Download Publication

Software-Defined Perimeter as a DDoS Prevention Mechanism
Release Date: 10/27/2019
Working Group: Zero Trust
- An explanation of DDoS attack vectors and their layers and logical protocols according to the OSI and TCP/IP models
- An overview of non-SDP mitigation methods
- The steps for setting up an SDP configured as a DDoS defense mechanism
- An explanation of three well-known attacks and how to use SDP to defend against them: HTTP Flood, TCP SYN Flood, UDP Reflection
- A list of DDoS and other attack monitoring maps
- People in security, enterprise architecture, and compliance roles within enterprises
- Solution providers, service providers, and technology vendors
Download this Resource
Prefer to access this resource without an account? Download it now.
Related Resources
Acknowledgements

Michael Roza
Risk, Audit, Control and Compliance Professional at EVC

Shamun Mahmud
Senior Research Analyst, CSA

Juanita Koilpillai
Pioneer of Software Defined Perimeter
Juanita Koilpillai was Founder and CEO of Waverley Labs, a pioneer in software defined perimeters (SDP) and digital risk reduction solutions. She had 30 years’ experience researching and developing systems in computer security, network management and real-time distributed software. She led the open source software-defined perimeter (SDP) effort for ‘black’ apps in the cl...

Nya Murray
CEO of Trac-Car and Verviam IDaaS
Nya is a key contributor to the Zero Trust working group and author of several position papers published by CSA’s Software-Defined Perimeter working group. She is the CEO of Trac-Car and Verviam IDaaS and a senior information and communications technology (ICT) cloud cyber security and identity management consulting architect. Nya cons...

Jason Garbis
Founder and Principal at Numberline Security
Jason Garbis is Founder and Principal at Numberline Security, a consulting firm helping enterprises prepare for, define, and execute on effective Zero Trust security strategies. Jason has authored several books, including Zero Trust Security: An Enterprise Guide, is co-chair of the Zero Trust Working Group at the Cloud Security Alliance, and is a frequent speaker at industry conferences. Jason holds a CISSP certification, has a BS in Comput...
Interested in helping develop research with CSA?
Related Certificates & Training

Learn more