AcmeCorp - Cloudflare Application Services SRA

Lab URL: innovative-trailblazer.sxplab.com

FieldValue
Prepared byEduard Agopyan - Nanosek
DateFebruary 03, 2026
CustomerAcmeCorp (e-commerce platform)
Region / scopeSoutheast Asia, Europe, and the United States
EnvironmentManaged lab – multi-origin (origin1/origin2), staging, API, and support hostnames
Lab identifier (slug)innovative-trailblazer
Objective Deliver a Cloudflare Application Services configuration that improves performance, security, and operational visibility for innovative-trailblazer.sxplab.com and related hostnames in line with the lab requirements.

Executive summary

This report documents the Cloudflare configuration delivered for AcmeCorp’s lab environment on innovative-trailblazer.sxplab.com. The lab covered multiple hostnames: innovative-trailblazer.sxplab.com, staging.innovative-trailblazer.sxplab.com, support.innovative-trailblazer.sxplab.com, api.innovative-trailblazer.sxplab.com, origin1.innovative-trailblazer.sxplab.com, and origin2.innovative-trailblazer.sxplab.com.

We established DNS and SSL/TLS foundations, optimised global performance and bandwidth usage, enforced secure HTTPS end-to-end, restricted staging access by geography, and hardened the application with WAF managed rules, Bot Management, and account-takeover protections. Application behaviour was customised for API, support, and internal status endpoints. For advanced configuration, we implemented regional load balancing between Singapore and Frankfurt, tuned OWASP behaviour around false positives, deployed a WAF “watcher” Worker for managed-ruleset drift, and enabled Page Shield with notifications for third-party JavaScript changes.

The design follows a standard Cloudflare SRA pattern: strict TLS and WAF baselines, safe but effective static caching, geo-aware load balancing between origin1/origin2, and dedicated controls for API, admin/support, staging, and “login-like” surfaces, all backed by analytics, notifications, and an HTML handoff report for ongoing tuning and audit.

Each answer below maps directly to a lab question. For every item we describe the configuration delivered, the outcome & rationale, and the validation performed, with visual evidence referenced as numbered figures (for example, “see Figure 4a”) throughout the document.

Contents

Target architecture

High level: All lab hostnames terminate on Cloudflare’s global edge. End users in Southeast Asia, Europe, and the US connect to the nearest Cloudflare POP, where traffic is accelerated and protected (CDN, WAF, Bot Management, DDoS, Access, Workers). From there, requests are either routed directly to the staging/support/API hostnames or passed through the Load Balancer, which steers traffic to the closest healthy origin (origin1 in Singapore or origin2 in Frankfurt).

End users SEA • Europe • US Cloudflare edge Anycast POPs • TLS termination CDN • WAF • DDoS • Bot Mgmt Access • Rules • Workers • LB Logs • Analytics • Page Shield Staging / Support / API staging • support • api.innovative-trailblazer.sxplab.com Regional load balancer Proximity steering • health checks origin1 Singapore • 52.191.5.18 origin2 Frankfurt • 52.170.37.97

Figure 0: Target architecture – Cloudflare edge fronting all lab hostnames and steering traffic between regional origins.

How to read this document: Each answer corresponds to a specific lab requirement (Basic Setup through Sections 1–5). Where relevant, the text references supporting figures in brackets – for example, “see Figure 1” or “see Figures 4a–4f”. Each referenced figure appears directly underneath the relevant answer with a matching caption (for example, “Figure 1: DNS configuration for all lab hostnames”), so you can visually confirm the configuration that was implemented.

Assumptions and lab context

Requirements-to-features mapping

Requirement area Cloudflare features delivered (summary)
Basic Setup Zone onboarding; DNS records for all lab hostnames; proxying via Cloudflare edge; verification of reachability.
Performance & Delivery Cache Rules, browser cache controls, Brotli, HTTP/2 and HTTP/3, geography-aware delivery, and geo restrictions for staging.
Security & Threat Protection WAF managed rules and custom rules, protection for critical endpoints, geo-restricted access to /contact, Bot Management on targeted paths, and account-takeover safeguards.
Application Behaviour Customisation Header enforcement for the API, support page redirection to the dedicated hostname, and special handling (caching + access control) for internal /status* paths.
Advanced configuration Regional Load Balancing between Singapore and Frankfurt with health monitoring and pinned paths, WAF fine-tuning workflow, and Page Shield configuration for third-party JavaScript on key journeys.
Visibility & handoff Analytics dashboards for threats, bandwidth savings, and performance improvements; documentation and screenshot pack summarizing the delivered configuration and known considerations.

Basic Setup

Basic Setup – Q1 DNS & onboarding
Answer 1. DNS configuration and lab onboarding

TL;DR: Configured Cloudflare-proxied A records for all lab hostnames pointing to the requested origin IPs and verified reachability via DNS lookups and Ray IDs.

Cloudflare features used: DNS (proxied A records), CDN reverse proxy, Security Events / Ray ID.

Configuration delivered: Configured Cloudflare DNS with proxied A records for all required hostnames, matching the lab’s IP assignment:

Outcome & rationale: All required hostnames are consistently routed through Cloudflare, providing a single control plane for performance, security, and advanced traffic steering while matching the IP assignments defined in the lab brief.

Validation performed: Used dig and nslookup to confirm that each hostname resolved to the correct IP address, and accessed https://innovative-trailblazer.sxplab.com via a browser to verify that responses included a Cloudflare Ray ID, confirming end-to-end connectivity through the proxy.

Evidence:

Cloudflare DNS page showing proxied A records for innovative-trailblazer.sxplab.com, staging, support, api, origin1, and origin2 with the specified IPs. Figure 1: DNS configuration for all lab hostnames.

Section 1: Performance & Delivery

Section 1 – Q2 Performance & Delivery
Answer 2. Global reach & speed – static content delivery

Configuration delivered: To address inconsistent load times across Southeast Asia, Europe, and the US, we configured Cloudflare’s performance features in layers:

Outcome & rationale: Static content is now served primarily from Cloudflare’s edge cache, while dynamic and non-cacheable traffic benefits from protocol-level optimisations and Argo Smart Routing. Image payloads are smaller, round-trips are faster (HTTP/2, HTTP/3, TLS 1.3, 0-RTT), and browsers receive Early Hints to start loading key assets sooner. Together, these changes improve page-load times across SEA, EU, and US without requiring any application refactoring.

Validation performed:

Evidence:

Cache Rules for innovative-trailblazer.sxplab.com highlighting static asset caching behaviour. Figure 2a: Cache Rules for static assets.
Cloudflare Speed and Optimisation settings showing RUM, Speed Brain, Polish, HTTP/2, HTTP/3, 0-RTT, TLS 1.3, and Early Hints enabled. Figure 2b: Speed & optimisation feature set.
Argo Smart Routing configuration panel showing the feature enabled for the zone. Figure 2c: Argo Smart Routing enabled for dynamic traffic.

Advanced recommendations (production-ready options):

Section 1 – Q3 Bandwidth optimisation
Answer 3. Bandwidth optimisation – edge and browser caching

TL;DR: Building on the static-asset Cache Rules defined in Answer 2, we set edge cache TTL to 10 minutes and browser cache TTL to 5 minutes for frequently accessed assets to cut origin bandwidth while keeping content reasonably fresh.

Cloudflare features used: Cache Rules (Edge TTL, Browser TTL), cache-control override, Cache Analytics.

Configuration delivered: To reduce repeated origin data transfer and server load for frequently accessed files, we:

Outcome & rationale: Frequently accessed files are served from edge cache and revalidated less often at the origin, directly reducing bandwidth usage and connection load on the backend while respecting the 10-minute edge / 5-minute browser requirement. The extension-based condition ensured that all real static content (including assets under /services and /images) was included, not just the theoretical /static and /assets paths from the SRA description.

Validation performed: We:

Evidence:

Cache Rule configuration for bandwidth optimisation, including the regex-based condition that matches static file extensions and TTL settings. Figure 3a: Cache Rule – edge and browser TTL with regex-based static asset matching.
Terminal output of curl requests to a static asset under /services or /images showing CF-Cache-Status HIT and appropriate cache headers. Figure 3b: curl validation – CF-Cache-Status HIT and cache headers for a static asset.
Section 1 – Q4 TLS & HTTPS posture
Answer 4. Secure access – HTTPS, CA pipeline, and PCI-aligned ciphers

TL;DR: Enforced HTTPS end-to-end with Full (strict) TLS, short-lived edge certificates from Google Trust Services, and a PCI-aligned cipher profile.

Cloudflare features used: SSL/TLS (Full strict), Edge Certificates (Google Trust Services), Always Use HTTPS, TLS encryption mode / cipher profiles.

Configuration delivered: To ensure all user traffic uses HTTPS with full end-to-end encryption and a compliant TLS posture, we:

Outcome & rationale: Traffic between end users and Cloudflare, and between Cloudflare and the origin, is fully encrypted under a validated TLS posture. The edge certificate lifecycle is automated using the Google Trust Services pipeline with short-lived certificates, and the negotiated cipher suites align with PCI DSS expectations, reducing the risk of weak or deprecated cryptography being used.

Validation performed:

Evidence:

Cloudflare SSL/TLS overview for innovative-trailblazer.sxplab.com with Full (strict) mode. Figure 4a: SSL/TLS overview showing Full (strict) mode.
Cloudflare setting showing Always Use HTTPS enabled. Figure 4b: Always Use HTTPS enabled.
curl -I http://innovative-trailblazer.sxplab.com showing a 301 redirect to HTTPS. Figure 4c: curl -I http://innovative-trailblazer.sxplab.com confirming HTTP→HTTPS redirect.
Cloudflare SSL/TLS overview and edge certificates issued via Google Trust Services. Figure 4d: Edge certificates and Google Trust Services CA pipeline.
Cloudflare TLS settings showing PCI DSS aligned cipher suite configuration. Figure 4e: PCI-aligned TLS cipher suite configuration.
Cloudflare TLS settings showing PCI DSS configuration option selected. Figure 4f: PCI-DSS cipher profile selection.
Section 1 – Q5 Staging access control
Answer 5. Restricted access to staging – geo-based controls

TL;DR: Locked down the staging hostname so only users in Singapore, Germany, and the United States can reach it; all other countries are blocked or must pass a Managed Challenge.

Cloudflare features used: WAF / Rulesets, Geo-IP conditions (ip.src.country), Block / Managed Challenge actions.

Configuration delivered: To restrict access to staging.innovative-trailblazer.sxplab.com so that only users in Singapore, Germany, and the United States can reach it, we:

Outcome & rationale: The staging environment is accessible exclusively from Singapore, Germany, and the United States, reducing exposure to unwanted global traffic while keeping the production environment fully available worldwide. This aligns staging with a “limited collaborator regions only” model without impacting customer-facing sites.

Validation performed:

Evidence:

(see Figure 5).

Cloudflare rule restricting staging.innovative-trailblazer.sxplab.com to Singapore, Germany, and the United States, with events showing blocked traffic from other locations. Figure 5: Geo-restricted access to staging.innovative-trailblazer.sxplab.com.

Section 2: Security & Threat Protection

Section 2 – Q6 WAF & critical endpoints
Answer 6. Application-layer threat prevention and critical endpoint protection

TL;DR: Enabled OWASP-aligned managed rules globally for all lab hostnames and layered stricter, dedicated managed rules on /services/safes and /services/business-sales to harden those flows against zero-day exploits.

Cloudflare features used: WAF managed rules (OWASP), additional managed rules scoped to paths, Security Events.

Configuration delivered: To protect against OWASP-class threats (SQL Injection, XSS, etc.) and add extra protection for /services/safes and /services/business-sales, we:

Outcome & rationale: The application benefits from broad, OWASP-aligned protection across all hostnames, while /services/safes and /services/business-sales receive an additional layer of managed-rule enforcement. This combination provides stronger zero-day and high-value endpoint protection without over-constraining less critical parts of the site.

Validation performed: Sent controlled test requests with benign but rule-matching payloads at /services/safes and /services/business-sales and verified that the requests were blocked or challenged by the dedicated managed rules, and that the associated events appeared with the expected rule IDs in Security Events.

Evidence:

Cloudflare WAF managed rules enabled globally for the lab zone with OWASP protections. Figure 6a: Global WAF managed rules baseline (OWASP).
Managed rules scoped to /services/safes and /services/business-sales in the WAF configuration. Figure 6b: Dedicated managed rules on critical services paths.
Security Events view showing blocked requests by managed rules on /services/safes and /services/business-sales. Figure 6c: Security Events – blocked requests from managed rules on critical endpoints.
Section 2 – Q7 Geo control on /contact
Answer 7. Geo-restricted access to /contact

TL;DR: Restricted /contact so that traffic from Singapore is allowed normally, while all other countries are gated behind a Managed Challenge.

