Cloudflare, Inc.

Cloudflare One Secure Access Service Edge (SASE)

Cloudflare SASE, Cloudflare One, is a Zero Trust network-as-a-service platform that dynamically connects users to enterprise resources, with identity-based security controls delivered close to users.

Replace expensive, proprietary circuits with a single Anycast global network built for ZTNA with DDoS mitigation, network firewalling, and traffic acceleration.


  • Zero Trust Network Access (ZTNA); identity and context based rules
  • Secure Web Gateway with DNS, HTTP, network, browser isolation rules
  • Network-as-a-Service (NaaS) and Firewall-as-a-service, replaces MPLS with SD-WAN type architecture
  • Agent-based or agentless access: any application, private network, Internet destination
  • Secure access to self-hosted and SaaS applications
  • Managed DNS and DNS Gateway capability
  • Any-to-any connectivity with faster performance, built-in security, and increased resiliency
  • Clientless access enables onboarding any user or device in minutes
  • Integrated cloud access security broker (CASB) and DLP modules
  • Integrated L3-L7 network services, all accessible from a single dashboard


  • ZTNA reduces VPN costs and attack risk against key applications
  • Reduce attack surface and shorten remediation times
  • Securely connect any user to any application and private network
  • Block known and unknown Internet threats . Easily control dataflows
  • Enforce stateful inspection rules on all inbound and outbound traffic
  • Replace your legacy WAN architecture with our global private backbone
  • Onboard entire public and private IP subnets
  • As-a-service model reduces hardware costs
  • Reduce TCO by replacing up to 10 separate point products
  • Simpler, more flexible architecture. Trusted, secure connectivity. Faster, future-proof innovation


£52.07 a user a month

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 13

Service ID

6 2 7 3 6 9 1 4 9 1 2 6 0 8 2


Cloudflare, Inc. Sue Lal
Telephone: +44 7795 922146

Service scope

Service constraints
System requirements
  • Our solution is a cloud-based SaaS service
  • Supported OS/systems: Linux (amd64 / x86-64, x86 (32-bit),ARMv6, ARM64)
  • Supported OS/systems: macOS, Windows (32-bit, 64-bit), Docker

User support

Email or online ticketing support
Email or online ticketing
Support response times
Phone, chat, and email support with median response time of 15 minutes. For critical business issues, Enterprise customers have access to our 24/7/365 emergency phone support hotline
User can manage status and priority of support tickets
Online ticketing support accessibility
None or don’t know
Phone support
Phone support availability
24 hours, 7 days a week
Web chat support
Web chat
Web chat support availability
24 hours, 7 days a week
Web chat support accessibility standard
None or don’t know
How the web chat support is accessible
Cloudflare provides the delivery of the content ensuring speed, reliability, and security. The WCAG 2.0 standards would not apply as the proposed solution is not providing the content but delivering and securing it.
Web chat accessibility testing
Onsite support
Support levels
Enterprise customers can choose between standard Enterprise support and Premium Support.
Premium Enterprise support includes increased SLA response times and prioritised ticket handling.
Standard Enterprise is included as a part of the standard Enterprise contract.
Premium Support pricing is bespoke.
Enterprise customers receive a dedicated Customer Success Manager and Solutions Engineer.
Support available to third parties

Onboarding and offboarding

Getting started
Cloudflare assists enterprise customers start using our service in a consultative manner using various methods, including remote and on-site and written documentation.
Service documentation
Documentation formats
End-of-contract data extraction
The Cloudflare User Interface includes data aggregation logs, which include audit logs (log of every action taken within the interface and change to an account setting), as well as HTTP request logs. Data can be extracted via API in aggregate, or individual requests can be downloaded from the UI directly. Upon ending a contract, Cloudflare will advise customers on capturing all these data prior to account termination.
End-of-contract process
Cloudflare supports customers through the end of their contract and does not charge for reasonable off-boarding services. If a customer requires an extension of service during the off-boarding process, this may be subject to the same terms as the original contract, but will be determined through joint agreement between Cloudflare and the customer.

