Security Use Cases
Implement zero trust networking and secure access patterns with NetBird.
Zero Trust Principles
NetBird is built on zero trust principles:
- Verify explicitly: Every connection is authenticated and authorized
- Least privilege: Access is granted only to specific resources, not entire networks
- Assume breach: End-to-end encryption ensures traffic is protected even if networks are compromised
Key Security Features
| Feature | Description |
|---|---|
| Access Control Policies | Define who can access what resources |
| Posture Checks | Verify device compliance before granting access |
| Activity Logging | Audit all access events |
| MFA Integration | Enforce multi-factor authentication |
| SSO | Integrate with identity providers |
Security Guides
Implement Zero Trust
Step-by-step guide to implementing zero trust networking with NetBird
Posture Checks
Verify device compliance before allowing network access
EDR/MDM Integration
Integrate with CrowdStrike, Intune, SentinelOne, and other security tools
Security Best Practices
- Segment your network - Create specific groups for different access levels
- Use protocol restrictions - Only allow the protocols and ports needed
- Enable posture checks - Verify device compliance before granting access
- Monitor activity - Review audit logs regularly
- Implement MFA - Require multi-factor authentication for all users
- Use time-limited access - Create expiring setup keys for temporary access

