Главная
Study mode:
on
1
Intro
2
GCP gives developers the power to build with Google's tools and infrastructure
3
Four issues are wrecking the castle approach
4
Google's six year Beyond Corp mission (2011-2017)
5
Similar visions of the future
6
Evolution: Infra leaves the building
7
Evolution: Identity leaves the building
8
Where Are The Risks?
9
Solutions
10
Ideal access policy for ERP application
11
Core principles of Beyond Corp
12
High level
13
Know your users
14
Know your devices
15
Build and enforce access policy
16
Enable access from anywhere
17
Deploy an unprivileged network
18
Safely migrate devices
19
Lessons learned
Description:
Explore Google's BeyondCorp security model in this 29-minute conference talk from BSidesSF 2017. Discover how the traditional "fortress" approach to network security is becoming obsolete in the face of mobile and cloud technologies. Learn about the four key issues undermining the castle approach and Google's six-year mission to develop BeyondCorp. Examine the evolution of infrastructure and identity management as they move beyond physical boundaries. Delve into the core principles of BeyondCorp, including user and device authentication, access policy enforcement, and the deployment of unprivileged networks. Gain insights into implementing this new security paradigm, which grants access based on device and user credentials regardless of location, eliminating the need for traditional VPNs. Understand how BeyondCorp can be applied to businesses to enhance security in an increasingly mobile and cloud-based work environment.

BeyondCorp - Beyond "Fortress" Security

Security BSides San Francisco
Add to list
0:00 / 0:00