Skip to content

Build and Secure Applications at Pace With Cloudflare

CDS builds, secures, and operates services on Cloudflare Developer Platform for organisations where downtime, security gaps, and slow delivery aren't acceptable. We'll review what you have — or what you're planning to build — and tell you exactly where you stand.

Ship faster

Scale without the cost

Resilient by default

Unlock value quickly with Developer Platform

The Cloudflare Developer Platform is a serverless edge computing environment that gives us a single, globally distributed compute layer, where we build, secure and operate full-stack applications without managing infrastructure.  This means we can ship faster, spend less time on plumbing and deliver solutions that are resilient by default rather than resilient by effort.

A single layer that makes the complicated problems simpler. 

HOW WE SEE THE VALUE

One globally distributed compute layer, without the complexity tax.

The organisations we work with can't afford downtime, latency, or security gaps. They also shouldn't have to pay a complexity tax to avoid them.

Cloudflare lets us ship faster, spend less time on plumbing, and deliver platforms that are resilient by default, not by effort.

Performance: Code runs at the edge, close to users.

Security: WAF, Access, rate limits, bot management, mTLS - configured alongside application logic.

Operational simplicity: No VMs to provision, no containers to orchestrate, no invalidation queues to manage.

 

WHY WE USE IT

Because failure is visible, and accountability is real.

Whether it's Police officers accessing case management tools or Government property managers editing legal leases. Defence-in-depth has to be default, not bolt-on. Iteration has to be safe, not ceremonial.

Low-latency delivery: Across geographically distributed user bases.

Defence-in-depth as standard: WAF, rate limits, bots, mTLS, Access, all versioned.

Rapid iteration: Workers deploy in seconds. No VMs, no orchestration, no invalidation.

Cost-efficient compute at scale: Serverless pricing, edge execution, no round-trips to origins.

A man standing on a tree stump looking out at the landscape and clouds before him
A woman on a chair above the clouds
FOR US FOR OUR CLIENTS
Development velocity Workers, Pages, KV, R2, D1 - A full stack, one deployment target. Reduced Operational Burden Nothing to patch, scale or observe at the infrastructure layer.
Composability Start with routing Worker. Add KV, R2, AI, D1 incrementally. Stronger security posture Enterprise WAF, DDos Protection, bot management, zero trust - included, not procured separately.
Confidence in production Built-in observability, automatic failover, global distribution. Faster time to value Edge depployment means fixes reach users in seconds, not hours.
Reusable patterns Edge routing, request signing, headless front ends, AI apps, IaC - transferable between clients. Lower total cost One platform replacing CDN + load balancers + dedicated servers.

Already on Cloudflare or considering it for the first time?

If you're already running on Cloudflare, we'll review what you've built and find where it can work harder. If you're evaluating it, or have an idea you want to validate, we'll give you an honest picture of whether it's the right choice and what the real trade-offs are at your scale.

What we are doing for clients today.

  • Full-stack application hosting on Cloudflare Pages: Serverless backends, replacing traditional cloud hosting for Next.js applications serving government and policing users.
  • Intelligent edge routing with Workers: Solving complex multi-tenant traffic management across hundreds of domains, with cryptographic request signing and zero-trust access control.
  • Enterprise CDN migration and modernisation: Moving major publishers from legacy CDN providers to Cloudflare with Terraform-managed infrastructure-as-code covering 400+ zones, 55+ Workers, and 14 accounts.
  • Security stack implementation: Including WAF rulesets, rate limiting, bot management, geo-steering, and custom error handling, all codified and version-controlled.
  • AI-powered application delivery: Hosting LLM-integrated platforms on Cloudflare Pages with R2 for document storage and KV for session management.

See our proof.

Three real case studies in critical environments - where failure isn't an option.

UK POLICING

Routing 100+ police force domains through a single edge Worker.

The Single Online Home programme serves 42 territorial police forces in England and Wales. Cloudflare's O2O restriction threatened the entire migration. We solved it at the edge with a programmable router, KV-driven configuration and cryptographic request signing.

100+

Police force domains live on the router

O2O

Restriction resolved entirely at the edge

MFA

Zero-trust CMS admin with Cloudflare Access

 

The problem Why Cloudflare What we built  The outcomes 

Cloudflare prohibits Orange-to-Orange routing between two Custom Hostname zones, returning Error 1016. Both the SOH public portal and the Optimizely DXP backend sit on Cloudflare — the routing impasse threatened the entire migration. Beyond that, CMS admin paths needed strict access control, backend infrastructure needed to be network-blocked, and performance had to hold across 100+ domains serving millions of citizens.

