SlideShare a Scribd company logo
BeyondCorp and Zero Trust
Bay Area Cyber Security Meetup - Sep 7th 2017
Ivan Dwyer | VP of Product Marketing | @fortyfivan
The BeyondCorp story begins with Operation Aurora
Google Got it Right With BeyondCorp
1 Connecting from a particular network must not determine which services you can access
2 Access to services is granted based on what we know about you and your device
3 All access to services must be authenticated, authorized, and encrypted
Mission: To have every Google employee work successfully
from untrusted networks without the use of a VPN
Google’s Reference Architecture
The Major Components
Identity Provider
The corporate system of record for employees and
contractors, with groups and roles
Device Inventory Service
A system that continuously collects and processes the
attributes and state of known devices
Trust Inferer
A system that continuously analyzes device attributes
and state to determine its trust tier
Access Policies
A programmatic representation of the resources, trust
tiers, and other rules that must be satisfied
Access Proxy
A reverse proxy service placed in front of every
resource that handles the requests
Access Control Engine
A centralized policy enforcement service that makes
authorization decisions in real time
Key Outcomes for Google
➔ Eliminated the use of perimeter-based
network security controls – VPNs
➔ Streamlined end user experience for all
Google employees across the globe
➔ More visibility into employee activity to
identify behavioral patterns
➔ A 30% reduction in IT Support tickets
through a better user experience
Zero Trust is BeyondCorp For Everyone Else
Corporate Identity Redefined
Is the user in good standing with the company?
Does the user belong to the Engineering org?
Is the user on Team A working on feature X?
Is the device in inventory?
Is the device’s disk encrypted?
Is the device’s OS up to date?
Identity = You + Your Device at a Point-in-Time
Smarter Decision Making
“You can’t submit source code from an
unpatched device”
“You can only reach the company wiki
from a managed device”
“Your disk must be encrypted to access
the confidential file repository”
“You can view the corporate phone
directory from any device”
Real-time trust attestation based on dynamic conditions
Better Security Posture
➔ Keeping devices up-to-date with the latest software
➔ Maintaining an inventory of employee devices
➔ Monitoring all endpoints & logging all traffic
➔ Only communicating over fully encrypted channels
➔ Incorporating multi-factor auth
➔ Eliminating the use of static credentials
When security is usable, people like it and keep up with it
How to Achieve Your Own Zero Trust Architecture
Collect Your Relevant Data
1 Take an inventory of all employee devices - workstations, laptops, tablets, and phones
2 Take an inventory of all company resources to protect - apps, databases, servers, etc.
3 Take an inventory of all static credentials - shared passwords, ssh keys, etc.
4 Diagram your system architecture and inspect traffic logs to understand behavior
5 Collect device state - is the software up to date? Is the disk encrypted?
Determine the Right Policy Framework
➔ User attributes
➔ Device state
➔ Location-based rules
➔ Time-based controls
➔ Groups and roles
➔ Team federation
➔ Resource specific rules
Write Job Stories to Understand Your Users
Behavioral patterns should influence policy definitions
Alice - Build Engineer
When a release is ready, I want to login to the build
server over ssh, so I can inspect the build logs.
What if a request from Alice to the build server comes
from a laptop during a non-release time?
Bob - Recruiter
When I arrive at the office in the morning, I want to login
to the ATS, so I can review the day’s applicants
What if a request from Bob to a finance app comes from
outside the office during the evening?
Implement the Access Controls
The ScaleFT Access Fabric
Recommendations
1 You don’t have to build the whole system yourself - leverage solutions for the hard parts
2 Be selective with the environments you support - operating systems, protocols, etc.
3 Start with simple global coarse-grained access policies before getting too fine-grained
4 Test your new system with simple apps that don’t contain sensitive data
5 Keep your network controls in place until absolutely confident the new system works
Companies Who Have Been Successful
THANKS!!
Get in touch: ivan.dwyer@scaleft.com | @fortyfivan
www.scaleft.com
www.beyondcorp.com

More Related Content

PDF
BeyondCorp and Zero Trust
PDF
BeyondCorp New York Meetup: Closing the Adherence Gap
PDF
BeyondCorp Austin Meetup: BeyondCorp Myths Busted
PDF
BeyondCorp Seattle Meetup: Closing the Adherence Gap
PDF
BeyondCorp Myths: Busted
PDF
BeyondCorp - Google Security for Everyone Else
PDF
BeyondCorp: Closing the Adherence Gap
PDF
Zero trust in a hybrid architecture
BeyondCorp and Zero Trust
BeyondCorp New York Meetup: Closing the Adherence Gap
BeyondCorp Austin Meetup: BeyondCorp Myths Busted
BeyondCorp Seattle Meetup: Closing the Adherence Gap
BeyondCorp Myths: Busted
BeyondCorp - Google Security for Everyone Else
BeyondCorp: Closing the Adherence Gap
Zero trust in a hybrid architecture

