Software Defined Perimeter Glossary
Software Defined Perimeter Glossary
Perimeter Glossary
The permanent and official location for Software Defined Perimeter Working Group is
https://cloudsecurityalliance.org/software-defined-perimeter/
You may download, store, display on your computer, view, print, and link to International
Standardization Council Policies & Procedures Security at https://cloudsecurityalliance.org/
download/international-standardization-council-policies-procedures, subject to the following:
(a) the Report may be used solely for your personal, informational, non-commercial use;
(b) the Report may not be modified or altered in any way;
(c) the Report may not be redistributed; and
(d) the trademark, copyright or other notices may not be removed. You may quote portions of
the Report as permitted by the Fair Use provisions of the United States Copyright Act, provided
that you attribute the portions to International Standardization Council Policies & Procedures.
Software Defined Perimeter Working Group Glossary © Copyright 2018, Cloud Security Alliance. All rights reserved 2
Acknowledgements
Lead Authors
Juanita Koilpillai
Contributors
Jason Garbis
Junaid Islam
Shamun Mahmud
Siva Pochiraju
Alex Shiro
Michael Roza
CSA Analysts
Ryan Bergsma
John Yeoh
The Software Defined Perimeter (SDP) Working Group is a Cloud Security Alliance
research working group with the goal of developing a solution to stop network attacks against
application infrastructure. Formed in 2013, the working group designed elements in a control
channel based architecture using standard proven security components. They published
a research artifact to determine if there was interest in the concept and called it SDP. The
working group research was and will continue to be freely available for use without license fees
or restrictions by the CSA.
Software Defined Perimeter Working Group Glossary © Copyright 2018, Cloud Security Alliance. All rights reserved 3
Preface
The Software Defined Perimeter (SDP) Glossary is a reference document that brings together
SDP related terms and definitions from various professional resources. The terms and
supporting information in the SDP glossary cover a broad range of areas, including the
components of SDP and common supporting technologies.
Bringing together all the information in this document is meant to minimize misinterpretation
about SDP and provide a good understanding in the least amount of time. A balance has
also been struck between length of the definitions and understandability with reliance on
the reference source as the final arbiter. The result is a common language to communicate,
understand, debate, conclude, and present the results of the SDP framework.
Software Defined Perimeter Working Group Glossary © Copyright 2018, Cloud Security Alliance. All rights reserved 4
802.1x IEEE 802.1X is an IEEE Standard for port-based Network Access Control
(PNAC). It is part of the IEEE 802.1 group of networking protocols. It provides
an authentication mechanism to devices wishing to attach to a LAN or WLAN.
802.1X has proven to be the strongest method for authentication, affording
ease of use in setting access permissions and enhanced security that is not
based on pre-shared keys (PSKs), which has the potential to be lost or stolen.
VPN access control typically uses 802.1X authentication. SDP architectures
define a number of connection types including client-to-gateway, client-to-
server, server-to-server, and private cloud-to-public cloud. Each of these
connections depends upon strong authentication from layer 2 or 3 up to
layer 7; 802.1x being one of these authentication mechanisms.
Accepting Host A trusted node within an SDP. The Accepting Host (AH) accepts the
(AH) communication from the Initiating Host (IH) after the SDP Controller
authenticates and authorizes the connection. The SDP Controller instructs
the Accepting SDP Hosts to accept communication from the Initiating Host
by leveraging policies required for two-way encrypted communications such
as mutual TLS.
Accepting Host The AH-Controller Path is the channel used for communication between
Controller Path each Accepting Host (AH) and the Controller.
Accepting Host The AH Session is the period of time that a particular Accepting Host (AH) is
Session connected to a Controller.
Accepting Host A 256-bit randomized arbitrary number used once (NONCE), managed by the
Session ID SDP Controller and used to refer to a particular Accepting Host (AH) Session.
Software Defined Perimeter Working Group Glossary © Copyright 2018, Cloud Security Alliance. All rights reserved 5
Access Policy For every connection established, SDP must fundamentally determine
(SDP Policy) which users (and/or devices) are permitted to access which resources
(e.g. services, gateways), and under which circumstances (e.g. from certain
locations). SDPs provide policy decision points and policy enforcement points
for connections. A cloud service provider (CSP), who elects to protect its
resources behind a SDP, must develop a balanced “registered user access
control policy”, as an undue restricted policy is likely to result in the denial
of access/service. Expected access control policy’s performance attributes
should become a part of the Service Level Agreement (SLA).
