Download Publication
![Software-Defined Perimeter as a DDoS Prevention Mechanism](https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MTQyOCwicHVyIjoiYmxvYl9pZCJ9fQ==--e985221debbcd0c5d5bb66de8f92b9d37a94d68c/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJwbmciLCJyZXNpemVfdG9fbGltaXQiOlsyMjUsMzAwXX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--ed3d8b3503f8660626bf50138e90f4b6f3228621/SDP-DDOS-Prevention-Mechanism.png)
Software-Defined Perimeter as a DDoS Prevention Mechanism
Release Date: 10/27/2019
Working Groups: Software-Defined Perimeter Zero Trust
- An explanation of DDoS attack vectors and their layers and logical protocols according to the OSI and TCP/IP models
- An overview of non-SDP mitigation methods
- The steps for setting up an SDP configured as a DDoS defense mechanism
- An explanation of three well-known attacks and how to use SDP to defend against them: HTTP Flood, TCP SYN Flood, UDP Reflection
- A list of DDoS and other attack monitoring maps
- People in security, enterprise architecture, and compliance roles within enterprises
- Solution providers, service providers, and technology vendors
Download this Resource
Prefer to access this resource without an account? Download it now.
Related Resources
Acknowledgements
![Michael Roza](/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6Mzc3NCwicHVyIjoiYmxvYl9pZCJ9fQ==--2ee3c93fe3c1fbe44c00209688a02592cb8f251c/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMTgweDI0MF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--ce1f0b273c14895214513c640abe6c284218f1db/roza.jpg)
Michael Roza
Risk, Control and Compliance Professional at EVC
Since 2012 Michael has contributed to over 100 CSA projects completed by CSA's Internet of Things, Zero Trust/Software-Defined Perimeter, Top Threats, Cloud Control Matrix, Containers/Microservices, DevSecOps, and other working groups. He has also served as co-chair of CSA's Enterprise Architecture, Top Threats, and Security-as-a-Service working groups while also serving as the Standards Liaison Officer for IoT, ICS, EA, SECaaS, and Cloud K...
![Shamun Mahmud](/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MTA1OTEsInB1ciI6ImJsb2JfaWQifX0=--a992cfa3fe00feb490e65dcf1b480753f9a8087c/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGVnIiwiYXV0b19vcmllbnQiOnRydWUsInJvdGF0ZSI6MCwiZ3Jhdml0eSI6ImNlbnRlciIsInJlc2l6ZSI6IjE4MHgyNDBeIiwiYmFja2dyb3VuZCI6Im5vbmUifSwicHVyIjoidmFyaWF0aW9uIn19--bce64e6cd8e04ad10bf1b7b6142bab4d14a520af/shamun-m.jpeg)
Shamun Mahmud
Senior Research Analyst, CSA
![Juanita Koilpillai](/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MTE2NSwicHVyIjoiYmxvYl9pZCJ9fQ==--9a3598794d927fa75f15b25cd89ef1f05e4a76cc/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMTgweDI0MF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--ce1f0b273c14895214513c640abe6c284218f1db/juanita-koilpillai.jpg)
Juanita Koilpillai
Pioneer of Software Defined Perimeter
Juanita Koilpillai was Founder and CEO of Waverley Labs, a pioneer in software defined perimeters (SDP) and digital risk reduction solutions. She had 30 years’ experience researching and developing systems in computer security, network management and real-time distributed software. She led the open source software-defined perimeter (SDP) effort for ‘black’ apps in the cl...
![Nya Murray](/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NDE1MCwicHVyIjoiYmxvYl9pZCJ9fQ==--64224ae6518a367a2e3b6d3911198e26cc38891f/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJwbmciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMTgweDI0MF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--eb486f3f6b5873e5a4f4e10b34324e47d456ee46/csa-headshot.png)
Nya Murray
CEO of Trac-Car and Verviam IDaaS
Nya is a key contributor to the Zero Trust working group and author of several position papers published by CSA’s Software-Defined Perimeter working group. She is the CEO of Trac-Car and Verviam IDaaS and a senior information and communications technology (ICT) cloud cyber security and identity management consulting architect. Nya cons...
![Jason Garbis](/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MjE2MjUsInB1ciI6ImJsb2JfaWQifX0=--54deb6808eb78b4a49831c53ddb055f745f544ea/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMTgweDI0MF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--ce1f0b273c14895214513c640abe6c284218f1db/jag-headshot.jpg)
Jason Garbis
Founder and Principal at Numberline Security
Jason Garbis is Founder and Principal at Numberline Security, a consulting firm helping enterprises prepare for, define, and execute on effective Zero Trust security strategies. Jason has authored several books, including Zero Trust Security: An Enterprise Guide, is co-chair of the Zero Trust Working Group at the Cloud Security Alliance, and is a frequent speaker at industry conferences. Jason holds a CISSP certification, has a BS in Comput...