Aller au contenu

🔐 G100 Security Setup - Cloudflare Access

Zero-Trust Security für G100 MEGA ECOSYSTEM KONZEPT Phase


⚠️ WARUM SECURITY FIRST?

Das Problem

G100 ist ein KONZEPT in Early Stage:
├── Nicht production-ready
├── Enthält sensible Business-Logik
├── NDA-pflichtige Informationen
├── Team Collaboration nötig
└── Investor Präsentationen

❌ OHNE Security:
→ Jeder kann Docs lesen
→ API Endpoints öffentlich
→ Business-Logik sichtbar
→ NDA Verstöße möglich

Die Lösung: Cloudflare Access

✅ Zero-Trust Authentication
✅ Email-basierte One-Time PINs
✅ Keine Passwörter nötig
✅ 10-Minuten PIN Gültigkeit
✅ Whitelist für Email-Adressen
✅ Complete Audit Logs
✅ 50 Users kostenlos
✅ 5 Minuten Setup

🚀 QUICK SETUP (5 Minuten)

1. Cloudflare Zero Trust aktivieren

# Dashboard öffnen
open https://one.dash.cloudflare.com/

Steps: 1. Sign in mit Cloudflare Account 2. Wähle Account: edeaf72f08c3145711f257893d9ddab1 3. Zero TrustGet Started (falls noch nicht aktiviert) 4. Team Name wählen: g100 (wird zu g100.cloudflareaccess.com)

2. One-Time PIN Identity Provider einrichten

In Cloudflare Zero Trust:

  1. SettingsAuthenticationLogin methods
  2. Add newOne-time PIN
  3. Enable One-time PIN

Wichtig: - Email Sender: noreply@notify.cloudflare.com - Falls Email-Scanner (Mimecast, Barracuda): Add to Whitelist!

3. Access Application erstellen (Docs)

Zero Trust → Access → Applications → Add an application

Application Settings

Name: G100 Documentation (NDA)
Session Duration: 8 hours
Application Domain: docs.g100.dev
Type: Self-hosted

Policy: NDA Signed Team Members

Policy Name: NDA Team + Investors
Action: Allow

Include Rules:
  - Email: gm@your-company.com      # Du
  - Email: developer@your-company.com
  - Email: investor@example.com
  - Email ends with: @your-company.com  # Whole team

Require:
  - One-time PIN

Purpose Justification (optional):
  "Access to G100 MEGA ECOSYSTEM documentation - NDA required"

4. Access Application erstellen (API Staging)

Zero Trust → Access → Applications → Add an application

Name: G100 API Staging
Session Duration: 24 hours
Application Domain: api-staging.g100.dev
Type: Self-hosted

Policy: Developer Team Only
Include:
  - Email ends with: @your-company.com
Require:
  - One-time PIN

5. Access Application erstellen (XPipe MCP)

Name: XPipe MCP Server (Team)
Session Duration: 24 hours
Application Domain: xpipe.g100.dev
Type: Self-hosted

Policy: Core Team Only
Include:
  - Email: gm@your-company.com
  - Email: lead-dev@your-company.com
Require:
  - One-time PIN

🌐 DNS Konfiguration

Cloudflare Pages (Docs)

In Cloudflare Dashboard:

  1. Pagesg100-docs project
  2. Custom Domains → Add domain
  3. Domain: docs.g100.dev
  4. ✅ DNS Record automatisch erstellt

Dann Access Policy anwenden: - Zero Trust → Access → Applications → G100 Documentation - Application Domain: docs.g100.dev - Save

API Worker (Staging)

# Worker Route erstellen
wrangler routes add "api-staging.g100.dev/*" contractplattform-api-staging

# Oder im Dashboard:
# Workers → contractplattform-api-staging → Triggers → Custom Domains
# Add: api-staging.g100.dev

Access Policy: - Zero Trust → Access → Applications → G100 API Staging - Application Domain: api-staging.g100.dev

XPipe Tunnel

# Cloudflare Tunnel DNS (automatisch via cloudflared)
cloudflared tunnel route dns xpipe-team-access xpipe.g100.dev

Access Policy: - Zero Trust → Access → Applications → XPipe MCP Server - Application Domain: xpipe.g100.dev


🔐 TEAM ONBOARDING

NDA Email Template

Subject: G100 MEGA ECOSYSTEM - Zugriff freigegeben (NDA)

Hallo [Name],

Du hast Zugriff auf das G100 MEGA ECOSYSTEM KONZEPT erhalten.

**Wichtig: NDA erforderlich!**
Bitte unterschreibe die beigefügte NDA vor dem ersten Zugriff.

**Zugriff:**

1. Dokumentation: https://docs.g100.dev
2. API Staging: https://api-staging.g100.dev
3. XPipe MCP: https://xpipe.g100.dev (nur Core Team)

**Login:**
1. Gehe zu einer der URLs
2. Gib deine Email ein: [user@example.com]
3. Du erhältst einen 6-stelligen Code per Email
4. Code ist 10 Minuten gültig
5. Nach Login: 8-24h Session

**Security:**
- Teile NIEMALS deinen OTP Code
- Logge dich nach Nutzung aus
- Melde verdächtige Aktivität sofort

Bei Fragen: gm@your-company.com

Viele Grüße,
GM

Email Whitelist updaten

Zero Trust → Access → Applications → Edit Policy

# Neuer Investor
Include:
  - Email: new-investor@vc-firm.com

# Neuer Developer
Include:
  - Email: new-dev@your-company.com

# Externe Berater
Include:
  - Email: consultant@agency.com

📊 MONITORING & AUDIT

Access Logs anschauen

Dashboard:

