This lesson explores Zero Trust and how it can be implemented using BeyondCorp Enterprise. We also look at securing resources and applying access levels.
Learning Objectives
- Explaining the Zero Trust Security Model
- Implementing Zero Trust using BeyondCorp Enterprise
- Securing resources with an Identity-Aware Proxy
- Extending security by creating and applying access levels
Intended Audience
- GCP Developers
- GCP Security Engineers
Prerequisites