ChaptersEventsBlog

Download Publication

Software-Defined Perimeter (SDP) Specification v2.0
Software-Defined Perimeter (SDP) Specification v2.0
Who it's for:
  • Security Architects
  • Security Officers
  • Cloud Service Providers
  • Technology Providers

Software-Defined Perimeter (SDP) Specification v2.0

Release Date: 03/10/2022

Working Group: Zero Trust

The Software-Defined Perimeter (SDP) architecture is an effective way to implement the principles of Zero Trust. SDP aims to give enterprise security architects, network providers, and application owners the ability to deploy dynamic “software-defined” perimeters, hide networks and resources, prevent unauthorized access to the services running on them, and enforce an identity-centric access policy model. This has become critically important given the shift toward the cloud and the ever-heightened threat landscape.

This specification document from CSA’s SDP and Zero Trust Working Group covers the architectural components, interactions, and basic security communications protocol for SDP and is an updated version of the CSA SDP Specification v1.0, published in April 2014. This revised version includes additions, clarifications, and extensions in the following areas:
  • SDP and its relationship to Zero Trust 
  • SDP architecture and components
  • Onboarding and access workflows
  • Single Packet Authorization (SPA) message format, use of UDP, and alternatives
  • Initial discussions on IoT devices and access policies
  • Sequence diagrams for three SDP sub-protocols

Key Takeaways:
  • The definition of SDP and how it works
  • Understanding of the three components of the SDP architecture (Controller, Initiating Hosts, and Accepting Hosts)
  • Overview of six different SDP deployment models
  • Protocols for AH to Controller, IH to Controller, IH to AH, and logging
Download this Resource

Bookmark
Share
Related resources
AI Consensus Assessments Initiative Questionnaire (AI-CAIQ) v1.0.2
AI Consensus Assessments Initiative Questionnai...
Analyzing Log Data with AI Models to Meet Zero Trust Principles
Analyzing Log Data with AI Models to Meet Zero ...
Agentic AI Identity and Access Management: A New Approach
Agentic AI Identity and Access Management: A Ne...
Killing Standing Privileges: Why Just-in-Time Access is the Future of PAM
Killing Standing Privileges: Why Just-in-Time Access is the Future ...
Published: 12/04/2025
Navigating the Liminal Edge of AI Security: Deconstructing Prompt Injection, Model Poisoning, and Adversarial Perturbations in the Cognitive Cyber Domain
Navigating the Liminal Edge of AI Security: Deconstructing Prompt I...
Published: 12/01/2025
One Day of Experience Building Agents
One Day of Experience Building Agents
Published: 11/25/2025
MCP Can Be RCE for You and Me
MCP Can Be RCE for You and Me
Published: 11/25/2025

Interested in helping develop research with CSA?

Related Certificates & Training