Cloudflare features used: WAF / Rulesets, Geo-IP conditions (ip.src.country), Managed Challenge.

Configuration delivered: To restrict access to /contact to IPs from Singapore while challenging all other traffic, we:

Outcome & rationale: The /contact endpoint is effectively prioritised for Singapore-based users while still allowing the business to receive legitimate traffic from that region without friction. Access from all other countries is not blocked outright but is challenged, adding friction for unwanted traffic and scripted abuse originating outside Singapore.

Validation performed: Using country simulation / geo-testing and test traffic from different regions, we verified that:

Evidence: Geo-based WAF rule for /contact using ip.src.country ne "SG" and Managed Challenge, plus Security Events entries showing challenges for non-SG traffic (see Figure 7).

Cloudflare WAF rule restricting /contact access using ip.src.country ne "SG" with Managed Challenge for non-Singapore traffic. Figure 7: Geo-restricted and challenged access to /contact.
Section 2 – Q8 Bot protection
Answer 8. Bot Management for /services/checkboxes

TL;DR: Enabled JavaScript detections in Security settings and added a WAF rule that challenges requests to /services/checkboxes when JS detection does not pass, filtering out non-JS bots while keeping the flow usable for humans.

Cloudflare features used: Bot Management JS detections, WAF rulesets, Security Events.

Configuration delivered: To identify and mitigate bot traffic targeting the /services/checkboxes area, we:

Outcome & rationale: Requests to /services/checkboxes that do not successfully complete JS detection are intercepted by the WAF rule and challenged or blocked. This reduces scripted and headless abuse on this specific flow while real browsers (where cf.bot_management.js_detection.passed is true) proceed normally.

Validation performed: Simulated traffic without JS execution (for example, simple curl/headless clients) against /services/checkboxes and confirmed that:

Evidence: Bot / Security configuration showing JS detections enabled and the WAF rule expression for /services/checkboxes, plus curl-based validation showing blocked/challenged responses when JS detection did not pass (see Figures 8a and 8b).

Cloudflare Security and Bot settings showing JavaScript detections enabled and a WAF rule referencing cf.bot_management.js_detection.passed for /services/checkboxes. Figure 8a: JS detections and WAF rule configuration for /services/checkboxes.
Terminal output from curl requests to /services/checkboxes showing blocked or challenged responses when JS detection did not pass. Figure 8b: curl validation – JS-detection-based enforcement on /services/checkboxes.
Section 2 – Q9 Account takeover (ATO)
Answer 9. Account takeover detection and mitigation on /contact

TL;DR: Enabled leaked-credentials detection and implemented three ATO-focused controls on /contact: a WAF rule that challenges leaked credentials, a second WAF rule that combines Cloudflare ATO detection IDs with leaked-credential similarity, and a rate-limiting rule that throttles repeated failed “login-like” attempts. In addition, we deployed a Cloudflare Worker that logs leaked-credential events, enriches them with Bot Management signals, and sends throttled alerts to Discord.

Cloudflare features used: Leaked credentials / ATO signal, Bot Management detection IDs, WAF custom rules, Advanced Rate Limiting, Cloudflare Workers + KV, Security Events.

Configuration delivered: To detect and mitigate account takeover activity on the /contact endpoint, we:

Outcome & rationale: /contact is now protected by: (1) direct leaked-credential enforcement, (2) an ATO heuristic rule that combines Cloudflare’s login-traffic detection ID 201326593 with credential similarity, (3) a failure-aware rate limit that reacts to spikes in 4xx responses, and (4) a high-level Worker that logs and correlates leaked-credential events with Bot Management telemetry, keeps per-IP history in KV, and sends throttled alerts to Discord. Together, these controls significantly reduce the likelihood of successful credential stuffing or account takeover on this endpoint while providing rich, noise-controlled alerting for security operations.

Validation performed:

Evidence: Configuration and proof for all ATO controls on /contact plus runtime evidence:

(see Figures 9a9f).

Cloudflare WAF custom rule named 'ATO – leaked credentials on /contact' using the username_and_password_leaked signal. Figure 9a: WAF leaked-credentials rule for /contact.
Cloudflare WAF rule named 'ATO detection IDs + leaked credential signal' combining detection ID 201326593 with username_password_similar. Figure 9b: Advanced ATO rule using detection IDs and credential similarity.
Rate Limiting rule 'ATO – failed attempts throttle on /contact' showing filter and counting expression based on http.response.code. Figure 9c: Rate Limiting – failed attempts throttle on /contact.
Security Events and rate limiting analytics showing the ATO rules triggering and failed attempts being throttled on /contact. Figure 9d: Runtime evidence of ATO rules on /contact.
Cloudflare Worker configuration for log-leaked-creds-and-bot-info (throttled), including KV binding LOGIN_LOG and DISCORD_WEBHOOK_URL secret. Figure 9e: Worker configuration for leaked-credential logging and Discord alerts.
Discord channel showing an alert embed with leaked-credential description, bot verdict/score, username, client IP, URL, user agent, and recent attempts for this IP. Figure 9f: Discord alert generated by the ATO Worker.

Section 3: Application Behaviour Customisation

Section 3 – Q10 API hardening
Answer 10. Custom API header enforcement on api.innovative-trailblazer.sxplab.com

TL;DR: Required every API request to include X-Security-Token, blocking calls that omit it before they reach the origin.

Cloudflare features used: WAF / Rulesets, header presence checks, Security Events.

Configuration delivered: To ensure that all traffic to the API hostname includes the custom header X-Security-Token, we:

Outcome & rationale: All calls to api.innovative-trailblazer.sxplab.com must carry the required security header, providing a simple but effective way to prevent unauthenticated or misconfigured clients from reaching the API origin.

Validation performed: Sent test requests to the API host both with and without the X-Security-Token header:

Evidence: Header-enforcement rule configuration and example blocked/allowed requests based on the presence of X-Security-Token (see Figure 10a and Figure 10b).

Cloudflare WAF rule for api.innovative-trailblazer.sxplab.com enforcing that X-Security-Token must be present and non-empty. Figure 10a: X-Security-Token header enforcement rule on the API hostname.
curl and/or Security Events output showing requests without X-Security-Token being blocked and requests with the header allowed. Figure 10b: Evidence of blocked vs allowed API requests based on X-Security-Token.
Section 3 – Q11 Support UX
Answer 11. Support page redirection from /help

TL;DR: Implemented a Single Redirect that sends requests for /help on the main site to the dedicated support hostname with a permanent redirect.

Cloudflare features used: Redirect Rules (Single Redirect), HTTP 301 responses.

Configuration delivered: To ensure that requests to /help are served from the dedicated support hostname, we:

Outcome & rationale: Users who navigate to /help on the main site are seamlessly redirected to the dedicated support subdomain, keeping the support experience centralised while preserving a simple, memorable entry point on the primary site.

Validation performed: Used curl -I https://innovative-trailblazer.sxplab.com/help and confirmed that the response returned an HTTP 301 with a Location header pointing to https://support.innovative-trailblazer.sxplab.com/. Verified that the browser follows the same redirect path.

Evidence: Single Redirect rule definition for /help and curl -I output showing the 301 redirect to the support hostname (see Figure 11a and Figure 11b).

Cloudflare Single Redirect rule matching /help and sending traffic to https://support.innovative-trailblazer.sxplab.com/ with a 301 status. Figure 11a: Single Redirect rule for /help → support.innovative-trailblazer.sxplab.com/.
curl -I response for https://innovative-trailblazer.sxplab.com/help showing HTTP 301 and Location: https://support.innovative-trailblazer.sxplab.com/. Figure 11b: curl validation of the 301 redirect from /help to the support hostname.
Section 3 – Q12 Internal status endpoints
Answer 12. Internal URL handling for /status

TL;DR: Configured /status to bypass cache and protected it with Cloudflare Access, so only trusted IPs, service tokens, or authenticated users can see internal health data.

Cloudflare features used: Cache Rules (Bypass cache), Cloudflare Access (ZTNA app), Access policies (Bypass / Service Auth / Allow).

Configuration delivered: For the /status endpoint specifically, we implemented:

Outcome & rationale: The internal status endpoint is never cached (CF-Cache-Status does not return HIT) and is only reachable via Cloudflare Access controls. Trusted IPs can see it transparently, monitoring systems use a service token, and all other users must authenticate with their identity provider. This gives us a clean “internal URL handling” pattern, scoped strictly to /status, without exposing health data publicly.

