The September 2025 Cloudflare breach, traced back to a Salesforce integration exploited through the Salesloft Drift incident, has already become a case study in how modern supply-chain attacks unfold. While the attackers gained access to sensitive support case data, Cloudflare’s response demonstrated the value of clear communication, accountability, and agile incident management. At the same time, the breach highlights the importance of proactive security practices that could have reduced the risk of compromise in the first place.
Once the breach was detected, Cloudflare moved quickly to revoke and rotate 104 exposed API tokens. This swift action limited potential downstream exploitation and reflected well-established incident response playbooks in action.

Rather than delay disclosure, Cloudflare provided a detailed public account of the breach. This openness helped customers understand both the scope of the incident and the steps being taken to remediate it. The speed and transparency of their communication also allowed customers to react quickly, minimising potential knock-on effects within their own environments.
Cloudflare did not seek to minimise responsibility by pointing fingers at third-party vendors. Instead, they accepted accountability for customer data exposure and outlined how they would strengthen their controls moving forward.
The initial entry point came via a third-party integration. While reliance on SaaS ecosystems is common, organisations need robust risk assessments for every external connector, particularly those with access to sensitive data.

The exposure of more than a hundred API tokens suggests opportunities for tighter lifecycle management. Automated expiry, rotation policies, and secret scanning could have reduced the window of vulnerability.
Customer-submitted information within support cases became a channel for sensitive data exposure. Educating customers on secure practices, while also applying automated scanning to redact or quarantine sensitive inputs, could further mitigate this risk.
At Vertex Agility, we believe that resilience is built not only through rapid response but through proactive, agile security practices embedded across the software lifecycle. As trusted partners within the Microsoft AI Cloud Partner Program, AWS Services Program, AWS Software Program, and Salesforce Consulting Services, we bring both breadth and depth to cloud security.
Our teams specialise in:

With agile, on-demand teams, Vertex Agility enables organisations to strengthen security without slowing delivery. The Cloudflare breach underlines a simple truth: in today’s interconnected landscape, prevention and agility must go hand in hand.
The Cloudflare Salesforce breach serves as both a warning and a guide. Transparency, accountability, and agility in response are commendable. But avoiding such breaches in the first place requires more – from disciplined token management to rigorous supply-chain security.
At Vertex Agility, we work alongside forward-thinking organisations to ensure that these practices are not an afterthought but a foundation. If you're seeking to strengthen your security posture while maintaining delivery velocity, we are here to help.
Contact us today to discuss how our expert teams can safeguard your organisation’s cloud environment.
What caused the Cloudflare Salesforce breach?
The breach was caused by a compromised Salesforce integration, linked to the Salesloft Drift supply-chain incident, which exposed sensitive support case data.
How did Cloudflare respond to the breach?
Cloudflare responded by quickly revoking and rotating 104 API tokens, issuing transparent communications, and taking accountability while outlining strengthened controls.
How can companies avoid similar incidents?
Companies can reduce risk by implementing robust supply-chain security audits, automating secret management, enforcing token lifecycle policies, and educating teams and customers on secure practices.
What are the key lessons from the Cloudflare breach?
The key lessons are the importance of rapid incident response, transparent communication, and accountability in remediation – alongside proactive measures such as supply-chain oversight and token hygiene.