Agent ID (AID) The Agent ID (AID) is a 32-bit unique unsigned value that identifies a
given Initiating Host (IH) and/or Accepting Host (AH) during Single Packet
Authorization.
Authenticators These are factors ( methods of identification) that are presented by users to
a system or application to verify that they are who they claim they are. The
three classic authenticators are 1. Something you know such as a password,
2. Something you have such as an ID badge or cryptographic key and 3.
Something you are such as a fingerprint or other biometric data. The more
factors required by the system reduces the risk of intrusion. Requiring more
than one factor is referred to as Multi Factor Authentication (MFA). SDP
access policies should support authenticators for user authentication.
Software Defined Perimeter Working Group Glossary © Copyright 2018, Cloud Security Alliance. All rights reserved 6
Air-gapped Air-gapped networks are trusted networks that are isolated from all other
Networks untrusted networks. These networks are used to mitigate network-based
attacks, unauthorized access, and misuse. SDP is designed to provide an
on-demand, dynamically provisioned, network that is the “equivalent of” an
air-gapped network.
Cloud Access A cloud access security broker (CASB) is an on-premises or cloud based
Security Broker software that sits between cloud service users and cloud applications
(CASB) to monitor all activity and enforce security policies. SDPs typically rely
on an organization’s existing Identity and Access Management system
(and/or external CASB) or an external federated identity service for user
authentication and user attributes (such as role or group membership).
Controller (SDP An appliance or process that controls secure access to isolated services
Controller) by ensuring that users are authenticated and authorized, devices are
validated, communications are established, and user and management
traffic are separated. Initiating Hosts (often user devices) and Accepting
Hosts (services and in some instances the SDP Gateway) connect to the
SDP Controller.
Software Defined Perimeter Working Group Glossary © Copyright 2018, Cloud Security Alliance. All rights reserved 7
Control Plane SDP architectures separate the control of connections called the ‘control
plane’ from the actual connections used to transfer data. The control plane
consists of those connections that enable the vetting of users, devices, and
ensure access to authorized services only providing extra security for those
connections used to transfer data.
Data Plane SDP architectures separate the control of connections from the actual
connections used to transfer data called the ‘data plane’. The data plane
consists of two-way encrypted connections typically using mutual TLS or
another mutual authentication mechanism.
Device Device onboarding for SDP entails the process of including new devices such
Onboarding as mobile phones, servers, and other IoT elements into an SDP.
Process
Dynamic Dynamic Tunnel Mode (DTM) is the proposed SDP protocol and
Tunnel Mode encapsulation for the IH to communicate with one or more AHs.
(DTM)
Firewall A firewall is a network security system that monitors, and controls incoming
and outgoing network traffic based on predetermined security rules. A
firewall typically establishes a barrier between a trusted internal network
and untrusted external network, such as the Internet. SDP architectures can
enforce a ‘deny-all’ firewall policy ensuring that the trusted network enabled
by SDP ensures the SDP will not respond to any connections from any clients
until they have provided an authentic SPA.
Software Defined Perimeter Working Group Glossary © Copyright 2018, Cloud Security Alliance. All rights reserved 8
Gateway (SDP An SDP Gateway is an appliance or process that, once a user or device is
Gateway) authorized, allows access to protected processes or services. This gateway
can also be used to effectively allow monitoring, logging, and reporting on
connections protecting processes or services.
Identity Management of identities (e.g. user accounts, roles) that enable access to
and Access secured infrastructure, platform, and services. Identity systems serve as a
Management source of authentication information as well as attributes for the managed
identities. Identities may be associated with users (humans), or devices. SDPs
typically rely on an organization’s existing Identity and Access Management
system (and/or external CASB) for user authentication and user attributes
(such as role or group membership).
Initiating Host An initiating host is a trusted node in an SDP. The Initiating Host (IH) is the
host that initiates communication to the Controller and to the AHs. It initiates
a two-way encrypted connection to authorized Accepting Hosts.
Initiating Host The Initiating Host (IH) Session is the period of time that a particular IH is
(IH) Session connected to a Controller.
Initiating Host A 256-bit randomized arbitrary number used once (NONCE) managed by the
(IH) Session ID SDP Controller and used to refer to a particular IH Session.
Software Defined Perimeter Working Group Glossary © Copyright 2018, Cloud Security Alliance. All rights reserved 9
Internet IPsec is designed to provide interoperable, high quality, cryptographically-
Protocol based security for IPv4 and IPv6. The set of security services offered
Security (IPSec) includes access control, connectionless integrity, data origin authentication,
protection against replays (a form of partial sequence integrity), confidentiality
(encryption), and limited traffic flow confidentiality. These services are provided
at the IP layer, offering protection for IP and/or upper layer protocols. SDPs
provide two-way secure connections over IPSec for the upper network layers.
