Check out our Zero Trust roadmap for civil society and nonprofit groups to learn how to increase the security of your website and team, including where to start and how to leverage Cloudflare tools.
Through easy-to-follow steps and case studies, you will learn about topics such as:
Zero Trust security is a model that requires strict identity verification for every person and device trying to access resources on a private network, regardless of whether they are sitting within or outside of the network perimeter. More simply put: traditional IT network security trusts anyone and anything inside the network. A Zero Trust architecture trusts no one and nothing.
A Zero Trust approach helps organizations enforce processes that authenticate, authorize, and validate all users and devices that connect to the network. Amid the shift to remote work, many organizations are unaware of the relevant risks or lack the resources to afford security tools to protect their internal teams. With Zero Trust tools such as Access and Gateway, you can use trusted access controls and inspect, secure, and log traffic from employees’ and volunteers' devices.
With Access, you can easily prevent unauthorized access to internal resources with identity- and posture-based rules to keep sensitive data from leaving your organization. It replaces a VPN client by securing SaaS and internal applications with a Zero Trust approach.
Access evaluates requests to internal applications and determines whether users are authorized based on defined policies. These policies and security rules are enforced when users connect to the Cloudflare network. Once the user is authenticated and authorized, they can access the internal resource.
Watch a 30-minute demo of Access.
Secure web gateways (SWG) protect an organization's data and enforce security policies. SWGs operate in between an organization's employees and the Internet.
Like a water filter, which removes impurities from water so it is safe to drink, SWGs filter unsafe content from web traffic to stop cyber threats and data breaches. They also block risky or unauthorized user behavior.
Watch a 30-minute demo of Gateway.
When a client device sends a request to a website or application on the Internet, the request travels through the gateway first. The gateway inspects the request and passes it along only if it does not violate established security policies. A similar process occurs in reverse: all incoming data is inspected by the SWG before it is passed along to users.
Because SWGs can run anywhere, they are helpful for managing remote employees and volunteers. By requiring remote workers to access the Internet through a secure web gateway, organizations can better prevent sensitive data from being stolen, as Gateway prevents users from clicking on malicious links, even if the organization does not have direct control over employee devices and networks.
To start protecting your network with Gateway, we recommend the following workflow: