SDP
SDP
SDP
https://cloudsecurityalliance.org/research/working-groups/software-defined-perimeter/
Disclaimer
Cloud Security Alliance designed and created this Zero Trust Training course study guide (the “Work”)
primarily as an educational resource for security and governance professionals. Cloud Security
Alliance makes no claim that use of any of the Work will assure a successful outcome. The Work
should not be considered inclusive of all proper information, procedures and tests or exclusive of
other information, procedures and tests that are reasonably directed to obtaining the same results.
In determining the propriety of any specific information, procedure or test, professionals should
apply their own professional judgment to the specific circumstances presented by the particular
systems or information technology environment.
© 2022 Cloud Security Alliance – All Rights Reserved. You may download, store, display on your
computer, view, print, and link to the Cloud Security Alliance at https://cloudsecurityalliance.org
subject to the following: (a) the draft may be used solely for your personal, informational, non-
commercial use; (b) the draft may not be modified or altered in any way; (c) the draft may not be
redistributed; and (d) the trademark, copyright or other notices may not be removed. You may quote
portions of the draft as permitted by the Fair Use provisions of the United States Copyright Act,
provided that you attribute the portions to the Cloud Security Alliance.
CSA Address
709 Dupont St.
Bellingham, WA 98225, USA
Phone: +1.360.746.2689
Fax: +1.206.832.3513
The Zero Trust Training was developed with the support of the Cloud Security Alliance Zero Trust
Training (ZTT) Expert Group, whose members include volunteers from a wide variety of industries
across the globe. Made up of subject matter experts with hands-on experience planning and
implementing ZTT, both as cloud service consumers and providers, the ZTT Expert Group includes
board members, the technical C-suite, as well as privacy, legal, internal audit, procurement, IT,
security and development teams. From cumulative stakeholder input, the ZTT Expert Group
established the value proposition, scope, learning objectives, and curriculum of the Zero Trust
Training.
To learn more about the Zero Trust Training and ways to get involved please visit: https://
cloudsecurityalliance.org/zt/
We would also like to thank our beta testers, who provided valuable feedback on the Zero Trust
Training.
Lead Developers:
Daniele Catteddu, CTO, CISM, Cloud Security Alliance, Italy
Juanita Koilpilla, CEO, Waverly Labs, USA
Richard Lee, CISSP, CCSP, WCP, Citizens Financial Group, USA
Contributing Editors:
Anna Schorr, Training Program Manager, MBA, CCSK, Cloud Security Alliance, USA
Hannah Rock, Content Development Manager, Cloud Security Alliance, USA
James Lam, CISA, CISM, CRISC, CDPSE, TOGAF, M.S., Accenture Strategy & Consulting, USA
Jenna Morrison, CCSK, USA
Leon Yen, Technical Writer, Cloud Security Alliance, USA
Remo Hardeman, Security Architect, Cybersecurity Advisor, Omerta Information Security, Petro SA,
Stephen Smith, Graphic Designer, Cloud Security Alliance, USA
List of Figures
Figure 1: Access Granted After Device Attestation/Identify Verification����������������������������������������������2
Figure 2: Traditional IAM Security vs. SDP��������������������������������������������������������������������������������������������6
Figure 3: SDP Ecosystem and Communication Flows���������������������������������������������������������������������������8
Figure 4: SDP as NAC Replacement��������������������������������������������������������������������������������������������������� 19
Figure 5: SDP as VPN Replacement����������������������������������������������������������������������������������������������������20
Figure 6: SDP and IAM������������������������������������������������������������������������������������������������������������������������ 21
Figure 7: SDP Core Tenets Tree����������������������������������������������������������������������������������������������������������24
Figure 8: SDP Secure Workflow����������������������������������������������������������������������������������������������������������29
Figure 9: Onboarding Process Flow���������������������������������������������������������������������������������������������������� 31
Figure 10: SDP Deployment Models��������������������������������������������������������������������������������������������������� 32
Figure 11: Client-to-Gateway Model��������������������������������������������������������������������������������������������������� 33
Figure 12: Client-to-Server Model�������������������������������������������������������������������������������������������������������34
Figure 13: Server-to-Server Model������������������������������������������������������������������������������������������������������ 35
Figure 14: Client-to-Server-to-Client Model����������������������������������������������������������������������������������������36
Figure 15: Client-to-Gateway-to-Client Model������������������������������������������������������������������������������������ 37
Figure 16: Gateway-to-Gateway Model����������������������������������������������������������������������������������������������38
This course is intended to give a high-level overview of why SDP was created, what it is, what it
does, how it can be used, and how it relates to ZT and ZTA. Although it is not within the scope of this
course to delve into SDP implementation how-tos, CSA will be releasing additional training courses
that will elaborate on ZTA and further explore the details of SDP.1
Course Structure
This introductory course on SDP consists of four units, each geared towards helping learners gain
competency in a specific area/topic:
• Explain what SDP is, how it came about, and what its technology and business benefits are
• Discuss the problems that SDP solves
• Describe some of SDP’s underlying technologies
• Distinguish between the basic types of SDP deployments
1
Cloud Security Alliance, “Zero Trust Architecture Training,” https://cloudsecurityalliance.org/
education/zero-trust-architecture-training
CSA defines SDP2 as a network security architecture implemented to provide security for all layers
of the open systems interconnection (OSI) model. An SDP implementation hides assets and uses a
single packet to establish trust via a separate control and data plane; only then are assets exposed to
the requestor.
Although SDP has different roots than the ZT security model, the evolution of both concepts over
time has led to community consensus in categorizing SDP as an implementation option of a ZTA.