Validation performed:

Evidence:

Cache Rule configuration in Cloudflare showing Bypass cache for http.request.uri.path eq "/status". Figure 12a: Cache Rule – Bypass cache for /status.
Cloudflare Access application for innovative-trailblazer.sxplab.com with path /status and layered policies (Bypass, Service Auth, Allow). Figure 12b: Cloudflare Access application and policies for /status.
Cloudflare Access login prompt shown when accessing /status without being allowlisted or providing a service token. Figure 12c: Access authentication page when reaching /status without authorization.
Terminal output from curl including CF-Access-Client-Id and CF-Access-Client-Secret headers showing successful access to /status. Figure 12d: curl validation of /status using an Access service token.

Section 4: Advanced Configuration

Section 4 – Q13 Load Balancing
Answer 13. Advanced Scenario 1 – Load balancing for regional banking portals

TL;DR: Configured Cloudflare Load Balancing with Proximity steering between Singapore (origin1) and Frankfurt (origin2), using 10-minute health checks and automatic failover. Implemented a custom load balancer rule to pin the compliance path /.git to Singapore only.

Cloudflare features used: Load Balancing (pools, monitors, load balancer for innovative-trailblazer.sxplab.com), Proximity steering, Custom Load Balancing Rules (path-based override), Failover across pools, and health monitor TLS option “Don’t verify SSL/TLS certificates (insecure)” to accommodate non-CA-signed origin certificates.

Configuration delivered:

Outcome & rationale:

Validation performed:

Evidence:

Cloudflare Load Balancer overview for innovative-trailblazer.sxplab.com showing Singapore and Frankfurt pools, proximity steering, failover across pools enabled, fallback pool Singapore, and HTTPS /health monitor with 600s interval and insecure TLS verification. Figure 13a: Regional Load Balancer with Singapore/Frankfurt pools and 10-minute health checks.
Custom Load Balancing rule matching /.git and overriding traffic to the Singapore pool. Figure 13b: Custom load balancer rule pinning /.git to the Singapore pool.
Section 4 – Q14 WAF fine-tuning
Answer 14. Advanced Scenario 2 – WAF fine-tuning and managed ruleset monitoring

TL;DR: Requests to /services were being blocked by the Cloudflare OWASP Core Ruleset due to specific OWASP CRS rule IDs contributing to the anomaly score. Per the lab scenario this traffic was treated as a false positive (hypothetical legitimate traffic), so we implemented a narrowly scoped OWASP exclusion on /services that skips only the offending rule IDs while keeping the rest of OWASP CRS protection enabled. In parallel, we deployed a scheduled “WAF watcher” Worker that monitors the managed ruleset and per-zone overrides for configuration drift, storing snapshots in KV and alerting via Discord / PagerDuty, and enabled Cloudflare Advanced Security Notifications to raise additional alerts on spikes in security events.

Cloudflare features used: Cloudflare OWASP Core Ruleset, managed rule exclusions, path-based match conditions, Security Events, Advanced Security Notifications, Cloudflare Rulesets API, Workers, Workers KV, Discord webhooks, PagerDuty Events API.

Configuration delivered:

Outcome & rationale: The OWASP CRS configuration now allows the lab-classified “legitimate” traffic to /services by excluding only the exact rule IDs that caused the false positive on that path, while all other OWASP protections remain in place. At the same time, the managed ruleset and its per-zone overrides are continuously monitored by the WAF watcher Worker; any change to managed rule versions, actions, or overrides is captured in KV and surfaced via Discord / PagerDuty. Cloudflare Advanced Security Notifications provide an additional safety net by alerting on raised security event volumes. This gives AcmeCorp both a stable, tuned WAF posture for /services and ongoing governance against configuration drift and emerging spikes in security events.

Validation performed:

Evidence:

Security Events view showing Cloudflare OWASP Core Ruleset blocking requests to /services with an elevated anomaly score and multiple SQL injection-related rule IDs triggered. Figure 14a: Original OWASP CRS block on /services before tuning.
Cloudflare managed ruleset exclusion configuration scoped to http.request.uri.path eq "/services" with specific OWASP rule IDs excluded for that path. Figure 14b: Path-scoped OWASP rule exclusion for /services.
Security Events view after applying the OWASP exclusion, showing /services traffic allowed while other attack patterns continue to be blocked. Figure 14c: /services traffic passing after OWASP tuning.
Cloudflare dashboard showing the WAF watcher Worker configuration, KV binding RULESET_KV, ZONE_IDS and MANAGED_RULESET_ID environment variables, and scheduled trigger. Figure 14d: WAF watcher Worker and KV configuration.
Discord or PagerDuty notification summarising Cloudflare managed ruleset and override changes detected across zones. Figure 14e: Alert generated by the WAF watcher Worker.
Section 4 – Q15 Page Shield
Answer 15. Advanced Scenario 3 – Page Shield for third-party JavaScript

