The Software-Defined Perimeter (SDP) architecture is an effective way to implement the principles of Zero Trust. SDP aims to give enterprise security architects, network providers, and application owners the ability to deploy dynamic “software-defined” perimeters, hide networks and resources, prevent unauthorized access to the services running on them, and enforce an identity-centric access policy model. This has become critically important given the shift toward the cloud and the ever-heightened threat landscape.
This specification document from CSA’s SDP and Zero Trust Working Group covers the architectural components, interactions, and basic security communications protocol for SDP and is an updated version of the CSA SDP Specification v1.0, published in April 2014. This revised version includes additions, clarifications, and extensions in the following areas:
- SDP and its relationship to Zero Trust
- SDP architecture and components
- Onboarding and access workflows
- Single Packet Authorization (SPA) message format, use of UDP, and alternatives
- Initial discussions on IoT devices and access policies
- Sequence diagrams for three SDP sub-protocols
Key Takeaways:
- The definition of SDP and how it works
- Understanding of the three components of the SDP architecture (Controller, Initiating Hosts, and Accepting Hosts)
- Overview of six different SDP deployment models
- Protocols for AH to Controller, IH to Controller, IH to AH, and logging
Download this Resource
Best For:
- Security Architects
- Security Officers
- Cloud Service Providers
- Technology Providers





