Software Defined Perimeter Working Group
Introduction to the Software Defined Perimeter Working Group
With the adoption of cloud services, the threat of network attacks against application infrastructure increases since servers can not be protected with traditional perimeter defense techniques. The Software Defined Perimeter (SDP) is a research working group that was established in 2013 with the goal to develop a solution to stop network attacks against application infrastructure. The working group research will be made freely available for use without license fees or restrictions by the CSA.
From the beginning the working group decided to take a clean-sheet approach to defeating cyber attacks that was comprehensive and cost effective. To achieve their goal, the team felt that three design elements were key. First, a security model that verified identity of the user, their devices, and role before granting access to protected systems. Second, cryptographic verification to ensure the security model was being followed. And third, that the protocols to achieve items one and two be proven public domain security controls.
The working group decided that a control channel based architecture using standard components such as SAML, PKI, and mutual TLS would provide the ideal approach. They published a paper in December 2013 to determine if there was interest in the concept and called it SDP.
Strong interest in the SDP concept led to the publishing of the SDP Version 1 specification in April 2014. The initial design consisted of an Initiating Host that would transmit device and user identity to a Controller over a mutual TLS connection. The Controller in turn would connect to an Issuing CA to verify the hardware identity and to an Identity Provider to verify user identity. Once verified, the Controller would then provision one or more mutual TLS connections between the Initiating Host and the appropriate Accepting Hosts.
To solve the problem of stopping network attacks on application infrastructure the SDP Workgroup developed a clean sheet approach that combines on device authentication, identity-based access and dynamically provisioned connectivity. While the security components in SDP are common place, the integration of the three components is fairly novel. More importantly, the SDP security model has been shown to stop all forms of network attacks including DDoS, Man-in-the-Middle, Server Query (OWASP10) as well as Advanced Persistent Threat (APT).
SDP Version 1 Design
The initial commercial SDP products implemented the concept as an overlay network for enterprise applications such as remote access high value data or protect cloud instances from network attacks. The SDP Initiating Host became a client and the Accepting Host became a Gateway.
The SDP Client handles a wide range of functions from verifying device and user identity to routing whitelisted applications (local) to authorized protected applications (remote). The SDP Client is configured in real time to ensure the certificate-based mutual TLS VPN only connects to services the user is authorized for. The SDP Client becomes the policy enforcement point for organizations, as that is where access control is implemented after user device and identity have been cryptographically verified.
The SDP Controller functions as a trust broker between the SDP Client and backend security controls such as Issuing Certificate Authority and Identity Provider. Once the identity of the SDP client has been verified and the services that it is authorized for determined, the SDP Controller configures both the SDP Client and Gateway in real time to provision a mutual TLS connection.
The SDP Gateway is the termination point for the mutual TLS connection from the Client. It is usually deployed as topologically close to the protected application as possible. The SDP Gateway is provided with the SDP Client’s IP address and Certificates after the identity of the requesting device has been verified and the authorization of the user’s determined.
Working together, the three SDP architectural components provide a number of unique security properties:
1) Information Hiding
No DNS information or visible ports of protected application infrastructure. SDP protected assets are considered “dark” as it is impossible to port scan for their presence.
Device identity (of the requesting host) is verified before connectivity is granted. Device identity is determined via a MFA token that is embedded in the TCP or TLS set up.
Users are provisioned access only to application servers that are appropriate for their role. The identity system utilizes a SAML assertion to inform the SDP Controller of the hosts’ privileges.
4) Application Layer Access
Users are only granted access at an application layer (not network). Additionally SDP typically whitelists the applications on the user’s device – thus provisioned connections are app-to-app.
SDP is built on proven, standards-based components such as mutual TLS, SAML and X.509 Certificates. Standards based technology ensures that SDP can be integrated with other security systems such as data encryption or remote attestation systems.
Pre-authentication when combined with pre-authorization create networks that are dark to unknown hosts while providing need-to-know access to authorized users. A key aspect of SDP is that pre-authentication and pre-authorization happen before a TCP connection between the user and protected application occurs. Additionally users are only granted access to authorized applications to eliminate the threat of lateral movement from compromised devices.
Software Defined Perimeter Working Group Founders
- Brent Bilger
- Alan Boehme
- Bob Flores
- Junaid Islam
- Jeff Schweitzer
Software Defined Perimeter Working Group Leadership
Software Defined Perimeter Co-chairs
Junaid Islam is the CTO and founder of Vidder which provides distributed access control solutions to Fortune 500 companies. Prior to founding Vidder, Junaid founded Bivio Networks which developed the first Gigabit speed software based security platform in the industry. Earlier in his career Junaid helped create networking standards such as Frame Relay, ATM and MPLS while at StrataCom and Cisco.
In addition to his work in the technology industry Junaid has served at the local and national levels. Junaid served as the Human Relations Commissioner of Santa Clara Country (Silicon Valley) from 2002 to 2009. Currently Junaid is the Co-Chair of the Software Defined Perimeter (SDP) research group which supports a number of US national cyber security initiatives.