Using the service

Web browser interface
Using the web interface
Users can manage all aspects of onboarding and configuration of their internet properties via the Cloudflare dashboard.
Web interface accessibility standard
None or don’t know
How the web interface is accessible
Our web interface is visually accessible in all areas. Our text to background contrast ratios are high and we don't rely exclusively on colour to relay information anywhere. As our web app is almost 10 years old we have varying states of keyboard and screenreader accessibility across different sections. As of late all new components in our shared pattern library are built to be fully keyboard accessible. We have high coverage on using semantically appropriate markup in forms and utilising buttons instead of text links for interactable elements.
Web interface accessibility testing
We do conduct external and internal user-testing sessions where some portion of our test subjects opt to use assistive technologies, largely keyboard based users. We test in house as a part of our component development QA process for keyboard accessibility to ensure any job to be done defined in our product specs can be accomplished without the aid of a mouse.
What users can and can't do using the API
The Cloudflare API exposes the entire Cloudflare functionality via a programmatic interface. You can manage your account settings, configure products, and develop applications using the Cloudflare API.
API automation tools
API documentation
API documentation formats
Command line interface
Command line interface compatibility
  • Linux or Unix
  • Windows
  • MacOS
Using the command line interface
Cloudflare offers CLI via a Cloudflare Open Source GO repository named ""flarectl"" ( services can be provisioned, modified and deleted by using this as per the examples within the ReadMe.

Cloudflare also offers a Terraform integration that can be found here:


Scaling available
Scaling type
Independence of resources
Cloudflare's Anycast architecture and software-based security implementation ensure high reliability and scalability across our 270+ data centers, facilitating up to a 142 TB/sec throughput.

All of our services run on all of our servers, in every data center, paired with a 100% Anycast architecture. Anycast network routing is able to route incoming connection requests across multiple data centers.
Usage notifications
Usage reporting
  • Email
  • Other


Infrastructure or application metrics
Metrics types
  • HTTP request and response status
  • Network
Reporting types
  • API access
  • Real-time dashboards


Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Hardware containing data is completely destroyed
Equipment disposal approach
A third-party destruction service

Backup and recovery

Backup and recovery
What’s backed up
Cloudflare conducts daily backups to maintain its service to customers
Backup controls
N/A - Cloudflare conducts backups to ensure restoration of customer accounts in the event of a complete data loss or disaster scenario within its primary data center. Cloudflare only has limited customer data and does not host its customers' websites, therefore customers do not control what is backed up or recovered.
Datacentre setup
Multiple datacentres with disaster recovery
Scheduling backups
Supplier controls the whole backup schedule
Backup recovery
Users contact the support team

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
100% uptime guarantee
Approach to resilience
Cloudflare's network is based on Anycast routing, any one of thousands of servers in 270+ locations around the world is able to provide all of our service functionality on a given IP address. The network is the most interconnected network in the world - present in more Internet Exchanges globally than any other. The network is designed to cope with many nodes on the network map becoming unavailable and still providing service.
Datacenters are regularly taken offline for among other reasons maintenance without any service degradation. Should a certain location become unavailable due to high load from an attack, we will proactively re-route our prioritised Enterprise service level customers to ensure the minimal impact is seen for your application users in that region. 
Within each datacenter, no single server/node is responsible for any service. These are also distributed across all metals such that server failures, hardware or networking issues won't impact the service/performance of our customers.
Outage reporting
Public dashboard and email alerts

Identity and authentication

User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google apps)
  • Username or password
Access restrictions in management interfaces and support channels
Cloudflare provisions access based on the principles of least privilege and need to know. Additional access must be requested via our internal ticketing system and it requires both a legitimate business reason and manager approval. Logging and Monitoring Policy requires logging of activities in critical systems. We perform quarterly access reviews for privileged access

