Skip to main content

Google BeyondCorp Zero Trust

Overview

Definition

BeyondCorp is Google's implementation of the zero trust model. It builds upon a decade of experience at Google, combined with ideas and best practices from the community. By shifting access controls from the network perimeter to individual users, BeyondCorp enables secure work from virtually any location without the need for a traditional VPN.

BeyondCorp began as an internal Google initiative to enable every employee to work from untrusted networks without the use of a VPN. Now, BeyondCorp is used by most Googlers every day to provide user- and device-based authentication and authorization for Google's core infrastructure and corporate resources.

Principles

BeyondCorp allows for single sign-on, access control policies, access proxy, and user- and device-based authentication and authorization. The BeyondCorp principles are:

  • Access to services must not be determined by the network from which you connect 

  • Access to services is granted based on contextual factors from the user and their device

  • Access to services must be authenticated, authorized, and encrypted

Architecture

  • Securely identify the device

    • Build a meta-inventory database of “managed device” identities using device certificates, which are issued upon a qualification process with periodic reviews.
  • Securely identify the user

    • Generate short-lived authorization tokens using a centralized SSO portal with MFA, which validates identity against an user and group database.
  • Remove trust from the network

    • RADIUS servers dynamically assign “managed devices” to an unprivileged net or “unmanaged devices” to a guest net via 802.1x auth, which checks for device certs.
  • Externalize apps and workflows

    • An internet-facing reverse access proxy enforces encryption between the client and application for all web-based apps via CNAME (public DNS) records.
  • Implement inventory-based access control

    • Per app access request, enforce service-level authorization by first interrogating multiple data sources to dynamically infer the level of device or user trustworthiness.

High level diagram


Top Resources

This series of whitepapers published by Google describes the BeyondCorp network security model in more detail:

Webinars from Google Cloud Security Talks 2021.