Skip navigation

Zero Trust: Moving Beyond the Perimeter (Part 2)

In this guide, you’ll find::

  • Steps to take to implement a BeyondCorp zero-trust architecture
  • How to enroll users and endpoints, and mark devices as ‘trusted’
  • How to create and enforce access policies
  • The different stages of zero-trust security maturity

How to Implement the BeyondCorp Security Model

In part 1 of our guide series, Moving Beyond the Perimeter: The Theory Behind Google’s BeyondCorp Security Model, we described the need for enterprises to adopt a zero-trust security architecture that addresses new risks beyond the perimeter.

In part 2, we walk you through how to implement a BeyondCorp-based zero-trust security model at your organization with detailed steps, caveats and questions to ask.

  • First, organizations need to enroll users and endpoints into inventories.
  • Then they can identify endpoints as “trusted” using digital certificates.
  • Finally, they can create access policies based on the authenticated combination of users and endpoints.

Learn about the other components of BeyondCorp and zero trust, including single sign-on, device inspection and much more. Part 2 also provides an outline of the different maturity stages of enterprise security evolution, and who can reach each stage.

Find out how you can implement a similar zero-trust security model in your organization with the help of Duo Beyond:

  • Identify corporate vs. personal devices
  • Easy certificate deployment
  • Block untrusted endpoints
  • Give users secure access to internal applications
Preview the eBook