ChaptersCircleEventsBlog
Share how your organization manages AI securely. Take the CSA and Google enterprise AI Survey today!

Download Publication

Software Defined Perimeter for Infrastructure as a Service: Chinese Translation
Software Defined Perimeter for Infrastructure as a Service: Chinese Translation

Software Defined Perimeter for Infrastructure as a Service: Chinese Translation

Release Date: 06/24/2019

Working Group: Zero Trust

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translated content falls outside of the CSA Research Lifecycle. For any questions and feedback, contact research@cloudsecurityalliance.org.

Obtain a clear sense of the security challenges facing enterprise users of IaaS, understand the problems that arise from combining native IaaS access controls with traditional network security tools, and learn about how a Software-Defined Perimeter can solve these problems across various use cases. This document is intended to explore and explain how a Software-Defined Perimeter (SDP) architecture can improve security, compliance, and operational efficiency when applied to Infrastructure-as-a-Service environments. It is primarily meant for customers of IaaS providers, but will also be relevant to service providers themselves that are offering IaaS. 
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
Zero Trust Automation & Orchestration and Visibility & Analytics Overview
Zero Trust Automation & Orchestration and Visib...
Zero Trust Guidance for IoT
Zero Trust Guidance for IoT
State of SaaS Security Report 2025
State of SaaS Security Report 2025
Policy-as-Code vs. IaC Security: What’s the Real Difference?
Policy-as-Code vs. IaC Security: What’s the Real Difference?
Published: 07/08/2025
Why Identity Automation Fails at 96% of Organizations
Why Identity Automation Fails at 96% of Organizations
Published: 07/07/2025
How Mature is Your NHI Security Program?
How Mature is Your NHI Security Program?
Published: 07/07/2025
MFA Made Easy: 8 Best Practices for Seamless Authentication Journeys
MFA Made Easy: 8 Best Practices for Seamless Authentication Journeys
Published: 07/02/2025
Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training