Context-Aware Access
A robust security feature designed to enhance access control in Google Workspace and Google Cloud Platform environments.
Category | Identity & Access Management |
---|---|
This page updated | a month ago |
Pricing Details | Available in specific Google Workspace and GCP editions, pricing varies based on the edition. |
Target Audience | Administrators and security professionals in organizations using Google Workspace and GCP. |
Context-Aware Access is a robust security feature designed to enhance access control in Google Workspace and Google Cloud Platform (GCP) environments. Here’s a technical overview of its architecture and operational considerations:
Context-Aware Access addresses the need for granular and dynamic access control, ensuring that users can only access applications and resources when their context meets predefined security criteria. This helps mitigate risks associated with unauthorized access from untrusted devices or locations.
The feature allows administrators to create access levels based on various attributes such as user identity, location, device security status, and IP address. These access levels can be combined to enforce complex policies. For example, you can restrict access to Google Drive only from company-issued devices that are encrypted and meet a minimum operating system version.
To implement Context-Aware Access, administrators must create and assign access levels to specific applications. This involves defining the criteria for each access level, such as IP ranges, geographic locations, or device characteristics. The policies are continuously evaluated, ensuring that access is revoked if the user's context changes and no longer meets the defined criteria.
- Device Management: Policies can be enforced on various device types, including desktops, laptops, and mobile devices, with support for operating systems like Mac, Windows, ChromeOS, Linux, Android, and iOS. Mobile devices are managed using Google endpoint management basic or advanced.
- Network and IP: Access can be restricted based on IP address ranges or geographic origins. However, there may be delays in policy enforcement if an ISP changes IP addresses between different geographic regions.
- Browser and App Access: Policies can be applied to web browser access and built-in first-party apps on mobile devices. For Safari with Apple Private Relay enabled, the device IP address is hidden, which may require adjusting access levels to avoid unintended access denial.
-
Integration with Other Services: Context-Aware Access can be integrated with Data Loss Prevention (DLP) rules and other Google services like Looker Studio and Google Play Console. It also supports third-party partner integrations through the BeyondCorp Alliance.
-
Edition Requirements: Context-Aware Access is only available in specific Google Workspace and GCP editions, such as Enterprise Standard and Plus, Education Standard and Plus, and Cloud Identity Premium.
- Service Account Limitations: Policies do not restrict access to Google APIs from service accounts, only from end-user accounts.
- Continuous Evaluation: While the continuous evaluation of user context is a strength, it also requires careful policy design to avoid unintended lockouts, especially when applying policies to the Admin console.