Cloud 101CircleEventsBlog
Join AT&T's experts & CSA's Troy Leach on April 4 to boost your cyber resilience in 2024!

CSA Official Press Release

Published 10/21/2014

Cloud Security Alliance Software Hackathon Closed. Software Defined Perimeter Prevails Again

Cloud Security Alliance Software Hackathon Closed. Software Defined Perimeter Prevails Again

Protocol Proves to be Intrinsically Secure Against Network-based Attacks; Full Attack Analysis Coming Soon!

Seattle, WA – October 22, 2014 - The Cloud Security Alliance (CSA), a not-for-profit organization which promotes the use of best practices for providing security assurance within cloud computing, today announced that the CSA Software Defined Perimeter (SDP) has prevailed at the close of its second Hackathon, which kicked off at CSA Congress 2014 on September 18. In the past month, billions of packets were fired by individuals, including many security experts, from more than 100 countries, but none succeeded in the attempt to breach the SDP protected public cloud. A full report with detailed attack analysis will be published in November. Attack statistics as of day 14 of the event are as follows:
  • Total dropped packets: 2.9 billion
  • Number successful Single Packet Authorizations: 0
  • Number successful mutual TLS authentications: 0
  • Number successful user authentications: 0
For additional information on the Hackathon please refer to Software Defined Perimeter (SDP) Prevailing after Hackathon Kickoff at Cloud Security Alliance Congress 2014 Last month, CSA invited hackers from all over the world to attempt to access a file server in a public cloud protected by the SDP, via a different public cloud. The first participant to successfully capture the target information on the protected file server would receive a cash prize. About the CSA Software Defined Perimeter The Software Defined Perimeter (SDP) is a new approach to security being developed as an open standard by the Cloud Security Alliance (CSA). SDP mitigates network-based attacks by creating dynamically provisioned perimeters anywhere in the world–including in a cloud, on the DMZ, and in the data center. Intrinsically secure, the SDP starts with zero visibility and zero connectivity. Only after the user and his device have been authenticated, the SDP dynamically builds networks to authorized applications. Enterprise companies use Software Defined Perimeter to protect applications on the Internet, such as business and partner portals, cross-company collaboration, and for their migration to Infrastructure-as-a-Service and SaaS services. And, in addition to using SDP to internally isolate critical applications, enterprises use it to protect internal business critical applications for non-employee and BYOD access. About the Cloud Security Alliance The Cloud Security Alliance is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing. The Cloud Security Alliance is led by a broad coalition of industry practitioners, corporations, associations and other key stakeholders. For further information, visit us at https://cloudsecurityalliance.org, and follow us on Twitter @cloudsa. Media Contact Kari Walker [email protected] 703.928.9996

Share this content on your favorite social network today!

About Cloud Security Alliance

The Cloud Security Alliance is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing. The Cloud Security Alliance is led by a broad coalition of industry practitioners, corporations, associations and other key stakeholders. For further information, follow us on Twitter @cloudsa.

For press inquiries, email Zenobia Godschalk of ZAG Communications or reach her by phone at 650.269.8315.