pomerium/docs/docs
2019-07-22 14:05:22 -07:00
..
certificates docs: add certificate section (#96) 2019-04-27 20:21:43 -07:00
examples docs: update for v0.1.0 release 2019-07-07 19:33:05 -07:00
gitlab docs: add kubernetes (#33) 2019-01-27 22:22:14 -08:00
google authenticator: support groups (#57) 2019-02-28 19:34:22 -08:00
impersonation authorize: fix headers when impersonating 2019-06-11 15:40:28 -07:00
local-development docs: add docs for hacking on poemrium with domains offline 2019-06-30 20:57:28 +02:00
microsoft authenticator: support groups (#57) 2019-02-28 19:34:22 -08:00
okta authenticator: support groups (#57) 2019-02-28 19:34:22 -08:00
one-login authenticator: support groups (#57) 2019-02-28 19:34:22 -08:00
signed-headers docs: add kubernetes (#33) 2019-01-27 22:22:14 -08:00
certificates.md authenticate: add CSP headers to this service only (#120) 2019-05-14 22:29:24 -07:00
contributing.md docs: add contributing.md 2019-07-12 18:02:38 -07:00
examples.md docs: update docs for v0.0.5 2019-06-04 15:21:25 -07:00
google-cloud-exploitation620x466.jpg docs: add certificate section (#96) 2019-04-27 20:21:43 -07:00
identity-providers.md deployment: add spellcheck to docs 2019-07-22 14:05:22 -07:00
impersonation.md authorize: fix headers when impersonating 2019-06-11 15:40:28 -07:00
programmatic-access.md authenticate: programmatic access support 2019-06-12 14:51:19 -07:00
readme.md docs: update docs for v0.0.5 2019-06-04 15:21:25 -07:00
signed-headers.md docs: add certificate section (#96) 2019-04-27 20:21:43 -07:00
upgrading.md docs: update for v0.1.0 release 2019-07-07 19:33:05 -07:00

title lang meta
Overview en-US
name content
keywords pomerium identity-access-proxy beyondcorp zero-trust reverse-proxy ztn

Overview

What

Pomerium is an identity-aware access proxy. Pomerium can be used to:

  • enable secure remote access to internal websites, without a VPN.
  • provide unified authentication (SSO) using the identity provider of your choice.
  • enforce dynamic access policy based on context, identity, and device state.
  • aggregate access logs and telemetry data.

Why

Perimeter security's shortcomings

For years, secure remote access meant firewalls, network segmentation, and VPNs. However, several high-profile security breaches have shown the limitations of perimeter security, namely:

  • Perimeter security does a poor job of addressing the insider-threat and 28% percent of breaches are by internal actors.
  • The impenetrable fortress theory of perimeter security is anything but in practice; most corporate networks have multiple entry points, lots of firewall rules, and constant pressure to expand network segmentation boundaries.
  • Even defining "what" a perimeter is is difficult as corporate networks have come to consist of an increasingly heterogeneous mix of on-premise, public, and private clouds.
  • VPNs frustrate end-users, give a false sense of security, and often fail to provide defense-in-depth.

Or for the visually inclined.

NSA exploiting google's SSL termination

SSL added and removed here :^) - NSA

Zero-trust

Pomerium attempts to mitigate these shortcomings by adopting principles like:

  • Trust flows from identity, device-state, and context; not network location.
  • Treat both internal and external networks as completely untrusted.
  • Act like you are already breached, because you probably are.
  • Every device, user, and application's communication should be authenticated, authorized, and encrypted.
  • Access policy should be dynamic, and built from multiple sources.

This security model has typically been referred to as zero-trust or BeyondCorp-inspired.

Resources

Pomerium was inspired by the security model originally articulated by John Kindervag in 2010, and by Google in 2011 as a result of the Operation Aurora breach.

Books

Papers

Posts

Videos