Cloud 101CircleEventsBlog
Save the date for CSA's 2024 Cyber Monday Sale: Get 50% off the exam token bundle!

Download Publication

Software-Defined Perimeter (SDP) Specification v2.0
Software-Defined Perimeter (SDP) Specification v2.0
Who it's for:
  • Security Architects
  • Security Officers
  • Cloud Service Providers
  • Technology Providers

Software-Defined Perimeter (SDP) Specification v2.0

Release Date: 03/10/2022

Working Group: Zero Trust

The Software-Defined Perimeter (SDP) architecture is an effective way to implement the principles of Zero Trust. SDP aims to give enterprise security architects, network providers, and application owners the ability to deploy dynamic “software-defined” perimeters, hide networks and resources, prevent unauthorized access to the services running on them, and enforce an identity-centric access policy model. This has become critically important given the shift toward the cloud and the ever-heightened threat landscape.

This specification document from CSA’s SDP and Zero Trust Working Group covers the architectural components, interactions, and basic security communications protocol for SDP and is an updated version of the CSA SDP Specification v1.0, published in April 2014. This revised version includes additions, clarifications, and extensions in the following areas:
  • SDP and its relationship to Zero Trust 
  • SDP architecture and components
  • Onboarding and access workflows
  • Single Packet Authorization (SPA) message format, use of UDP, and alternatives
  • Initial discussions on IoT devices and access policies
  • Sequence diagrams for three SDP sub-protocols

Key Takeaways:
  • The definition of SDP and how it works
  • Understanding of the three components of the SDP architecture (Controller, Initiating Hosts, and Accepting Hosts)
  • Overview of six different SDP deployment models
  • Protocols for AH to Controller, IH to Controller, IH to AH, and logging
Download this Resource

Bookmark
Share
Related resources
AI Risk Management: Thinking Beyond Regulatory Boundaries
AI Risk Management: Thinking Beyond Regulatory ...
Using Asymmetric Cryptography to Help Achieve Zero Trust Objectives
Using Asymmetric Cryptography to Help Achieve Z...
Zero Trust Guidance for Critical Infrastructure
Zero Trust Guidance for Critical Infrastructure
Zero Standing Privileges (ZSP): Vendor Myths vs. Reality
Zero Standing Privileges (ZSP): Vendor Myths vs. Reality
Published: 11/15/2024
Modernization Strategies for Identity and Access Management
Modernization Strategies for Identity and Access Management
Published: 11/04/2024
Dispelling the ‘Straight Line’ Myth of Zero Trust Transformation
Dispelling the ‘Straight Line’ Myth of Zero Trust Transformation
Published: 11/04/2024
Zero Standing Privileges: The Essentials
Zero Standing Privileges: The Essentials
Published: 11/01/2024

Acknowledgements

Michael Roza
Michael Roza
Risk, Audit, Control and Compliance Professional at EVC

Michael Roza

Risk, Audit, Control and Compliance Professional at EVC

Since 2012 Michael has contributed to over 100 CSA projects completed by CSA's Internet of Things, Zero Trust/Software-Defined Perimeter, Top Threats, Cloud Control Matrix, Containers/Microservices, DevSecOps, and other working groups. He has also served as co-chair of CSA's Enterprise Architecture, Top Threats, and Security-as-a-Service working groups while also serving as the Standards Liaison Officer for IoT, ICS, EA, SECaaS, and Cloud K...

Read more

Jason Garbis
Jason Garbis
Founder and Principal at Numberline Security

Jason Garbis

Founder and Principal at Numberline Security

Jason Garbis is Founder and Principal at Numberline Security, a consulting firm helping enterprises prepare for, define, and execute on effective Zero Trust security strategies. Jason has authored several books, including Zero Trust Security: An Enterprise Guide, is co-chair of the Zero Trust Working Group at the Cloud Security Alliance, and is a frequent speaker at industry conferences. Jason holds a CISSP certification, has a BS in Comput...

Read more

Juanita Koilpillai
Juanita Koilpillai
Pioneer of Software Defined Perimeter

Juanita Koilpillai

Pioneer of Software Defined Perimeter

Juanita Koilpillai was Founder and CEO of Waverley Labs, a pioneer in software defined perimeters (SDP) and digital risk reduction solutions. She had 30 years’ experience researching and developing systems in computer security, network management and real-time distributed software. She led the open source software-defined perimeter (SDP) effort for ‘black’ apps in the cl...

Read more

Junaid Islam
Junaid Islam
Secure Communications Expert

Junaid Islam

Secure Communications Expert

Junaid Islam is the CTO and founder of Vidder which provides distributed access control solutions to Fortune 500 companies. Prior to founding Vidder, Junaid founded Bivio Networks which developed the first Gigabit speed software based securityin the industry. Earlier in his career Junaid helped create networking standards such as Frame Relay, ATM and MPLS while...

Read more

Bob Flores
Bob Flores
Co-founder and Partner at Cognitio

Bob Flores

Co-founder and Partner at Cognitio

Bob Flores is a co-founder and partner of Cognitio. Prior to this, Bob spent 31 years at the Central Intelligence Agency. While at CIA, Bob held various positions in the Directorate of Intelligence, Directorate of Support, and the National Clandestine Service. Toward the end of his career at the CIA, Bob spent three years as the CIA’s Chief Technology Officer where he wa...

Read more

Daniel Bailey Headshot Missing
Daniel Bailey

Daniel Bailey

Benfeng Chen Headshot Missing
Benfeng Chen

Benfeng Chen

Eitan Bremier Headshot Missing
Eitan Bremier

Eitan Bremier

Ahmed Refaey Hussein Headshot Missing
Ahmed Refaey Hussein

Ahmed Refaey Hussein

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training