


The systems we use for productivity, collaboration, and domain specific functions are being operated in the cloud as opposed to from a server room. Teams are working across the globe from a wide range of mobile, tablet, and desktop devices. Regardless of size, the modern organization is becoming increasingly distributed. In a distributed world, there is no perimeter Simply put, this architecture enables Google employees to access internal resources from any location without the use of a VPN. Access is granted through a centralized engine that evaluates the user and the connecting device based on their current respective states. The results are a well crafted perimeterless architecture where internal applications are deployed to the public internet in a zero-trust fashion. In 2014, they wrote a paper ( PDF) outlining the concepts, and another ( PDF) in 2016 detailing their migration path.

The primary goal for Google was to improve their security with regards to how employees and devices access internal applications. On the contrary, the term comes from an internal security initiative within Google that began after a highly sophisticated cyber attack in 2009 known as Operation Aurora. If you have yet to hear of BeyondCorp, it’s not an homage to the hackers in Mr.