In order to isolate services from unsecured networks, SDP aims to give infrastructure and application
owners the ability to deploy perimeter functionality when and where it’s needed. SDP overlays
existing physical infrastructure with logical components that should be operated under the control
of the application owner. SDP only grants access to the application infrastructure after device
attestation and identity verification.
2
https://cloudsecurityalliance.org/artifacts/software-defined-perimeter-and-zero-trust/
SDP brings together multiple controls that are usually separated by function and therefore hard
to integrate: applications, firewalls, and clients, to name a few. These pieces of information need
unification in order to establish and ensure secure connections. SDP helps to integrate controls for
firewalls, encryption, identity and access management (IAM), session management, and device
management into a comprehensive security architecture.
The SDP architecture is based on the principles of least privilege and segregation of duties, enforced
by implementing the following key controls and processes:
In this section, you will learn about the relationship between SDP and ZT. ZT is the umbrella category
under which SDP falls.
In essence, the ZT concept retires the use of trusted entities inside a defined corporate perimeter.
Instead, it mandates that enterprises create micro-perimeters around sensitive data assets to
maintain control and visibility around data use across the environment. Essentially, ZT aims to
defend enterprise assets by distrusting anything inside or outside the perimeter. Implementing ZT
requires verifying connection requests to assets before granting access, followed by continuous
monitoring and evaluation throughout the entire duration. For additional references on ZT concepts
By comparing the foundational principles of SDP and ZT, it is clear that they are driven by the same
high-level principle: “never trust, always verify”. In fact, SDP is considered one implementation type
of a ZTA; others include Zero Trust Network Access (ZTNA) and Google BeyondCorp, to name a few.
Compared to other ZTA implementations, SDP has some distinctive features and benefits, such as
the use of a drop-all rule and the adoption of SPA. While these features are not necessarily unique
to SDP, they are foundational to it; however, these features are not necessary requirements of other
ZTA implementations.
NOTE: SDP is a ZTA, but not every ZTA conforms with SDP requirements.
In this section, you will learn about the history of SDP, its origins, and why it was developed.
SDP is a cybersecurity approach that evolved from the U.S. Defense Information Systems Agency’s
Global Information Grid Black Core Network initiative in 20074. Designed to be extensible and future
proof, this approach would later serve as the basis for CSA’s SDP framework in 2013. The CSA SDP
framework focuses on how to control access to resources based on identity and device attestation.
Per SDP, connectivity is provided on a need to know model that verifies device posture and identity
before granting access to an application infrastructure. Because the application infrastructure exists
without visible domain name system (DNS) information or IP addresses, it is effectively hidden and
undetectable unless access is specifically granted.
As organizations continue to undergo digital transformation, staying ahead of the threat landscape
and attack chain curves is becoming increasingly difficult to achieve. Today, rather than managing
and securing a single network, most organizations operate a variety of environment types, such as
the following:
3
Cloud Security Alliance, “Publications,” https://cloudsecurityalliance.org/research/artifacts/
4
DOD, “Vision for a Net-Centric, Service-Oriented DoD Enterprise,” June 2007, https://www.
acqnotes.com/Attachments/DoD%20GIG%20Architectural%20Vision,%20June%2007.pdf
As organizations shift from traditional infrastructures to more virtualized and hybrid architectures,
new attack vectors also emerge that require a novel approach to network security. SDP’s designers
focused on mitigating the most common network-based attacks, including server scanning, denial
of service, SQL injection, operating system and application vulnerability exploits, man-in-the-middle,
pass-the-hash, pass-the-ticket, to name a few. Despite the evolving cyber threat landscape, SDP
continues to hold up against both existing and unknown threats.
In this section, we will explore the technological benefits of SDP. Some of these include SDP’s attack
surface reduction and pre-access authentication/authorization. We will also discuss SDP technologi-
cal benefits such as IAM security and SDP’s open specification.
Today’s network architectures consist of devices with assigned IP addresses used for connectivity.
When a device is establishing a connection to another device, a handshake is established and au-
thentication is verified. By reversing this sequence and first verifying the connection, SDP provides
key technical benefits, most notably attack surface reduction. Connectivity to an organization’s
assets is provided only after authentication, validation/authorization, and the determination of which
protected assets the user is allowed access to. These steps greatly reduce the attack surface of the
application infrastructure.
With SDP, users and devices are no longer granted general access to network segments or subnets.
Instead, policies ensure that users and devices only have access to specified hosts, resources, and/
or services. Therefore, SDP can be used to protect different types of services or protocols such as
Hypertext Transfer Protocol Secure (HTTPS) or remote desktop services (RDS). By controlling the ac-
cess level that individual users and devices have to specific services, SDP can allow authorized users
to access privileged services while hiding them from unauthorized users.
Without the SDP gateway’s drop-all capability, allowing and enforcing only trusted connections
would be prohibitively difficult. SDP’s architecture enables pre-access vetting and fine-grained access
policies through role and attribute-based permissions, as well as other similar access control mech-
anisms. Traditional architectures require separate implementations for each of these components,
leading to increased complexity and higher maintenance overhead.
SDP is a connection-oriented security architecture: while the physical infrastructure routes packets,
SDP secures all connectivity over an infrastructure. This connection-based architecture distinction is
important because of the current IP address explosion and the disintegrated perimeter in cloud envi-
ronments — without SDP, IP-based security protections are ineffective when faced with this increas-
ing complexity. SDP enables validation on the data plane prior to any Transmission Control Protocol/
Transport Layer Security (TLS/TCP) handshake and enforces mutually encrypted communications.
This practice helps to mitigate threats related to unauthorized access.
A prominent technical aspect of SDP is its centralized organizational IAM security. With IAM, a secu-
rity problem on the front-end only requires an update to the SDP — every subsequent service with-
in the perimeter will adjust to the heightened security measures. Traditional, direct access would
require the checking and updating of potentially hundreds of services to address a single flaw. This is
another example of how SDP drastically decreases maintenance overhead and complexity.
