320 likes | 331 Views
Discover how Google protects its corporate security perimeter without the use of traditional firewalls. Learn about the principles of BeyondCorp and the guidelines for implementing this innovative approach to network security.
E N D
BeyondCorp - How Google Protects Its Corporate Security Perimeter without Firewalls Heather Adkins TECH-T11 Director of Security Google Rory Ward Site Reliability Engineering Manager Google
Google’s realization ... WALLS DON’T DON’T WORK WALLS WORK
BeyondCorp Principles ... #1 Connecting from a particular network must not determine which services you can access.
BeyondCorp Principles ... #2 Access to services is granted based on what we know about you and your device.
BeyondCorp Principles ... #3 All access to services must be authenticated, authorized and encrypted.
Our Six Year Mission To have every Google employee work successfully from untrusted networks without use of a VPN.
Implementing BeyondCorp How we did it and guidelines for how you can do it.
High Level User Inventory Access Proxy Device Inventory Access Control Engine Single Sign On Trust Repository
Get intimate with your Users • JobFunctionChanges User Inventory
Get intimate with your Devices Device Inventory • Procurement • End of Life • Provisioning
Build a Dynamic Trust Repository • DeviceInventory Trust Repository • DataSources
Build and Enforce Access Policy User Inventory Device Inventory Access Control Engine • ServiceRequest Trust Repository
Enable Access from anywhere Access Proxy Access Control Engine Single Sign On
Migrating to BeyondCorp How we did it and guidelines for how you can do it.
Outreach Telling the broader community about BeyondCorp
Lessons Learned What six years has taught us
Lessons Learned • Get, and retain, executive support.
Lessons Learned • Data Quality is key.
Lessons Learned • Enable Painless Migration.
Lessons Learned • Clear User Communications.
Lessons Learned • Run Highly Reliable Systems.
Applying BeyondCorp • Have zero trust in your network. • Base all access decisions on what you know about the user and their device. • Migrate carefully so as not to break existing users.