SlideShare a Scribd company logo
SOFTWARE DEFINED PERIMETER: Software Defined Perimeter (SDP), also called a "Black Cloud", is an approach to computer security which evolved from the
work done at the Defense Information Systems Agency (DISA) under the Global Information Grid (GIG) Black Core Network initiative. Software-defined perimeter (SDP)
framework was developed by the Cloud Security Alliance (CSA) to control access to resources based on identity. Connectivity in a Software Defined Perimeter is based on a
need-to-know model, in which device posture and identity are verified before access to application infrastructure is granted. Application infrastructure is effectively "black",
without visible DNS information or IP addresses. Software Defined Perimeter mitigates the most common network-based attacks,including: server scanning, denial of service,
SQL injection, operating system and application vulnerability exploits, man-in-the-middle, pass-the-hash, pass-the-ticket, and other attacks by unauthorized users.
SOFTWARE DEFINED PEREMETER VIRTUAL PRIVATE NETWORK
Adaptive to every network Zero automation of network policies
Global Access Lack of Remote user security
Precise segmentation Does not Integrate with Identity Providers
Secured and Encrypted Weak Network traffic visibility
Policies based on users Unable to create identification rules
Seamless Audit and Report No network Activity reports
Rejects Account hijacking An easy target for hackers
Reduced Costs Implementation costs are high
Least privilege Access Easy Access to unauthorized users
OpenID-OAuth Authentication Layers
someorg.com
SDP Controller
Login with google.com IDP
someorg.com/callback
SDP Controller
Login success IDP
SDP Controller Layer
Initiating SDP Host
Accepting SDP Host
Accepting SDP Host
Accepting SDP Host
1 Controller on line
2 Mutual VPN to Controller
3 Mutual VPN to Controller
4
List of Authorized Accepting
Hosts Determined
5
Accept communication
from Initiating Hosts
6
Receive list of IP s of
Accepting Hosts
7 Mutual VPN s
WORKFLOW:
1
One or more SDP Controllers are brought online and connected to the appropriate optional authentication and authorization services (e.g., PKI, device fingerprinting,
geolocation, SAML, OpenID, OAuth, LDAP, Kerberos, multifactor authentication, and other such services). Here I am showing OpenID-OAuth authentication and
authorization service where authentication and authorization is done using jwt (json based objects). This comes under claims-based service and all the exchanges of
information is done using encryption to satisfy confidentiality and integrity I will show later how the confidentiality & Integrity can be maintained using PKI.
SOFTWARE DEFINED PERIMETER BETTER THAN VPN
VPN BETTERTHAN
2
One or more Accepting SDP Hosts are brought online. These hosts connect to and authenticate to the Controllers. However, they do not acknowledge communication
from any other Host and will not respond to any non-provisioned request.
3
Each Initiating SDP Host that is brought online connects with, and authenticates to, the SDP Controllers.
4
After authenticating the Initiating SDP Host, the SDP Controllers determine a list of Accepting Hosts to which the Initiating Host is authorized to communicate.
5
The SDP Controller instructs the Accepting SDP Hosts to accept communication from the Initiating Host as well as any optional policies required for encrypted
communications. I will show later how the confidentiality & Integrity can be maintained using PKI.
6
The SDP Controller gives the Initiating SDP Host the list of Accepting Hosts as well as any optional policies required for encrypted communications. I will show later
how the confidentiality & Integrity can be maintained using PKI.
7
The Initiating SDP Host initiates a mutual VPN connection to all authorized Accepting Hosts.
ENCRYPTION TO ACHIEVE CONFIDENTIALITY, INTEGRITY: When there are 2 parties exchanging information securely there need to be confidentiality and integrity.
In the Public-key cryptography there will be two keys private key and public key.
PARTY 1
PUBLIC KEY
PRIVATE KEY
PARTY 1 PKI
PARTY 2
PUBLIC KEY
PARTY 1
PUBLIC KEY
PRIVATE KEY
PARTY 2 PKI
PARTY 2
PUBLIC KEY
COMMUNICATING CONFIDENTIALLY
When party 1 communicates with Party 2 the information is encrypted using Party 2 Public key by party 1 and sent. Once party 2 receives the information it decrypts the information using its
private key, thus confidentiality is achieved. In the same way when party 2 communicates with Party 1 the information is encrypted using Party 1 Public key by party 2 and sent.Once party 1
receives the information it decrypts the information using its private key, thus confidentiality is achieved.
PARTY 1
PUBLIC KEY
PRIVATE KEY
PARTY 1 PKI
PARTY 2
PUBLIC KEY
PARTY 1
PUBLIC KEY
PRIVATE KEY
PARTY 2 PKI
PARTY 2
PUBLIC KEY
COMMUNICATING WITH INTEGRITY
When party 1 communicates with Party 2 the message digest is encrypted using Party 1 Private key by party 1 and sent.Once party 2 receives the information it decrypts the message digest
using party 1 public key, thus integrity is achieved. In the same way when party 2 communicates with Party 1 the message digest is encrypted using Party 2 Private key by party 2 and sent.
Once party 1 receives the information it decrypts the message digest using party 2 public key, thus integrity is achieved. Th is guarantees the information communication between 2 parties has
achieved non-repudiation.