Zero Trust → Logs → Access

Filtern: - User Email - Application - Action (Allow/Block) - Timestamp

Export: - CSV Download - Logpush to S3/R2 - SIEM Integration

Wichtige Metriken

Überwachen:
  - Failed login attempts (Brute Force?)
  - Multiple countries (Account Compromise?)
  - Off-hours access (Suspicious?)
  - New email addresses (Track invites)

Alerts einrichten:
  - 5+ failed logins → Email Alert
  - Login from unknown country → Slack Alert
  - Weekend access → Review Monday

🚨 INCIDENT RESPONSE

Verdächtiger Zugriff erkannt

# 1. User sofort blockieren
# Zero Trust → Access → Applications → Edit Policy

Block:
  - Email: suspicious-user@example.com

# 2. Session invalidieren
# Zero Trust → Settings → Session Management → Revoke all sessions for user

# 3. NDA Review
# Legal Team informieren
# NDA Breach prüfen

# 4. Password Reset
# Falls user Passwort hatte (bei IdP später)

# 5. Logs exportieren
# Evidence sichern für Legal

NDA Breach Response

1. Access sofort entfernen
2. Alle Sessions beenden
3. Legal Team informieren
4. Logs sichern (Evidence)
5. Incident Report erstellen
6. Team informieren
7. Monitoring verschärfen

🔥 ADVANCED FEATURES

Purpose Justification

User muss Grund angeben beim Login:

# Access → Application → Settings
Purpose Justification:
  ✅ Enable purpose justification
  ✅ Require for all users

Prompt: "Warum benötigst du Zugriff auf G100 Docs?"

Examples:
  - "Investor Due Diligence"
  - "Feature Development"
  - "Architecture Review"

Logs zeigen dann:

User: investor@vc-firm.com
Purpose: "Q1 2026 Investment Evaluation"
Timestamp: 2026-01-15 15:30:00

Session Duration by User

# Different policies for different groups

Policy: Investors (Short Session)
  Include: Email ends with @vc-firm.com
  Session: 2 hours

Policy: Core Team (Long Session)
  Include: Email ends with @your-company.com
  Session: 24 hours

Country Restrictions

# Nur EU + USA erlauben (DSGVO)

Policy: Geographic Restriction
  Include: All NDA users
  Require:
    - Country: Germany, Austria, Switzerland, USA

  # Alle anderen Länder automatisch blocked

Device Posture Check (später)

# Require WARP Client + Device Check

Policy: Secure Device Required
  Require:
    - WARP Client
    - OS Version: macOS 14+ oder Windows 11+
    - Antivirus: Running
    - Firewall: Enabled

💰 KOSTEN

Tier Users Features Kosten
Free 50 users OTP, Basic Policies €0/Monat
Zero Trust Unlimited IdP, Advanced Policies $7/user/Monat
Enterprise Unlimited SSO, SCIM, DLP Custom Pricing

G100 Start: FREE Tier (50 Users reichen!)


✅ SECURITY CHECKLIST

Pre-Launch

  • [ ] Cloudflare Access konfiguriert
  • [ ] One-Time PIN enabled
  • [ ] Policies für alle Apps erstellt
  • [ ] DNS Records konfiguriert
  • [ ] Email Whitelist gepflegt
  • [ ] NDA Template erstellt
  • [ ] Team Onboarding Guide geschrieben
  • [ ] Incident Response Plan dokumentiert

Launch

  • [ ] Erster Test-Login (selbst)
  • [ ] Test mit Team Member
  • [ ] Test mit Investor
  • [ ] Logs überprüft
  • [ ] Access Alerts konfiguriert
  • [ ] Backup Admin hinzugefügt

Post-Launch

  • [ ] Weekly Access Review
  • [ ] Monthly Security Audit
  • [ ] Quarterly NDA Review
  • [ ] User Offboarding Process
  • [ ] Incident drills

🔗 NEXT STEPS

Phase 1: Docs Protection (TODAY!)

1. Cloudflare Zero Trust aktivieren
2. One-Time PIN einrichten
3. Docs Application erstellen
4. DNS für docs.g100.dev
5. Erste Team Members einladen

Phase 2: API Protection (Week 2)

1. API Staging Application
2. DNS für api-staging.g100.dev
3. Separate Policy (Developers only)
4. API Key Rotation Strategy

Phase 3: XPipe Protection (Week 3)

1. XPipe MCP Application
2. Cloudflare Tunnel Setup
3. Core Team Policy (restricted)
4. Audit Logs monitoring

📚 Resources

Resource URL
Cloudflare Zero Trust https://one.dash.cloudflare.com/
OTP Setup Guide https://developers.cloudflare.com/cloudflare-one/integrations/identity-providers/one-time-pin/
Access Policies https://developers.cloudflare.com/cloudflare-one/policies/access/
Audit Logs https://developers.cloudflare.com/cloudflare-one/insights/logs/audit-logs/

🎯 ZUSAMMENFASSUNG

✅ Cloudflare Access = Zero-Trust Gateway
✅ One-Time PIN = Einfach + Sicher
✅ Email Whitelist = NDA Control
✅ 50 Users Free = Perfekt für Start
✅ Complete Audit Logs = Compliance
✅ 5 Min Setup = Schnell deployen

🔒 G100 KONZEPT ist geschützt!
📊 Nur NDA-Unterzeichner haben Zugriff!
🚀 Team kann sicher collaboraten!

Ready to secure G100? 🔐
Next: Cloudflare Zero Trust Dashboard öffnen!