Wednesday, January 16, 2019

Word of the Day: software-defined perimeter (SDP)

Word of the Day WhatIs.com
Daily updates on the latest technology terms | January 16, 2019
software-defined perimeter (SDP)

Software-defined perimeter (SDP) is a security framework developed by the Cloud Security Alliance (CSA) that controls access to resources based on identity. The framework is based on the U.S. Department of Defense's "need to know" model -- all endpoints attempting to access a given infrastructure must be authenticated and authorized prior to entrance. The SDP approach is sometimes said to create a "black cloud" because it obscures systems within the perimeter so that outsiders can't observe them.

The SDP uses an approach to cybersecurity that mitigates network-based attacks, protecting all classification levels of legacy IT assets and cloud services. The software-defined network works by hiding critical IT assets within an opaque black cloud that can't be accessed by outsiders, whether the assets are in the cloud, on premises, in a DMZ (demilitarized zone, sometimes known as a perimeter network), on a server in a data center or even in an application server.

An SDP functions as a broker between internal applications and users and only provides access to services if the correct criteria are met. This enables companies to determine which users have access to which applications. Segmenting applications via SDP enables organizations to secure sensitive information more easily.

The SDP creates an invisible screen to protect against malware, cyberattacks and other threats. This framework was designed to let enterprises provide secure access to network-based services, applications and systems.

SDPs are used to lower the chances of successful network-based attacks, including denial-of-service (DoS) attacks, man-in-the-middle attacks, server vulnerabilities and lateral movement attacks, such as SQL injection or cross-site scripting (XSS). Continue reading...

Quote of the Day

 
"The goal of software-defined perimeter is to remove internet-connected devices and applications from public visibility and reduce the surface area for attack." - Lee Doyle

Learning Center

 

What is a software-defined perimeter, and do I need it?
A software-defined perimeter improves enterprise security by making users and devices invisible to outside attacks. Discover the basics of SDP and learn how it can alleviate common security challenges.

Next-gen automotive cybersecurity with software-defined perimeter and blockchain
Combining a software-defined perimeter with blockchain is an ideal way to secure autonomous vehicles. Movimento Group's Mahbubul Alam explains.

How has software-defined networking security evolved?
Microsegmentation is a vital component of software-defined networking security, and network analytics are tagging along for the ride as well. But SDN can be applied to other security missions like security DMZs and network monitoring.

Software-defined networking security involves 3 factors
When it comes to software-defined networking security, IT teams can cover their backs by addressing three main points: confidentiality, integrity and availability. They should also take the time to consider compliance requirements.

How to improve IoT security and resilience with SD-WAN and SDP
For IoT to move from consumer curiosity to industry workhorse, organizations need confidence in the availability and performance of IoT architectures. Cato Networks' Gur Shatz explains how SD-WAN and SDP can help achieve this.

Quiz Yourself

 
The Cloud Security Alliance (CSA) has worked with European officials to support implementation of the _____ privacy and related data use laws and regulations.
A. Unions'
B. Union's

Answer

Stay in Touch

 
For feedback about any of our definitions or to suggest a new definition, please contact me at: mrouse@techtarget.com

Visit the Word of the Day Archives and catch up on what you've missed!

FOLLOW US

TwitterRSS
About This E-Newsletter
This e-newsletter is published by the TechTarget network. To unsubscribe from Whatis.com, click here. Please note, this will not affect any other subscriptions you have signed up for.
TechTarget

TechTarget, Whatis, 275 Grove Street, Newton, MA 02466. Contact: webmaster@techtarget.com

Copyright 2018 TechTarget. All rights reserved.

No comments: