Cloud 101CircleEventsBlog
Register for CSA’s free Virtual Cloud Trust Summit to tackle enterprise challenges in cloud assurance.

Download Publication

Integrating SDP and DNS: Enhanced Zero Trust Policy Enforcement - Chinese Translation
Integrating SDP and DNS: Enhanced Zero Trust Policy Enforcement - Chinese Translation

Integrating SDP and DNS: Enhanced Zero Trust Policy Enforcement - Chinese Translation

Release Date: 02/07/2022

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translated content falls outside of the CSA Research Lifecycle. For any questions and feedback, contact [email protected].

The purpose of this research article is to explain how DNS and the enterprise-managed DDI system can be combined with a Software-Defined Perimeter to deliver improved security visibility, resiliency, and responsiveness. 

This position paper explores two use cases where DNS and the enterprise-managed DDI and SDP can be combined to improve security, contextual awareness, and responsiveness. This type of integration - tying together systems traditionally distinct for more holistic enforcement - is a hallmark of the Zero Trust approach to security. This paper does not address the security of the DNS infrastructure itself. 
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
View translations
Related resources
Defining the Zero Trust Project Surface - Korean Translation
Defining the Zero Trust Project Surface - Korea...
Defining the Zero Trust Protect Surface
Defining the Zero Trust Protect Surface
Communicating the Business Value of Zero Trust
Communicating the Business Value of Zero Trust
How to Prepare Your Workforce to Secure Your Cloud Infrastructure with Zero Trust
How to Prepare Your Workforce to Secure Your Cloud Infrastructure w...
Published: 04/24/2024
What’s in a Name? Defining Zero Trust for Leaders
What’s in a Name? Defining Zero Trust for Leaders
Published: 04/22/2024
Implementing a Data-Centric Approach to Security
Implementing a Data-Centric Approach to Security
Published: 04/19/2024
7 Common Causes of Data Breach: Safeguarding Your Digital Assets
7 Common Causes of Data Breach: Safeguarding Your Digital Assets
Published: 04/18/2024
Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training