Identity and Context-Aware Access Control

Difficulty: Intermediate
Duration: 1 minute and 49 seconds
Students: 578
Rating: 5/5

This lesson explores Zero Trust and how it can be implemented using BeyondCorp Enterprise. We also look at securing resources and applying access levels. 

Learning Objectives

  • Explaining the Zero Trust Security Model
  • Implementing Zero Trust using BeyondCorp Enterprise
  • Securing resources with an Identity-Aware Proxy
  • Extending security by creating and applying access levels

Intended Audience 

  • GCP Developers
  • GCP Security Engineers

Prerequisites 

  • Access to a GCP account