Cloud 101CircleEventsBlog
Register for CSA’s free Virtual Cloud Trust Summit to tackle enterprise challenges in cloud assurance.

Download Publication

Integrating SDP and DNS: Enhanced Zero Trust Policy Enforcement - Chinese Translation
Integrating SDP and DNS: Enhanced Zero Trust Policy Enforcement - Chinese Translation

Integrating SDP and DNS: Enhanced Zero Trust Policy Enforcement - Chinese Translation

Release Date: 02/07/2022

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translated content falls outside of the CSA Research Lifecycle. For any questions and feedback, contact [email protected].

The purpose of this research article is to explain how DNS and the enterprise-managed DDI system can be combined with a Software-Defined Perimeter to deliver improved security visibility, resiliency, and responsiveness. 

This position paper explores two use cases where DNS and the enterprise-managed DDI and SDP can be combined to improve security, contextual awareness, and responsiveness. This type of integration - tying together systems traditionally distinct for more holistic enforcement - is a hallmark of the Zero Trust approach to security. This paper does not address the security of the DNS infrastructure itself. 
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
View translations
Related resources
Defining the Zero Trust Protect Surface
Defining the Zero Trust Protect Surface
Communicating the Business Value of Zero Trust
Communicating the Business Value of Zero Trust
Zero Trust Guiding Principles
Zero Trust Guiding Principles
7 Common Causes of Data Breach: Safeguarding Your Digital Assets
7 Common Causes of Data Breach: Safeguarding Your Digital Assets
Published: 04/18/2024
Protocols are Passé. APIs are Key for Effective Zero Trust Implementation.
Protocols are Passé. APIs are Key for Effective Zero Trust Implemen...
Published: 04/12/2024
Threats to Water: The Achilles’ Heel of Critical Infrastructure
Threats to Water: The Achilles’ Heel of Critical Infrastructure
Published: 04/08/2024
10 Essential Identity and Access Management (IAM) Terms
10 Essential Identity and Access Management (IAM) Terms
Published: 03/30/2024
Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training