test customer
Cloudflare Zero Trust · owner dror@globaldots.com · status scoping · 50 test users · target 2026-05-14
SSO
access Not started POC must haveAll POC applications authenticate through the customer IdP (SAML or OIDC) with MFA enforced. No local accounts, no per-app identity duplication.
TLS termination
security Not started POC must haveTLS terminates at the vendor edge (for published apps and for inline inspection of user traffic) using customer-approved certificates and cipher policy. The customer can see where termination happens and validate the chain.
Monitoring AI usage via TLS decryption
security Not started POC should haveUsage of public GenAI tools (ChatGPT, Gemini, Claude, Copilot, etc.) is visible in logs and governable by policy — who, what tool, how often, what was sent — via inline TLS decryption on the user's outbound traffic.
LLM API-based observability and guardrails
security Not started POC nice to haveFor LLM calls the business itself makes (application backends, internal agents, AI copilots), a vendor-provided layer sits between the app and the model provider — observing prompts/responses, enforcing guardrails, and surfacing usage and cost in a dashboard.
Clientless access
access Not started POC must haveUsers and third parties can reach internal web apps from a plain browser with no agent installed, authenticated via the IdP and governed by policy — reducing the unmanaged-device / contractor friction of traditional VPNs.
Access to internet (SWG)
security Not started POC must haveAll outbound user web traffic flows through the vendor's SWG with URL/category filtering, threat protection, and per-user reporting. Acceptable-use policy is enforced consistently on-site and off-site.
Access to internal environments (ZTNA)
connectivity Not started POC must haveUsers reach specific internal apps and resources (web, SSH, RDP, DB, thick-client) based on identity + device posture — replacing broad VPN network access.
Hostname-based routing
connectivity Not started POC must haveInternal apps can be published and reached on a customer-chosen hostname (public or private), with the vendor making policy decisions based on the hostname — no need to expose raw IPs or re-IP when apps move.
Terraform support
operations Not started POC must haveThe vendor is configurable via a maintained Terraform provider — identity, policy, apps, tunnels, sites — so the customer can manage the estate as code in their existing pipelines.
SIEM setup
observability Not started Project kickoff must haveAccess, security, and admin-change events stream to the customer's SIEM with documented fields and retention meeting policy. Alerts can be built off the stream.
Alerts and notifications
operations Not started Project kickoff should haveCritical events (tunnel down, cert expiry, policy change, quota breach, security incident) produce alerts to the right channel (email, Slack, webhook, PagerDuty) — no waiting for a user to report the outage.
MDM enforcement
access Not started POC must haveAccess is gated on the device being enrolled and compliant in the customer's MDM (Intune, JAMF, Kandji, Workspace ONE, etc.). Unmanaged or out-of-compliance devices are blocked or stepped-up regardless of user identity.
Tablet users can access browser based RDP
access custom Not started POC must haveCustomer has a large group of tablet based users who occasionally access rdp