TL;DR: Enabled Page Shield on innovative-trailblazer.sxplab.com and focused monitoring on the /contact flow (including /contact/received). Deployed a Log-mode Page Shield policy that treats sxplab.com as trusted and generates policy violations for any scripts from other origins. Configured Page Shield Notifications to alert the security team on new resources, new domains, and JavaScript code changes during the monitoring rollout.

Cloudflare features used (implemented): Page Shield (script monitoring & inventory, policy violations, client-side supply chain visibility); Page Shield Notifications (new resources, new domains, code change detection alerts).

Configuration delivered:

Outcome & rationale: AcmeCorp gains visibility into all JavaScript loaded during the /contact journey (including /contact/received) and a clear trust boundary: sxplab.com is allowed, everything else is highlighted via policy violations. The security team receives actionable alerts when:

Policies remain in Log mode during this lab, avoiding user-facing breakage while proving that enforcement (Allow/Block) would be viable in a later phase.

Validation performed:

Evidence:

Page Shield overview in the Cloudflare dashboard showing Page Shield enabled for the zone. Figure 15a: Page Shield enabled for the zone.
Client-side resources Scripts view filtered by Seen on page for /contact and /contact/received. Figure 15b: Scripts inventory filtered for /contact and /contact/received.
Page Shield policy configuration in Log mode, scoped to the /contact path with script-src 'self' https://*.sxplab.com;. Figure 15c: Log-mode Page Shield policy for the contact flow.
Page Shield policy violations view, highlighting scripts from non-sxplab.com domains. Figure 15d: Policy violations for non-sxplab.com scripts.
Page Shield Notifications configuration showing New Resources, New Domain, and New Code Change Detection alerts enabled. Figure 15e: Page Shield notification configuration for the security team.

Advanced improvement (recommended, not implemented in this lab):

Section 5: Visibility & Handoff

Section 5 – Q16 Analytics & handoff
Answer 16. Visibility & handoff – operational reporting pack

TL;DR: Produced a customer handoff pack as custom HTML reports that summarize the current security posture, performance configuration, and enabled alerting for innovative-trailblazer.sxplab.com, including exportable tables (CSV/Excel) for investigation and audit workflows.

Cloudflare features used: Security analytics (WAF posture), bot/client IP attributes, Notifications, Health Checks, and Performance Analytics (traffic, cache hit, TTFB).

Configuration delivered:

Outcome & rationale: AcmeCorp receives a practical handoff artifact that documents (1) what controls are enabled, (2) what the platform is observing (top client IPs and bot attributes), (3) what the security team will be alerted on, and (4) baseline performance indicators. This enables faster operations, troubleshooting, and audit readiness without relying on screenshots scattered across multiple dashboard pages.

Validation performed: Verified that the generated reports align with the live dashboard views for the same zone and time range, including: WAF posture shown as enabled/enforcing, notifications listed as enabled, health checks reporting healthy, and the performance analytics summary rendering correctly.

Evidence (selected pages from the HTML handoff report):

Top Client IPs – Attributes report showing bot attributes, detection tags, and error concentration with export options.
Figure 16A: Top Client IPs – Attributes (exportable investigation view).
Speed & Performance Settings report showing feature states (current vs recommended) for the zone.
Figure 16B: Speed & Performance Settings summary (current vs recommended).
WAF zone-level posture showing managed WAF and OWASP enabled/enforced, and remediation recommendations.
Figure 16C: WAF posture summary and prioritized remediation list.
Notifications enabled list including Page Shield alerts, plus health checks status for the zone.
Figure 16D: Notifications enabled (including Page Shield alert types) and Health Checks status.
Cloudflare Performance Analytics summary showing requests, bytes, cache hit percentage, and median TTFB.
Figure 16E: Performance Analytics summary (requests/bytes, cache hit %, median TTFB).

