Jump to Content
Developers & Practitioners

Devices and zero trust

March 29, 2021
https://storage.googleapis.com/gweb-cloudblog-publish/images/new_header.max-2600x2600.png
Priyanka Vergadia

Staff Developer Advocate, Google Cloud

Max Saltonstall

Developer Relations Engineer

In a zero trust environment, every device has to earn trust in order to be granted access. When determining whether access should be granted, the security system relies on device metadata, such as what software is running or when the OS was last updated, and checks to see if the device meets that organization's minimum bar for health. 

Think of it like your temperature: under 100 degrees and you are safe, but go over and you are now medically in fever territory, and you may not be allowed into certain venues.


Zero Trust relies on WHO you are and WHAT you are using to determine access


In this issue of GCP Comics we  focus on devices, and how they play into a Zero Trust environment.

https://storage.googleapis.com/gweb-cloudblog-publish/images/Google-Cloud-Comic-issue7-Exports_full-com.max-2200x2200.png

Device data can take many forms, and can come from many sources. We recommend collecting multiple types of data from multiple systems and using it to make well-informed decisions on which devices get access to your important systems.

What are some of those data types?

  • Operating system version: to help you limit access for older, unsupported releases
  • Patch date: to find out if there are unpatched vulnerabilities present
  • Last check-in date: to understand how long this machine has been 'offline'
  • Binaries installed: to see if there's any known malware or dangerous executables
  • Executables run recently: to see if anything fishy is still running
  • Disk encryption: to see if the device complies with data protection policies
  • Location data: to restrict access to some tools to only specific cities, states, or countries
  • User(s) logged in recently: to see if other people might be sharing this device

And where can you gather the data? There are many sources, including:

  • DNS servers
  • DHCP servers
  • Local agents
  • Mobile device management solutions
  • OS-specific management tools

For more on this topic, check out the following resources:

Want more GCP Comics? Visit gcpcomics.com and be sure to follow us on Twitter at @pvergadia and @maxsaltonstall so you don’t miss the next issue!
Posted in