BeyondCorp: Beyond fortress security BA.net Private Cloud Office - - PowerPoint PPT Presentation

beyondcorp beyond fortress security
SMART_READER_LITE
LIVE PREVIEW

BeyondCorp: Beyond fortress security BA.net Private Cloud Office - - PowerPoint PPT Presentation

BeyondCorp: Beyond fortress security BA.net Private Cloud Office Open Source Software Freedom, flexibility, low cost, no vendor lock-in, no jumping through monopoly license hoops, byod, local software, hybrid cloud, retire old firewalls, new


slide-1
SLIDE 1

BeyondCorp: Beyond fortress security

BA.net Private Cloud Office

slide-2
SLIDE 2

Open Source Software

Freedom, flexibility, low cost, no vendor lock-in, no jumping through monopoly license hoops, byod, local software, hybrid cloud, retire old firewalls, new security model zero trust, corporate access proxy.

slide-3
SLIDE 3

New hybrid cloud model: risks and threats

slide-4
SLIDE 4

How some enterprises think of security

But there are issues with this approach...

slide-5
SLIDE 5

Four issues that are wrecking the castle approach

Mobile workforce Breaches Plethora of devices Cloud services

5

slide-6
SLIDE 6

ERP SERVER

Access yesterday: On-premises walled gardens

VPN On Prem

Identity CRM SERVER

» What about contractors?

6

Employee

slide-7
SLIDE 7

On-prem

ERP SERVER

Evolution: Not just employees with corporate devices

VPN

Identity CRM SERVER

Contractor

Unintended CRM access for contractor

Employee

» What about the cloud?

7

slide-8
SLIDE 8

On-prem

Evolution: Infrastructure goes hybrid-cloud

VPN

Identity CRM VM ERP VM

» What about single sign on?

8

Contractor Employee

slide-9
SLIDE 9

Evolution: Identity goes hybrid-cloud

Identity CRM VM ERP VM

Now everything is either local software

  • r cloud replicated

» What threats are there in this new cloud world?

9

Contractor Employee

slide-10
SLIDE 10

Problems

Identity CRM VM ERP VM

Phishing? Malware? Man in the Middle? No chokepoint to enforce access control?

» What should I do?

XSS/SQL injection?

10

Contractor Employee

slide-11
SLIDE 11

WALLS DON’T WORK

BeyondCorp’s realization

slide-12
SLIDE 12

Solutions

Identity CRM VM ERP VM

Security keys Device management TLS Proxy for access control, TLS termination, based

  • n BeyondCorp

vision

Access proxy

» So what’s the ideal?

App security scans

12

Contractor Employee

slide-13
SLIDE 13

I want my Office application service to be:

  • Accessed only by employees
  • From well-managed client devices
  • In home country
  • Using strong user authentication
  • And proper transport encryption and
  • Hardened against application attacks

13

slide-14
SLIDE 14

Implementing BeyondCorp

slide-15
SLIDE 15

3

Authenticated Authorized Encrypted

Core principles of BeyondCorp:

Any network Context-based access

2

v1

15

slide-16
SLIDE 16

High level

Access proxy Single sign on

Access control engine

User inventory Device inventory Trust repository Security policy

16

slide-17
SLIDE 17

Know your people

User inventory

Job function changes

17

slide-18
SLIDE 18

Know your devices

Procurement End of life Provisioning Asset tracking Certificates

Device inventory

18

slide-19
SLIDE 19

Dynamic trust repository

Policies Device inventory People

Level of trust

Certificates

Trust repository

19

slide-20
SLIDE 20

Access policy

Service request

Access control engine

User inventory Device inventory Trust repository Security policy

20

slide-21
SLIDE 21

Access from anywhere

Access proxy Single sign on

Access control engine

21

slide-22
SLIDE 22

Migrating to BeyondCorp

slide-23
SLIDE 23

New unprivileged network

New VLAN Add devices Deploy

+ +

23

slide-24
SLIDE 24

Traffic analysis

24

slide-25
SLIDE 25

Safely migrate devices

25

slide-26
SLIDE 26

Better loaners

slide-27
SLIDE 27
  • An overview: A New Approach to Enterprise Security
  • Front-end infrastructure: The Access Proxy
  • Migrating to BeyondCorp: Maintaining Productivity

While Improving Security

  • The Human Element: The User Experience

BeyondCorp Papers

27

slide-28
SLIDE 28

Lessons learned: What 7 years taught us about migrating services to the cloud

slide-29
SLIDE 29

Lessons learned migrating to hybrid cloud

Get, and retain, executive support Enable painless migration Run highly reliable systems

29

slide-30
SLIDE 30

Lessons learned migrating to hybrid cloud

Get, and retain, executive support Enable painless migration Run highly reliable systems

30

slide-31
SLIDE 31

31 Migrate carefully so as not to break existing users

3

Base all access decisions on what you know about the user and their device

2

Have zero trust in your network

v1

Remember:

slide-32
SLIDE 32

Thank you