Cloud Security Alliance Releases Software-Defined Perimeter Architecture Guide
Document offers a better understanding of how SDP architecture works and can be deployed in unique situations
SEATTLE – May 7, 2019 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications and best practices to help ensure a secure cloud computing environment, today released the Software-Defined Perimeter (SDP) Architecture Guide. Produced by the Software-Defined Perimeter Working Group, this report is designed to help enterprises and practitioners learn more about SDP and the economic and technical benefits it can provide, as well as assist users in implementing SDP in their organizations successfully.
“It’s time for us in the information security industry to embrace innovative new tools for network security– specifically via Software-Defined Perimeter SDP technologies—and to include all layers of network stacks in our security efforts,” said Shamun Mahmud, Senior Research Analyst, Cloud Security Alliance. “The SDP approach can give security professionals the tools they need to provide a strong, adaptable, and manageable foundation for robust development, operations and security. We hope this document offers a better understanding of how SDP architecture works and how it can be uniquely deployed.”
The Architecture Guide provides insight into areas such as:
- Increased market awareness, credibility, and enterprise adoption of SDP;
- Improved understanding of how SDP can be used in different environments;
- Motivation to use SDP to solve enterprise problems;
- Use of this document to educate internal stakeholders about SDP; and
- Ways in which enterprises are successfully deploying SDP solutions based on the architecture recommendations in this paper.
The paper also delves into alternatives to SDP, such as the Zero Trust concept, initially driven by the 'research advisory Forrester, and Google’s internal BeyondCorp initiative.
The Software-Defined Perimeter Working Group was established with the goal to develop a solution to stop network attacks against application infrastructure. Individuals interested in becoming involved in the future research and initiatives of this group are invited to do so by visiting the Join page.
Share this content on your favorite social network today!