Skip to main content

Getting Started

Welcome to the AI Security Bootcamp hands-on lab. You'll build Zero Trust foundations from zero, then protect AI-powered applications and govern workforce AI usage using Cloudflare.

What You'll Build

Over 6 modules you will:

  1. Set up Zero Trust — configure SAML IdP, reusable Access policies, and CF1 Client / WARP
  2. Explore a vulnerable AI-powered e-commerce assistant
  3. Detect attacks using AI Security for Apps
  4. Mitigate them with WAF rules
  5. Govern workforce AI usage with Gateway and DLP
  6. Secure sanctioned MCP access via portal and block shadow MCP

Lab Components

You'll need the following resources, all provided for you:

ComponentDescription
Cloudflare account & zoneA dedicated lab account with WAF, Zero Trust, and all required entitlements
Windows 11 clientA managed Windows workstation for CF1 Client / WARP enrollment
Ubuntu serverAn Ubuntu origin server
SAML identity providerA shared SAML-based IdP with preconfigured test users
AI Shopping AssistantA prebuilt e-commerce app with an LLM-powered chat assistant
KiwiCart MCP ServerA shared remote MCP server with read-only tools
Lab guideThis step-by-step guide with validation checkpoints

Your Lab Slug

Throughout this guide, you will see references to your lab slug. You can find it in the name of your Cloudflare account — it is the two-word suffix after the hyphen (e.g., ... - adjective-noun).

Lab Architecture

The lab uses two control planes across multiple traffic paths:

Inbound (AI App Protection)

You (browser) → Cloudflare WAF + AI Security for Apps → AI Shopping Assistant + LLM

Outbound (Workforce AI Governance)

Win11 client (WARP) → Cloudflare Gateway + DLP → Public AI Tools

Sanctioned MCP Path

MCP Inspector → MCP Portal → Cloudflare Access (auth) → KiwiCart MCP Server

Unsanctioned MCP Path (blocked)

MCP Inspector → Gateway/SWG → Direct MCP Server URL → BLOCKED

Identity & Trust Model

LayerComponentPurpose
IdentitySAML IdPProvides user identities for Access and MCP portal auth
AccessReusable policiesControls who can reach protected resources
ClientCF1 Client / WARPRoutes device traffic through Gateway for policy enforcement
GatewayHTTP policies + DLPEnforces AI usage governance and blocks shadow MCP
MCP PortalAI controlsProvides sanctioned, identity-aware MCP access

What You Will Build From Zero

In M0, every attendee creates the Zero Trust foundation:

  1. Configure SAML identity provider — register and test the IdP
  2. Create reusable Access policiesAll employees and IT admins
  3. Set up CF1 Client / WARP — enroll the Windows 11 client, connect to Gateway
M4 and M5 depend on M0

Do not skip M0. The Gateway AI governance (M4) and MCP portal (M5) labs require a working identity provider, Access policies, and WARP client connection.

Module Overview

ModuleTitleTimeWhat You'll Do
M0Zero Trust Foundation35 minConfigure SAML IdP, Access policies, CF1 Client / WARP
M1Explore & Attack20 minEnable AI Security for Apps, label endpoints, then send normal and adversarial prompts to the AI app
M2AI Security — Monitor30 minConfigure custom topics, inspect detections from M1 traffic
M3AI Security — Mitigate25 minApply WAF rules per detection type, compare before/after
M4Zero Trust AI Governance30 minGateway AI controls, DLP prompt inspection, Shadow AI
M5Sanctioned MCP Portal40 minConfigure MCP portal, Access policy, block direct MCP

How to Use This Guide

Each module page includes:

  • Task — what you're doing in one sentence
  • Why — why this matters
  • Steps — numbered steps with exact dashboard paths
  • Expected Result — what you should see
  • Validation — checkboxes to confirm success
  • Troubleshooting — common issues and fixes

Complete each module's Validation step before moving to the next module.

Prerequisites

  • A laptop with a modern web browser (Chrome, Firefox, or Edge)
  • Your lab credentials (provided by the facilitator)
  • Access to the Windows 11 VM and Ubuntu server
  • Node.js 18+ installed (for MCP Inspector in M5)

Need Help?

  • Check the Troubleshooting section in each module
  • Raise your hand — facilitators are available to help
  • If the dashboard looks different from the screenshots, check that you're in the correct account/zone