What's hot (20)

PPTX
5 Steps to a Zero Trust Network - From Theory to Practice
PPTX
Jason Kent - AppSec Without Additional Tools
PPTX
Kent King - PKI: Do You Know Your Exposure?
PPTX
COSAC 2021 presentation - AWS Zero Trust
PDF
Forrester zero trust_dna
PDF
How Google Protects Its Corporate Security Perimeter without Firewalls
PPTX
Simplifying Security Management in the Virtual Data Center
PPTX
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
PPTX
Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...
PDF
Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...
PPTX
Insider Threat: How Does Your Security Stack Measure Up?
PPTX
Cloud – Helps or Hurts Insider Threat?
PDF
Managing risk and vulnerabilities in a business context
PDF
Top Azure security fails and how to avoid them
PPTX
Disección de amenazas en entornos de nube
PPTX
Bil Harmer - Myths of Cloud Security Debunked!
PDF
CIS Security Benchmark
PPTX
Kevin Glavin - Continuous Integration, Continuous Delivery, and Deployment (C...
PDF
Data protection on demand in hybrid it
PPTX
Ethical hacking
5 Steps to a Zero Trust Network - From Theory to Practice
Jason Kent - AppSec Without Additional Tools
Kent King - PKI: Do You Know Your Exposure?
COSAC 2021 presentation - AWS Zero Trust
Forrester zero trust_dna
How Google Protects Its Corporate Security Perimeter without Firewalls
Simplifying Security Management in the Virtual Data Center
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...
Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...
Insider Threat: How Does Your Security Stack Measure Up?
Cloud – Helps or Hurts Insider Threat?
Managing risk and vulnerabilities in a business context
Top Azure security fails and how to avoid them
Disección de amenazas en entornos de nube
Bil Harmer - Myths of Cloud Security Debunked!
CIS Security Benchmark
Kevin Glavin - Continuous Integration, Continuous Delivery, and Deployment (C...
Data protection on demand in hybrid it
Ethical hacking
Ad

Similar to BeyondCorp and Zero Trust (20)

PDF
Practical Enterprise Security Architecture
PPTX
Overview of Google’s BeyondCorp Approach to Security
PPSX
Zero-Trust SASE DevSecOps
PDF
How Zero Trust Changes Identity & Access
PDF
Un enfoque práctico para implementar confianza cero en el trabajo híbrido
PDF
The 1st Step to Zero Trust: Asset Management for Cybersecurity
PDF
BeyondCorp SF Meetup: Closing the Adherence Gap
PDF
BeyondCorp Boston Meetup: Closing the Adherence Gap
PDF
Manage risk by protecting apps, data and usage
PDF
Moving Beyond Zero Trust
PDF
SAP Application Access with Instasafe Zero Trust
PDF
Enterprise Security Reloaded
PDF
Hitachi ID Access Certifier: Find and remove stale privileges with periodic r...
PPTX
Embracing secure, scalable BYOD with Sencha and Centrify
PDF
Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...
PDF
BATbern48_How Zero Trust can help your organisation keep safe.pdf
PPTX
Secure adn Contained Access for Everybody, at Anytime
PDF
110307 cloud security requirements gourley
PPTX
Adopting A Zero-Trust Model. Google Did It, Can You?
PPTX
Zero Trust Model
Practical Enterprise Security Architecture
Overview of Google’s BeyondCorp Approach to Security
Zero-Trust SASE DevSecOps
How Zero Trust Changes Identity & Access
Un enfoque práctico para implementar confianza cero en el trabajo híbrido
The 1st Step to Zero Trust: Asset Management for Cybersecurity
BeyondCorp SF Meetup: Closing the Adherence Gap
BeyondCorp Boston Meetup: Closing the Adherence Gap
Manage risk by protecting apps, data and usage
Moving Beyond Zero Trust
SAP Application Access with Instasafe Zero Trust
Enterprise Security Reloaded
Hitachi ID Access Certifier: Find and remove stale privileges with periodic r...
Embracing secure, scalable BYOD with Sencha and Centrify
Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...
BATbern48_How Zero Trust can help your organisation keep safe.pdf
Secure adn Contained Access for Everybody, at Anytime
110307 cloud security requirements gourley
Adopting A Zero-Trust Model. Google Did It, Can You?
Zero Trust Model
Ad

Recently uploaded (20)

