ChaptersEventsBlog

Download Publication

Software-Defined Perimeter (SDP) and Zero Trust
Software-Defined Perimeter (SDP) and Zero Trust

Software-Defined Perimeter (SDP) and Zero Trust

Release Date: 05/27/2020

Working Group: Zero Trust

A Zero Trust implementation using Software-Defined Perimeter enables organizations to defend new variations of old attack methods that are constantly surfacing in existing network and infrastructure perimeter-centric networking models. Implementing SDP improves the security posture of businesses facing the challenge of continuously adapting to expanding attack surfaces that are increasingly more complex. This paper will show how SDP can be used to implement ZTNs and why SDP is applied to network connectivity, meaning it is agnostic of the underlying IP-based infrastructure and hones in on securing all connections using said infrastructure - it is the best architecture for achieving Zero Trust.

Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
Managing Privileged Access in a Cloud-First World
Managing Privileged Access in a Cloud-First World
Analyzing Log Data with AI Models to Meet Zero Trust Principles
Analyzing Log Data with AI Models to Meet Zero ...
Zero Trust Guidance for Small and Medium Size Businesses (SMBs) - Korean Translation
Zero Trust Guidance for Small and Medium Size B...
Reimagining the Browser as a Critical Policy Enforcement Point: A Zero Trust Security Architecture for Modern Enterprises
Reimagining the Browser as a Critical Policy Enforcement Point: A Z...
Published: 01/14/2026
Best Practices to Achieve the Benefits of Agentic AI in Pentesting
Best Practices to Achieve the Benefits of Agentic AI in Pentesting
Published: 01/13/2026
Closing the Zero Trust Governance Gap: Why Automation is Essential
Closing the Zero Trust Governance Gap: Why Automation is Essential
Published: 01/12/2026
Securing the Future: AI Strategy Meets Cloud Security Operations
Securing the Future: AI Strategy Meets Cloud Security Operations
Published: 01/09/2026

Interested in helping develop research with CSA?

Related Certificates & Training