Open specifications are publicly available and therefore directly benefit from greater community
contributions. This increases the volume of data flowing in, the validity, and practicality of the specifi-
cation that is developed, based on a given set of data. With an open specification you can customize
the code or implementation to your needs, audit the code as it exists, and receive community feed-
back on faults and errors.
The SDP specification is open and has been proven on many network implementations, such as
SDNs, IoT networks, network functions virtualization, edge computing, 5G, and more. As part of
the research efforts, the CSA Software-Defined Perimeter Working Group teamed up with the com-
munity at large to research how to create a high availability infrastructure using public clouds with
the equivalent robustness of a dedicated data center. The CSA Software-Defined Perimeter Work-
ing Group has also created additional reference materials, such as SDP Architecture Guide v25 and
Software-Defined Perimeter as a DDoS Prevention Mechanism vs. SDP and DDoS6 that are publicly
available. These documents were created with input from the global cybersecurity community.
In this section, we will discuss the various business benefits that companies gain from implementing
SDP. As part of this discussion, we will examine how SDP enhances existing cybersecurity invest-
ments, reduces costs and labor, and assists in governance, risk, and compliance (GRC) efforts.
Organizations are under continuous pressure to respond to security events in a timely manner; to
this end, they’ve made substantial investments in cybersecurity. For example, expenditures in vul-
nerability management, patch management, and configuration management, have allowed organiza-
tions to lock down machines that utilize IP addresses for connectivity. Threat intelligence combined
with endpoint threat detection and response (EDR) may also be in place, enabling organizations to
better understand who the unauthorized users are and what connections they are making. Many
organizations also manage their own security operation centers to actively monitor for threats and
respond to intrusion alerts and other security events. SDP helps optimize security investments and
make them more cost effective as a result of both preventive and reactive security capabilities.
SDP provides a preventive measure against network-based and cross-domain attacks. By hiding re-
sources and applying the drop-all rules, SDP helps companies reduce their attack surface and conse-
quently reduce the amount of security events or alerts that are collected by the security information
and event management (SIEM) and sent to the security operation center. In addition, SDP reduces
lateral movement in attacks by keeping assets invisible to unauthorized users. SDP helps reduce the
5
Cloud Security Alliance, “SDP Architecture Guide v2,” 7th, May 2019, https://cloudsecurityalliance.
org/artifacts/sdp-architecture-guide-v2/
6
Cloud Security Alliance, “Software-Defined Perimeter as a DDoS Prevention Mechanism,” 27th,
October 2019, https://cloudsecurityalliance.org/artifacts/software-defined-perimeter-as-a-ddos-
prevention-mechanism/
Replacing traditional network security components with SDP reduces licensing and support costs.
Implementing and enforcing security policies using SDP reduces operational complexity and reliance
on traditional security tools. SDP also reduces costs of corporate backbone components by reduc-
ing or replacing multiprotocol label switching (MPLS) or leased line utilization. As information and
communication technology environments change, reliance on corporate backbone is reduced, and
more dynamic networks are implemented. SDP allows organizations to achieve dynamic network im-
plementations securely. Ultimately, SDP brings efficiency and simplicity to organizations, which can
ultimately help reduce scarce and often expensive labor needs.
As mentioned earlier, two of the main technology benefits of SDP are the reduction of the attack
surface and an increased granular control over resource access. These two features, alongside mi-
cro-segmentation, are key to helping organizations better face compliance challenges, as they allow
the reduction of the scope of compliance. By better controlling where regulated data are processed
and stored, and by limiting, both physically and logically, who can have access to that data, organiza-
tions can reduce the scope of the compliance requirements. In addition, granular logging and moni-
toring of who-does-what-when-why support the creation of a much-needed accountability approach,
which is foundational to any compliance effort.
7
Figure adapted from NIST, “SP 800-207 Zero Trust Architecture,” August 2020, https://csrc.nist.gov/
publications/detail/sp/800-207/final
In this section you will learn about critical issues that SDP addresses, including the changing perime-
ter, the IP address challenge, and the integration of security controls.
Virtualized networks have superseded the older, fixed network perimeter paradigm that relies on
trusted internal network segments protected by network appliances (e.g., load balancers and fire-
walls). Network protocols of the past are not secure by design and are known to have vulnerabilities.
In addition, the plethora of mobile and IoT devices further challenge the validity of a fixed network
perimeter.
The introduction of the cloud has drastically changed the composition of organizations’ IT environ-
ments. With the emergence of bring your own device (BYOD), machine-to-machine connectivity,
the rise in remote access, and phishing attacks, legacy security approaches are no longer effective
in protecting the shifting physical perimeter. For one, there are more internal devices and varieties of
users. For example, contractors working on-site may require temporary access to IT resources, both
on-premises and in the cloud. IT environments are also increasingly diversified with the continued
enterprise adoption of hybrid architectures. Corporate devices are moving to the cloud, co-located
facilities, and in some cases to off-site customer and partner facilities. These migrations further shift
the physical perimeter of the organization; SDP addresses the inherent challenges of securing this
shifting physical perimeter with a software overlay that creates virtual perimeters dynamically, when
and where they are needed.
Everything on the internet today relies on TCP/IP for trust. This is problematic, because IP addresses
have no concept of users’ identities. TCP/IP simply addresses connectivity — it doesn’t validate the
endpoint or the user as being trustworthy.
TCP/IP is a bidirectional protocol, so internal trusted hosts communicating with external untrusted
hosts can receive unsafe messages. Any changes to IP addresses may require extensive reconfigura-
tion resulting in potential security group and network access control (NAC) list errors. Unmanaged/
forgotten internal hosts can provide an entry point for malicious actors by providing default respons-
es using legacy protocols such as ICMP. This illustrates that common use of network address transla-
tion (NAT) tables combined with TCP/IP is inherently open to compromise.
The integration of multiple security controls like firewalls and identity managers is typically imple-
mented to achieve compliance. However, integrating these controls to work as a whole in protecting
the application infrastructure can be challenging. Currently, the integration of controls may be per-
formed by gathering data in an SIEM for analysis; however, correlating disparate streams of security
to gain deeper insights (e.g., who is connected, from what device, from where, to what, and more) is
resource intensive.
These disparate requirements make it difficult to implement an integrated set of controls for a
physical network. Furthermore, integrating identity management prior to allowing access through
a firewall requires the routing of packets to a different service — one that is resource-intensive and
may or may not be proxied. In addition, most DevOps teams consider application layer firewalls and
anti-denial of service/distributed denial of service (DoS/DDoS) protection as an afterthought; more-
over, allowing individual applications to control their own security posture may result in catastrophe.
Integrating access control, identity management, session management, and firewall management in
today’s environments is highly difficult; SDP addressed this challenge by providing a unified location
for implementing and managing controls for the entire environment, versus using traditional distrib-
uted controls.
Lack of cloud security Financial loss, reputational SDP has a ZT policy that
architecture & strategy damage, legal repercussions, outlines a framework with
and fines systems designed around
the value of the data and its
specific protection needs.
Insecure interfaces & APIs Regulatory and financial impact SDP provides controls defining
in the form of fines/penalties, communication endpoints (as
security issues related to long as the interface and API
confidentiality, integrity, communications sit behind
availability and accountability the SDP controller).
Weak control plane Data loss, either due to theft SDP’s control plane is
or corruption, resulting in protected by both network
a substantial impact on the level controls (e.g., SPA), and
business — particularly if the strong authentication.
incident includes privileged
user data, and regulatory
punishment for data loss may
be incurred
8
Cloud Security Alliance, “Top Threats to Cloud Computing: Egregious Eleven Deep Dive,” 23rd,
September 2020, https://cloudsecurityalliance.org/artifacts/top-threats-egregious-11-deep-dive/
System intrusion Eavesdropping, data loss, data SDP requires the use of SPA
exposure, and unauthorized to/from the server. Coupled
access with MFA, these controls help
to enforce authentication prior
to authorized access.
9
Verizon, “2021 Data Breach Investigations Report,” 2021, https://enterprise.verizon.com/resources/
reports/2021-data-breach-investigations-report.pdf
Lack of secure update Unauthorized access SDP and SPA provide device
mechanism authentication and valid
endpoints via mTLS, allowing
for secure over-the-air
authentication and device
update mechanisms.
Use of insecure or outdated Eavesdropping, data loss/ SDP leverages ZT call flows in
components exposure, and unauthorized the TCP/IP network, thereby
access protecting legacy, insecure or
outdated components.
10
OWASP, “OWASP IoT Top 10,” 2018, https://owasp.org/www-pdf-archive/OWASP-IoT-Top-10-2018-
final.pdf
Software & data integrity Insertion of malicious code Leveraging the SPA, SDP
failures into critical path continuous uses endpoint authentication
integration/continuous to assist with verifying the
delivery (CI/CD) pipelines integrity of CI/CD pipelines
(e.g., open source software, and software updates.
containing malicious code)
In addition, the following sections address some of the various threats that SDP helps protect
against. These include server exploitation and hijacking, among others.
• DoS/DDoS attacks
• Code injection attacks
• Other attacks that exploit server misconfigurations/vulnerabilities
• Phishing
• Keyloggers
• Brute force attacks
For further information, please refer to CSA’s SDP Architecture Guide12 and existing research on SDP
and ZT13.
11
Footnote 12: OWASP, “OWASP Top 10,” 2021, https://owasp.org/Top10/
12
Cloud Security Alliance, “SDP Architecture Guide v2,” 7th, May 2019, https://cloudsecurityalliance.
org/artifacts/sdp-architecture-guide-v2/
13
Cloud Security Alliance, “Software-Defined Perimeter (SDP) and Zero Trust,” 27th, May 2020,
https://cloudsecurityalliance.org/artifacts/software-defined-perimeter-and-zero-trust/
In this section, you will learn about various industry adopted solutions and how SDP replaces or
works in conjunction with them. This includes NAC, virtual private networks (VPNs), IAM, and next
generation firewalls (NGFW).
NAC typically controls what devices can connect to a given network and which network locations or
segments they have access to. These solutions use a combination of standards-based hardware (e.g,
802.1X for port-based NAC) and software to validate devices, prior to granting them network access.
NAC typically operates at layer 2 (i.e., the data link layer) of the OSI model.
When a device first appears on the network, the NAC performs device validation followed by
assignment to the correct network segment (e.g., virtual local area network). In practice, NACs
coarsely assign devices to a small number of networks, as most organizations only have a few
networks set up (e.g., guest, employee, and production). Because NACs operate at layer 2 of the OSI
model, they more often require specific network equipment, don’t operate in cloud environments,
and are not used by remote users.
In some respects, SDP can be considered a modern replacement for NAC. Though they share similar
functionalities, SDP, unlike NAC, does not require specific network hardware to function. This allows
for the integration of users and provisioning of device access without a dedicated network appliance.
SDP fully supports cloud environments and remote access, overcoming traditional NAC limitations.
However, some environments are more suitable for NAC implementations — for example, those with
printers, copiers, landline phones, or security cameras. These devices are often 802.1X compliant
with built-in support, which means they don’t typically support the installation of an SDP client. In
this case, the gateway-to-gateway model is a better option for protecting and managing access to
these devices.
