ChaptersEventsBlog
How is your organization adopting AI technologies? Take this short survey to help us identify key trends and risks across FSI →

Download Publication

Software-Defined Perimeter (SDP) Specification v2.0
Software-Defined Perimeter (SDP) Specification v2.0
Who it's for:
  • Security Architects
  • Security Officers
  • Cloud Service Providers
  • Technology Providers

Software-Defined Perimeter (SDP) Specification v2.0

Release Date: 03/10/2022

Working Group: Zero Trust

The Software-Defined Perimeter (SDP) architecture is an effective way to implement the principles of Zero Trust. SDP aims to give enterprise security architects, network providers, and application owners the ability to deploy dynamic “software-defined” perimeters, hide networks and resources, prevent unauthorized access to the services running on them, and enforce an identity-centric access policy model. This has become critically important given the shift toward the cloud and the ever-heightened threat landscape.

This specification document from CSA’s SDP and Zero Trust Working Group covers the architectural components, interactions, and basic security communications protocol for SDP and is an updated version of the CSA SDP Specification v1.0, published in April 2014. This revised version includes additions, clarifications, and extensions in the following areas:
  • SDP and its relationship to Zero Trust 
  • SDP architecture and components
  • Onboarding and access workflows
  • Single Packet Authorization (SPA) message format, use of UDP, and alternatives
  • Initial discussions on IoT devices and access policies
  • Sequence diagrams for three SDP sub-protocols

Key Takeaways:
  • The definition of SDP and how it works
  • Understanding of the three components of the SDP architecture (Controller, Initiating Hosts, and Accepting Hosts)
  • Overview of six different SDP deployment models
  • Protocols for AH to Controller, IH to Controller, IH to AH, and logging
Download this Resource

Bookmark
Share
Related resources
Securing Autonomous AI Agents
Securing Autonomous AI Agents
Stealth Mode SDP for Zero Trust Network Infrastructure
Stealth Mode SDP for Zero Trust Network Infrast...
The State of Non-Human Identity and AI Security
The State of Non-Human Identity and AI Security
Resolving The Coordination Gap in Modern Cloud Security
Resolving The Coordination Gap in Modern Cloud Security
Published: 02/03/2026
The Agentic Trust Framework: Zero Trust Governance for AI Agents
The Agentic Trust Framework: Zero Trust Governance for AI Agents
Published: 02/02/2026
Zero Trust in the Cloud: Designing Security Assurance at the Control Plane
Zero Trust in the Cloud: Designing Security Assurance at the Contro...
Published: 01/30/2026
Why SaaS and AI Security Will Look Very Different in 2026
Why SaaS and AI Security Will Look Very Different in 2026
Published: 01/29/2026

Interested in helping develop research with CSA?

Related Certificates & Training