More Related Content

PPT
Digital Signature
PPTX
Public key infrastructure
PPTX
Cryptography
PDF
Scott Rea - IoT: Taking PKI Where No PKI Has Gone Before
PPT
Digital signature
PPT
Digital Signature
PPT
PKI and Applications
PPT
Digital Signature
Digital Signature
Public key infrastructure
Cryptography
Scott Rea - IoT: Taking PKI Where No PKI Has Gone Before
Digital signature
Digital Signature
PKI and Applications
Digital Signature

What's hot (20)

PDF
Digital certificates & its importance
PPTX
Seminar ppt on digital signature
PPTX
Digital certificates in e commerce
PPTX
Introduction to Public Key Infrastructure
PPT
Digital Certificate
PDF
Digital Signature
PPTX
Digital certificates
PPTX
Digital signature(Cryptography)
PPTX
Digital signature
PPT
Implementing Public-Key-Infrastructures
PDF
Digital signatures
PPT
Digital Signature
PPTX
public key infrastructure
PPTX
Digital certificates and information security
PDF
Public key Infrastructure (PKI)
PPT
Presentation on digital signatures & digital certificates
PPTX
Digital signature
PPT
Digital signature
PPTX
Kumkum digital certificate
Digital certificates & its importance
Seminar ppt on digital signature
Digital certificates in e commerce
Introduction to Public Key Infrastructure
Digital Certificate
Digital Signature
Digital certificates
Digital signature(Cryptography)
Digital signature
Implementing Public-Key-Infrastructures
Digital signatures
Digital Signature
public key infrastructure
Digital certificates and information security
Public key Infrastructure (PKI)
Presentation on digital signatures & digital certificates
Digital signature
Digital signature
Kumkum digital certificate
Ad

Similar to SOFTWARE DEFINED PERIMETER BETTER THAN VPN (20)

PDF
Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...
PDF
Datasheet over privileged_users
PDF
SDP Glossary v2.0
PPTX
Cryptzone: The Software-Defined Perimeter
PPTX
Cryptzone: What is a Software-Defined Perimeter?
PDF
How VPNs and Firewalls Put Your Organization at Risk
PDF
Block Armour Blockchain Defined Perimeter Brochure
PDF
Blockchain Defined Perimeter (BDP) - Experience the power of Software Defined...
PDF
Ciss previsionnotes
PPTX
How to Overcome Network Access Control Limitations for Better Network Security
PDF
IoTcloud-cybersecurity-securityofthings
PDF
App gate sdp_use_case_secure_cloud_access
PPTX
Microservices security - jpmc tech fest 2018
PPTX
Final ppt ecommerce
PDF
www.ijerd.com
PPT
8.X Sec & I Pv6
PPTX
Ecommerce final ppt
PPT
Web Security
PDF
Self-Protecting Information for De-Perimiterised Electronic Relationships
PDF
Practical Enterprise Security Architecture
Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...
Datasheet over privileged_users
SDP Glossary v2.0
Cryptzone: The Software-Defined Perimeter
Cryptzone: What is a Software-Defined Perimeter?
How VPNs and Firewalls Put Your Organization at Risk
Block Armour Blockchain Defined Perimeter Brochure
Blockchain Defined Perimeter (BDP) - Experience the power of Software Defined...
Ciss previsionnotes
How to Overcome Network Access Control Limitations for Better Network Security
IoTcloud-cybersecurity-securityofthings
App gate sdp_use_case_secure_cloud_access
Microservices security - jpmc tech fest 2018
Final ppt ecommerce
www.ijerd.com
8.X Sec & I Pv6
Ecommerce final ppt
Web Security
Self-Protecting Information for De-Perimiterised Electronic Relationships
Practical Enterprise Security Architecture
Ad

Recently uploaded (20)

PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
1. Introduction to Computer Programming.pptx
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
cuic standard and advanced reporting.pdf
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Approach and Philosophy of On baking technology
PPTX
A Presentation on Artificial Intelligence
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPT
Teaching material agriculture food technology
PDF
Encapsulation theory and applications.pdf
PDF
Empathic Computing: Creating Shared Understanding
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
Big Data Technologies - Introduction.pptx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Programs and apps: productivity, graphics, security and other tools
1. Introduction to Computer Programming.pptx
SOPHOS-XG Firewall Administrator PPT.pptx
cuic standard and advanced reporting.pdf
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
20250228 LYD VKU AI Blended-Learning.pptx
MYSQL Presentation for SQL database connectivity
Approach and Philosophy of On baking technology
A Presentation on Artificial Intelligence
Reach Out and Touch Someone: Haptics and Empathic Computing
Teaching material agriculture food technology
Encapsulation theory and applications.pdf
Empathic Computing: Creating Shared Understanding
Per capita expenditure prediction using model stacking based on satellite ima...
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
“AI and Expert System Decision Support & Business Intelligence Systems”
Big Data Technologies - Introduction.pptx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...