VPNs establish secure private network connections over untrusted networks. Commonly used for
secure remote access (e.g. employee access to a corporate site, secure site-to-site communications,
or site-to-site extranets between companies), VPNs use TLS/Secure Sockets Layer (SSL) or Internet
Protocol Security (IPSec) to establish an encrypted tunnel.
Although VPNs encapsulate and encrypt network traffic, they also allow unrestricted access to a
network segment. This is risky, especially if credentials are compromised. In contrast, SDP will only
allow access to specifically assigned applications in the network segments.
On the user experience side, VPNs tend to impose a considerable burden on users, especially in
environments undergoing significant cloud-based transformations and migrations. IT may also need
to configure VPN for users requiring secure access to multiple sites, as this prevents unintentional
network bridging and systems from connecting to multiple locations simultaneously. Ultimately, this
shifts the burden and inconvenience of switching back and forth between remote locations on the
user.
1. In distributed environments, VPNs may require the unnecessary backhauling of user traffic
through a corporate data center, adding latency and bandwidth costs.
2. VPN servers themselves expose the network on the internet. VPN servers contain security
vulnerabilities as do most IT components, which an attacker could exploit to gain access and
exfiltrate data or perform other malicious activities.
3. VPN licensing costs are not expensive, but anecdotally they can be difficult to implement
and maintain. Whenever cloud migration is involved, VPN management balloons in
complexity. This is because IT administrators need to configure and sync VPN and firewall
policies across multiple locations,making it even more difficult to mitigate unauthorized
access.
The SDP architecture is designed to integrate with existing enterprise IAM providers in the cloud,
on-premises, or hybrid environments. IAM provides a unified mechanism for users and devices to
be validated, authenticated, and authorized. It provides a way to store managed identity attributes
and group memberships within a central system using protocols to enable access directly or via
federation. SDP supports standard protocols and security mechanisms used by IAM, including
Lightweight Directory Access Protocol (LDAP), Active Directory (AD), and Security Assertion Markup
Language (SAML).
SDP typically controls access based on business rules. These rules can be built up from IAM
attributes and group memberships, as well as from the attributes of devices making the connection
and/or the network segments themselves. The telemetry data provided by these sources enables the
creation of granular access rules for allowing/restricting access. This ensures only users requesting
specific access on registered devices are granted authorization to the resources in question.
Integration of SDP with IAM is not only used for initial user authentication; it’s also commonly used in
conjunction with step-up authentication (e.g., prompting for a one-time password to access sensitive
resources). IAM systems can also communicate with an SDP via API calls, as SDP can respond to
identity lifecycle processes in this configuration. Some examples include joiners, mover, and leavers
(JML), disabling an account, group membership changes, and dropping user/device connections from
certain geographic locations.
In identity lifecycle management, IAM tools focus on the business processes for maintaining the
identity lifecycle (i.e., the JML process). IAM standardizes how identity information is used to control
access to resources, using access methods such as role-based and attribute-based access control.
SDP supports these IAM processes and relies heavily on IAM-managed identity attributes and group
memberships. As user attributes or group memberships change, SDP will alter access permissions
accordingly without changing IAM telemetry, as SDP is a downstream system. These processes are
utilized by SDP via standard protocols like SAML, AD, LDAP, or through the use of APIs.
SDP integrates with open authentication protocols such as SAML. Within an SDP deployment, a
SAML entity might act as an identity provider for user attributes and/or as an MFA authentication
provider.
In addition to SAML, SDP integrates with many other open authentication protocols such as OAuth,
OpenID Connect, W3C Web Authentication, and the FIDO Alliance Client-to-Authenticator Protocol.
These protocols will be explored in future SDP-related research, but are not in scope for this training.
NGFWs have all the capabilities of traditional firewalls, along with additional capabilities such as
intrusion detection/prevention and deep packet inspection. NGFWs filter data using the information
in layers 2 through 4 of the OSI model (i.e., the data-link, network, and transport layers). Additionally,
NGFWs use the information in layers 5 through 7 (i.e., the session, presentation, and application
layer) to perform additional functions.
Depending on the vendor, NGFWs may provide some or all of the following capabilities:
• Latency – as is the case with IDPS, NGFWs will cause additional network latency, especially if
they’re performing file inspection
• Scalability issues – a NGFW requires more robust hardware to scale
• Rule complexity – some NGFW vendors include identity management capabilities such as
user/group attribute assignments, but anecdotally these tend to be complex to implement
SDP is a natural complement to existing NGFWs. Enterprises can use SDP for secure user access
policies while leveraging their NGFWs for core firewall, IDPS, and traffic inspection capabilities. By
integrating SDP with a NGFW, enterprises can at once enforce the zero visibility principle and make
them more dynamic.
User access policies can be achieved by integrating NGFWs with IAM or AD. By combining NGFW
VPN capabilities with user and application awareness, enterprises can, to some degree, accomplish
many of the goals of SDP. However, there are some general architectural differences.
NGFW systems are IP-based and offer limited identity and application-centric capabilities, whereas
SDP is connection-based and therefore easier to control authorized connections. Additionally,
NGFWs tend to be much less dynamic than SDPs, while the latter often supports the ability to
include external systems in access decisions. For example, a prime use case for SDP is to only permit
developer access to staging servers during an approved change management window.
Since NGFWs are still firewalls, their network deployment/design patterns still favor traditional
perimeter-centric network architectures with site-to-site connections between locations. On the
other hand, SDP deployments usually support more distributed and flexible networks, thereby
enabling a flexible network segmentation capability.