Co-chair of the SDP Working group; co-author and chief architect behind the SDP specification. Presenter at several events including U.S. Congress 2013, CSA Congress in 2014 and 2015 and CSA Summit Hack-a-thon host. Recipient of the Ron Knode Award.
Bob Flores is a co-founder and partner of Cognitio. Prior to this, Bob spent 31 years at the Central Intelligence Agency. While at CIA, Bob held various positions in the Directorate of Intelligence, Directorate of Support, and the National Clandestine Service. Toward the end of his career at the CIA, Bob spent three years as the CIA’s Chief Technology Officer where he was responsible for ensuring that the Agency’s technology investments matched the needs of its mission. Bob is the Co-chair of the Software Defined Perimeter (SDP) Working Group at the Cloud Security Alliance.
Software Defined Perimeter Working Group Initiatives
SDP for IaaSObjective: Utilize SDP to manage user access and privileges in IaaS environments
Application: Enable security and compliance in hybrid and multi-cloud platforms
Membership: Open to the public
Information: All documents publicly available
Private InternetObjective: Utilize SDP to build an overlay network across the public Internet
Application: Enable global supply chain security for Global 100 companies
Membership: Invitation Only
Information: Briefing available upon request
On Demand FISMA Moderate ServicesObjective: Utilize SDP to enable virtualized FISMA moderate services
Application: Contractor access, coalition collaboration, emergency services
Membership: Open to US Federal Agencies
Information: Briefing available upon request (US Federal Agencies only)
Automotive Secure CommunicationsObjective: Utilize SDP for secure vehicle to cloud communications
Application: Secure telematics data transfer, OTA IVI software update
Membership: Open to automotive OEMs and suppliers
Information: Briefing available upon request
Open Source DDoS InitiativeObjective: Research SDP as a high speed Internet-based packet filter
Application: Enable access to mission critical sites during DDoS attacks
Membership: Open to the public
Information: All documents publicly available
There are no documents currently in peer review.
Thanks for your interest!
Your request to join Software Defined Perimeter has been recorded. Someone will be in touch with you soon with more instructions.
Connect with Us
Software Defined Perimeter Working Group News
February 13, 2017
Cloud Security Alliance Releases New Software Defined Perimeter for Infrastructure-as-a-Service Research
New Report Outlines How SDP Can Be Applied to Infrastructure-as-a-Service Environments, Including Requirements, Benefits and Key Use Cases SAN FRANCISCO, CA – February 13, 2017 – RSA Conference 2017 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment,…
March 31, 2016
CSA, The World’s Leading Cloud Organization Collaborated with Verizon and Vidder To Validate Security and Feasibility of High Availability Public Cloud Architecture at Fourth Annual CSA Hackathon at the RSA Conference 2016 SEATTLE, WA – March 31, 2016 – The Cloud Security Alliance (CSA), today released The Software Defined Perimeter (SDP) Hackathon #4 Report: High…
February 04, 2016
Cloud Security Alliance to Host Fourth Software Defined Perimeter Hackathon; Top Prize of $10,000 up for Grabs
Participants Invited to Attack Mission-Critical Cloud Application Architecture at RSA Conference; Verizon to Lead Testing Effort San Francisco, Calif. (RSA Conference Booth #S2614) – Feb. 4, 2016 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, today announced it…
April 07, 2015
Cloud Security Alliance to Host Third Software Defined Perimeter (SDP) Hackathon– Top Prize of $10,000 Available
The first Hackathon participant to gain access to Bob’s account gets $10,000! Full contest rules and registration will be available April 20th 12:00pm PDT.
August 27, 2014
Hackathon On! Cloud Security Alliance Challenges Hackers to Break its Software Defined Perimeter (SDP) at CSA Congress 2014
Successful breach of SDP Protected Public Cloud will earn a prize of $10,000!
May 01, 2014
The SDP Version 1.0 Implementation Specification and SDP Hackathon Results Report provide important updates on the SDP security framework and are now available for download.
December 05, 2013
New white paper outlines best practices to deploy an SDP to protect application infrastructure from network-based attacks.
November 13, 2013
A project to develop an architecture for creating highly secure and trusted end-to-end networks between any IP addressable entities, allowing for systems that are highly resilient to network attacks.
Software Defined Perimeter Working Group Downloads
This document outlines a Cloud Security Alliance (CSA) initiated protocol for the Software Defined Perimeter specification, and requests discussion and suggestions for improvements.
Release Date: April 30, 2014
The CSA SDP Hackathon challenged hackers to attack a server defended by a software defined perimeter. Of the billions of packets fired at the server, not one attacker penetrated even the first layer of security. The whitepaper outlines how this is possible.
Release Date: April 17, 2014
This document explains the software defined perimeter (SDP) security framework and how it can be deployed to protect application infrastructure from network-based attacks. The SDP incorporates security standards from organizations such as the National Institute of Standards and Technology (NIST) as well as security concepts from organizations such as the U.S. Department of Defense (DoD) into an integrated framework.
Release Date: December 01, 2013