ChaptersCircleEventsBlog
Get early access to CSA’s Trusted AI Safety Certification Program—updates, resources & beta invites!

Download Publication

Software Defined Perimeter Architecture Guide: Chinese Translation
Software Defined Perimeter Architecture Guide: Chinese Translation

Software Defined Perimeter Architecture Guide: Chinese Translation

Release Date: 06/24/2018

Working Group: Zero Trust

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translated content falls outside of the CSA Research Lifecycle. For any questions and feedback, contact research@cloudsecurityalliance.org.

Software Defined Perimeter (SDP) Architecture Guide is designed to leverage proven, standards-based components to stop network attacks against application infrastructure. The architecture guide will help increase awareness and adoption of SDP, improve understanding of how SDP can be used in different environments, and help enterprises successfully deploy SDP solutions based on the architecture recommendations.
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
Zero Trust Privacy Assessment and Guidance
Zero Trust Privacy Assessment and Guidance
Zero Trust Guidance for Small and Medium Size Businesses (SMBs) - Japanese Translation
Zero Trust Guidance for Small and Medium Size B...
Zero Trust Guidance for Critical Infrastructure - Japanese Translation
Zero Trust Guidance for Critical Infrastructure...
Integrity: An Overlooked Foundation of Zero Trust
Integrity: An Overlooked Foundation of Zero Trust
Published: 05/15/2025
Shields Up: What IT Professionals Wish They Knew About Preventing Data Breaches
Shields Up: What IT Professionals Wish They Knew About Preventing D...
Published: 05/14/2025
Securing the Media Industry
Securing the Media Industry
Published: 05/06/2025
Manufacturing’s Hidden Cybersecurity Crisis: Why ESXi Hypervisor Security Can’t Wait
Manufacturing’s Hidden Cybersecurity Crisis: Why ESXi Hypervisor Se...
Published: 05/06/2025
Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training