SDP is fundamentally based on a need to know security principle, which by design hides all
unauthorized services from users and leverages SPA and dynamic firewalls to hide connections
protected by the SDP. NGFWs are not designed to function this way and typically result in
environments that are more visible and therefore higher risk than with SDP. It should be noted
that NGFWs have not yet been able to integrate authentication and authorization controls prior to
allowing connections.
SDP has three core tenets that govern its implementations: assume nothing, trust no one or thing,
and validate everything. These tenets are used as the building blocks of the SDP framework. SDP was
designed to secure dynamic workloads, most prominent in cloud mobile environments, by providing
the following:
14
Figure adapted from Cloud Security Allaince, “Software-Defined Perimeter (SDP) Specification v2,”
10th, March, 2022, https://cloudsecurityalliance.org/artifacts/software-defined-perimeter-zero-trust-
specification-v2/
In this section, we will introduce and discuss the underlying technologies that support the SDP
architecture, including drop-all firewalls, separate control and data planes, mTLS, and SPA. SDP
provides a security architecture designed from the ground up using these foundational technologies.
The drop-all firewall is the most critical underlying technology of the SDP. Using drop-all rules,
these firewalls operate according to the principle of least privilege: all actions not explicitly allowed
remain forbidden. This strategy supports the ability to add rules to the firewall dynamically for post-
authentication access level changes.
An SDP deployment can identify and deny risky transactions based on the analysis of a single packet.
When malicious actors attempt to connect, SDP uses a drop-all rule to drop all unauthorized packets
at the perimeter. This approach is highly effective as it only focuses on allowing approved actions,
rather than blocking unapproved actions.
The three basic components of an SDP architecture are the data plane, control plane, and
management plane. The data plane — also known as the user plane, forwarding plane, carrier plane,
or bearer plane — is the part of a network that carries user traffic. In SDP, the control plane and
management plane enable the data plane, which bears the traffic that the network carries. The
control plane is responsible for establishing connections and dropping unauthorized packets at the
perimeter. The control plane takes care of authenticating and authorizing users and devices prior to
sending data to the SDP gateway. No devices are allowed to reach the data plane until the user and
device in question are validated at the control plane.
In traditional architectures, data and control planes are commonly implemented together. In contrast,
SDP architectures place the control plane outside the organization’s perimeter; subsequently users
and devices do not enter the organization’s environment until they are authenticated and authorized.
By separating the data plane from the control plane, SDP enables the external control plane to
perform authentication and authorization before granting access to resources.
SDP uses mTLS authentication to ensure that client-server traffic is secure and trusted in both
directions. This allows requests that do not log in with an identity provider (e.g., requests from
IoT devices) to demonstrate that they are permitted access to a given resource. Client certificate
authentication adds an additional security layer for team members who both log in with an identity
provider and use a valid client certificate for authentication.
SPA is a protocol that allows a user to make a request to a server. This request cannot be replayed
and uniquely identifies the user. SDP uses SPA to compensate for the fundamentally open and
insecure nature of TCP/IP. In addition, SDP uses SPA to authorize a valid device and authenticate a
user identity. SPA then permits access into the perimeter and the relevant system component. The
purpose of SPA is to allow assets within the perimeter to be restricted via a default drop-all firewall.
While implementations of SPA may differ slightly, they should share the following common concepts
for an SDP implementation:
The key advantage of using SPA is service restriction. A default drop-all firewall posture prevents
port scanning and other attacker-related reconnaissance techniques. It effectively renders the
SPA components invisible to unauthorized users, significantly reducing the attack surface of
the SDP system. This compares favorably to systems such as VPNs, with open ports and known
vulnerabilities in many implementations.
There are subsequent benefits to restricting services. One is zero-day protection. Any newly
discovered vulnerability becomes significantly less critical when only authenticated users can access
the affected service. Another benefit is DDoS protection. A relatively small amount of traffic can take
an HTTPS service offline if that service is exposed to the public internet for attack. A SPA makes that
service visible only to authenticated users. Therefore, a DDoS attack is handled by a default drop-all
firewall instead of the protected service itself.
One of the core goals of SDP is to overcome the fundamentally open, or insecure nature of TCP/
IP, which follows a connect, then authenticate model. Amid today’s threat landscape, it’s simply
SPA is only a part of SDP and is not a complete security architecture on its own. While SPA
implementations should be designed to be resilient to replay attacks, SPA may be subject to a
MITM attack; specifically, if MITM adversaries are able to capture or alter the SPA packet, they can
potentially establish the TCP connection to the controller or accepting host (AH) in place of the
authorized initiating host (IH). However, these adversaries will be unable to complete the mTLS
connection, since it will not have the client’s certificate. The controller or AH should therefore reject
this connection attempt and close the TCP connection. Even considering this limitation, which only
applies to the MITM scenario, SPA is more secure than standard TCP.
In this section, we will discuss the foundational SDP architecture components: IH, AH, gateways, SDP
clients, and the controller. SDP provides an integrated security architecture that is otherwise hard to
achieve with security point products.
• Identity-aware applications
• Client-aware devices
• Network-aware firewalls/gateways
The SDP client consists of software installed on the IH device. The client initiates connections in
order to cryptographically sign in to the SDP. The SDP client typically generates the SPA packet
for the SDP gateway after completing the authentication and authorization process with the SDP
controller.
AH are devices that accept connections from IH and provide a set of services that are protected
by the SDP. They typically reside on a network under the control of the enterprise (and/or direct
representative) operating the SDP, and do not acknowledge communications from any other host
or respond to non-provisioned requests. To unauthorized users and devices, AH remain cloaked and
inaccessible while using SDP’s SPA.
