Check out the third blog in Duo Principal Security Strategist Wendy Nather’s series on BeyondCorp, covering:
- What “Trusted” really means - checkpoints like authentication factors and conditions placed on the device
- What “Managed” means and the different ways to enforce a managed device policy
- How Duo Beyond takes BeyondCorp a step further to not only identify managed devices, but by including device/user data in the cert so that neither one’s credentials can be leveraged alone (by an attacker), and you can set policies requiring access to only approved endpoints