Loading AI tools
Approach to computer security from the US Defense Information Systems Agency From Wikipedia, the free encyclopedia
A software-defined perimeter (SDP), sometimes referred to as a 'black cloud' is a method of enhancing computer security. The software-defined perimeter (SDP) framework was developed by the Cloud Security Alliance (CSA) to control access to resources based on identity. Connectivity in a Software Defined Perimeter is based on a need-to-know model, in which device posture and identity are verified before access to application infrastructure is granted.[1] The application infrastructure is effectively 'black' (a term used by the Department of Defense to describe an undetectable infrastructure), lacking visible DNS information or IP addresses. The inventors of these systems claim that a Software Defined Perimeter mitigates the most common network-based attacks, including: server scanning, denial of service, SQL injection, operating system and application vulnerability exploits, man-in-the-middle, pass-the-hash, pass-the-ticket, and other attacks by unauthorized users.[2]
This article contains wording that promotes the subject in a subjective manner without imparting real information. (May 2015) |
The premise of the traditional enterprise network architecture is to create an internal network separated from the outside world by a fixed perimeter that consists of a series of firewall functions that block external users from coming in while allowing internal users to get out.[3] Traditional fixed perimeters help to protect internal services from external threats. This is achieved via simple techniques for blocking visibility and accessibility from outside the perimeter to internal applications and infrastructure. But the weaknesses of this traditional fixed perimeter model are becoming ever more problematic because of the popularity of user-managed devices and phishing attacks, providing untrusted access inside the perimeter, and SaaS and IaaS extending the perimeter into the internet.[4] Software-defined perimeters address these issues by giving application owners the ability to deploy perimeters that retain the traditional model's value of invisibility and inaccessibility to outsiders but can be deployed anywhere: on the internet, in the cloud, at a hosting center, on the private corporate network, or across some or all of these locations.[1]
There are several techniques for delivering a software-defined perimeter (SDP). This includes:[5]
In its simplest form, the architecture of the SDP consists of two components: SDP Hosts and SDP Controllers.[6] SDP Hosts can either initiate connections or accept connections. These actions are managed by interactions with the SDP Controllers via a control channel (see Figure 1). Thus, in a Software Defined Perimeter, the control plane is separated from the data plane to enable greater scalability. In addition, all of the components can be redundant for higher availability.
The SDP framework has the following workflow (see Figure 2).
While the general workflow remains the same for all implementations, the application of SDPs can favor certain implementations over others.
In the client-to-gateway implementation, one or more servers are protected behind an Accepting SDP Host such that the Accepting SDP Host acts as a gateway between the clients and the protected servers. This implementation can be used inside an enterprise network to mitigate common lateral movement attacks such as server scanning, OS and application vulnerability exploits, password cracking, man-in-the-middle, Pass-the-Hash (PtH), and others.[7][8][9] Alternatively, it can be implemented on the Internet to isolate protected servers from unauthorized users and mitigate attacks such as denial of service, OS and application vulnerability exploits, password cracking, man-in-the-middle, and others.[10][11]
The client-to-server implementation is similar in features and benefits to the client-to-gateway implementation discussed above. However, in this case, the server being protected will be running the Accepting SDP Host software instead of a gateway sitting in front of the server running that software. The choice between the client-to-gateway implementation and the client-to-server implementation is typically based on the number of servers being protected, load balancing methodology, elasticity of servers, and other similar topological factors.[12]
In the server-to-server implementation, servers offering a Representational State Transfer (REST) service, a Simple Object Access Protocol (SOAP) service, a remote procedure call (RPC), or any kind of application programming interface (API) over the Internet can be protected from unauthorized hosts on the network. For example, in this case, the server initiating the REST call would be the Initiating SDP Host, and the server offering the REST service would be the Accepting SDP Host. Implementing an SDP for this use case can reduce the load on these services and mitigate attacks similar to the ones mitigated by the client-to-gateway implementation.
The client-to-server-to-client implementation results in a peer-to-peer relationship between the two clients and can be used for applications such as IP telephone, chat, and video conferencing. In these cases, the SDP obfuscates the IP addresses of the connecting clients. As a minor variation, a user can also have a client-to-gateway-to-client configuration if the user wishes to hide the application server as well.
For data breaches involving intellectual property, financial information, HR data, and other sets of data exclusively available within the enterprise network, attackers may gain entry to the internal network by compromising one of the computers in the network and then move laterally to access high-value information assets. In this scenario, an enterprise can deploy an SDP inside its data center to partition the network and isolate high-value applications. Unauthorized users will not have network access to the protected application, thus mitigating the lateral movement upon which these attacks depend.[13]
The software-defined perimeter (SDP) model, traditionally used to secure physical infrastructures, is also adaptable to private cloud environments, leveraging their flexibility and scalability. SDPs can be used by enterprises to secure public cloud instances either in isolation or as part of a unified system that spans private and public clouds, as well as cross-cloud clusters.
For software-as-a-service (SaaS) providers, SDPs can enhance security by designating the service as an Accepting Host and all users as Initiating Hosts. This allows SaaS vendors to utilize the global reach of the Internet while reducing exposure to potential threats.
Infrastructure-as-a-service (IaaS) providers can offer SDP-as-a-Service, providing customers with a secure on-ramp to their cloud infrastructure. This mitigates various attack vectors while allowing customers to benefit from IaaS agility and cost savings.
Platform-as-a-service (PaaS) providers can include SDP architecture as part of their offering, providing an embedded security solution that mitigates network-based attacks.
A vast number of new devices are being connected to the Internet.[12] Back-end applications that manage these devices and/or extract information from them can be mission-critical and act as custodians for private or sensitive data. SDPs can be used to conceal these servers and their interactions over the Internet to enhance security and uptime.[14]
Seamless Wikipedia browsing. On steroids.
Every time you click a link to Wikipedia, Wiktionary or Wikiquote in your browser's search results, it will show the modern Wikiwand interface.
Wikiwand extension is a five stars, simple, with minimum permission required to keep your browsing private, safe and transparent.