3.3.4 Controller
The SDP controller is an appliance or process that secures access to isolated services. It does this by
ensuring that users are authenticated and authorized, devices are validated, secure communications
are established, and user and management traffic on a network remain separate. Like the AH, the
controller is also protected by SPA, making it invisible and inaccessible to unauthorized users and
devices. Both IH and AH connect to the SDP controller.
3.3.5 Gateway
The SDP gateway is an appliance or process that provides access through the invisible perimeter for
authorized users and devices. Through this gateway, authorized users and devices are able to access
protected processes and services. The gateway can also effectively allow monitoring, logging, and
reporting on these connections. The functionality of the gateway depends on where it is located.
In this section we will break down SDP’s workflow, illustrating how all of the architecture components
discussed in the previous section work together.
The following is the most basic SDP workflow for allowing an IH and AH to communicate securely:
Several architectural considerations must be taken into account when deploying SDP. For example,
organizations should evaluate how an SDP deployment fits into existing network topologies and
technologies. Other critical considerations include how SDP impacts users, monitoring, logging,
onboarding, application release, and device validation.
15
Figure adapted from Cloud Security Allaince, “Software-Defined Perimeter (SDP) Specification v2,”
10th, March, 2022, https://cloudsecurityalliance.org/artifacts/software-defined-perimeter-zero-trust-
specification-v2/
Network architects should select the SDP deployment model best suited for their particular use
case. However, some models require additional in-line network components like gateways, resulting
in network changes like adding firewalls or making routing alterations. This ensures that protected
resources are hidden and only accessible through the SDP gateway. To fully leverage the capabilities
of SDP, architects should consider proper micro-segmentation, keeping in mind that SDP ensures
secure connections irrespective of the underlying network infrastructure.
Enterprise security architectures16 can be complex, with numerous stakeholders across the
organization and business units, as well as governance, risk management, and compliance (GRC)
requirements alongside daily IT infrastructure operations and management. Architects should keep
these factors in mind when planning their enterprise’s SDP deployment.
SDP affects monitoring and logging architectures. Because it uses mTLS between the IH and AH, SDP
also hides network traffic from intermediary services, which may be in place to monitor for security,
performance, or reliability. Architects must understand what systems are in operation and how the
changes to the network traffic may affect them. However, SDP typically provides richer, identity-
centric logging of user access — ideal for augmenting and enhancing existing monitoring systems
for a more focused traffic monitoring scope and purpose. In addition, all dropped packets from SDP
gateways and controllers can be logged, monitored, and analyzed using security tools like intrusion
detection systems/intrusion detection and prevention systems (IDS/IDPS) and SIEMs. With an SDP in
place, it is easier to collect the who, what, when, how, why information for every connection versus
each individual packet.
High-velocity application release practices like DevOps17 and its supporting automation and CI/
CD framework require thoughtful integration with SDP. An SDP can be integrated with DevOps to
secure authorized users’ connections to the various deployment environments (e.g., development,
test, staging, and production), as well as used during operations to ensure legitimate users have
proper connectivity to protected servers and applications. Ideally, the SDP will be integrated into
the application stack to fully leverage its security features. Common DevOps practices such as
the use of virtualized environments and containers can further streamline SDP integration; that
said, security architects must fully understand the chosen SDP deployment model and how their
organization’s DevOps mechanisms will interact and integrate with it. When it comes to DevOps
toolset integration, security teams should carefully review and evaluate third party APIs supported by
their SDP implementation.
16
Sometimes referred to as enterprise information security architecture
17
Cloud Security Alliance, “Enterprise Architecture Reference Guide,” 18th, May 2021, https://
cloudsecurityalliance.org/artifacts/enterprise-architecture-reference-guide-v2/
Security teams typically strive to have their solutions work as transparently as possible, with minimal
user interruption. SDP is similar to any security control where proper application of least privilege
principles balances the user experience with security. Depending on the SDP deployment model,
users will need to run the SDP client software on their devices. Security architects should collaborate
with IT to model and plan for the user experience, client software distribution, and device onboarding
processes.
4.1.5 Onboarding
The onboarding process of SDP controllers, IH, AH, and users will vary depending on the chosen
deployment models. SDP systems can be managed via an API or administrative user interface.
A typical SDP onboarding process flow would involve the following steps:
1. One or more SDP controllers are brought online and connected to the appropriate optional
authentication and authorization services.
2. One or more AHs are enlisted as SDP gateways. These gateways connect to and
authenticate with the controllers.
3. One or more clients on the IHs are onboarded, with each user/entity authenticated by the
SDP controller.
Note: Because the onboarding process is distinct from the user authentication process, users are
only onboarded once but will require authentication/authorization for each subsequent connection.
18
Figure adapted from Cloud Security Allaince, “Software-Defined Perimeter (SDP) Specification v2,”
10th, March, 2022, https://cloudsecurityalliance.org/artifacts/software-defined-perimeter-zero-trust-
specification-v2/
© Copyright 2022, Cloud Security Alliance. All rights reserved. 31
4.1.6 Device Validation
mTLS proves that the device requesting access to the SDP possesses a valid, non-expired/non-
revoked private key. However, this method can be compromised, as an attacker with a stolen key
cannot be distinguished from a legitimate user/key. Device validation can help to further establish a
trusted connection based on certificate-based keys. Per SDP, the controller acts as the trusted device
because it resides in the most heavily controlled environment. The initiating and AHs must then
validate themselves with the controller, thereby preventing unauthorized access via stolen keys.
In this section we’ll introduce the various SDP deployment models and explore their similarities and
differences.
As an architecture, SDP provides the protocol to secure connections at all layers of the network
stack. By deploying gateways and controllers at key locations, SDP implementers can focus on
securing and protecting the most critical connections from both network-based and cross-domain
attacks. All the SDP models support identity-driven network access control/authorization, and most
can accommodate existing network security tools like IDS/IDPS and SIEMs by enabling the analysis of
dropped packets and unsecured connections. SDP secures the connections between components, as
depicted in each of the deployment models described below.
