Custom Indicator Feeds
Cloudflare’s threat intelligence team crowdsources attack trends and protects users automatically, such as from zero-day vulnerabilities like the HTTP/2 Rapid Reset attack ↗. However, in some cases, Cloudflare will partner with external entities that have their own feeds which can be shared with eligible Cloudflare users.
With Custom Indicator Feeds, Cloudflare provides a threat intelligence feed based on data received from various Cyber Defense Collaboration groups. The security filtering capabilities are available to eligible public and private sector organizations.
Publicly available feeds
Cloudflare provides some feeds to Gateway users without the need to establish a provider relationship.
Name | Description | Availability |
---|---|---|
Treasury Early Indicator Feed ↗ | Threat data for financial institutions provided by the US Department of Treasury and Pacific Northwest National Laboratory (PNNL). For more information, contact your account team. | Approved financial services organizations |
UK NCSC Public Threat Indicators ↗ | Recursive DNS service supplied by the UK National Cyber Security Centre (NCSC) to block DNS-based malware. | All users |
Get started
Cloudflare threat intelligence data consists of a data exchange between providers and subscribers.
A provider is an organization that has a set of data that they are interested in sharing with other Cloudflare organizations. Any organization can be a provider. Examples of current providers are Government Cyber Defense groups.
Subscribers can be any Cloudflare customer that wants to secure their environment further by creating rules based on provider datasets. Subscribers must be authorized by a provider. Authorization is granted using the Grant permission to indicator feed endpoint.
If your organization is interested in becoming a provider or a subscriber, contact your account team.
Create a Custom Indicator Feed
Providers can create and manage a Custom Indicator Feed with the Custom Indicator Feeds API endpoints:
-
Contact your account team to configure your account as an indicator feed provider.
-
Create a feed with the Create new indicator feed endpoint. Make note of the
feed_id
generated for your feed. For example: -
Upload data to the feed with the Update indicator feed data endpoint. Uploaded indicator data must be in a
.stix2
↗ formatted file. -
(Optional) Verify the status of your feed upload with the Get indicator feed data endpoint. For example:
-
Grant access to subscribers with the Grant permission to indicator feed endpoint. You can add subscribers to the feed’s allowed subscribers list using their account IDs. For example:
Use a feed in Gateway
Once an account is granted access to a feed, it will be available to match traffic as a selector in Gateway DNS policies.
-
In Zero Trust ↗, go to Gateway > Firewall policies. Select DNS.
-
To create a new DNS policy, select Add a policy.
-
Name your policy.
-
In Traffic, add a condition with the Indicator Feeds selector. If your account has been granted access to a Custom Indicator Feed, Gateway will list the feed in Value. For example, you can block sites that appear in a feed:
Selector Operator Value Action Indicator Feeds in Threat Intel Feed Block -
Select Create policy.
For more information on creating Gateway policies, refer to DNS policies.