June 23rd, 2024

BeyondCorp (2014)

Google's BeyondCorp approach rethinks enterprise security by moving away from traditional perimeter security to enhance protection in the changing tech environment. Visit the link for more details on this innovative strategy.

Read original articleLink Icon
BeyondCorp (2014)

The article discusses Google's BeyondCorp approach to enterprise security, highlighting the shift away from traditional perimeter security enforced by firewalls. With the increasing adoption of mobile and cloud technologies, the conventional security model faces challenges when the perimeter is breached, granting attackers access to the company's privileged intranet. Google's alternative security strategy involves eliminating the need for a privileged intranet and transitioning corporate applications to the Internet. This new approach aims to enhance security in the evolving technological landscape. For further information, readers are directed to the provided link for additional details on BeyondCorp.

Related

The hacking of culture and the creation of socio-technical debt

The hacking of culture and the creation of socio-technical debt

Algorithms shape culture, dividing it into niche groups. "A Hacker Manifesto" by McKenzie Wark discusses hackers' influence on power dynamics, emphasizing free information. Tech giants like Facebook and TikTok wield immense cultural influence, blurring propaganda and personalization boundaries. Corporate dominance in culture hacking alters global power structures, challenging governments' regulatory capacity.

Simple ways to find exposed sensitive information

Simple ways to find exposed sensitive information

Various methods to find exposed sensitive information are discussed, including search engine dorking, Github searches, and PublicWWW for hardcoded API keys. Risks of misconfigured AWS S3 buckets are highlighted, stressing data confidentiality.

VPN by Google One shuts down

VPN by Google One shuts down

Google One has discontinued its VPN service due to low usage. Existing Pixel owners retain access to a limited Pixel VPN. Google Fi Wireless subscribers can still use a VPN service. Users should delete the now-defunct VPN app from their devices.

Microsoft admits no guarantee of sovereignty for UK policing data

Microsoft admits no guarantee of sovereignty for UK policing data

Microsoft admits inability to guarantee UK policing data sovereignty on its public cloud, potentially breaching UK data protection laws. Concerns persist despite company's efforts to address issues, impacting all UK government users.

The Death of the Web

The Death of the Web

The internet's evolution from creative individual websites to commercial dominance is discussed. Optimism for global unity and knowledge sharing shifted to profit-driven strategies, concentrating traffic on major platforms, altering user experience.

Link Icon 13 comments
By @ofrzeta - 5 months
It's a bit strange to post this here without context. BeyondCorp is essentially the same as Zero Trust if I am not mistaken https://en.wikipedia.org/wiki/Zero_trust_security_model

Open Source applications include:

- https://landing.openziti.io/

- https://www.ory.sh/oathkeeper/

Any other important projects I am missing?

By @ninkendo - 5 months
Am I crazy or is there nothing here? I see an abstract, a link to some unrelated search, “research areas” (another unrelated link) then a footer with a link to their team. Where do I actually read about beyondcorp?
By @gcr - 5 months
BeyondCorp is such a great idea! I wish it were easier to implement from other companies.
By @jwildeboer - 5 months
From 2014, so I guess posted as anniversary reminder?
By @dec0dedab0de - 5 months
When I was a network guy I used to argue more in favor of letting everything we could over the internet. it was cheaper than the various private circuits, and more reliable than VPNs.

Then when I started programming I realized we can’t trust programmers to do anything safely. And I wanted to airgap everything, but ofcourse that’s ridiculous.

So while we should assume all endpoints are open to the internet, I don’t think we should actually let them be. That would be madness.

does anyone expect every printer and network managed light fixture to stay up to date and vulnerability free? Even if it does, do we trust the vendors to not start spying on their customers?

I suspect this was mostly about selling the enterprise on saas/the cloud/google office. And it worked.

By @input_sh - 5 months
(2014)
By @nunez - 5 months
Zero Trust before it became buzzword-ized!
By @aborsy - 5 months
Silly name, with common sense concepts!
By @zer0c00ler - 5 months
A lot of people wrongly believe this means no firewall. If you don't use firewalls (yes, even for web traffic and SaaS, limit who can access your stuff), you are doing something wrong.