Keyed-Hash HMAC is a computed “signature” often sent along with some data. The
Message HMAC is used to verify (authenticate) that the data has not been altered
Authentication or replaced. It is an integral element of the initial packet that initiates
Code (HMAC) connections into the SDP.
Mux ID The 64-bit Mux ID (MID) is used to multiplex connections across a single IH-AH
Tunnel in Dynamic Tunnel Mode. The most significant 32 bits form a unique
value assigned by the Controller for each remote Service. It is referred to as
the Service ID of the MID. The least significant 32 bits form a value maintained
by the IH and the AH to differentiate among different TCP connections for a
specific remote Service. This is referred to as the Session ID of the MID.
Software Defined Perimeter Working Group Glossary © Copyright 2018, Cloud Security Alliance. All rights reserved 10
Network Network access control (NAC), also called network admission control, is a
Access Control method of bolstering the security of a private or “on-premise” network by
(NAC) restricting the availability of network resources to endpoint devices that
comply with a defined security policy. NACs address layer 3 access control
and connectivity. SDPs bolster the security of a private or “on-premise”
network by securing layer 2 through 7 connectivity.
Privileged A set of additional controls for privileged access accounts e.g. developers
Account and administrators. SDP is often used to control access by users or services
Management with privileged accounts, increasing the security and visibility of access by
these accounts by instantly providing information about the users making
connections and from what device.
Public Key A public key infrastructure is a set of roles, policies, and procedures needed to
Infrastructure create, manage, distribute, use, store, and revoke digital certificates and manage
(PKI) private and public keys used for encryption, decryption, hashing and signing. SDPs
may use PKI for generation of TLS certificates and for secure connections. If no PKI
infrastructure exists, SDPs can provide TLS certificates for use to secure connections.
Role Based RBAC is a policy neutral access control mechanism defined around roles and
Access Control privileges. The components of RBAC, such as role-permissions, user-role, and
(RBAC) role-role relationships make it simple to perform user assignments. SDPs can
make use of role information (typically housed in an Identity Management
System) to control connections to resources such as servers, devices,
processes, and data as part of an SDP policy.
Software Defined Perimeter Working Group Glossary © Copyright 2018, Cloud Security Alliance. All rights reserved 11
Security Group A security group is a named container for security group rules in cloud
infrastructures. Examples are Cloud Security Group in Amazon Web Services
or Network Security Group in Azure.. Security group rules provide Public
Cloud users the ability to specify the types of traffic that are allowed to pass
through, to, and from ports (Public/ServiceNet) on a cloud server. Cloud
Security Groups can be effectively used with a SDP, by being set to ensure
that inbound network access to cloud-based resources is only permitted
from an SDP Gateway. By doing so, the SDP policy will act as the access
control enforcement point, rather than the cloud security group. The cloud
security group can also be used to require that outbound traffic be directed
through the SDP Gateway, if supported by the SDP implementation.
Secure Shell The SSH protocol (also referred to as Secure Shell) is a method for
(SSH) secure remote login from one computer to another. It provides several
alternative options for strong authentication, and it protects the
communications security and integrity with strong encryption. It is a
secure alternative to the non-protected login protocols (such as telnet,
rlogin) and insecure file transfer methods (such as FTP). SDPs require
using mutual TLS v1.2 and higher to enable secure connections and
better management of keys that are typically not managed effectively with
SSH remote logins and file transfers.
Secure Sockets SSL (Secure Sockets Layer), and TLS (Transport Layer Security), are protocols
Layer (SSL) that provide data encryption and authentication between applications
and servers in scenarios where that data is being sent across an insecure
network, such as checking your email. The terms SSL and TLS are often used
interchangeably or in conjunction with each other (TLS/SSL), but SSL is in fact
the predecessor of the TLS — and SSL 3.0 served as the basis for TLS 1.0
which, as a result, is sometimes referred to as SSL 3.1. SSL v3.0 is effectively
“dead” as a useful security protocol. Places that still allow its use for web
hosting as placing their “secure web sites” at risk. SDPs require using mutual
TLS v1.2 and higher to enable secure connections.
Software Defined Perimeter Working Group Glossary © Copyright 2018, Cloud Security Alliance. All rights reserved 12
SAML Assertion An assertion is a package of information that supplies one or more
statements made by a SAML authority. SAML defines three different
kinds of assertion statements that can be created by a SAML authority:
Authentication, Attribute, and Authorization decisions. SDPs can use a SAML
assertion to authenticate and authorize users into the perimeter.
Service ID The Service ID, a unique value assigned by the Controller for each remote
Service, is the most significant 32 bits of the Mux ID.
Session ID The Session ID, a value maintained by the IH and the AH to differentiate
among different TCP connections for a specific remote Service, is the least
significant 32 bits of the Mux ID.
Software A secure perimeter that is created based on policies to isolate services from
Defined unsecured networks. It’s designed to provide an on-demand, dynamically
Perimeter provisioned air-gapped network, by first authenticating users and devices
(SDP) prior to authorizing the user/device combination to securely connect to the
isolated services. Unauthorized users and devices are unable to connect to
the protected resources. SDPs make extensive use of encryption, including
mutual TLS for inter-component communications, and an HMAC within the
Single-Packet Authorization packet.
Software Defined Perimeter Working Group Glossary © Copyright 2018, Cloud Security Alliance. All rights reserved 13
Software SD-WAN is an acronym for software-defined networking in a wide area
Defined WAN network (WAN). An SD-WAN simplifies the management and operation of a
(SD WAN) WAN by decoupling (separating) the networking hardware from its control
mechanism. This concept is similar to how software-defined networking
implements virtualization technology to improve data center management
and operation. While SD-WANs manage the infrastructure for IP networking,
SDPs secure connections that use the infrastructure provided by SD-WANs.
Software Token A software token (a.k.a. soft token) is a type of two-factor authentication
security mechanism that may be used to authorize the use of computer
services. Software tokens are stored on a general-purpose electronic device
such as a desktop computer, laptop, PDA, or mobile phone and can be
duplicated. (Contrast hardware tokens, where the credentials are stored on
a dedicated hardware device and therefore cannot be duplicated (absent
physical invasion of the device).) SDP systems can rely on Software Tokens as
a form of MFA, just as they can rely on a hardware token for MFA.
Single Packet A single packet protocol for service protection behind a default-
Authorization drop packet filter that offers 1) asymmetric ciphers for encryption, 2)
(SPA) authentication with a keyed-hash message authentication code (HMAC)
in the encrypt-then-authenticate model, 3) non-replayable packets that
cannot be broken by trivial sequence busting attacks. Within SDP, SPA plays
a key role by hiding servers (including the SDP Controller and Gateway)
until and unless the initiating host sends a valid SPA packet as the initial
connection request.
Single Packet A Single Packet Authorization based on RFC 4226 (a document describing an
Authorization algorithm to generate one-time password values, based on Hashed Message
OTP Authentication Code (HMAC), but modified to include a counter value which
ensures a different password each time. It is used to uniquely identify the IH
when initiating communication to both the SDP Controller and the AH.
Transmission A transport layer protocol in the Internet protocol suite provides reliable,
Control ordered, and error-checked delivery of a stream of octets between applications
Protocol (TCP) running on hosts communicating over an IP network. SDP communications
between Client, Controller, and Gateway use the TCP protocol.
Software Defined Perimeter Working Group Glossary © Copyright 2018, Cloud Security Alliance. All rights reserved 14
Transmission The design of protocols in the TCP/IP model does not concern itself with
Control strict hierarchical encapsulation and layering. TCP/IP recognizes four broad
Protocol/ layers of functionality which are derived from the operating scope of their
Internet contained protocols: 1. the scope of the software application; 2. the end-to-
Protocol (TCP/IP) end transport connection; 3. the internetworking range; and 4. the scope of
the direct links to other nodes on the local network. Despite TCP/IP using a
different concept for layering than the OSI model, the TCP/IP layers are often
compared with the 7 layer OSI scheme in the following way:
1. The Internet application layer includes the OSI 7) application layer, 6)
presentation layer, and most of the 5) session layer.
2. Its end-to-end transport layer includes the graceful close function of
the OSI 5) session layer as well as the OSI 4) transport layer.
3. The internetworking layer (Internet layer) is a subset of the OSI 3)
network layer.
4. The link layer includes the OSI 2) data link layer and sometimes the 1)
physical layers, as well as some protocols of the OSI’s 3) network layer.
A port is always associated with an IP address of a host and the protocol type of
the communication. It completes the destination or origination network address
of a message. Ports are identified for each protocol and address combination by
16-bit unsigned numbers, commonly known as the port number.
SDP communications between Client, Controller, and Gateway use the TCP /
IP ports.
