Yeah, I was going to send that article to the list as well.  Google is way ahead of the curve on this stuff (I guess that goes without saying).

Large networks are slightly less hostile than the Internet but only a bit.  And in some ways, they may be more hostile since an attacker has a smaller and more well defined attack surface within a corporate network than on the Internet at large.

Google is still using the onion model and security-in-depth but they've recognized and acted upon the idea that allowing large numbers of employees to access the private network via VPN and then letting them loose on it is not a strong strategy, just a band aid that all large organizations have been using for the past 15 years.

-Adam

--
Kili - Cloud for Africa: kili.io
More Musings: varud.com

On Wed, May 13, 2015 at 4:42 PM, awatila--- via kictanet <kictanet@lists.kictanet.or.ke> wrote:

Good evening,

Many organizations especially government ones have been allergic to cloud based systems.

 

Have a look at the below link that gives justification for cloud based systems

 

 

"The new model — called the BeyondCorp initiative — assumes that the internal network is as dangerous as the Internet. Access depends on the employee’s device and user credentials. Using authentication, authorization and encryption, the model grants employees fine-grained access to different enterprise resources"

 

Best Regards,

 

Alex Watila

 

 


_______________________________________________
kictanet mailing list
kictanet@lists.kictanet.or.ke
https://lists.kictanet.or.ke/mailman/listinfo/kictanet

Unsubscribe or change your options at https://lists.kictanet.or.ke/mailman/options/kictanet/adam%40varud.com

The Kenya ICT Action Network (KICTANet) is a multi-stakeholder platform for people and institutions interested and involved in ICT policy and regulation. The network aims to act as a catalyst for reform in the ICT sector in support of the national aim of ICT enabled growth and development.

KICTANetiquette : Adhere to the same standards of acceptable behaviors online that you follow in real life: respect people's times and bandwidth, share knowledge, don't flame or abuse or personalize, respect privacy, do not spam, do not market your wares or qualifications.