture](/api-shield/security/authentication-posture/#process) for more information.
65
65
66
66
`cf-risk-sensitive`: Automatically added to endpoints when HTTP responses match the WAF's [Sensitive Data Detection](/api-shield/management-and-monitoring/#sensitive-data-detection) ruleset.
67
67
@@ -81,7 +81,40 @@ Cloudflare automatically runs risk scans every 24 hours on your saved endpoints.
81
81
Cloudflare will only add authentication labels to endpoints with successful response codes. Refer to the below table for more details.
How you address risks to your endpoints will depend on its label(s). The following steps provide you with general guidelines on how to take action on them.
87
+
88
+
<Steps>
89
+
1. Review risks to endpoints.
90
+
91
+
View the endpoints labeled as risks and identify if they have been labeled for other risks.
92
+
93
+
For example, endpoints labeled `cf-risk-sensitive` and `cf-risk-missing-auth` or `cf-risk-mixed-auth` may contain sensitive data that is available to unauthenticated users.
Go to the details pages for endpoints labeled as `cf-risk-missing-auth` or `cf-risk-mixed-auth`, and check for recent changes in the authenticated traffic profile in the last 24 hours and seven days.
98
+
99
+
2. Review traffic to these labeled endpoints in Security Analytics.
100
+
101
+
Check for unexpected traffic sources and note any irregular traffic patterns.
102
+
103
+
:::caution[Filtering]
104
+
Filtering by risk label includes all traffic to all endpoints labeled with that risk, not only the traffic that prompted Cloudflare to apply the label.
3. Review your origin's authorization and authentication policies with your development team.
110
+
111
+
Speak with your developers or application owners in your organization to understand whether or not all requests to these endpoints should be authenticated. Modify your application to consistently enforce the authentication requirement for all traffic accessing these endpoints.
112
+
113
+
Refer to [Authentication Posture](/api-shield/security/authentication-posture/) for more information.
0 commit comments