Cloudflare Docs
Cloudflare Zero Trust
View GitHub RSS feed
Visit Cloudflare Zero Trust on GitHub
Set theme to dark (⇧+D)

Dropbox

The Dropbox integration detects a variety of data loss prevention, account misconfiguration, and user security risks in an integrated Dropbox account that could leave you and your organization vulnerable.

​​ Integration prerequisites

  • A Dropbox Business plan (Standard, Advanced, Enterprise, or Education)
  • Access to a Dropbox Business account with Team admin permissions

​​ Integration permissions

For the Dropbox integration to function, Cloudflare CASB requires the following Dropbox permissions via an OAuth 2.0 app:

  • account_info.read
  • files.metadata.read
  • files.content.read
  • sharing.read
  • team_info.read
  • team_data.member
  • team_data.governance.write
  • team_data.governance.read
  • files.team_metadata.read
  • members.read
  • groups.read
  • sessions.list

These permissions follow the principle of least privilege to ensure that only the minimum required access is granted. To learn more about each permission, refer to the Dropbox API Permissions documentation.

​​ Security findings

The Dropbox integration currently scans for the following findings, or security risks. Findings are grouped by category and then ordered by severity level.

To stay up-to-date with new CASB findings as they are added, bookmark this page or subscribe to its RSS feed.

​​ File and folder sharing

Identify files and folders that have been shared in a potentially insecure fashion.

Finding Severity
Dropbox file publicly accessible with edit access Critical
Dropbox file shared team-wide with edit access High
Dropbox file publicly accessible with view access High
Dropbox folder publicly accessible High
Dropbox shared link create policy set to default ‘Public’ High
Dropbox file shared team-wide with view access Medium
Dropbox shared folder policy set to default ‘Anyone’ Medium
Dropbox group creation policy set to ‘Admins and Members’ Medium
Dropbox folder join policy set to ‘Can join folders shared by Anyone’ Medium
Dropbox folder member policy set to ‘Can share folders with Anyone’ Medium
Dropbox folder shared company-wide Medium
Dropbox shared link create policy set to default ‘Team-wide’ Low

​​ Suspicious applications

Detect when suspicious Dropbox applications are linked by members.

Finding Severity
Suspicious Dropbox application linked by member High

​​ User access and account misconfigurations

Flag user access issues, including users misusing accounts or not following best practices.

Finding Severity
Dropbox user with admin permissions and unverified secondary email Medium
Dropbox user with admin permissions and restricted directory access Medium
Dropbox user with unverified email Medium
Invited Dropbox user Low
Suspended Dropbox user Low
Dropbox user with secondary email configured Low