Moving Beyond the Perimeter: How to Implement the BeyondCorp Security Model


In part 2 of our series on moving beyond the perimeter (read part 1 here), Duo’s Principal Security Strategist Wendy Nather explains how you can build a new security model within your organization.

She covers:

  • Enrolling users/endpoints into inventories
  • Identifying endpoints as ‘trusted’ w/certs
  • Enforcing access policies based on validates users/endpoints

Check it out!