Download Publication
Software Defined Perimeter for Infrastructure as a Service: Japanese Translation
Release Date: 06/23/2019
Working Group: Zero Trust
This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translated content falls outside of the CSA Research Lifecycle. For any questions and feedback, contact [email protected].
Obtain a clear sense of the security challenges facing enterprise users of IaaS, understand the problems that arise from combining native IaaS access controls with traditional network security tools, and learn about how a Software-Defined Perimeter can solve these problems across various use cases. This document is intended to explore and explain how a Software-Defined Perimeter (SDP) architecture can improve security, compliance, and operational efficiency when applied to Infrastructure-as-a-Service environments. It is primarily meant for customers of IaaS providers, but will also be relevant to service providers themselves that are offering IaaS.
Obtain a clear sense of the security challenges facing enterprise users of IaaS, understand the problems that arise from combining native IaaS access controls with traditional network security tools, and learn about how a Software-Defined Perimeter can solve these problems across various use cases. This document is intended to explore and explain how a Software-Defined Perimeter (SDP) architecture can improve security, compliance, and operational efficiency when applied to Infrastructure-as-a-Service environments. It is primarily meant for customers of IaaS providers, but will also be relevant to service providers themselves that are offering IaaS.
Download this Resource
Prefer to access this resource without an account? Download it now.
Are you a research volunteer? Request to have your profile displayed on the website here.
Interested in helping develop research with CSA?
Related Certificates & Training
For those who want to learn from the industry's first benchmark for measuring Zero Trust skill sets, the CCZT includes foundational Zero Trust components released by CISA and NIST, innovative work in the Software-Defined Perimeter by CSA Research, and guidance from renowned Zero Trust experts such as John Kindervag, Founder of the Zero Trust philosophy.
Learn more