More information on these deployment models can be found in the SDP Architecture Guide v219.
19
Cloud Security Alliance, “SDP Architecture Guide v2,” 7th, May 2019, https://cloudsecurityalliance.
org/artifacts/sdp-architecture-guide-v2/
20
Figure adapted from Cloud Security Alliance, “SDP Architecture Guide v2,” 7th, May 2019, https://
cloudsecurityalliance.org/artifacts/sdp-architecture-guide-v2/
The client-to-gateway model is suitable for use cases where one or more servers need to be
protected behind a gateway. This approach is preferred when an organization is moving its
applications to the cloud or securing on-premises legacy applications. The client (i.e., the IH) and
gateway may be in the same location or distributed across the globe. In either case, the connections
between the client and the gateway are secured, regardless of the underlying network topology.
In this model, the client is connected to the gateway directly via an mTLS tunnel where the
connection terminates. To secure the connection to server environments, additional precautions
must be taken. For example, the network on which the server environments reside, will need to
be configured to permit inbound connections to protected servers from the gateway only. This
prevents unauthorized clients from bypassing the gateway. The gateway should be configured to
deny all traffic by default, and explicitly allow approved traffic. The same gateway can be used for the
controller and servers by locating the controller in the cloud or near the protected servers.
This model preserves the ability for an organization to use its existing network security components,
such as IDSs or IPSs, by deploying them between the SDP gateway and the protected servers.
21
Figure adapted from Cloud Security Alliance, “SDP Architecture Guide v2,” 7th, May 2019, https://
cloudsecurityalliance.org/artifacts/sdp-architecture-guide-v2/
The client-to-server model is ideal when moving applications to an IaaS provider, as it combines the
server and gateway in a single host to ensure connections are secured end-to-end. Organizations
are afforded a great deal of flexibility due to the portability of server-gateway combinations between
multiple IaaS providers.
Client-to-server is also appropriate for securing on-premises legacy applications that cannot be
upgraded. With this model, the protected servers will need to be outfitted with the gateways. The
network on which the servers reside do not need configuration to restrict inbound connections
to the protected servers, as the gateways or server enforcement points use SPA to prevent
unauthorized connections. Secure connections to the servers provided by the gateway may be
controlled by the infrastructure owner, as they have full control over the connections. Similar to the
client-to-gateway model, the client may be located in the same location or distributed across the
globe — in either case, it remains secured. Additionally, this model leaves the data plane completely
secure, as there are no breaks in the mTLS tunnel. Traffic can be monitored by analyzing dropped
packets from the SDP gateway/protected servers, thereby preserving the mTLS connections
between the client and the servers.
22
Figure adapted from Cloud Security Alliance, “SDP Architecture Guide v2,” 7th, May 2019, https://
cloudsecurityalliance.org/artifacts/sdp-architecture-guide-v2/
The server-to-server model is ideal for IoT and virtual machine environments, as it offers full control
over connections, regardless of where the server is located, whether in the cloud or on-premises.
This model ensures that all connections between servers are encrypted, regardless of the underlying
network or IP infrastructure. In addition, it ensures that all communications are explicitly permitted
by an SDP allowlist policy. This model enables secure communications between servers across
untrusted networks while hiding the servers from all unauthorized connections using the lightweight
SPA protocol.
The server-to-server model is similar to the client-to-server model, except that the IH is itself a server
and can also act as an AH. Like the client-to-server model, the server-to-server model requires that
the SDP gateway, or similar lightweight technology, be installed on each server. This renders all
server-to-server traffic hidden to other elements of the security ecosystem. The traffic can also be
monitored by analyzing all the dropped packets from the SDP gateway/protected servers. The secure
connections to the servers going through the gateway are under the control of the owner of the
application/services on the server by default, giving the owner full control of these connections.
23
Figure adapted from Cloud Security Alliance, “SDP Architecture Guide v2,” 7th, May 2019, https://
cloudsecurityalliance.org/artifacts/sdp-architecture-guide-v2/
24
Figure adapted from Cloud Security Alliance, “SDP Architecture Guide v2,” 7th, May 2019, https://
cloudsecurityalliance.org/artifacts/sdp-architecture-guide-v2/
This variation of the client-to-server-to-client model has the advantage of supporting peer-to-peer
network protocols that require clients to connect directly to one another, while still enforcing SDP
access policies. This results in a logical connection between the clients, each acting as either IH, AH,
or both depending on the application protocol. It’s worth noting that while the application protocol
determines how the clients connect to each other, the SDP gateway continues to perform its
standard role as a firewall.
25
Figure adapted from Cloud Security Alliance, “SDP Architecture Guide v2,” 7th, May 2019, https://
cloudsecurityalliance.org/artifacts/sdp-architecture-guide-v2/
The gateway-to-gateway model is well-suited for certain IoT environments. In this scenario, one or
more servers sits behind the AH and acts as a gateway between the clients and the servers. At the
same time, one or more clients sits behind an IH that acts as a gateway.
In this SDP model, the IH gateway is running SDP client software, but the client devices are not —
they may be incapable of supporting SDP client installation, such as in the case of printers, scanners,
sensors, or IoT devices. In this model, the gateway would operate as a firewall or router/proxy,
depending on the implementation.
26
Figure adapted from Cloud Security Alliance, “SDP Architecture Guide v2,” 7th, May 2019, https://
cloudsecurityalliance.org/artifacts/sdp-architecture-guide-v2/
Lastly, learners were provided with a set of crucial architectural considerations to account for when
implementing SDP, followed by the various SDP deployment options and related guidance for
selecting the appropriate model.