SlideShare a Scribd company logo
HOW ZERO TRUST CHANGES IDENTITY & ACCESS
BeyondCorpSF Meetup - Mar 9th 2017
Ivan Dwyer - ivan.dwyer@scaleft.com | @fortyfivan
90%
of organizations
vulnerable to insider
threats in 2015
80%
of security breaches
involve privileged
credentials
23
Authentication
events per person
every day
Source: ForresterSource: Technavio Source: NIST
Mitigating insider risk is a top priority for every organization
Mission: To have every Google employee work successfully from untrusted networks without use of a VPN
1. Connecting from a particular network must not determine which services you can access
2. Access to services is granted based on what we know about you and your device
3. All access to services must be authenticated, authorized, and encrypted
Google really got it right with BeyondCorp
Zero Trust: Google Security for Everyone Else
First we need a new concept of Enterprise Identity
* Insert gross overgeneralization disclaimer here
Employees have traditionally been placed into two buckets*
Privileged User Non-privileged User
IT Function Business
Infrastructure Resources Applications
Terminal Workflow Web
Admin Role Group-based
Key or Cert Credential Password
Rotation policy Added Layers MFA
PAM Product Category IAM
Building a dynamic user and device profile
Is the user in good standing with the company?
Does the user belong to the Engineering org?
Is the user on Team A working on feature X?
...
Is the device in inventory?
Is the device’s disk encrypted?
Is the device’s OS up to date?
...
Enterprise Identity = You + Your Device at a Point-in-Time
Identity is still King, but Access is the Throne
What do we really want from Access Management?
➔ A unified solution for authentication, authorization, and auditing
➔ A common access policy definition for ABAC & RBAC
➔ The ability to make intelligent access decisions in real-time
➔ A consistent, streamlined workflow for both privileged and non-privileged users
➔ Identity governance decoupled from the system of record
➔ To eliminate the need for network segmentation and static credentials
Revitalizing the AAA Framework
Authenticate Authorize Audit
Verify Identity is who they say
they are
Verify Identity is allowed to
access the resource
Verify Identity is doing no harm
(intentional or not)
The basis for
a common
Access Policy
definition
➔ User attributes
➔ Device attributes
➔ Location-based rules
➔ Time-based controls
➔ Groups and roles
➔ Federation capabilities
➔ Resource-specific rules
Access Gateway
IdP
Why was I denied access?
Yes
No
SSH
RDP
HTTPS
Access Policies
MFA
Grant?
All requests flow through a centralized access gateway
Request resource
CA
Policy Engine
Some questions to ponder
➔ How will all the components integrate with each other?
➔ How to balance coarse-grained policies with fine-grained policies?
➔ Where do the access policies line-up with the shared responsibility principles of IaaS?
➔ What’s the best way to incorporate approval workflows to specific resources?
➔ Can the Identity system of record exist in the cloud?
➔ How to support legacy protocols and specifications consistently? (Should you?)
➔ How to track and monitor all the devices (managed and BYOD) their employees use?
Zero Trust is Security Transformation
The big picture
Zero Trust security measures encourage better overall practices
➔ Keep devices up-to-date with the latest software
➔ Maintain an inventory of employee devices
➔ Monitor all endpoints & log all traffic
➔ Only communicate over fully encrypted channels
➔ Incorporate multi-factor auth
➔ Eliminate static credentials
We will start to see significant market effects
➔ A new category of Cloud Native solution providers are emerging that are disrupting the
legacy security companies who focus primarily on strengthening perimeter security
➔ Defined market categories such as IAM and PAM will converge into a single Access
Management category that works across privileged and nonprivileged users
➔ The Identity Provider space is about to heat up as cloud-based alternatives to Active
Directory start to break through into the enterprise market
➔ The VPN market is going to be significantly impacted as more companies shift towards a Zero
Trust model that places less (or no) emphasis on network protection as a security measure
Where does ScaleFT fit in the picture?
ScaleFT is the leading Zero Trust Access Management provider
Architecture Reviews Platform Implementations Community Efforts
We work closely with you to design the
right Zero Trust architecture for your
organization
The ScaleFT platform can be operated as a
SaaS or as a dedicated deployment in any
cloud environment
We are leading the BeyondCorp
movement, further educating the market
about Zero Trust
THANKS!!
Get in touch: ivan.dwyer@scaleft.com | @fortyfivan
www.scaleft.com
www.beyondcorp.com

More Related Content

PDF
Zero trust in a hybrid architecture
PDF
BeyondCorp and Zero Trust
PDF
BeyondCorp - Google Security for Everyone Else
PDF
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
PPTX
Adopting A Zero-Trust Model. Google Did It, Can You?
PPTX
Zero Trust Network Access
PDF
BeyondCorp Myths: Busted
DOCX
What is zero trust model of information security?
Zero trust in a hybrid architecture
BeyondCorp and Zero Trust
BeyondCorp - Google Security for Everyone Else
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Adopting A Zero-Trust Model. Google Did It, Can You?
Zero Trust Network Access
BeyondCorp Myths: Busted
What is zero trust model of information security?

