News Stay informed about the latest enterprise technology news and product updates.

BeyondCorp brings software-defined network security to Google

Google restructured its network security with the BeyondCorp program and wants to show other organizations how to move past firewalls.

SAN FRANCISCO -- Google created the BeyondCorp program because it, like many other companies, found that as more...

and more employees needed to work remotely, the traditional notion of network perimeter security became meaningless.

Rory Ward, site reliability engineering manager at Google, told an audience at RSA Conference 2017 that he and his team have been working on BeyondCorp at the search giant for six years in order to move Google's network security infrastructure to a "zero-trust model," where authentication is based on trusting devices and users, rather than the network itself.

Heather Adkins, director of security at Google, said, historically, enterprises have envisioned the corporate network as a castle or a "bonbon" in which the sweet goodies are on the inside and surrounded by a strong perimeter.

"We designed it this way because, 20 to 30 years ago, we would buy hardware and software, and we would connect it to networks inside a physical perimeter, inside a building," Adkins said. "There came a time where we needed to protect it from the internet, so we bought networking equipment that provided us with Layer-3 firewall, Layer-2 firewall and web application firewalls. This created the castle-like perimeter."

However, Adkins noted, as workers became mobile and people lived "outside the castle" and Google services were moving to the cloud, what had been a strong perimeter became more like Swiss cheese and difficult to maintain. Enterprises adopted VPNs to extend the reach of the enterprise network, but employees don't like them because they are "slow and cumbersome" and can be unreliable, especially on mobile networks.

Breaking down the (fire)walls

Adkins and Ward realized that if walls didn't work, there needed to be a massive overhaul of how Google thought of network security. This led to the creation of BeyondCorp, which is based on three main principles:

  • All networks are treated as untrusted.
  • Access is granted based on what is known about the user and the device.
  • All access to services must be authenticated, authorized and encrypted.

Ward explained the key to making BeyondCorp work was all about "intimacy." First, Google needed to reinvent the employee database with far more granular job codes to be used for determining what applications and data a user would be allowed to access. And they needed to "get more intimate" with devices by creating a detailed database of managed devices, which tracked hardware from procurement to provisioning to end of life, including repairs or upgrades. Interestingly, this "dynamic trust repository" of devices included digital certificates issued by Google's internal certificate authority to be used as unique identifiers.

Ward explained that the repository gave trust levels to different hardware configurations and created a policy for what a device can do on the network. For example, to access source code systems, one would have to be a full-time Google employee with an engineering job code and use a fully trusted desktop.

We have complete knowledge of users, devices and an indication of trust of every device accessing Google systems.
Rory Wardsite reliability engineering manager, Google

"The trust definition of a device can go up or down dynamically, depending on what was done and what the policy says," Ward said. "We have complete knowledge of users, devices and an indication of trust of every device accessing Google systems."

Google then externalized the company's single sign-on and created what was essentially a reverse proxy to authenticate users.

Christopher Steffen, technical director at Cryptzone, based in Waltham, Mass., said BeyondCorp's method of security is similar to "an implementation of the Software-Defined Perimeter (SDP) standard, created by the Cloud Security Alliance."

"This approach makes lateral movement impossible for the user and any possible attackers, as the device or the user is only permitted access to resources for which they are specifically authorized to consume," Steffen told SearchSecurity. "Accordingly, the enterprise is able to reduce their attack surface by as much as 99% in some cases -- effectively leaving very little downside for a security-minded enterprise."

Bobby Kuzma, system engineer at Core Security, based in Roswell, Ga., said the BeyondCorp strategy model is "a natural outgrowth of what cloud providers have been doing for a while now."

"I think that a move to this type of architecture is inevitable ... eventually. It's very much akin to, and an outgrowth of, the moves to microservice application architectures," Kuzma told SearchSecurity. "There are a lot of hurdles that Google is able to make disappear by fiat. Legacy applications and nonstandard protocols are a problem that impedes this strategy. For enterprises, I think that the legacy application problem is going to be a bigger hurdle than getting devices under active management for trust."

Extending BeyondCorp to other organizations

Ward said it took two years just to create the trust repository of users and devices before beginning the task of migrating users over from the traditional corporate network to the BeyondCorp network -- another long process of identifying when the new system didn't work for certain users and adapting it. Because of this, Adkins said communication was key.

Now that the work is done, the team wanted to explain to others how they accomplished the task with a series of talks and white papers, and then guide other enterprises toward how their networks can be shifted. 

Adkins admitted their experience building BeyondCorp for Google was likely atypical for a number of reasons. First, BeyondCorp had full support and patience from Google's executives, including co-founders Larry Page and Sergey Brin, which was invaluable, because although this type of network was less expensive to maintain, the unlimited budget and support afforded by Google was instrumental in getting the program off the ground. Also, Ward said the BeyondCorp initiative would not have worked without "highly reliable systems" that experience almost zero downtime, something that Google has worked diligently on over the years.

The budget issues could be exacerbated for some because, "currently, all devices are managed devices," according to Ward. Google hopes to be able to get to the point where users can bring their own devices, but that makes maintaining the device trust repository more difficult.

Adkins advised enterprises maintain clear communication with auditors, because the BeyondCorp concepts may not be familiar to regulators.

"We found that by deeply engaging with [auditors], explaining how to translate the concepts that we used to be the rules and procedures that they have to follow, we've actually found quite good ability to be able to translate that," Adkins said. "But that requires that you have a good relationship with your auditor."

Steffen said cost should not be a factor for an enterprise looking to migrate to an SDP because "SDPs are considered affordable, especially when you factor the cost of security breaches and the solutions that an SDP can replace." However, he noted that it could be difficult for a security professional to understand the "authenticate first, connect second" nature of its architecture.

"This is an approach that enterprises should consider adopting -- be it the BeyondCorp model or any other version of the Software-Defined Perimeter model, as it provides a new paradigm of security. [It's] an approach where devices and users are not trusted, and can only gain access to authenticated resources," Steffen said. "In either model, after the initial setup, ongoing maintenance of users and managed devices is not significantly different or more burdensome than other security methods, and the enterprise creates a much more secure environment."

Next Steps

Learn how to use Software-Defined Perimeter to create an air-gapped network.

Find out why some think private cloud systems will remain more popular than BeyondCorp.

Get info on how a software-defined perimeter can secure BYOD and IoT.

PRO+

Content

Find more PRO+ content and other member only offers, here.

Conference Coverage

RSA 2017: Special conference coverage

Join the conversation

2 comments

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

Do you have plans to adopt the Google BeyondCorp structure?
Cancel
The castle analogy makes sense. Would like to use BeyondCorp structure but on a smaller scale and tied to TMV initiatives. Technology & Marketing Ventures, Inc. has added prototypes for: physical IOT audits, identification of out-of-date security firmware for IOT devices and IOT certifications by device, app and network. Contact me if you want to be a sponsor or strategic partner.
Cancel

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close