Skip to content

Pull Zone security and observability

Lock down delivery with IP and TLS controls, add request signing, and keep visibility through analytics and logs.

Access controls and rate limits

  • IP allowlist/blocklist per zone; a country blocklist placeholder exists for future rollout.
  • Optional rate limiting defined as requests per minute to slow abusive clients without touching origin capacity.

TLS and headers

  • SSL can be toggled per zone; certificates for hostnames are issued and renewed automatically.
  • Security headers:
    • X-Frame-Options
    • X-Content-Type-Options
    • Referrer-Policy
    • Content-Security-Policy (freeform)
  • CORS: enable the Access-Control-Allow-Origin header when browsers should fetch from other origins. Keep it off for private APIs.

WAF-style protections

  • Block root path access when your origin should never serve /.
  • Block common attack patterns (basic injection and traversal filters) with a single toggle.

AWS-style request signing

  • Administrator-only setting that signs requests against S3-compatible backends.
  • Provide bucket, key, and secret; keep the toggle off for public buckets and on for locked-down origins.

Analytics and logs

  • Traffic analytics: daily traffic, total requests, cache performance, and status-code breakdowns.
  • Request logs: inspect recent requests to spot cache misses, origin failures, or blocked traffic.
  • Use analytics to validate cache rules after deployments; use logs to confirm IP rules and WAF behaviour without waiting for user reports.