ChaptersEventsBlog

Download Publication

Software-Defined Perimeter (SDP) Specification v2.0
Software-Defined Perimeter (SDP) Specification v2.0
Who it's for:
  • Security Architects
  • Security Officers
  • Cloud Service Providers
  • Technology Providers

Software-Defined Perimeter (SDP) Specification v2.0

Release Date: 03/10/2022

Working Group: Zero Trust

The Software-Defined Perimeter (SDP) architecture is an effective way to implement the principles of Zero Trust. SDP aims to give enterprise security architects, network providers, and application owners the ability to deploy dynamic “software-defined” perimeters, hide networks and resources, prevent unauthorized access to the services running on them, and enforce an identity-centric access policy model. This has become critically important given the shift toward the cloud and the ever-heightened threat landscape.

This specification document from CSA’s SDP and Zero Trust Working Group covers the architectural components, interactions, and basic security communications protocol for SDP and is an updated version of the CSA SDP Specification v1.0, published in April 2014. This revised version includes additions, clarifications, and extensions in the following areas:
  • SDP and its relationship to Zero Trust 
  • SDP architecture and components
  • Onboarding and access workflows
  • Single Packet Authorization (SPA) message format, use of UDP, and alternatives
  • Initial discussions on IoT devices and access policies
  • Sequence diagrams for three SDP sub-protocols

Key Takeaways:
  • The definition of SDP and how it works
  • Understanding of the three components of the SDP architecture (Controller, Initiating Hosts, and Accepting Hosts)
  • Overview of six different SDP deployment models
  • Protocols for AH to Controller, IH to Controller, IH to AH, and logging
Download this Resource

Bookmark
Share
Related resources
AI Consensus Assessments Initiative Questionnaire (AI-CAIQ) v1.0.2
AI Consensus Assessments Initiative Questionnai...
Analyzing Log Data with AI Models to Meet Zero Trust Principles
Analyzing Log Data with AI Models to Meet Zero ...
Agentic AI Identity and Access Management: A New Approach
Agentic AI Identity and Access Management: A Ne...
Micro-Segment the Metal: A Zero Trust Field Guide for Physical Hosts
Micro-Segment the Metal: A Zero Trust Field Guide for Physical Hosts
Published: 12/12/2025
The CSA Triangle Chapter’s Year of Momentum: 2025 Highlights
The CSA Triangle Chapter’s Year of Momentum: 2025 Highlights
Published: 12/11/2025
How to Build AI Prompt Guardrails: An In-Depth Guide for Securing Enterprise GenAI
How to Build AI Prompt Guardrails: An In-Depth Guide for Securing E...
Published: 12/10/2025
Zero Trust for OT in Manufacturing: A Practical Path to Modern Industrial Security
Zero Trust for OT in Manufacturing: A Practical Path to Modern Indu...
Published: 12/08/2025

Interested in helping develop research with CSA?

Related Certificates & Training