What's hot (20)

PDF
BeyondCorp: Closing the Adherence Gap
PDF
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
PDF
BeyondCorp New York Meetup: Closing the Adherence Gap
PPTX
5 Steps to a Zero Trust Network - From Theory to Practice
PPTX
COSAC 2021 presentation - AWS Zero Trust
PPTX
What is Zero Trust
PPTX
What is zero trust model (ztm)
PDF
How Zero Trust Makes the Mission Simple & Secure
PDF
How Google Protects Its Corporate Security Perimeter without Firewalls
PPTX
Zero Trust Framework for Network Security​
PPTX
Zero Trust Run-time Kubernetes Security made easy with AccuKnox
PDF
Zero Trust Enterprise Network at Adobe
PDF
Workshop on CASB Part 2
PPTX
An in depth understanding in the application of the zero-trust security model...
PDF
63 Requirements for CASB
PDF
Data protection on demand in hybrid it
PPTX
How sdp delivers_zero_trust
PDF
Zero Trust Model Presentation
PDF
Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...
PPTX
LoginCat - Zero Trust Integrated Cybersecurity
BeyondCorp: Closing the Adherence Gap
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
BeyondCorp New York Meetup: Closing the Adherence Gap
5 Steps to a Zero Trust Network - From Theory to Practice
COSAC 2021 presentation - AWS Zero Trust
What is Zero Trust
What is zero trust model (ztm)
How Zero Trust Makes the Mission Simple & Secure
How Google Protects Its Corporate Security Perimeter without Firewalls
Zero Trust Framework for Network Security​
Zero Trust Run-time Kubernetes Security made easy with AccuKnox
Zero Trust Enterprise Network at Adobe
Workshop on CASB Part 2
An in depth understanding in the application of the zero-trust security model...
63 Requirements for CASB
Data protection on demand in hybrid it
How sdp delivers_zero_trust
Zero Trust Model Presentation
Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...
LoginCat - Zero Trust Integrated Cybersecurity
Ad

Viewers also liked (20)

PDF
Achieving a Serverless Development Experience
PDF
El principio de precaución (ensayo)
PPT
Trivalent Inacivated Seasonal Influenza Vaccine 2017-2018
DOCX
EL AYUNTAMIENTO PRESENTARÁ ESTE AÑO MÁLAGA COMO CIUDAD PARA INVERTIR EN MÁS D...
PDF
Ensayo carga probatoria
PDF
德華小知識 #補充鈣質
PPSX
Trec
PPT
Le SoTL comme voie de développement professionnel
PDF
Prescription For The Planet The Painless Remedy for our Energy & Environmenta...
PDF
Clubby Media
PPTX
Procesadores
DOCX
Olivier Desbarres - FED 25 AND 500 GODFATHERS
PDF
How to find customers and grow your tribe
PPTX
Google AMP 1 an après : quel bilan, quelles perspectives ?
PDF
Declaration de Politique Générale du Premier Ministre Nomme Jack Guy Lafontant
PDF
Sunderbans mangrove trees losing capacity to absorb co2 study
PDF
Departement d'Etat: Rapport 2017 sur la Strategie de Combat Contre le Trafiqu...
PDF
Tammy A. Namoco
PDF
20170309 Webinar oc op presentazione analisi
PDF
20170309 webinar oc op presentazione opencoesione
Achieving a Serverless Development Experience
El principio de precaución (ensayo)
Trivalent Inacivated Seasonal Influenza Vaccine 2017-2018
EL AYUNTAMIENTO PRESENTARÁ ESTE AÑO MÁLAGA COMO CIUDAD PARA INVERTIR EN MÁS D...
Ensayo carga probatoria
德華小知識 #補充鈣質
Trec
Le SoTL comme voie de développement professionnel
Prescription For The Planet The Painless Remedy for our Energy & Environmenta...
Clubby Media
Procesadores
Olivier Desbarres - FED 25 AND 500 GODFATHERS
How to find customers and grow your tribe
Google AMP 1 an après : quel bilan, quelles perspectives ?
Declaration de Politique Générale du Premier Ministre Nomme Jack Guy Lafontant
Sunderbans mangrove trees losing capacity to absorb co2 study
Departement d'Etat: Rapport 2017 sur la Strategie de Combat Contre le Trafiqu...
Tammy A. Namoco
20170309 Webinar oc op presentazione analisi
20170309 webinar oc op presentazione opencoesione
Ad

