<s>
BeyondCorp	B-Application
is	O
an	O
implementation	O
,	O
by	O
Google	B-Application
,	O
of	O
zero-trust	B-General_Concept
computer	I-General_Concept
security	I-General_Concept
concepts	I-General_Concept
creating	O
a	O
zero	B-General_Concept
trust	I-General_Concept
network	I-General_Concept
.	O
</s>
<s>
An	O
open	O
source	O
implementation	O
inspired	O
by	O
Google	B-Application
's	I-Application
research	O
paper	O
on	O
an	O
access	O
proxy	O
is	O
known	O
as	O
"	O
transcend	O
"	O
.	O
</s>
<s>
Google	B-Application
documented	O
its	O
Zero	B-General_Concept
Trust	I-General_Concept
journey	O
from	O
2014	O
–	O
2018	O
through	O
a	O
series	O
of	O
articles	O
in	O
the	O
journal	O
;	O
login	O
:	O
.	O
</s>
<s>
Google	B-Application
called	O
their	O
ZT	O
network	O
,	O
BeyondCorp	B-Application
.	O
</s>
<s>
Google	B-Application
implemented	O
a	O
Zero	B-General_Concept
Trust	I-General_Concept
architecture	I-General_Concept
on	O
a	O
large	O
scale	O
,	O
and	O
relied	O
on	O
user	O
and	O
device	O
credentials	O
,	O
regardless	O
of	O
location	O
.	O
</s>
<s>
Unmanaged	O
devices	O
such	O
as	O
BYOD	O
,	O
were	O
not	O
given	O
access	O
to	O
the	O
BeyondCorp	B-Application
resources	O
.	O
</s>
<s>
BeyondCorp	B-Application
utilized	O
a	O
zero	B-General_Concept
trust	I-General_Concept
security	I-General_Concept
model	I-General_Concept
,	O
which	O
is	O
a	O
relatively	O
new	O
security	O
model	O
that	O
it	O
assumes	O
that	O
all	O
devices	O
and	O
users	O
are	O
potentially	O
compromised	O
.	O
</s>
<s>
This	O
is	O
in	O
contrast	O
to	O
traditional	O
security	O
models	O
,	O
which	O
rely	O
on	O
firewalls	B-Application
and	O
other	O
perimeter	O
defenses	O
to	O
protect	O
sensitive	O
data	O
.	O
</s>
<s>
BeyondCorp	B-Application
utilized	O
a	O
Device	O
Inventory	O
Database	O
and	O
Device	O
Identity	O
that	O
uniquely	O
identifies	O
a	O
device	O
through	O
a	O
digital	O
certificate	O
.	O
</s>
<s>
The	O
corporate	O
network	O
grants	O
no	O
inherent	O
trust	O
,	O
and	O
all	O
internal	O
apps	O
are	O
accessed	O
via	O
the	O
BeyondCorp	B-Application
system	O
,	O
regardless	O
of	O
whether	O
the	O
user	O
is	O
in	O
a	O
Google	B-Application
office	O
or	O
working	O
remotely	O
.	O
</s>
<s>
BeyondCorp	B-Application
is	O
related	O
to	O
Zero	B-General_Concept
Trust	I-General_Concept
architecture	I-General_Concept
as	O
it	O
implements	O
a	O
true	O
Zero	B-General_Concept
Trust	I-General_Concept
network	I-General_Concept
,	O
where	O
all	O
access	O
is	O
granted	O
on	O
identity	O
,	O
device	O
,	O
and	O
authentication	B-Application
,	O
based	O
on	O
robust	O
underlying	O
device	O
and	O
identity	O
data	O
sources	O
.	O
</s>
<s>
BeyondCorp	B-Application
works	O
by	O
using	O
a	O
number	O
of	O
security	O
policies	O
including	O
authentication	B-Application
,	O
authorization	O
,	O
and	O
access	O
control	O
to	O
ensure	O
that	O
only	O
authorized	O
users	O
can	O
access	O
corporate	O
resources	O
.	O
</s>
<s>
Authentication	B-Application
verifies	O
the	O
identity	O
of	O
the	O
user	O
,	O
authorization	O
determines	O
whether	O
the	O
user	O
has	O
permission	O
to	O
access	O
the	O
requested	O
resource	O
,	O
and	O
access	O
control	O
policies	O
restrict	O
what	O
the	O
user	O
can	O
do	O
with	O
the	O
resource	O
.	O
</s>
<s>
One	O
of	O
the	O
main	O
components	O
in	O
BeyondCorp	B-Application
's	O
implementation	O
is	O
the	O
Trust	O
Inferer	O
.	O
</s>
<s>
Another	O
important	O
component	O
of	O
BeyondCorp	B-Application
's	O
implementation	O
is	O
the	O
Access	O
Control	O
Engine	O
.	O
</s>
<s>
Think	O
of	O
this	O
as	O
the	O
brain	O
of	O
the	O
Zero	B-General_Concept
Trust	I-General_Concept
architecture	I-General_Concept
.	O
</s>
<s>
One	O
of	O
the	O
first	O
things	O
Google	B-Application
did	O
to	O
implement	O
a	O
Zero	B-General_Concept
Trust	I-General_Concept
architecture	I-General_Concept
was	O
to	O
capture	O
and	O
analyze	O
network	O
traffic	O
.	O
</s>
<s>
In	O
doing	O
so	O
,	O
BeyondCorp	B-Application
also	O
discovered	O
unusual	O
,	O
unexpected	O
,	O
and	O
unauthorized	O
traffic	O
.	O
</s>
<s>
This	O
was	O
very	O
useful	O
because	O
it	O
gave	O
the	O
BeyondCorp	B-Application
engineers	O
critical	O
information	O
that	O
assisted	O
them	O
in	O
reengineering	O
the	O
system	O
in	O
a	O
secure	O
manner	O
.	O
</s>
<s>
The	O
Zero	B-General_Concept
Trust	I-General_Concept
architecture	I-General_Concept
is	O
scalable	O
and	O
can	O
be	O
adapted	O
to	O
the	O
changing	O
needs	O
of	O
the	O
businesses	O
and	O
their	O
users	O
.	O
</s>
<s>
Unlike	O
traditional	O
VPNs	B-Application
,	O
BeyondCorp	B-Application
's	O
access	O
policies	O
are	O
based	O
on	O
information	O
about	O
a	O
device	O
,	O
its	O
state	O
,	O
and	O
its	O
associated	O
user	O
.	O
</s>
<s>
BeyondCorp	B-Application
considers	O
both	O
internal	O
networks	O
and	O
external	O
networks	O
to	O
be	O
completely	O
untrusted	O
,	O
and	O
gates	O
access	O
to	O
applications	O
by	O
dynamically	O
asserting	O
and	O
enforcing	O
levels	O
,	O
or	O
“	O
tiers	O
,	O
”	O
of	O
access	O
.	O
</s>
