Google BeyondCorp Notes - Paper 1

Jay Looney October 09, 2023 #zerotrust #cybersecurity #BeyondCorp

This article is just notes I took while reading the first BeyondCorp1 paper.

BeyondCorp: A New Approach to Enterprise Security2

Introduction

Key Assmptions of Perimeter Security Model are no longer true Perimeter is no longer the physical location of an enterprise, inside the perimeter is not some blessed safe space for personal devices or enterprise apps

While most enterprises assume that the internal network is a safe environment in which to expose corporate applications, Google’s experience has proven that this faith is misplaced. Rather, one should assume that an internal network is as fraught with danger as the public Internet and build enterprise applications based upon this assumption

Google’s BeyondCorp initiative is moving to a new model that dispenses with a privileged corporate network. Instead, access depends solely on device and user credentials, regard-less of a user’s network location—be it an enterprise location, a home network, or a hotel or coffee shop. All access to enterprise resources is fully authenticated, fully authorized, and fully encrypted based upon device state and user credentials.

Major Components of BeyondCorp

  1. Securely Identifying the Device
  2. Securely Identifying the User
  3. Removing Trust from the Network
  4. Externalizing Applications and Workflows
  5. Implementing Inventory-Based Access Control

Securely Identifying the Device

Securely Identifying the User

Remove Trust from the Network

Externalizing Applications and Workflows

Implementing Inventory-Based Access Control