In the same way that users aren't all in the same physical location or using the same device, developers don’t all deploy code to the same environment. In a cloud-native environment, the network perimeter still needs to be protected, but this security model is not enough-if a firewall can't fully protect a corporate network, it can't fully protect a production network either. Modern security approaches have moved beyond a traditional perimeter-based security model, where a wall protects the perimeter and any users or services on the inside are fully trusted. BeyondProd: A new approach to cloud-native security As many organizations seek to adopt cloud-native architectures, we hope security teams can learn how Google has been securing its own architecture, and simplify their adoption of a similar security model. Today, we’re introducing a whitepaper about BeyondProd, which explains the model for how we implement cloud-native security at Google. Google’s cloud-native architecture was developed prioritizing security as part of every evolution in our architecture. Google’s architecture is the inspiration and template for what’s widely known as “ cloud-native” today-using microservices and containers to enable workloads to be split into smaller, more manageable units for maintenance and discovery. At Google, our infrastructure runs on containers, using a container orchestration system Borg, the precursor to Kubernetes.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |