How to Implement the BeyondCorp Security Model
In part 1 of our white paper series, Moving Beyond the Perimeter: The Theory Behind Google’s BeyondCorp Security Model, we described the need for a new enterprise architecture that addresses new risks beyond the perimeter.
In part 2, we walk you through how to implement a BeyondCorp security model at your organization with detailed steps, caveats and questions to ask.
- First, organizations need to enroll users and endpoints into inventories.
- Then they can identify endpoints as “trusted” using digital certificates.
- Finally, they can create access policies based on the authenticated combination of users and endpoints.
Learn about the other components of BeyondCorp, including single sign-on, device inspection and much more. Part 2 also provides an outline of the different maturity stages of enterprise security evolution, and who can reach each stage.
Find out how you can implement a similar security model in your organization with the help of Duo Beyond:
- Identify corporate vs. personal devices
- Easy certificate deployment
- Block untrusted endpoints
- Give users secure access to internal applications