Episode 3: Secure remote access to your critical infrastructure
Presented by: Simon Thorpe
Originally aired on March 3, 2025 @ 2:00 PM - 2:30 PM EST
Applications, databases and their servers are running in a variety of locations. From on-premises data centers to cloud hyperscalers, making the need to secure administrative access more important than ever. In this video learn how Cloudflare's SASE platform can provide highly secure access, leveraging a modern ZTNA service to implement zero trust principles for access to your critical infrastructure.
Chapters:
00:00 Introduction to SASE and Securing Access to Critical Infrastructure
00:50 Connecting and Securing Private Servers with Cloudflare Tunnels
00:02:12 Using Internal DNS to Securely Resolve Private Network Resources
00:03:01 Connecting User Devices Securely with Cloudflare’s Device Agent
00:03:48 Enforcing Access Control with Identity, Network and Device Based Security Policies
00:05:03 Auditing and Logging Access to Critical Infrastructure
Watch the rest of the videos in our series to learn more about Cloudflare's SASE platform.
And if you want one of our experts to do a deep dive workshop into how you can integrate Cloudflare into your existing environment, contact us: https://www.cloudflare.com/zero-trust/
English
Cloudflare
cybersecurity
deviceprotection
dnssecurity
identitymanagement
networksecurity
sase
secureaccess
zerotrust
ztna
Transcript (Beta)
Secure Access Service Edge or SASE solutions incorporate Zero Trust Network Access or ZTNA to provide access to applications such as an internal wiki or HR system.
But what about critical high -risk services such as a database administration tool or servers requiring access via SSH or RDP.
In these cases it's important to be able to ensure tight security from the device all the way to the application and allow authorized users who are using strong authentication on trusted devices.
Let's say we need to secure access to a database admin app such as PGAdmin, a common web interface for Postgres databases and also access to SSH on the same server.
Imagine we have an example environment and in it we've already created connectivity from the server to Cloudflare using a software agent that maintains a secure tunnel from the private network where the PGAdmin server is running back to the Cloudflare network.
No private server IP addresses are going to be exposed to the Internet.
We're essentially connecting this server to our new corporate network managed by Cloudflare.
Once connected there are two methods by which we can access our private server.
Method one is to create a public hostname which resolves to Cloudflare which in turn proxies and routes the traffic for that specific hostname to that application at the end of our tunnel.
And this method allows anyone anywhere on any device to easily access the application.
But that's not enough.
In this scenario we want to implement even tighter security. So method two is to configure the tunnel to proxy access only to the server IP with no public DNS record and only for trusted users with managed devices that are connected to the Cloudflare network.
So none of this server has any public exposure.
Now to provide access to only database admins there are a few things we need to do.
We need to use an internal hostname that resolves to our server. We need to connect to the user device to the Cloudflare managed network and we need to identify who the user is and if their device has a good security posture.
So let's first look at how we do the internal DNS resolution because nobody likes using IP addresses to access services.
With the exception of 1.1.1.1 because it's the easiest IP address on the Internet to remember.
So we really should always be using hostnames.
With Cloudflare it's as simple as connecting a private DNS service to the network and then building a policy that says any request from a user or a network anywhere on the Cloudflare network for an internal domain should be answered by that specific DNS service.
In this example we're going to connect it to Cloudflare using exactly the same tunnel software that we're using for the database server.
So at this point we have a database admin tool that's connected to Cloudflare and we have an ability to resolve the IP address of that private network using an internal hostname.
Next we need to securely connect the user device to Cloudflare so that all traffic destined for our database server is over secure channels.
We do this using a similar piece of software we used on the server but one that's designed for user devices.
It supports macOS, Windows, Linux, iOS and Android and connects the device to Cloudflare using a secure tunnel.
But the agent can actually provide information about the security posture of the device and we'll talk about that later when we look at the policy itself.
So once the user device is connected to Cloudflare requests for private applications are resolved using the internal DNS service and traffic is routed from the device through Cloudflare through secure tunnels down to the private IP the application is running on.
Now we have secured connectivity all the way from the device to the server.
The last thing we need to do is actually write a policy which enforces access only to users that you authorize and that the device they're on meets a certain level of security.
We use information from our device agent and also leverage your existing identity and device services to help build that policy.
Cloudflare is typically integrated with one or more identity providers.
Usually your company has a central directory for employees but you can also add more.
For example you might manage contractors in a different directory.
Cloudflare can also integrate with XDR platforms such as CrowdStrike and Sentinel One and these give us information we can use in the policy regards to the security posture of the device.
You know such as if the device is free of malware. For our own agent we can provide information about the device such as is the hard disk encrypted or if the local firewall is enabled.
So now we have all the information about the user, their device and how they're connected to Cloudflare.
A policy can be created which only allows users who have authenticated using a strong factor such as MFA using a hard token that they also exist in a group such as IT administrators and they're using a secure device free of malware.
This policy sits in front of access to both the database admin tool and the SSH service.
Finally because you might want a record of all access to the database administration tool you can optionally inject a page after the authentication asking for justification for access to the app and that gets audited and logged in Cloudflare.
So in summary you've seen an example of how Cloudflare can protect access to some of your critical infrastructure using our SASE platform.
We can help lock down access to servers only from highly authenticated users on tightly managed devices that must be connected to your new corporate network all managed by Cloudflare.
Well thanks for watching this video is part of a series which explains how to build your new corporate network using Cloudflare's SASE platform.
You can watch the other videos in this series to learn more.
Hi I'm Simon from Cloudflare. Congrats on finding this video. We also cover a wide variety of topics including application security, corporate networking and all the developer content the Internet can hold.
Follow us online and thanks for watching.