a man checking his phone on public wifi in the NYC subway system
News Analysis

Google's Context-Aware Access Updates Underlines Move to Improved Workplace Security

4 minute read
David Barry avatar
By
SAVED
Google's recent CAA updates underline a broader move in the vendor space to improve security while maintaining a good UX.

Google introduced new features in late October to enhance its Context-Aware Access (CAA) policies, with the goal of improving cybersecurity with minimal manual effort. The release comes at a time when both CIOs and CEOs called reducing security risk a priority for 2025, as threats and incidents in the digital workplace show no signs of abatement.

The updates include proactive insights to automatically detect security gaps, pre-built CAA levels with suggested policies to address identified risks, and a monitor mode that allows administrators to evaluate policies in action before full deployment.

Google's Context-Aware Access Updates

The new features allow organizations to enforce access controls based on user identity and request context — such as location and device security — without the need for VPNs. Administrators will additionally be able to customize suggested policies before implementing them and will receive quarterly email updates with insights and actionable recommendations. 

The use of CAA has emerged as an addition to access control and security in our increasingly interconnected digital world. This sophisticated system goes beyond traditional security measures to provide a more nuanced and adaptive security framework.

The roots of CAA can be traced back to pioneering research in ubiquitous computing during the 1990s. Their exploration of the potential of pervasive computing environments pushed researchers to recognize the need for systems that could adapt to changing user contexts and environmental conditions.

The insight laid the groundwork for what would eventually evolve into Context-Aware Access policies. Initially focused primarily on location-based factors, the concept of context awareness expanded to encompass a wide range of contextual elements, including user identity and attributes, device characteristics, time, environmental conditions and user behavior patterns. 

Additionally, the integration of semantic web technologies has enabled more sophisticated context modeling and policy specification, further enhancing the capabilities of CAA systems.

CAA offers a promising solution to the ongoing challenge of securing increasingly diverse and dynamic digital ecosystems. By considering the full context of access requests, these systems can provide improved security without sacrificing user experience. The balance between protection and usability is crucial, with seamless access and robust security holding equal importance. 

Related Article: A Zero-Trust Security Primer

CAA and the New Wave of Security Solutions: Automated and Intelligent

CAA policies, when integrated into customer identity and access management (CIAM) systems, can improve an organization's security posture by leveraging real-time data points such as location and user behavior to make informed access decisions, FusionAuth founder Brian Pontarelli told Reworked.

For example, FusionAuth focuses on incorporating adaptive authentication, which dynamically adjusts security measures based on user behavior and context, much like Google's proactive insights in CAA. These mechanisms permit granular control, matching exactly what is needed for real-time security responses. These systems can send alerts or prompt for additional verification when anomalous access patterns are detected, aligning with the proactive monitoring trends in CAA.

CAA offers substantial benefits for the digital workplace. Organizations benefit from enhanced security through continuous risk assessment and automated policy enforcement, while users experience reduced friction in their daily work, Amazon IT services manager Harmeet Bhatia said.

The system can automatically adjust security requirements based on context, requiring additional authentication only when risk factors indicate it is necessary. Google's recent enhancements to their CAA offerings demonstrate the industry's movement toward more automated and intelligent security solutions.

Bhatia pointed to other vendors working along the same line, such as Microsoft, with its Conditional Access in Azure AD, which offers deep integration with their enterprise ecosystem. Cisco Duo emphasizes zero-trust principles and comprehensive device health checks, while Omnissa's (formerly VMWare's) Workspace ONE Access provides strong endpoint management capabilities and automated remediation features.

Each vendor takes a unique approach, he continued. Where Google excels in automation and proactive security, Microsoft offers superior enterprise integration. Cisco provides robust network security components, while Omnissa delivers comprehensive endpoint management. Organizations should consider their existing infrastructure, compliance requirements and scale when selecting a CAA solution.

“The future of CAA points toward even greater automation and intelligence, with systems becoming more adept at predicting and preventing security incidents before they occur," Bhatia said. “As remote work continues to evolve, the importance of context-aware security measures will only increase, making CAA a critical component of modern digital workplace security strategies.”

The big-name vendors aren't the only ones working in the space, several smaller vendors also offer unique CAA solutions. Pomerium, Cerbos, Netskope and Lookout Software each offer unique solutions for context-aware access, prioritizing secure, adaptive control over user access to applications without traditional VPNs.

Pomerium functions as a reverse proxy, verifying user identity and attributes like location and device status for secure application access. Cerbos provides an open-source authorization layer, which simplifies implementation of context-aware policies through an easy-to-use YAML syntax and centralized management via their Cerbos Hub. Netskope's zero-trust network access solution enables granular, real-time access control to enterprise apps, leveraging factors like user identity and device status. Finally, Lookout Software focuses on continuous authentication and endpoint risk assessments, supporting cloud visibility and control with mobile endpoint security and a Secure Cloud Access solution.

Related Article: Public Cloud Security Questions Your Workplace Is Probably Ignoring

Learning Opportunities

A Multi-Layered Approach to Secure Access

Security Compass VP Gyan Chawdhary pointed to the variety of factors CAA examines to determine access including:

  • Access Logs: Surveys the previous access history of the person making the request to detect unusual patterns or unauthorized attempts.
  • Device Health: Taps into the security status of the device trying to connect to ensure only safe devices can access the network.
  • Location Tracking: Monitors user location when logging in, which can help identify suspicious activities or locations.
  • User Behavior: Understands normal usage patterns to quickly spot any deviations that might indicate a security threat.
  • Risk Scoring: Assigns each access request a risk score based on context, helping prioritize which ones need closer examination.

When combined, these metrics show how secure access through CAA is and help improve security, without the lag and complexity of a VPN.

“Finding the right balance between security and user experience is crucial. If policies are too strict, they can disrupt workflows and lead to frustration among users,” Chawdhary said. "The key is to create policies that are robust enough to protect data without being overly burdensome. This often involves trial and error, continuous feedback and adjustments to find that sweet spot.”

About the Author
David Barry

David is a European-based journalist of 35 years who has spent the last 15 following the development of workplace technologies, from the early days of document management, enterprise content management and content services. Now, with the development of new remote and hybrid work models, he covers the evolution of technologies that enable collaboration, communications and work and has recently spent a great deal of time exploring the far reaches of AI, generative AI and General AI.

Main image: Joshua Newton | unsplash
Featured Research