Implementing BeyondCorp

Studying what trends are on the rise in identity management, one may see an increase in chatter about BeyondCorp™. The security framework from Google® is sparking many organizations to reconsider their networks, and how they can implement BeyondCorp. Why is implementing BeyondCorp an important hurdle to an IT organization? Well, let’s first start with what BeyondCorp is and then we can drop into why using the model is critical for IT security.

What is BeyondCorp?

Zero Trust Security

BeyondCorp is, essentially, an implementation model of Zero Trust Security, delivered by Google. Zero Trust Security turns the traditional network security model, often called the perimeter security model, on its head. Perimeter security consists of creating layers of security features around the network, creating a domain based on trust that, in theory, sheltered authorized users and sensitive data inside the perimeter and kept bad actors out. Zero trust, on the other hand, is aptly named; no user or resource should be trusted until they’ve built trust in the network. ®

By assuming everything is untrusted to start, each interaction requires the generation of trust. That starts with understanding that the user is the right person to access their Windows®, Mac®, or Linux® laptop or desktop. From there, accessing IT resources needs to generate trust through identity, system configuration, and the network connection. These data points help to ensure that the right person can work securely on their materials.

Google’s Version of Zero Trust

Obviously, with Google’s globally dispersed workforce, the concept of a traditional physical, or even virtual, domain doesn’t make a lot of sense. And, neither does the concept of setting VPNs everywhere and the additional end user hassle and friction from them. So, the idea behind BeyondCorp is to enable people to do their work securely, regardless of where they are and what network they are on.

Challenges with Implementing BeyondCorp

The challenge is that most organizations don’t have the resources, nor the expertise, of Google to build and implement their own Zero Trust Security security model like BeyondCorp. Switching the security stance (Read more...)

*** This is a Security Bloggers Network syndicated blog from Blog – JumpCloud authored by Zach DeMeyer. Read the original post at: https://jumpcloud.com/blog/implementing-beyondcorp/

Zach DeMeyer

Zach DeMeyer

Zach is a writer and researcher for JumpCloud with a degree in Mechanical Engineering from the Colorado School of Mines. He loves being on the cutting edge of new technology, and when he's not working, he enjoys all things outdoors, making music, and soccer.

zach-demeyer has 244 posts and counting.See all posts by zach-demeyer