Across the years, Google’s multiple whitepapers, describing how the company solves particular problems at scale, have always spawned new startup ecosystems and shaped how other enterprises think about scaling their tools.
Now, the company is issuing a new security whitepaper that shows how it keeps its cloud-native design safe.
An Introduction to BeyondCorp
The name, BeyondProd, previously indicates that this is an expansion of the BeyondCorp zero trust system the company initially launched a few years ago.
While BeyondCorp is about moving security away from VPNs and firewalls on edge to the individual users and devices, BeyondProd centers on Google’s zero-trust plan to how it joins machines, workloads, and services.
Unsurprisingly, BeyondProd is based on rather much the same policies as BeyondCorp, including network protection at the top, no common trust between services, trusted machines operating known code, automated and regulated change rollout, and divided workloads.
All of this, of course, directs on securing cloud-native applications that usually communicate over APIs and work on modern infrastructure.
“Collectively, these controls imply that containers and the microservices working inside can be deployed, interact with each other, and operate next to each other, securely.
Without troubling individual microservice developers with the safety and implementation details of the underlying foundation,” Google explains.
Google’s Hybrid Cloud Platform
Google, of course, sees that it is getting all of these features available to developers through its services like GKE and Anthos, its hybrid cloud platform.
Also, though, the company emphasizes that a lot of its open-source tools further enables enterprises to develop systems that adhere to the same policies, including the likes of Envoy, Istio, gVisor, and others.
“In the identical way that BeyondCorp assisted us to grow beyond a perimeter-based security model, BeyondProd depicts a similar leap forward in our path to production security,” Google says.
“By implementing the security policies in the BeyondProd model to your cloud-native infrastructure, you can avail from our experience, to increase the deployment of your workloads, how you are their communications are guarded, and how they influence other workloads.”
For more updates and the latest tech news, keep reading iTMunch.
Image 1: Freepik.com