Google Reveals Own Security Regime Policy Trusts No Network, Ever (theregister.co.uk) 41
Darren Pauli, reporting for The Register: Google sees little distinction between boardrooms and bars, cubicles and coffee shops; all are untrusted under its perimeter-less security model detailed in a paper published this week. The "BeyondCorp model" under development for more than five years is a zero-trust network model where the user is king and log in location means little. Staff devices including laptops and phones are logged into a device inventory service which contains trust information and snapshots of the devices at a given time. Employees are awarded varying levels of trust provided they meet minimum criteria which authors Barclay Osborn, Justin McWilliams, Betsy Beyer, and Max Saltonst all say reduces maintenance cost and improves device usability (PDF).
This is best policy (Score:2)
Trust No Network Ever.
Re: (Score:2)
Of course not (Score:2)
Re: (Score:2)
Oh boo hoo. You bought a device that relies on other people's servers to even function, and you're surprised that you don't really have a say in how long that server will be kept running?
Welcome to the Internet of Things, where you have to rely on the goodwill of other people to keep their services running. Newsflash: "Lifetime service" in an EULA does not mean what you think it means.
Re: (Score:2)
Re: (Score:1)
Re: (Score:3)
Google Never has been discontinued.
Re: This is best policy (Score:1)
Re: (Score:2)
That new internal gov network was trusted.
All the staff who saw the strange new hardware and flood of outgoing connections and said nothing, reported nothing.
Its kind of hard to clean up after years of having a mil or gov teams just connect deep into any network.
Re: (Score:2)
Even that is too narrow.
Never trust.
Re: (Score:2)
Google is a cult.
Considering Apple is just as much a cult, and in fact is less open to working with other company's stuff, I can only look to Microsoft in comparison, and everything they are doing for interoperability in the mobile phone area. It is kind of scary when we are talking about Microsoft being more open than the successors to Linux and BSD.
Good idea. (Score:4, Interesting)
Way back in the day a company I worked for had done a good job securing our network...
Until a developer went to a conference and plugged his network in the hotel network then brought it back inside our firewall.
We did catch the problem very quickly and only a few machines where infected but we locked things down even more after that.
Re: (Score:2)
You live and learn. We started to format and re image all notebooks used on trips after that.
Re: (Score:2)
Never trust any network. Conversely, your network should never implicitly trust any client device.
Re: I don't get it. (Score:3, Informative)
Re: I don't get it. (Score:4, Insightful)
real zero trust is impossible to deal wtih.
we will never know what goes on in intel's mgmt engine or other parts of intel's chips. amd, too. and nvidia. and and and...
cellphones? get real! so many layers of 'sorry, no spec sheet for you!' in there. locked up tight and only the cell companies, cell makers and nsa can get in.
chips from china? oh, please! as untrustable as it gets.
you can talk all you want about the network - and we need to - but the elephant in the room is the lowest level, the silicon and the microcode that we will NEVER get access to.
if even one link is bogus, the whole chain is bogus.
my conclusion: the whole chain will always be bogus. things are out of hand and never getting back to reasonable levels ever again.
Re: (Score:2)
Yes, but zero trust is an old hat. The basic idea is that you pretend all devices are on the public internet. This makes is a non issue when they actually are and a rogue device in the network will create little harm. This reduces the effort to secure the corporate network, since it is basically regarded as public and unsafe.
Re: (Score:1)
Re: (Score:3)
Is it really spying if you explicitly authorize it?
Slight correction "devices", not "employees" (Score:4, Informative)
The summary says "Employees are awarded varying levels of trust provided they meet minimum criteria". That should say "employee devices...". Employees, of course, do have differing levels of access to various resources, based on the needs of their jobs, with very fine-grained access control. But the criteria-based trust the article is talking about varies based on device, not user. For example, because my phone isn't "fully trusted" (because I don't want to accept the authentication and other requirements that would impose), it can't access the bug report database or the code repositories, but it does have access to the employee directory, my company e-mail and calendar, etc. My laptop is fully trusted because of how it's configured and I can use it to look at anything I'm authorized to see.
The key point, though, is that all of this is completely network-independent. It doesn't matter if I'm connected directly to an internal LAN or sitting in a coffee shop, my access, based on my device and my authenticated identity, is the same. Google does still have VPN infrastructure for some legacy services that haven't been fully migrated to the perimeter-less architecture, but that's being phased out as those services are upgraded or replaced. I only use my VPN client a few times per year, and eventually I need it at all.
Re:Slight correction "devices", not "employees" (Score:4, Insightful)
Most networks are like cockroaches... (Score:2)
crunchy on the outside, but soft and chewy on the inside!