Главная
Study mode:
on
1
Introduction
2
Not so easy
3
Protect the environment
4
Manage the transition
5
Google BeyondCorp
6
Architecture
7
Recap
8
Understand your assets
9
Parameters
10
Outbound perimeter
11
Device management
12
Identity ecosystem
13
BeyondCorp architecture
14
Policy enforcement
15
OAuth
16
Identity Provider
17
SAML All or Nothing
18
Application Permissions Demo
19
Rejecting tools
20
Demo
21
Django
22
Django middleware
23
Django authentication model
24
App proxy flow
25
Extensible access control
26
Three components
27
Demos
28
Worlds simplest application
29
All Im doing
30
Demo gods
31
Send device certificate
32
Import
33
Limitations
34
Summary
35
Where are we
36
Rules and attributes
37
Vice fingerprinting
38
Contact information
Description:
Explore the concept of BeyondCorp and its implementation in enterprise security through this LASCON conference talk. Delve into the challenges of traditional enterprise security models and learn how to adapt to modern remote work environments. Discover the key components of Google's BeyondCorp architecture, including strong user authentication, device authentication, and centralized security control. Examine practical demonstrations of implementing this pattern in open-source web applications, focusing on separating authentication from business functionality using tools like SAML. Gain insights into modifying web application frameworks such as Django to enable conditional permissions based on session metadata. Follow along with hands-on demos showcasing the world's simplest application, device certificate implementation, and extensible access control. Conclude with a discussion on the current state of enterprise security, rules and attributes, and device fingerprinting techniques.

Be Ready for BeyondCorp - Enterprise Identity, Perimeters and Your Application

LASCON
Add to list