
What would this look like as a user?īeyondCorp is filled with buzz words. This blog post aims to provide a practical implementation guide for using BeyondCorp security on your internal websites hosted in AWS.Īt Transcend, we use BeyondCorp security to ensure our IP and our users’ data stays safe. That’s a lot to ask!īut we also believe that getting started with BeyondCorp is much easier than many may think, and that the security payoffs can come immediately. It asks you to look at every single request flowing through your system and to validate it’s legitimacy based on multiple data sources: where is the request coming from, who is sending it, what is the security status of that source, etc.
This is despite the fact that Google’s whitepaper explaining the idea was released in 2014. This idea has been widely praised by security researchers, though practical guides on getting started with it on the most popular cloud platforms are still limited. This gave birth to BeyondCorp, a theoretical model for protecting all of your applications without the use of a VPN. But once Google became wary of this approach in 2009 after the Operation Aurora hack attempt, they decided to shift towards a zero-trust security model, where every request is treated as though it is coming from a network that could be compromised. This isn’t a new idea, as companies have been creating VPNs (virtual private networks) to restrict access to their internal networks for decades.

So you should protect them to protect that data. Every company has them, and they often contain some of your company’s most important data.
