Cloud 101CircleEventsBlog

Download Publication

Software-Defined Perimeter (SDP) and Zero Trust - Chinese Translation
Software-Defined Perimeter (SDP) and Zero Trust - Chinese Translation

Software-Defined Perimeter (SDP) and Zero Trust - Chinese Translation

Release Date: 09/21/2020

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translated content falls outside of the CSA Research Lifecycle. For any questions and feedback, contact [email protected].

A Zero Trust implementation using Software-Defined Perimeter enables organizations to defend new variations of old attack methods that are constantly surfacing in existing network and infrastructure perimeter-centric networking models. Implementing SDP improves the security posture of businesses facing the challenge of continuously adapting to expanding attack surfaces that are increasingly more complex. This paper will show how SDP can be used to implement ZTNs and why SDP is applied to network connectivity, meaning it is agnostic of the underlying IP-based infrastructure and hones in on securing all connections using said infrastructure - it is the best architecture for achieving Zero Trust.

Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
Defining the Zero Trust Protect Surface
Defining the Zero Trust Protect Surface
Communicating the Business Value of Zero Trust
Communicating the Business Value of Zero Trust
Zero Trust Guiding Principles
Zero Trust Guiding Principles
CSA Community Spotlight: Being a Force for Good with Risk Manager Heinrich Smit
CSA Community Spotlight: Being a Force for Good with Risk Manager H...
Published: 03/21/2024
Zero Trust: Win Friends, Influence People, and Improve Your Organizational Maturity
Zero Trust: Win Friends, Influence People, and Improve Your Organiz...
Published: 03/19/2024
Five Lessons Learned From Okta’s Support Site Breach
Five Lessons Learned From Okta’s Support Site Breach
Published: 03/11/2024
Embracing Zero Trust: A Blueprint for Secure Digital Transformation
Embracing Zero Trust: A Blueprint for Secure Digital Transformation
Published: 03/08/2024
Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training