![]() Known vulnerabilities that are easy to exploit will be rarer.Strong auth requirements increases cost of cred theft and MITM attacks.Each service has to authenticated - internal netwrok is not permissive.We are removing the requirement for a privileged intranet and moving our corporate applications to the Internet. Google is taking a different approach to network security. As companies adopt mobile and cloud technologies, the perimeter is becoming increasingly difficult to enforce. However, this security model is problematic because, when that perimeter is breached, an attacker has relatively easy access to a company’s privileged intranet. Virtually every company today uses firewalls to enforce perimeter security. By reading this whitepaper BeyondCorp: A New Approach to Enterprise Security, 2014, we could learn that BeyondCorp is a security-oriented engineering effort which begun in 2012 to re-architect the Google Corp network to remove any privileges granted solely on the basis of having a Corp IP, instead basing authentication on more secure factors.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |