CloudFlare, Inc.

Cloudflare Enterprise Plan

Cloudflare can protect your website, make it run faster and improve availability with a simple change in DNS. By offering this functionality as a cloud service, we save you time, money and hassle.


  • Global CDN
  • DDoS Mitigation
  • Web Application Firewall
  • Load Balancing
  • Bot Mitigation
  • Access Management
  • DNS
  • Edge Compute
  • SSL/TLS Provisioning
  • Internet Optimisation


  • Deliver web content to users faster
  • Unmetered DDoS mitigation at L3,4 and 7, ensuring maximum availability
  • Thwart L7 application attacks, including XSS and SQL Injection
  • Safeguard from service disruptions with local and global failover
  • Detect and mitigate credential stuffing, content scrapers and spam leads
  • Our global DNS service is fast, powerful and secure
  • Protect internal resources by authenticating and monitoring per user access
  • Allow developers deploy code at Cloudflare's edge
  • Automatic TLS certificate generation and deployment
  • Optimise routes and content delivery, improving end user experience


£0 to £0 a terabyte a year

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 12

Service ID

2 6 5 3 1 0 4 3 8 5 4 7 1 7 7


CloudFlare, Inc. Khaled AlSaleh
Telephone: +44 20 3514 6970

Service scope

Service constraints
System requirements

User support

Email or online ticketing support
Email or online ticketing
Support response times
Phone, chat, and email support with median response time of 15 minutes. For critical business issues, Enterprise customers have access to our 24/7/365 emergency phone support hotline
User can manage status and priority of support tickets
Online ticketing support accessibility
None or don’t know
Phone support
Phone support availability
24 hours, 7 days a week
Web chat support
Web chat
Web chat support availability
24 hours, 7 days a week
Web chat support accessibility standard
None or don’t know
How the web chat support is accessible
Web chat accessibility testing
Onsite support
Support levels
Enterprise customers can choose between standard Enterprise support and Premium Support. Premium Enterprise support includes increased SLA response times and prioritised ticket handling. Standard Enterprise is included as a part of the standard Enterprise contract. Premium Support pricing is bespoke. Enterprise customers receive a dedicated Customer Success Manager and Solutions Engineer.
Support available to third parties

Onboarding and offboarding

Getting started
Cloudflare assists enterprise customers start using our service in a consultative manner using various methods, including remote and on-site and written documentation.
Service documentation
Documentation formats
End-of-contract data extraction
The Cloudflare User Interface includes data aggregation logs, which include audit logs (log of every action taken within the interface and change to an account setting), as well as HTTP request logs. Data can be extracted via API in aggregate, or individual requests can be downloaded from the UI directly. Upon ending a contract, Cloudflare will advise customers on capturing all these data prior to account termination.
End-of-contract process
Cloudflare supports customers through the end of their contract and does not charge for reasonable off-boarding services. If a customer requires an extension of service during the off-boarding process, this may be subject to the same terms as the original contract, but will be determined through joint agreement between Cloudflare and the customer.

Using the service

Web browser interface
Using the web interface
Users can manage all aspects of onboarding and configuration of their internet properties via the Cloudflare dashboard.
Web interface accessibility standard
None or don’t know
How the web interface is accessible
Our web interface is visually accessible in all areas. Our text to background contrast ratios are high and we don't rely exclusively on colour to relay information anywhere. As our web app is almost 10 years old we have varying states of keyboard and screenreader accessibility across different sections. As of late all new components in our shared pattern library are built to be fully keyboard accessible. We have high coverage on using semantically appropriate markup in forms and utilising buttons instead of text links for interactable elements.
Web interface accessibility testing
We do conduct external and internal user-testing sessions where some portion of our test subjects opt to use assistive technologies, largely keyboard based users. We test in house as a part of our component development QA process for keyboard accessibility to ensure any job to be done defined in our product specs can be accomplished without the aid of a mouse.
What users can and can't do using the API
All onboarding and configuration management tasks can be completed via API.
API automation tools
API documentation
API documentation formats
Command line interface
Command line interface compatibility
  • Linux or Unix
  • Windows
  • MacOS
Using the command line interface
Cloudflare offers CLI via a Cloudflare Open Source GO repository named "flarectl" ( services can be provisioned, modified and deleted by using this as per the examples within the ReadMe.

