Cloud 101CircleEventsBlog
Join us for Cybersecurity Awareness Month! Strengthen your cyber resilience with essential security tips and resources for everyone.

Download Publication

Software-Defined Perimeter (SDP) Specification v2.0 - Japanese Translation
Software-Defined Perimeter (SDP) Specification v2.0 - Japanese Translation

Software-Defined Perimeter (SDP) Specification v2.0 - Japanese Translation

Release Date: 05/04/2022

Working Group: Zero Trust

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translated content falls outside of the CSA Research Lifecycle. For any questions and feedback, contact [email protected].


はじめに

Software-Defined Perimeter (SDP) アーキテクチャは、ネットワークセキュリティの境界を動的かつ柔軟に

展開し、安全が担保されていないネットワークにあるアプリケーションやサービスを隔離する機能を提供

します。SDP は、隔離に必要な、オンデマンドで、かつ動的にプロビジョニングされる信頼のオーバーレ

イを提供し、企業が管理するネットワークの内外からのネットワークベースの攻撃を軽減するように設計

されています。SDPの実装では、不正な存在から資産を隠し、接続を許可する前に信頼を確立し、分離さ

れたコントロールプレーンとデータプレーンによってシステムを管理します。SDPの導入によって、企業

はゼロトラストの目標を達成することができ、その結果、従来の(効果がなくなりつつある)境界中心の

モデルから脱却し、セキュリティの有効性と回復力を向上させることができます。

Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
View translations
Related resources
Zero Trust Guiding Principles v1.1
Zero Trust Guiding Principles v1.1
Confronting Shadow Access Risks: Considerations for Zero Trust and Artificial Intelligence Deployments
Confronting Shadow Access Risks: Considerations...
Defining the Zero Trust Protect Surface - Korean Translation
Defining the Zero Trust Protect Surface - Korea...
Secure by Design: Implementing Zero Trust Principles in Cloud-Native Architectures
Secure by Design: Implementing Zero Trust Principles in Cloud-Nativ...
Published: 10/03/2024
What ‘Passwordless’ Really Means for Privileged Access Management
What ‘Passwordless’ Really Means for Privileged Access Management
Published: 10/03/2024
Is Your Production Data Secure? That’s a Hard NO.
Is Your Production Data Secure? That’s a Hard NO.
Published: 09/23/2024
Building a Resilient Manufacturing Environment Through Zero Trust OT Cybersecurity Controls
Building a Resilient Manufacturing Environment Through Zero Trust O...
Published: 09/23/2024
Defending Against the Cloud Adversary: Detection and Response in the Cloud
Defending Against the Cloud Adversary: Detection and Response in th...
October 24 | Online
Achieve Zero Trust Identity with the new 7 A’s of IAM
Achieve Zero Trust Identity with the new 7 A’s of IAM
November 7 | Online
Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training