npx claudepluginhub plurigrid/asi --plugin asiThis skill uses the workspace's default tool permissions.
Google BeyondCorp Enterprise implements the zero trust security model by eliminating the concept of a trusted network perimeter. Instead of relying on VPNs and network location, BeyondCorp authenticates and authorizes every request based on user identity, device posture, and contextual attributes. Identity-Aware Proxy (IAP) serves as the enforcement point, intercepting all requests to protected...
Deploys Google BeyondCorp Enterprise zero trust access using IAP, context-aware policies, device trust, and Access Context Manager for GCP resources and apps.
Deploys Google BeyondCorp Enterprise zero-trust access control on GCP resources and internal apps using IAP, Access Context Manager, device trust verification, and context-aware policies.
Implements Google's BeyondCorp zero trust access model using IAP, Access Context Manager, and Chrome Enterprise Premium for VPN-less, identity-aware access to Google Cloud apps. Replaces VPNs for remote/hybrid workforces with device posture checks.
Share bugs, ideas, or general feedback.
Google BeyondCorp Enterprise implements the zero trust security model by eliminating the concept of a trusted network perimeter. Instead of relying on VPNs and network location, BeyondCorp authenticates and authorizes every request based on user identity, device posture, and contextual attributes. Identity-Aware Proxy (IAP) serves as the enforcement point, intercepting all requests to protected resources and evaluating them against Access Context Manager policies. This skill covers configuring IAP for web applications, defining access levels based on device trust and network attributes, and auditing access policies for compliance.
Configure Identity-Aware Proxy on Compute Engine, App Engine, or HTTPS load balancer backends.
Create Access Context Manager access levels based on IP ranges, device attributes (OS version, encryption, screen lock), and geographic location.
Apply access levels as IAP conditions to enforce context-aware access decisions on protected resources.
Query IAP audit logs, verify policy enforcement, and identify gaps in zero trust coverage.
JSON report containing IAP-protected resources, access level definitions, policy binding audit results, and zero trust coverage metrics.