Cloudflare + Sola Security

Connect your Cloudflare environment to your Sola workspace and start building security apps around your access policies, DNS configuration, traffic management, and audit logs in minutes.

How can the Sola <> Cloudflare integration help you meet your security needs?

See the full picture of your Cloudflare access policies, account settings, and zone configurations in one place
Monitor DNS, traffic management, and WAF rules for misconfigurations and network perimeter exposure
Track user activity and audit logs across your Cloudflare environment on an ongoing basis

Use cases and capabilities

Network perimeter exposure
Show all Cloudflare firewall or WAF rules that allow unrestricted inbound access on sensitive ports from the public internet and flag any that violate network perimeter best practices.
Page rule compliance
List all Cloudflare Page Rules across my zones and evaluate them for compliance, including the actions they trigger, whether any rules disable security features, and any conflicting or redundant rules. Highlight any rules that may weaken security posture.
Zone rule compliance
Show a compliance overview of all my Cloudflare zones, including SSL/TLS encryption mode, HTTPS enforcement, security level, and whether DNSSEC, WAF, and DDoS protection are enabled. Flag any zones that are misconfigured or fall below recommended standards.
Account configuration overview
Analyze my Cloudflare setup for security gaps and risky configurations, including disabled security features, overly permissive firewall rules, missing bot protection, and SSL/TLS settings that fall below best practices. Prioritize findings by severity.
Audit log monitoring
Show recent activity and change history across my Cloudflare account from the audit logs, including who made changes, what was modified, and when. Flag any suspicious actions such as changes to firewall rules, access policies, or DNS records.
DNS and traffic management audit
Show a full overview of my Cloudflare DNS records, including record types, targets, TTL values, and proxy status. Highlight any records that look misconfigured, have unusually low TTLs, or expose sensitive infrastructure.