 The platform was already committed to Cloudflare for CDN and security. Rather than layer in a separate proxy or abandon Cloudflare's native stack, we used the Developer Platform to solve O2O at the edge. Workers gave us the programmable routing layer, KV the distributed config store, and Access the zero-trust auth for admin interfaces — all within the same platform the client was already using for DNS and WAF. 
  • Worker looks up each incoming hostname in a KV namespace to determine whether it's a public or administrative request, and which DXP backend it routes to.
  • Request destinations are rewritten to the correct Optimizely DXP target — bypassing O2O entirely.
    Every forwarded request is cryptographically signed with SHA-256 HMAC, validated by a custom HostOverrideModule at DXP so only genuine edge requests reach origin.
  • Admin paths on public domains redirect to `.cms.soh.police.uk` hostnames behind Cloudflare Access with MFA.
  • Response Location headers and Set-Cookie domains are rewritten to user-facing hostnames.
  • WAF rules block all direct DXP access. Azure Pipelines runs a two-stage manual approval deploy with dry-run validation and automated KV seeding.
  • Over 100 police force domains (public and admin) successfully route through the Worker to Optimizely DXP, serving millions of citizens across England and Wales.
  • The O2O routing constraint was resolved entirely at the edge without introducing additional proxy infrastructure or compromising Cloudflare's security model.
  • CMS administration is protected by Cloudflare Access with MFA, and direct backend access is blocked by WAF rules.
  • The solution deploys in seconds and scales automatically. There are no servers to manage, no capacity to plan, and no cold starts.
  • For CDS, the project established reusable patterns for multi-tenant edge routing, cryptographic request signing, and KV-driven configuration that transfer directly to future engagements.

Read more here

OFFICE OF GOVERNMENT PROPERTY

The UK government's property estate, modernised at the edge.

The Office of Government Property (OGP_ manages tens of thousands of buildings, leases and compliance certificates across government. InSite is the modernised front end- GOV.UK compliant, geospatial, accessible, on Cloudflare Pages. the backend stayed in UK-South Azure for data sovereignty. 

18+

Entity types with full CRUD

GOV.UK

Front-end design system

Free

Preview environment per code change

 

The problem Why Cloudflare What we built  The outcomes 

The OGP manages government property: tens of thousands of buildings, land parcels, contracts, leases, BREEAM/EPC/DEC certifications across multiple departments. The existing system needed modernisation — data quality monitoring, geospatial search, GOV.UK design-system compliance, integration with legacy ePIMS SOAP authentication, and existing reporting tools.

 The front end needed to be resilient, fast, cost-efficient, and built to GOV.UK accessibility standards. Pages provided edge-deployed Next.js hosting without server management. The .NET backend stayed in UK-South Azure for data sovereignty. Split architecture: edge performance for users; controlled Azure environment for sensitive data and legacy integrations.
  • Next.js 15 front end on Pages built to GOV.UK Frontend with Leaflet-based interactive mapping, advanced list + map search views, geospatial polygon management, CRUD for 18+ entity types.
  • OpenAPI-first development: .NET backend generates an OpenAPI spec that drives TypeScript type generation for the front end — end-to-end type safety from database to UI.
  • Geospatial: Ordnance Survey integration for address lookup and raster tiles; Leaflet with marker clustering; Geoman for boundary editing. Tile server requests proxied via a Worker and cached within Cloudflare.
  • Legacy auth integration connecting NextAuth.js sessions with the existing ePIMS SOAP service — bridging modern front-end auth with established government identity infrastructure.
  • Accessibility + security: axe-core automated accessibility testing, CSRF protection, security headers middleware, parameterised SQL queries throughout.
  • Workers to generate and destroy unique preview environments per code change at no additional cost — dramatically streamlining testing.
  • Government property managers have a modern, accessible, performant interface for managing the UK government's property estate, built to GOV.UK standards and served from Cloudflare's edge.

  • The split architecture delivers edge performance for the user-facing application alongside data sovereignty compliance for the backend and database.
  • OpenAPI-driven type safety eliminates an entire class of integration bugs between front end and backend.
  • The generous tier of free daily usage on Workers results in the client application being extremely cost effective to run.
  • For CDS, InSite demonstrates our ability to use Cloudflare Pages as a modern front-end hosting platform for government systems while integrating cleanly with existing Azure backend infrastructure and legacy authentication - a pattern that applies to many public sector modernisation programmes.

 

Read more here

COLLEGE OF POLICING

An AI agent that actually cites its sources - for 42 police forces.

The College of Policing needed to prove that an AI agent could answer officer questions grounded in both unstructured guidance and structured force data. We built it on MCP - two Workers, nine tools, Durable Object for state, AI Search for RAG, AI Gateway for observability. All serverless, all at the edge. 