Similar to How Zero Trust Changes Identity & Access (20)

PDF
BATbern48_How Zero Trust can help your organisation keep safe.pdf
PPTX
Zero trust deck 2020
PDF
BeyondCorp and Zero Trust
PDF
Un enfoque práctico para implementar confianza cero en el trabajo híbrido
PDF
InstaSafe Zero Trust Access - Key Features and Benefits
PPTX
Zero Trust 20211105
PDF
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
PDF
Beyond Boundaries-The Power of Zero Trust Networking By Mohammed Danish Amber...
PDF
Why Zero Trust Yields Maximum Security
PDF
The 1st Step to Zero Trust: Asset Management for Cybersecurity
PPTX
microsoft-cybersecurity-reference-architectures (1).pptx
PDF
Moving Beyond Zero Trust
PDF
Zero Trust Network Security- A Modern Approach to Cyber Defense (1).pdf
PPSX
Zero-Trust SASE DevSecOps
PDF
Microsoft Zero Trust
PPTX
Zero Trust: Redefining Security in the Digital Age
PPTX
The Importance of Zero Trust Security in Modern.pptx
PPTX
ciso-workshop-3-identity-protection.pptx
PPTX
Zero trust model for cloud computing.pptx
PDF
Zero Trust Security Why Managed Cybersecurity Services Are Adopting This Model
BATbern48_How Zero Trust can help your organisation keep safe.pdf
Zero trust deck 2020
BeyondCorp and Zero Trust
Un enfoque práctico para implementar confianza cero en el trabajo híbrido
InstaSafe Zero Trust Access - Key Features and Benefits
Zero Trust 20211105
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Beyond Boundaries-The Power of Zero Trust Networking By Mohammed Danish Amber...
Why Zero Trust Yields Maximum Security
The 1st Step to Zero Trust: Asset Management for Cybersecurity
microsoft-cybersecurity-reference-architectures (1).pptx
Moving Beyond Zero Trust
Zero Trust Network Security- A Modern Approach to Cyber Defense (1).pdf
Zero-Trust SASE DevSecOps
Microsoft Zero Trust
Zero Trust: Redefining Security in the Digital Age
The Importance of Zero Trust Security in Modern.pptx
ciso-workshop-3-identity-protection.pptx
Zero trust model for cloud computing.pptx
Zero Trust Security Why Managed Cybersecurity Services Are Adopting This Model

More from Ivan Dwyer (8)

PDF
BeyondCorp Austin Meetup: BeyondCorp Myths Busted
PDF
BeyondCorp Boston Meetup: Closing the Adherence Gap
PDF
BeyondCorp Seattle Meetup: Closing the Adherence Gap
PDF
BeyondCorp SF Meetup: Closing the Adherence Gap
PDF
Navigating the Cloud Foundry Ecosystem of Ecosystems: An ISV Perspective
PDF
API Strategy Austin - App-centric vs Job-centric Microservices
PDF
Internet of Things: Patterns For Building Real World Applications
PDF
Handling Asynchronous Workloads With OpenShift and Iron.io
BeyondCorp Austin Meetup: BeyondCorp Myths Busted
BeyondCorp Boston Meetup: Closing the Adherence Gap
BeyondCorp Seattle Meetup: Closing the Adherence Gap
BeyondCorp SF Meetup: Closing the Adherence Gap
Navigating the Cloud Foundry Ecosystem of Ecosystems: An ISV Perspective
API Strategy Austin - App-centric vs Job-centric Microservices
Internet of Things: Patterns For Building Real World Applications
Handling Asynchronous Workloads With OpenShift and Iron.io

Recently uploaded (20)

PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
A Presentation on Artificial Intelligence
PDF
Encapsulation theory and applications.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
Big Data Technologies - Introduction.pptx
PDF
Modernizing your data center with Dell and AMD
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Machine learning based COVID-19 study performance prediction
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
cuic standard and advanced reporting.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
Chapter 3 Spatial Domain Image Processing.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
A Presentation on Artificial Intelligence
Encapsulation theory and applications.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
MYSQL Presentation for SQL database connectivity
Big Data Technologies - Introduction.pptx
Modernizing your data center with Dell and AMD
Diabetes mellitus diagnosis method based random forest with bat algorithm
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Machine learning based COVID-19 study performance prediction
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
20250228 LYD VKU AI Blended-Learning.pptx
NewMind AI Weekly Chronicles - August'25 Week I
cuic standard and advanced reporting.pdf
Unlocking AI with Model Context Protocol (MCP)

