Skip to content

Commit 063fdd8

Browse files
[API Shield] Risk labeled endpoints next steps (#27982)
* risk labeled endpoints next steps * remove table, use link * Update src/content/docs/api-shield/management-and-monitoring/endpoint-labels.mdx Co-authored-by: marciocloudflare <83226960+marciocloudflare@users.noreply.github.com> --------- Co-authored-by: marciocloudflare <83226960+marciocloudflare@users.noreply.github.com>
1 parent e93f814 commit 063fdd8

1 file changed

Lines changed: 36 additions & 3 deletions

File tree

src/content/docs/api-shield/management-and-monitoring/endpoint-labels.mdx

Lines changed: 36 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -59,9 +59,9 @@ Use managed labels to identify endpoints by use case. Cloudflare may automatical
5959

6060
Cloudflare automatically runs risk scans every 24 hours on your saved endpoints. API Shield applies these labels when a scan finds security risks on your endpoints. A corresponding Security Center Insight is also raised when risks are found.
6161

62-
`cf-risk-missing-auth`: Automatically added when all successful requests lack a session identifier. Refer to the table below for more information.
62+
`cf-risk-missing-auth`: Automatically added when all successful requests lack a session identifier. Refer to [Authentication Posture](/api-shield/security/authentication-posture/#process) for more information.
6363

64-
`cf-risk-mixed-auth`: Automatically added when some successful requests contain a session identifier and some successful requests lack a session identifier. Refer to the table below for more information.
64+
`cf-risk-mixed-auth`: Automatically added when some successful requests contain a session identifier and some successful requests lack a session identifier. Refer to [Authentication Posture](/api-shield/security/authentication-posture/#process) for more information.
6565

6666
`cf-risk-sensitive`: Automatically added to endpoints when HTTP responses match the WAF's [Sensitive Data Detection](/api-shield/management-and-monitoring/#sensitive-data-detection) ruleset.
6767

@@ -81,7 +81,40 @@ Cloudflare automatically runs risk scans every 24 hours on your saved endpoints.
8181
Cloudflare will only add authentication labels to endpoints with successful response codes. Refer to the below table for more details.
8282
:::
8383

84-
<Render file="label-methodology" product="api-shield" />
84+
#### Recommended action
85+
86+
How you address risks to your endpoints will depend on its label(s). The following steps provide you with general guidelines on how to take action on them.
87+
88+
<Steps>
89+
1. Review risks to endpoints.
90+
91+
View the endpoints labeled as risks and identify if they have been labeled for other risks.
92+
93+
For example, endpoints labeled `cf-risk-sensitive` and `cf-risk-missing-auth` or `cf-risk-mixed-auth` may contain sensitive data that is available to unauthenticated users.
94+
95+
<DashButton url="/?to=/:account/:zone/security/web-assets" />
96+
97+
Go to the details pages for endpoints labeled as `cf-risk-missing-auth` or `cf-risk-mixed-auth`, and check for recent changes in the authenticated traffic profile in the last 24 hours and seven days.
98+
99+
2. Review traffic to these labeled endpoints in Security Analytics.
100+
101+
Check for unexpected traffic sources and note any irregular traffic patterns.
102+
103+
:::caution[Filtering]
104+
Filtering by risk label includes all traffic to all endpoints labeled with that risk, not only the traffic that prompted Cloudflare to apply the label.
105+
:::
106+
107+
<DashButton url="/?to=/:account/:zone/security/analytics" />
108+
109+
3. Review your origin's authorization and authentication policies with your development team.
110+
111+
Speak with your developers or application owners in your organization to understand whether or not all requests to these endpoints should be authenticated. Modify your application to consistently enforce the authentication requirement for all traffic accessing these endpoints.
112+
113+
Refer to [Authentication Posture](/api-shield/security/authentication-posture/) for more information.
114+
115+
</Steps>
116+
117+
---
85118

86119
## Create a label
87120

0 commit comments

Comments
 (0)