SOFTWARE DEFINED PERIMETER BETTER THAN VPN

  • 1. SOFTWARE DEFINED PERIMETER: Software Defined Perimeter (SDP), also called a "Black Cloud", is an approach to computer security which evolved from the work done at the Defense Information Systems Agency (DISA) under the Global Information Grid (GIG) Black Core Network initiative. Software-defined perimeter (SDP) framework was developed by the Cloud Security Alliance (CSA) to control access to resources based on identity. Connectivity in a Software Defined Perimeter is based on a need-to-know model, in which device posture and identity are verified before access to application infrastructure is granted. Application infrastructure is effectively "black", without visible DNS information or IP addresses. Software Defined Perimeter mitigates the most common network-based attacks,including: server scanning, denial of service, SQL injection, operating system and application vulnerability exploits, man-in-the-middle, pass-the-hash, pass-the-ticket, and other attacks by unauthorized users. SOFTWARE DEFINED PEREMETER VIRTUAL PRIVATE NETWORK Adaptive to every network Zero automation of network policies Global Access Lack of Remote user security Precise segmentation Does not Integrate with Identity Providers Secured and Encrypted Weak Network traffic visibility Policies based on users Unable to create identification rules Seamless Audit and Report No network Activity reports Rejects Account hijacking An easy target for hackers Reduced Costs Implementation costs are high Least privilege Access Easy Access to unauthorized users OpenID-OAuth Authentication Layers someorg.com SDP Controller Login with google.com IDP someorg.com/callback SDP Controller Login success IDP SDP Controller Layer Initiating SDP Host Accepting SDP Host Accepting SDP Host Accepting SDP Host 1 Controller on line 2 Mutual VPN to Controller 3 Mutual VPN to Controller 4 List of Authorized Accepting Hosts Determined 5 Accept communication from Initiating Hosts 6 Receive list of IP s of Accepting Hosts 7 Mutual VPN s WORKFLOW: 1 One or more SDP Controllers are brought online and connected to the appropriate optional authentication and authorization services (e.g., PKI, device fingerprinting, geolocation, SAML, OpenID, OAuth, LDAP, Kerberos, multifactor authentication, and other such services). Here I am showing OpenID-OAuth authentication and authorization service where authentication and authorization is done using jwt (json based objects). This comes under claims-based service and all the exchanges of information is done using encryption to satisfy confidentiality and integrity I will show later how the confidentiality & Integrity can be maintained using PKI. SOFTWARE DEFINED PERIMETER BETTER THAN VPN VPN BETTERTHAN
  • 2. 2 One or more Accepting SDP Hosts are brought online. These hosts connect to and authenticate to the Controllers. However, they do not acknowledge communication from any other Host and will not respond to any non-provisioned request. 3 Each Initiating SDP Host that is brought online connects with, and authenticates to, the SDP Controllers. 4 After authenticating the Initiating SDP Host, the SDP Controllers determine a list of Accepting Hosts to which the Initiating Host is authorized to communicate. 5 The SDP Controller instructs the Accepting SDP Hosts to accept communication from the Initiating Host as well as any optional policies required for encrypted communications. I will show later how the confidentiality & Integrity can be maintained using PKI. 6 The SDP Controller gives the Initiating SDP Host the list of Accepting Hosts as well as any optional policies required for encrypted communications. I will show later how the confidentiality & Integrity can be maintained using PKI. 7 The Initiating SDP Host initiates a mutual VPN connection to all authorized Accepting Hosts. ENCRYPTION TO ACHIEVE CONFIDENTIALITY, INTEGRITY: When there are 2 parties exchanging information securely there need to be confidentiality and integrity. In the Public-key cryptography there will be two keys private key and public key. PARTY 1 PUBLIC KEY PRIVATE KEY PARTY 1 PKI PARTY 2 PUBLIC KEY PARTY 1 PUBLIC KEY PRIVATE KEY PARTY 2 PKI PARTY 2 PUBLIC KEY COMMUNICATING CONFIDENTIALLY When party 1 communicates with Party 2 the information is encrypted using Party 2 Public key by party 1 and sent. Once party 2 receives the information it decrypts the information using its private key, thus confidentiality is achieved. In the same way when party 2 communicates with Party 1 the information is encrypted using Party 1 Public key by party 2 and sent.Once party 1 receives the information it decrypts the information using its private key, thus confidentiality is achieved. PARTY 1 PUBLIC KEY PRIVATE KEY PARTY 1 PKI PARTY 2 PUBLIC KEY PARTY 1 PUBLIC KEY PRIVATE KEY PARTY 2 PKI PARTY 2 PUBLIC KEY COMMUNICATING WITH INTEGRITY When party 1 communicates with Party 2 the message digest is encrypted using Party 1 Private key by party 1 and sent.Once party 2 receives the information it decrypts the message digest using party 1 public key, thus integrity is achieved. In the same way when party 2 communicates with Party 1 the message digest is encrypted using Party 2 Private key by party 2 and sent. Once party 1 receives the information it decrypts the message digest using party 2 public key, thus integrity is achieved. Th is guarantees the information communication between 2 parties has achieved non-repudiation.