Cloudflare's 24/7 Detection and Response team monitors logs/alerts for malicious activity on both servers and endpoints.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Devices users manage the service through
  • Dedicated device on a government network (for example PSN)
  • Dedicated device over multiple services or networks
  • Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)
  • Directly from any device which may also be used for normal business (for example web browsing or viewing external email)

Audit information for users

Access to user activity audit information
You control when users can access audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
ISO/IEC 27001 accreditation date
What the ISO/IEC 27001 doesn’t cover
Our latest acquisition of Area 1 is currently not included. Work is commencing to include this in the future
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Who accredited the PCI DSS certification
PSC part of NCC Group
PCI DSS accreditation date
What the PCI DSS doesn’t cover
Our latest acquisition of Area 1 is currently not included. Work is commencing to include this in the future
Cyber essentials
Cyber essentials plus
Other security certifications
Any other security certifications
  • ISO 27701:2019
  • ISO 27018
  • SOC 2 Type II

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
ISO/IEC 27001
Information security policies and processes
Cloudflare has the following certifications/external accredited audits for compliance with these standards:
ISO 27001:2013
ISO 27701:2019
ISO 27018
SOC 2 Type II
PCI DSS 3.2.1

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Changes to server configurations must be tracked via Cloudflare's ticketing system. Changes are peer reviewed and receive additional review by a member of the Site Reliability Engineering team. Major changes require rollback procedures and are vetted for potential impact to products and services.
Major releases undergo Security Architecture reviews.Cloudflare conducts static code scans of its code base. Cloudflare also scans its dependencies for vulnerabilities.

Enterprise risk assessments are conducted annually, and targeted risk assessments are conducted throughout the year. Risks also include vulnerabilities and deficiencies that are observed by other teams.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Cloudflare's Vulnerability Management Policy is aligned with PCI-DSS, ISO27001, and SOC 2. Cloudflare subscribes to intelligence feeds and leverages open source vulnerability databases such as the NVD. Cloudflare has a Bug Bounty program in place which leverages a community of security researchers to uncover vulnerabilities that may have been missed by our penetration test.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
A 24/7 Detection and Response team monitors logs/alerts for malicious activity on both servers and endpoints.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Users can report incidents via the Cloudflare dashboard or Enterprise phone line. Cloudflare also monitors other channels, such as social media, to ensure that we are aware of any potential issue in the provision of service. Pre-defined processes exist for incident management, including common events. Incidents are subject to Cloudflare's Security Incident Response Policy, which includes requirements for root cause analysis and full reporting.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart

Energy efficiency

Energy-efficient datacentres
Description of energy efficient datacentres
Cloudflare has a main principle of adhering to the laws of any land within which it operates. It is no surprise that she expects the same exact approach from all vendors/suppliers.

Social Value

Fighting climate change

Fighting climate change

Our goal is simple: help build a better, greener Internet with no carbon emissions that is powered by renewable energy.

To help us get there, Cloudflare is making two announcements. The first is that we're committed to powering our network with 100% renewable energy. This builds on work we started back in 2018, and we think is clearly the right thing to do. We also believe it will ultimately lead to more efficient, more sustainable, and potentially cheaper products for our customers.

The second is that by 2025 Cloudflare aims to remove all greenhouse gases emitted as the result of powering our network since our launch in 2010. As we continue to improve the way we track and mitigate our carbon footprint, we want to help the Internet begin with a fresh start.

Finally, as part of our effort to track and mitigate our emissions, we're also releasing our first annual carbon emissions inventory report. The report will provide detail on exactly how we calculate our carbon emissions as well as our renewable energy purchases. Transparency is one of Cloudflare's core values. It's how we work to build trust with our customers in everything we do, and that includes our sustainability efforts.


£52.07 a user a month
Discount for educational organisations
Free trial available
Description of free trial
Entities who are evaluating Cloudflare's Enterprise service may conduct a Proof of Concept supported by Cloudflare, or sign up for a Free Account to trial our service.
Link to free trial

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.