How Zero Trust Changes Identity & Access

  • 1. HOW ZERO TRUST CHANGES IDENTITY & ACCESS BeyondCorpSF Meetup - Mar 9th 2017 Ivan Dwyer - ivan.dwyer@scaleft.com | @fortyfivan
  • 2. 90% of organizations vulnerable to insider threats in 2015 80% of security breaches involve privileged credentials 23 Authentication events per person every day Source: ForresterSource: Technavio Source: NIST Mitigating insider risk is a top priority for every organization
  • 3. Mission: To have every Google employee work successfully from untrusted networks without use of a VPN 1. Connecting from a particular network must not determine which services you can access 2. Access to services is granted based on what we know about you and your device 3. All access to services must be authenticated, authorized, and encrypted Google really got it right with BeyondCorp
  • 4. Zero Trust: Google Security for Everyone Else
  • 5. First we need a new concept of Enterprise Identity
  • 6. * Insert gross overgeneralization disclaimer here Employees have traditionally been placed into two buckets* Privileged User Non-privileged User IT Function Business Infrastructure Resources Applications Terminal Workflow Web Admin Role Group-based Key or Cert Credential Password Rotation policy Added Layers MFA PAM Product Category IAM
  • 7. Building a dynamic user and device profile Is the user in good standing with the company? Does the user belong to the Engineering org? Is the user on Team A working on feature X? ... Is the device in inventory? Is the device’s disk encrypted? Is the device’s OS up to date? ...
  • 8. Enterprise Identity = You + Your Device at a Point-in-Time
  • 9. Identity is still King, but Access is the Throne
  • 10. What do we really want from Access Management? ➔ A unified solution for authentication, authorization, and auditing ➔ A common access policy definition for ABAC & RBAC ➔ The ability to make intelligent access decisions in real-time ➔ A consistent, streamlined workflow for both privileged and non-privileged users ➔ Identity governance decoupled from the system of record ➔ To eliminate the need for network segmentation and static credentials
  • 11. Revitalizing the AAA Framework Authenticate Authorize Audit Verify Identity is who they say they are Verify Identity is allowed to access the resource Verify Identity is doing no harm (intentional or not)
  • 12. The basis for a common Access Policy definition ➔ User attributes ➔ Device attributes ➔ Location-based rules ➔ Time-based controls ➔ Groups and roles ➔ Federation capabilities ➔ Resource-specific rules
  • 13. Access Gateway IdP Why was I denied access? Yes No SSH RDP HTTPS Access Policies MFA Grant? All requests flow through a centralized access gateway Request resource CA Policy Engine
  • 14. Some questions to ponder ➔ How will all the components integrate with each other? ➔ How to balance coarse-grained policies with fine-grained policies? ➔ Where do the access policies line-up with the shared responsibility principles of IaaS? ➔ What’s the best way to incorporate approval workflows to specific resources? ➔ Can the Identity system of record exist in the cloud? ➔ How to support legacy protocols and specifications consistently? (Should you?) ➔ How to track and monitor all the devices (managed and BYOD) their employees use?
  • 15. Zero Trust is Security Transformation
  • 17. Zero Trust security measures encourage better overall practices ➔ Keep devices up-to-date with the latest software ➔ Maintain an inventory of employee devices ➔ Monitor all endpoints & log all traffic ➔ Only communicate over fully encrypted channels ➔ Incorporate multi-factor auth ➔ Eliminate static credentials
  • 18. We will start to see significant market effects ➔ A new category of Cloud Native solution providers are emerging that are disrupting the legacy security companies who focus primarily on strengthening perimeter security ➔ Defined market categories such as IAM and PAM will converge into a single Access Management category that works across privileged and nonprivileged users ➔ The Identity Provider space is about to heat up as cloud-based alternatives to Active Directory start to break through into the enterprise market ➔ The VPN market is going to be significantly impacted as more companies shift towards a Zero Trust model that places less (or no) emphasis on network protection as a security measure
  • 19. Where does ScaleFT fit in the picture? ScaleFT is the leading Zero Trust Access Management provider Architecture Reviews Platform Implementations Community Efforts We work closely with you to design the right Zero Trust architecture for your organization The ScaleFT platform can be operated as a SaaS or as a dedicated deployment in any cloud environment We are leading the BeyondCorp movement, further educating the market about Zero Trust
  • 20. THANKS!! Get in touch: ivan.dwyer@scaleft.com | @fortyfivan www.scaleft.com www.beyondcorp.com