PDF
Electronic commerce courselecture one. Pdf
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Empathic Computing: Creating Shared Understanding
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
Cloud computing and distributed systems.
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Big Data Technologies - Introduction.pptx
DOCX
The AUB Centre for AI in Media Proposal.docx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Approach and Philosophy of On baking technology
PDF
Modernizing your data center with Dell and AMD
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
A Presentation on Artificial Intelligence
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
KodekX | Application Modernization Development
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Electronic commerce courselecture one. Pdf
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Empathic Computing: Creating Shared Understanding
Advanced methodologies resolving dimensionality complications for autism neur...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Cloud computing and distributed systems.
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Big Data Technologies - Introduction.pptx
The AUB Centre for AI in Media Proposal.docx
“AI and Expert System Decision Support & Business Intelligence Systems”
Approach and Philosophy of On baking technology
Modernizing your data center with Dell and AMD
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
A Presentation on Artificial Intelligence
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
NewMind AI Monthly Chronicles - July 2025
Agricultural_Statistics_at_a_Glance_2022_0.pdf
KodekX | Application Modernization Development
Bridging biosciences and deep learning for revolutionary discoveries: a compr...

BeyondCorp and Zero Trust

  • 1. BeyondCorp and Zero Trust Bay Area Cyber Security Meetup - Sep 7th 2017 Ivan Dwyer | VP of Product Marketing | @fortyfivan
  • 2. The BeyondCorp story begins with Operation Aurora
  • 3. Google Got it Right With BeyondCorp 1 Connecting from a particular network must not determine which services you can access 2 Access to services is granted based on what we know about you and your device 3 All access to services must be authenticated, authorized, and encrypted Mission: To have every Google employee work successfully from untrusted networks without the use of a VPN
  • 5. The Major Components Identity Provider The corporate system of record for employees and contractors, with groups and roles Device Inventory Service A system that continuously collects and processes the attributes and state of known devices Trust Inferer A system that continuously analyzes device attributes and state to determine its trust tier Access Policies A programmatic representation of the resources, trust tiers, and other rules that must be satisfied Access Proxy A reverse proxy service placed in front of every resource that handles the requests Access Control Engine A centralized policy enforcement service that makes authorization decisions in real time
  • 6. Key Outcomes for Google ➔ Eliminated the use of perimeter-based network security controls – VPNs ➔ Streamlined end user experience for all Google employees across the globe ➔ More visibility into employee activity to identify behavioral patterns ➔ A 30% reduction in IT Support tickets through a better user experience
  • 7. Zero Trust is BeyondCorp For Everyone Else
  • 8. Corporate Identity Redefined Is the user in good standing with the company? Does the user belong to the Engineering org? Is the user on Team A working on feature X? Is the device in inventory? Is the device’s disk encrypted? Is the device’s OS up to date? Identity = You + Your Device at a Point-in-Time
  • 9. Smarter Decision Making “You can’t submit source code from an unpatched device” “You can only reach the company wiki from a managed device” “Your disk must be encrypted to access the confidential file repository” “You can view the corporate phone directory from any device” Real-time trust attestation based on dynamic conditions
  • 10. Better Security Posture ➔ Keeping devices up-to-date with the latest software ➔ Maintaining an inventory of employee devices ➔ Monitoring all endpoints & logging all traffic ➔ Only communicating over fully encrypted channels ➔ Incorporating multi-factor auth ➔ Eliminating the use of static credentials When security is usable, people like it and keep up with it
  • 11. How to Achieve Your Own Zero Trust Architecture
  • 12. Collect Your Relevant Data 1 Take an inventory of all employee devices - workstations, laptops, tablets, and phones 2 Take an inventory of all company resources to protect - apps, databases, servers, etc. 3 Take an inventory of all static credentials - shared passwords, ssh keys, etc. 4 Diagram your system architecture and inspect traffic logs to understand behavior 5 Collect device state - is the software up to date? Is the disk encrypted?
  • 13. Determine the Right Policy Framework ➔ User attributes ➔ Device state ➔ Location-based rules ➔ Time-based controls ➔ Groups and roles ➔ Team federation ➔ Resource specific rules
  • 14. Write Job Stories to Understand Your Users Behavioral patterns should influence policy definitions Alice - Build Engineer When a release is ready, I want to login to the build server over ssh, so I can inspect the build logs. What if a request from Alice to the build server comes from a laptop during a non-release time? Bob - Recruiter When I arrive at the office in the morning, I want to login to the ATS, so I can review the day’s applicants What if a request from Bob to a finance app comes from outside the office during the evening?
  • 15. Implement the Access Controls The ScaleFT Access Fabric
  • 16. Recommendations 1 You don’t have to build the whole system yourself - leverage solutions for the hard parts 2 Be selective with the environments you support - operating systems, protocols, etc. 3 Start with simple global coarse-grained access policies before getting too fine-grained 4 Test your new system with simple apps that don’t contain sensitive data 5 Keep your network controls in place until absolutely confident the new system works
  • 17. Companies Who Have Been Successful
  • 18. THANKS!! Get in touch: ivan.dwyer@scaleft.com | @fortyfivan www.scaleft.com www.beyondcorp.com