Advanced improvement (recommended, not implemented in this lab): For long-term audit retention beyond the dashboard UI, enable Logpush for relevant datasets (for example, security and Page Shield event streams) to an external storage/SIEM destination with appropriate write access.

Advanced handoff (separate audit pack): To avoid overwhelming this submission with raw exports, AcmeCorp will receive a separate full audit pack alongside the main document. This audit pack will include the complete Analytics, Performance, and Security reports as standalone HTML exports (and/or CSV/Excel where applicable), preserving the detailed drill-down views required for operations and audit review while keeping the primary handoff concise and reviewer-friendly.

Section 5 – Q17 Documentation & handoff
Answer 17. Documentation & summary

TL;DR: This pack includes the SRA document itself, a structured figure set (Figures 1, 2A–16E), and a final checklist that maps each lab requirement to its implemented configuration and evidence. Together with the HTML handoff reports from Answer 16, it forms a customer-ready documentation bundle for innovative-trailblazer.sxplab.com.

Cloudflare features used: N/A – this answer covers documentation, validation, and handoff rather than additional product configuration.

Configuration delivered:

Outcome & rationale:

AcmeCorp receives a clear, self-contained description of what was delivered, how it was validated, and where to look in the Cloudflare dashboard or HTML reports to review or extend the configuration. Each lab requirement is traceable from:

Validation performed:

Final checklist:

Check Expected result Evidence
DNS & Basic Setup All lab hostnames resolve to requested IPs via Cloudflare. Figure 1 (DNS configuration for all lab hostnames).
Global performance & delivery Static assets cached at edge; RUM + Speed Brain enabled; image optimisation via Polish; protocol optimisations (HTTP/2, HTTP/3, TLS 1.3, 0-RTT, Early Hints) and Argo Smart Routing improving latency across SEA/EU/US. Figures 2A–2C (cache rules, speed & optimisation, Argo Smart Routing).
Bandwidth optimisation Edge cache TTL 10 minutes; browser cache 5 minutes for frequently accessed assets. Figures 3A–3B (cache rule TTL settings and CF-Cache-Status: HIT validation).
HTTPS and TLS Full (strict) TLS, Google Trust Services CA, PCI-aligned cipher profile, HTTP→HTTPS enforced. Figures 4A–4F (SSL/TLS overview, HTTPS redirect, edge certs, PCI-aligned cipher settings).
Staging restriction Staging hostname accessible only from SG/DE/US; other countries blocked/challenged. Figure 5 (geo-restricted access rule and events for staging).
WAF & critical endpoints OWASP-aligned managed rules enabled globally; stricter managed rules on /services/safes and /services/business-sales. Figures 6A–6C (global managed rules and critical-path managed rules + events).
Bot & ATO controls Bot traffic mitigated on /services/checkboxes; ATO activity on /contact detected, throttled, and logged (rules + Worker alerts). Figures 8A–8B (JS-based bot enforcement on /services/checkboxes) and Figures 9A–9F (ATO rules, rate limiting, Worker alerts & analytics).
API & behaviour customisation API requires X-Security-Token; /help redirects to support; /status bypasses cache and is protected by Cloudflare Access. Figures 10A–10B (API header enforcement), 11A–11B (support redirect), and 12A–12D (internal /status handling with cache bypass and Access).
Advanced scenarios Load Balancing with proximity steering & failover; WAF fine-tuning on /services; Page Shield monitoring on the contact flow. Figures 13A–13B (regional load balancer), 14A–14E (WAF fine-tuning and managed ruleset watcher), and 15A–15E (Page Shield policy, violations, and notifications).
Visibility & reporting Threat, cache, and performance analytics available; HTML handoff pack generated with exportable tables for operations and audit. Figures 16A–16E (Top Client IP attributes, Speed & Performance settings, WAF posture, notifications & health checks, and performance analytics summary).
Advanced recommendations Smart Shield with Tiered Cache, Cloudflare Images, R2 offload, and originless Workers hosting identified as production-ready options (design-ready, not enabled in this lab). SRA narrative – Answer 2 (Advanced recommendations section).

References

Notes

This report reflects the configuration delivered in the managed lab for innovative-trailblazer.sxplab.com at the time of execution. Where Enterprise-only features were not available, equivalent behaviour was implemented using Workers, Rules, or lab-tier alternatives and is explicitly noted in the relevant answers. Advanced recommendations are design-ready for production but were left disabled in this environment.