CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
CISO Perspectives and Progress in Deploying Zero Trust - Chinese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
Toward a Zero Trust Architecture Enterprise stakeholders must consider the challenges of increased real-time system complexity, the need for new cybersecurity policy and strong cultural s... Request to download | |
Zero Trust Architecture Expert Group Charter The CSA Zero Trust Architecture Expert Group will review and advise on the scope, curriculum, objectives, structure, go-to-market (GTM) strategy and value pr... Request to download | |
Software Defined Perimeter Architecture Guide: Korean Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
Software-Defined Perimeter Zero Trust Charter The proposed charter outlines the scope, responsibilities, etc. to align and guide the Software-Defined Perimeter Zero Trust working group through the year 2... Request to download | |
SDP: The Most Advanced Zero Trust Architecture Today’s “Zero Trust” implementations are like putting up a wall with multiple doors and allowing people to come and pick a lock on the door. We are then just... Request to download | |
Software-Defined Perimeter ARCHITECTURE GUIDE - Japanese Translation Software Defined Perimeter (SDP) Architecture Guide is designed to leverage proven, standards-based components to stop network attacks against application in... Request to download | |
Software-Defined Perimeter as a DDoS Prevention Mechanism The primary goal of this document is to increase the awareness and understanding of SDP as a tool to prevent DDoS attacks by demonstrating its efficiency and... Request to download | |
Software Defined Perimeter (SDP): Awareness and Adoption Infographic A majority of organizations recognize the need to change their approach to user access control. SDP is seeing early market adoption and awareness, with under... Request to download | |
Software Defined Perimeter for Infrastructure as a Service: Chinese Translation Obtain a clear sense of the security challenges facing enterprise users of IaaS, understand the problems that arise from combining native IaaS access control... Request to download | |
Software Defined Perimeter for Infrastructure as a Service: Japanese Translation Obtain a clear sense of the security challenges facing enterprise users of IaaS, understand the problems that arise from combining native IaaS access control... Request to download | |
SDP Architecture Guide v2 Software Defined Perimeter (SDP) Architecture Guide is designed to leverage proven, standards-based components to stop network attacks against application in... Request to download | |
Software Defined Perimeter Architecture Guide: Chinese Translation Software Defined Perimeter (SDP) Architecture Guide is designed to leverage proven, standards-based components to stop network attacks against application in... Request to download | |
Software Defined Perimeter as a DDoS Mechanism: Chinese Translation The primary goal of this document is to increase the awareness and understanding of SDP as a tool to prevent DDoS attacks by demonstrating its efficiency and... Request to download | |
Software Defined Perimeter Specification: Chinese Translation This document outlines a Cloud Security Alliance (CSA) initiated protocol for the Software Defined Perimeter specification, and requests discussion and sugge... Request to download | |
Software Defined Perimeter Glossary The Software Defined Perimeter (SDP) Glossary is a reference document that brings together SDP related terms and definitions from various professional resour... Request to download | |
SDP for IaaS Obtain a clear sense of the security challenges facing enterprise users of IaaS, understand the problems that arise from combining native IaaS access control... Request to download | |
SDP Specification v1.0 This document outlines a Cloud Security Alliance (CSA) initiated protocol for the Software Defined Perimeter specification, and requests discussion and sugge... Request to download | |
SDP Hackathon Whitepaper The CSA SDP Hackathon challenged hackers to attack a server defended by a software defined perimeter. Of the billions of packets fired at the server, not one... Request to download | |
Software Defined Perimeter This document explains the software defined perimeter (SDP) security framework and how it can be deployed to protect application infrastructure from network-... Request to download |