Cloudflare also offers a Terraform integration that can be found here:


Scaling available
Scaling type
Independence of resources
Usage notifications
Usage reporting
  • Email
  • Other


Infrastructure or application metrics
Metrics types
  • HTTP request and response status
  • Network
Reporting types
  • API access
  • Real-time dashboards


Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
EU-US Privacy Shield agreement locations
User control over data storage and processing locations
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Backup and recovery

Backup and recovery
What’s backed up
Cloudflare conducts daily backups to maintain its service to customers
Backup controls
N/A - Cloudflare conducts backups to ensure restoration of customer accounts in the event of a complete data loss or disaster scenario within its primary data center. Cloudflare only has limited customer data and does not host its customers' websites, therefore customers do not control what is backed up or recovered.
Datacentre setup
Multiple datacentres with disaster recovery
Scheduling backups
Supplier controls the whole backup schedule
Backup recovery
Users contact the support team

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
100% uptime guarantee, 2500% service credit
Approach to resilience
Cloudflare operates a global Anycast network with 185+ Points of Presence globally. Each data centre builds its own cache such that any data center can service an end customers' request. Cloudflare also has two data centres which make up the control plane, located in the United States and in Luxembourg. Information like customer account settings are backed up daily to the core data centres and, in the event of a disaster affecting the primary data center, full failover from the disaster recovery site would be conducted. More information regarding service level RPO/RTOs can be provided upon request.
Outage reporting
Public dashboard, email alerts

Identity and authentication

User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google apps)
  • Username or password
Access restrictions in management interfaces and support channels
Cloudflare provides customer support through Zendesk, to which only the Cloudflare Support Team has access. Access to production is limited by role to the Systems Reliability Engineering team.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password
Devices users manage the service through
Directly from any device which may also be used for normal business (for example web browsing or viewing external email)

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
Between 6 months and 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
Between 6 months and 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
ISO/IEC 27001 accreditation date
What the ISO/IEC 27001 doesn’t cover
Facilities; Equipment (other than that located within the in-scope data centers); Networks, Information Systems (other than those to which in-scope equipment are connected); Personnel (other than those with access to or involved in provisioning of in-scope production software);
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Who accredited the PCI DSS certification
PSC, Part of the NCC Group
PCI DSS accreditation date
What the PCI DSS doesn’t cover
N/A – Production network including billing network is in-scope of our PCI certification.
Other security certifications
Any other security certifications
SOC 2 Type 1

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
ISO/IEC 27001
Information security policies and processes
Cloudflare is SOC 2 Type 1 and ISO27001 compliant. Cloudflare also has a robust policy management process by which all of its internal policies are reviewed and revised on an at-least annual basis. More information on individual policies or processes can be made available upon request.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Cloudflare maintains baseline configurations in SaltStack. Cloudflare systems and process owners document and control change to all organizational information systems. All information system changes must approved by an appropriate manager in accordance with organizational policies and procedures. All configuration changes are monitored and access to production is severely based on role and utilizes systems to ensure access restriction and limitations.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
All critical and high priority patches must be applied within thirty (30) calendar days from their release. Cloudflare conducts threat intelligence through the Information Security Team, who is responsible for reviewing and connecting disparate datasets to conduct internal and external threat analyses based on open source information, Cloudflare's internal logs, and the detection of anomalous behavior or traffic. Cloudflare also utilizes Red Canary for endpoint security, threat detection and notification.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Cloudflare's internal teams monitor our service for potential compromises in addition to sponsoring Responsible Disclosure and Bug Bounty Programs. Potential compromises are reviewed by the Security Incident Response Team (SIRT) who defines the incident level and then addresses the incident based upon severity classification.
Incident management type
Supplier-defined controls
Incident management approach
Users can report incidents via the Cloudflare dashboard or Enterprise phone line. Cloudflare also monitors other channels, such as social media, to ensure that we are aware of any potential issue in the provision of service. Pre-defined processes exist for incident management, including common events. Incidents are subject to Cloudflare's Security Incident Response Policy, which includes requirements for root cause analysis and full reporting.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart

Energy efficiency

Energy-efficient datacentres


£0 to £0 a terabyte a year
Discount for educational organisations
Free trial available
Description of free trial
Entities who are evaluating Cloudflare's Enterprise service may conduct a Proof of Concept supported by Cloudflare, or sign up for a Free Account to trial our service.
Link to free trial

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.