Identity and Context-Aware Access Control
Difficulty: Intermediate
Duration: 1 minute and 49 seconds
Students: 578
Rating: 5/5
This lesson explores Zero Trust and how it can be implemented using BeyondCorp Enterprise. We also look at securing resources and applying access levels.
Learning Objectives
- Explaining the Zero Trust Security Model
- Implementing Zero Trust using BeyondCorp Enterprise
- Securing resources with an Identity-Aware Proxy
- Extending security by creating and applying access levels
Intended Audience
- GCP Developers
- GCP Security Engineers
Prerequisites
- Access to a GCP account