HOME

TheInfoList



OR:

A software-defined perimeter (SDP), sometimes referred to as a black cloud, is a method of enhancing computer security. The SDP framework was developed by the
Cloud Security Alliance Cloud Security Alliance (CSA) is a not-for-profit organization with the mission to “promote the use of best practices for providing security assurance within Cloud Computing, cloud computing, and to provide education on the uses of cloud computi ...
to control access to resources based on identity. In an SDP, connectivity follows a need-to-know model, where both device posture and identity are verified before access to application infrastructure is granted. The application infrastructure in a software-defined perimeter is effectively "black"—a term used by the
Department of Defense The United States Department of Defense (DoD, USDOD, or DOD) is an executive department of the U.S. federal government charged with coordinating and supervising the six U.S. armed services: the Army, Navy, Marines, Air Force, Space Force, ...
to describe an undetectable infrastructure—lacking visible
DNS The Domain Name System (DNS) is a hierarchical and distributed name service that provides a naming system for computers, services, and other resources on the Internet or other Internet Protocol (IP) networks. It associates various informatio ...
information or
IP addresses An Internet Protocol address (IP address) is a numerical label such as that is assigned to a device connected to a computer network that uses the Internet Protocol for communication. IP addresses serve two main functions: network interface id ...
. Proponents of these systems claim that an SDP mitigates many common network-based attacks, including server scanning, denial-of-service,
SQL injection In computing, SQL injection is a code injection technique used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution (e.g. to dump the database contents to the attacker). SQL injec ...
, operating system and application vulnerability exploits, man-in-the-middle attacks, pass-the-hash, pass-the-ticket, and other attacks by unauthorized users.


Background


Software-defined perimeter

An SDP is a security methodology that controls access to resources based on user identity and device posture. It follows a zero-trust model, verifying both factors before granting access to applications. This approach aims to make internal infrastructure invisible to the internet, reducing the attack surface for threats like denial-of-service (DoS) and server scanning (Ref. .


Traditional vs. software-defined perimeter

Traditional network security relies on a fixed perimeter, typically protected by firewalls. While this isolates internal services, it becomes vulnerable with the rise of: * User-managed devices: These devices bypass traditional perimeter controls. * Phishing attacks: These attacks can give unauthorized users access within the perimeter. * Cloud adoption: Applications can be hosted anywhere, making perimeter control more complex. SDPs address these issues by: * Making applications invisible: Public internet cannot directly see internal resources. * Enforcing access control: Only authorized users and devices can connect to applications.


SDP architecture and workflow

An SDP consists of two main components: * SDP Controllers: Manage access policies and communication between devices. * SDP Hosts: These can be initiating (requesting access) or accepting (providing access) applications. The workflow involves: # Deploying SDP controllers and connecting them to authentication services (e.g., Active Directory, multi-factor authentication). # Bringing online accepting SDP hosts, which authenticate with the controllers. # Initiating SDP hosts authenticating with the controllers. # Controllers determining authorized communication and creating secure connections between hosts.


SDP deployment models

There are several ways to deploy SDPs, each suited for specific scenarios: * Client-to-Gateway: Protects servers behind a gateway, mitigating lateral movement attacks within a network or on the internet. * Client-to-Server: Similar to client-to-gateway, but the protected server runs the SDP software directly. * Server-to-Server: Secures communication between servers offering APIs. * Client-to-Server-to-Client: Enables secure peer-to-peer connections for applications like video conferencing.


SDP applications

SDPs offer security benefits in various situations: * Enterprise application isolation: Protects sensitive applications from unauthorized access within the network. * Cloud security: Secures public, private, and hybrid cloud deployments. * Internet of Things (IoT): Protects back-end applications managing IoT devices.


Conclusion

Software-defined perimeters offer a dynamic approach to network security, aligning with zero-trust principles. They can enhance security for on-premise, cloud, and hybrid environments.


References

{{reflist Cybersecurity engineering