9

Tools the agent can invoke

MCP

First-class architecture

3x

Dedicated AI Search collections

 

The problem Why Cloudflare What we built  The outcomes 

The College of Policing maintains the body of knowledge underpinning modern policing practice - APP guidance, training catalogues, professional profiles, force performance metrics, examination results, learning event records. Officers face a familiar problem: unstructured guidance requires manual web searches; structured data requires database queries or bespoke reports. No single interface lets a user ask a natural language question and receive a synthesised answer drawing on both.

The PoC needed to host the front-end app, run agent logic, store structured + unstructured data, and perform vector search for RAG — with no origin servers. Cloudflare's Developer Platform provided every layer: Pages for the Next.js app, Workers with Durable Objects for the agent, the Agents SDK for React-to-agent comms, R2 for storage, AI Search for automatic vectorisation + retrieval, AI Gateway for analytics and guardrails on LLM calls.
  • Two Workers form the core: an MCP client Worker running the chat agent (OpenAI GPT-4o), and an MCP server Worker exposing nine tools the agent can invoke. Both use Durable Objects with SQLite for persistent multi-turn state.
  • Three tool categories: unstructured data (APP guidance, courses, profiles via AI Search); structured data (force info, events, examinations, performance metrics via Apache Iceberg on R2 + Python FastAPI running Spark); and a transformation tool generating Chart.js configs for visualisations.
  • Auto-generated schemas: a Python script reads Iceberg table metadata and produces Zod schemas that serve simultaneously as API validation and LLM function definitions. Eliminates drift between data layer and agent understanding.
  • Next.js 15 front-end deployed to Cloudflare Pages via OpenNextJS Cloudflare. Chat responses stream through Server-Sent Events; tool invocations visible as they occur.
  • AI Gateway sits between the MCP client and OpenAI, providing request analytics, evaluation, and guardrail capability. Azure Pipelines deploys three parallel targets (Pages + two Workers via Wrangler).
  • Police staff can ask natural language questions and receive answers grounded in College of Policing content and data, with the agent transparently selecting and invoking the right tools for each query.

  • The MCP architecture means the same tool server can be consumed by the web application, Claude Desktop, or any other MCP-compatible client, without rebuilding the tool layer.

  • AI Search eliminated the need to build and maintain a custom embedding and vector search pipeline. Content uploaded to R2 is automatically vectorised and made queryable.

  • The entire stack runs serverless on Cloudflare's edge, with no origin servers for the application or agent logic. The only non-Cloudflare compute is the Spark query service for Iceberg table access - although this functionality could probably now be served within a Cloudflare container.
  • For CDS, this project represents our first production use of Cloudflare AI Search, AI Gateway, and the Agents SDK with Durable Objects, and it establishes reusable patterns for MCP-based agent architectures on the Developer Platform.

 

Watch our panel with College of Policing

How we are aligning.

We are investing in Cloudflare as a core part of our delivery capability:

Internal tools & accelerators

Improving delivery speed and engineering consistency across teams.

Reusable Terraform Modules

Standardised infrastructure for rapid client environment setup.

Engineer Training

Full-stack  enablement across Workers, Pages, KV, R2. D1. AI.

Roadmap Alignment

Building in sync with Cloudflare's evolving platform capabilities.

Case Studies

Proving the platform in high-scale, mission-critical environments.

Technical Publishing

Publishing authoritative architectural guidance and patterns.

Architecting on Cloudflare.

An independent technical book on the platform, written by our Solution Architect.

When we say we deliver secure, resilient, user-centred technology, this book and the production experience behind it - is the receipt.  

Covers Workers, Durable Objects, D1, R2, Queues, Workflows, Containers, Workers AI, Vectorize, and the Agents SDK — for architects and technical decision-makers evaluating Cloudflare against hyperscalers. Includes honest assessments of limitations and thresholds where the platform stops being the right choice.


Author: Jamie Lord, Solution Architect at CDS

Scope: Workers all the way to Agents SDK - every production primitive

Viewpoint: Honest view and trade-offs. Where the platform excels and when it isn't the right call

Book your Cloudflare Architecture Review

A focussed session covering your current setup and where Cloudflare can do more for you. You'll leave with a prioritised written report of recommendations:

  Current Cloudflare setup: Configuration, IaC maturity, and deployment pipeline

  How to build and innovate faster on the platform without compromising security or stability

  Ways in which you can safely accelerate your AI journey

  Security posture: WAF, origin protection, NCSC alignment

  Cost profile: What you're running and where the waste is