Cloud 101CircleEventsBlog
Get 50% off the Cloud Infrastructure Security training bundle with code 'unlock50advantage'

Download Publication

Software-Defined Perimeter (SDP) and Zero Trust
Software-Defined Perimeter (SDP) and Zero Trust

Software-Defined Perimeter (SDP) and Zero Trust

Release Date: 05/27/2020

Working Group: Zero Trust

A Zero Trust implementation using Software-Defined Perimeter enables organizations to defend new variations of old attack methods that are constantly surfacing in existing network and infrastructure perimeter-centric networking models. Implementing SDP improves the security posture of businesses facing the challenge of continuously adapting to expanding attack surfaces that are increasingly more complex. This paper will show how SDP can be used to implement ZTNs and why SDP is applied to network connectivity, meaning it is agnostic of the underlying IP-based infrastructure and hones in on securing all connections using said infrastructure - it is the best architecture for achieving Zero Trust.

Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
Cloud Security for Startups 2024
Cloud Security for Startups 2024
Key Management for Public Cloud Migration
Key Management for Public Cloud Migration
Top Threats to Cloud Computing 2024 - Japanese Translation
Top Threats to Cloud Computing 2024 - Japanese ...
How to Demystify Zero Trust for Non-Security Stakeholders
How to Demystify Zero Trust for Non-Security Stakeholders
Published: 12/19/2024
Why Digital Pioneers are Adopting Zero Trust SD-WAN to Drive Modernization
Why Digital Pioneers are Adopting Zero Trust SD-WAN to Drive Modern...
Published: 12/19/2024
Managed Security Service Provider (MSSP): Everything You Need to Know
Managed Security Service Provider (MSSP): Everything You Need to Know
Published: 12/18/2024
Zero-Code Cloud: Building Secure, Automated Infrastructure Without Writing a Line
Zero-Code Cloud: Building Secure, Automated Infrastructure Without ...
Published: 12/16/2024

Acknowledgements

Michael Roza
Michael Roza
Risk, Audit, Control and Compliance Professional at EVC

Michael Roza

Risk, Audit, Control and Compliance Professional at EVC

Since 2012, Michael Roza has been a pivotal member of the Cloud Security Alliance (CSA) family. He has contributed to over 125 projects, as a Lead Author or Author/Contributor and many more as a Reviewer/Editor.

Michael's extensive contributions encompass critical areas including Artificial Intelligence, Zero Trust/Software Defined Perimeter, Internet of Things, Top Threats, Cloud Control Matrix, DevSecOps, and Key Management. His lea...

Read more

Shamun Mahmud
Shamun Mahmud
Senior Research Analyst, CSA

Shamun Mahmud

Senior Research Analyst, CSA

Juanita Koilpillai
Juanita Koilpillai
Pioneer of Software Defined Perimeter

Juanita Koilpillai

Pioneer of Software Defined Perimeter

Juanita Koilpillai was Founder and CEO of Waverley Labs, a pioneer in software defined perimeters (SDP) and digital risk reduction solutions. She had 30 years’ experience researching and developing systems in computer security, network management and real-time distributed software. She led the open source software-defined perimeter (SDP) effort for ‘black’ apps in the cl...

Read more

Junaid Islam
Junaid Islam
Secure Communications Expert

Junaid Islam

Secure Communications Expert

Junaid Islam is the CTO and founder of Vidder which provides distributed access control solutions to Fortune 500 companies. Prior to founding Vidder, Junaid founded Bivio Networks which developed the first Gigabit speed software based securityin the industry. Earlier in his career Junaid helped create networking standards such as Frame Relay, ATM and MPLS while...

Read more

Nya Murray
Nya Murray
CEO of Trac-Car and Verviam IDaaS

Nya Murray

CEO of Trac-Car and Verviam IDaaS

Nya is a key contributor to the Zero Trust working group and author of several position papers published by CSA’s Software-Defined Perimeter working group. She is the CEO of Trac-Car and Verviam IDaaS and a senior information and communications technology (ICT) cloud cyber security and identity management consulting architect. Nya cons...

Read more

Aditya Bhelke Headshot Missing
Aditya Bhelke

Aditya Bhelke

Oscar Monge Espana Headshot Missing
Oscar Monge Espana

Oscar Monge Espana

Matt Conran Headshot Missing
Matt Conran

Matt Conran

Eitan Bremier Headshot Missing
Eitan Bremier

Eitan Bremier

Tino Hirschmann Headshot Missing
Tino Hirschmann

Tino Hirschmann

Steve Swift Headshot Missing
Steve Swift

Steve Swift

Sam Heuchert Headshot Missing
Sam Heuchert

Sam Heuchert

John Markh Headshot Missing
John Markh

John Markh

Roupe Sahans
Roupe Sahans
DevSecOps Leader

Roupe Sahans

DevSecOps Leader

Roupe leads DevSecOps delivery and thought leadership for technology and media clients embracing digital transformation.

Roupe started his DevOps journey in 2016, building containerised microservices on AWS for government platforms. He has since been working with engineers to c-suite executives to embed security and resilience into digital products, secure cloud services, and reduce cyber technical-debt.

Most recently Roupe ha...

Read more

Gerardo Di Giacomo Headshot Missing
Gerardo Di Giacomo

Gerardo Di Giacomo

Vladimir Klasnya Headshot Missing
Vladimir Klasnya

Vladimir Klasnya

J. Lam Headshot Missing
J. Lam

J. Lam

Clara Andress Headshot Missing
Clara Andress

Clara Andress

Dan Mountstephan Headshot Missing
Dan Mountstephan

Dan Mountstephan

Manoj Sharma Headshot Missing
Manoj Sharma

Manoj Sharma

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training