Gives an overview of Googles BeyondCorp project, why Zero Trust is the right framework to follow, and how to get started at your own company. Presentation given at the Rocky Mountain InfoSec Conference - May 10, 2017. It builds upon a decade of experience at Google, combined with ideas and best practices from the community. BeyondCorp - Google Security for Everyone Else. Licensed under Creative Commons: By Attribution 3. BeyondCorp is Google's implementation of the zero trust model. SE Radio theme music: “Broken Reality” by Kevin MacLeod ( ) SE Radio 288: Francois Reynaud on DevSecOp.SE Radio 378: Joshua Davies on Attacking and Securing PKI.BeyondCorp slide deck from OReilly Security Conference.Zero Trust isn’t a product or a solution it’s a philosophy and a strategy. BeyondCorp is basically Google’s own in-house version of Zero Trust. Why is implementing BeyondCorp an important hurdle to an IT organization Well, let’s first start with what BeyondCorp is and then we can drop into why using the model is critical for IT security. BeyondCorp: How Google Ditched VPNs for Remote Employee Access by Joab Jackson Also in 2010, Google started developing something called BeyondCorp after Chinese hackers breached the company’s system and stole intellectual property. The security framework from Google is sparking many organizations to reconsider their networks, and how they can implement BeyondCorp.These capabilities map to a set of interacting core architectural components that are highly adaptable to various business scenarios. Google’s BeyondCorp reference architecture The Zero Trust Network, or Zero Trust Architecture, model was created in 2010 by John Kindervag, who at the time was a principal analyst at Forrester Research Inc. Zero Trust Reference Framework The key capabilities of zero trust security can be summarized as follows: identity-based schema, resource secure access, continuous trust evaluation and adaptive access control.Book: Zero-Trust Network by Evan Gilman and Doug Barth.encryption running your own internal CA trusting apps the secure build pipeline DevOps and the zero-trust model tools and frameworks where are we in the adoption curve? Related Links The discussion covers: the perimeter network architecture the threat model in modern networks the meaning of “trust in the network” why we should not trust our networks (it’s probably already owned) the concept of zero trust in the network design of the zero-trust network the control plane and the data plane trust scoring – behavioral, policy-driven, and uses of ML/AI. Evan Gilman and Doug Barth, authors of Zero-Trust Networks: building secure systems in untrusted networks discuss zero-trust networks.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |