June 2018
Intermediate to advanced
372 pages
8h 44m
English
While every organisation wishes to have and maintain security of it's network infrastructure and data, maintaining zero-trust architecture (where all traffic is equally untrustworthy) with increasing scale is always a challenge. Google claims to have maintained it for 6 years and the result of such research and practices is BeyondCorp, an enterprise security model built on the idea of making individual users the units of security management instead of relying on network perimeter.
And now, BeyondCorp is available on GCP as a service. They call it Identity-Aware-Proxy (IAP). Here, the IAM identities are used to create firewall and other security policies for the user. As a user, it implies following practices ...