Blog Zscaler

Recevez les dernières mises à jour du blog de Zscaler dans votre boîte de réception

Products & Solutions

DeepSeek Access Control: Enhancing Security with DeepSeek Application Blocking

image

DeepSeek is a new addition to the GenAI application landscape. While it offers powerful capabilities similar to other GenAI applications, its usage may pose significant risks if not properly monitored or restricted. These risks include:

  • Data Leakage: Exposure of sensitive company intellectual property, such as source code.
  • Compliance Risks: Unauthorized search or retrieval of regulated information, potentially violating compliance requirements.

To address these risks, organizations leveraging Zscaler can create and enforce a URL policy to block access to DeepSeek.

Steps to Block DeepSeek Using Zscaler URL Policy

1. Identify DeepSeek's URLs and Domains

  • DeepSeek typically operates through specific URLs. Ensure you collect and validate the primary domains and subdomains associated with the application (e.g., www.deepseek.comchat.deepseek.comcdn.deepseek.com).
  • Use Zscaler’s logs and analytics to monitor existing traffic patterns and verify user access attempts to DeepSeek-related URLs.

2. Create a Custom URL for the Application

Create a custom URL for Deepseek application. Please refer to this help article on how to configure custom URL 

3. Create a URL Filtering Policy

4. Apply the Policy

  • Save and activate the policy. This ensures immediate enforcement across all users routed through Zscaler’s Zero Trust Exchange platform

5. Test the Policy

  • Validate the implementation by attempting to access DeepSeek URLs from endpoints with traffic routed through the Zscaler Zero Trust Exchange. The requests should be blocked, accompanied by a notification message.
  • Review Zscaler logs to confirm the policy's effectiveness.
Block Deepseek

6. Enable Alerts and Reporting

  • Configure alerting to notify administrators when users attempt to access blocked DeepSeek URLs.
  • Use Zscaler’s Analytic & reporting to monitor trends, such as repeated attempts to bypass the policy.

Additional Recommendations

  • Educate Users: Communicate the rationale behind blocking DeepSeek to employees, emphasizing data protection and compliance.
  • Monitor Exceptions: Regularly review and update policies to address exceptions or new risks as DeepSeek evolves.
  • Integrate with Zscaler DLP: Enhance protection by integrating Zscaler’s policy enforcement with data loss prevention (DLP) solutions to control sensitive data interactions.

By leveraging Zscaler’s robust URL policy enforcement, organizations can mitigate the risks associated with DeepSeek while maintaining compliance and safeguarding sensitive information.

form submtited
Merci d'avoir lu l'article

Cet article a-t-il été utile ?

Clause de non-responsabilité : Cet article de blog a été créé par Zscaler à des fins d’information uniquement et est fourni « en l’état » sans aucune garantie d’exactitude, d’exhaustivité ou de fiabilité. Zscaler n’assume aucune responsabilité pour toute erreur ou omission ou pour toute action prise sur la base des informations fournies. Tous les sites Web ou ressources de tiers liés à cet article de blog sont fournis pour des raisons de commodité uniquement, et Zscaler n’est pas responsable de leur contenu ni de leurs pratiques. Tout le contenu peut être modifié sans préavis. En accédant à ce blog, vous acceptez ces conditions et reconnaissez qu’il est de votre responsabilité de vérifier et d’utiliser les informations en fonction de vos besoins.

Recevez les dernières mises à jour du blog de Zscaler dans votre boîte de réception

En envoyant le formulaire, vous acceptez notre politique de confidentialité.