Software Defined Perimeter Working Group Glossary © Copyright 2018, Cloud Security Alliance. All rights reserved 15
User Datagram The User Datagram Protocol offers only a minimal transport service -- non-
Protocol (UDP) guaranteed datagram delivery -- and gives applications direct access to the
datagram service of the IP layer. UDP is used by applications that do not
require the level of service of TCP or that wish to use communications services
(e.g., multicast or broadcast delivery) not available from TCP. SPA packets used
to initiate connections could use UDP to ensure the SDP will not respond to
any connections from any clients until they have provided an authentic SPA.
User Threat This is a category of security appliances that combine a number of security
Management features into a single appliance. Generally a UTM appliance includes firewall,
(UTM) gateway anti-virus, and intrusion detection and prevention capabilities.. UTM is
designed protect users from blended threats while reducing complexity. The
disadvantage of these appliances are that they can represent a single point
of failure. To counter this vulnerability UTM’s can be combined with SDP’s to
catch anything that gets through or around the UTM.
Universal The UAF protocol allows online services to offer password-less and multi-
Authentication factor security. The user registers their device to the online service by
Framework selecting a local authentication mechanism such as swiping a finger, looking
(UAF) at the camera, speaking into the mic, entering a PIN, etc. The UAF protocol
allows the service to select which mechanisms are presented to the user.
Once registered, the user simply repeats the local authentication action
whenever they need to authenticate to the service. The user no longer needs
to enter their password when authenticating from that device. UAF also
allows experiences that combine multiple authentication mechanisms such
as fingerprint + PIN.
SDPs can leverage U2F or UAF for user or device authentication without
additional CA requirements, separate from the CA utilized for mutual TLS
Universal 2nd The U2F protocol allows online services to augment the security of their
Factor (U2F) existing password infrastructure by adding a strong second factor to user
login. The user logs in with a username and password as before. The
service can also prompt the user to present a second factor device at any
time it chooses. The strong second factor allows the service to simplify
its passwords (e.g. 4-digit PIN) without compromising security. During
registration and authentication, the user presents the second factor by
simply pressing a button on a USB device or tapping over NFC. The user
can use their U2F device across all online services that support the protocol
leveraging built-in support in web browsers.
SDPs also leverage U2F or UAF for user or device authentication without
additional CA requirements, separate from the CA utilized for mutual TLS.
Software Defined Perimeter Working Group Glossary © Copyright 2018, Cloud Security Alliance. All rights reserved 16
Virtual Private A technology that securely creates a private network within another network
Network (VPN) (often an untrusted, public network such as the Internet) by incorporating
encrypted connections through that network. A VPN provides confidentiality
and integrity for private communications. SDPs provide the benefits of a VPN
(message confidentiality and integrity) while overcoming the limitations of
traditional VPN products like fine-grained access control.
Web The W3C’s Web Authentication specification defines a standard web API that
Authentication can be built into browsers and related web platform infrastructure to enable
(WebAuth) online services to use FIDO Authentication; UAF and U2F and CTAP being
some of the authentication frameworks defined by the FIDO alliance.
Software Defined Perimeter Working Group Glossary © Copyright 2018, Cloud Security Alliance. All rights reserved 17
References
https://en.wikipedia.org/wiki/IEEE_802.1X
https://downloads.cloudsecurityalliance.org/initiatives/sdp/SDP_Specification_1.0.pdf
https://en.wikipedia.org/wiki/Cloud_access_security_broker
https://www.techrepublic.com/blog/tech-decision-maker/avoid-unexpected-problems-by-automating-device-
onboarding/
http://www.cipherdyne.org/fwknop/
https://en.wikipedia.org/wiki/Firewall_(computing)
http://www.networksorcery.com/enp/topic/ipsecsuite.htm
https://en.wikipedia.org/wiki/Multi-factor_authentication
https://en.wikipedia.org/wiki/Multiprotocol_Label_Switching
http://www.linfo.org/network_segment.html
http://searchnetworking.techtarget.com/definition/network-access-control
https://en.wikipedia.org/wiki/Next-Generation_Firewall
https://www.networkworld.com/article/2216499/wireless/what-is-802-1x-.html
https://en.wikipedia.org/wiki/Software_Defined_Perimeter
https://en.wikipedia.org/wiki/SD-WAN
https://www.ssh.com/ssh/protocol/
https://en.wikipedia.org/wiki/Security_Assertion_Markup_Language
http://saml.xml.org/assertions
http://www.waverleylabs.com/software-defined-network-sdn-or-software-defined-perimeter-sdp-whats-the-
difference/
http://searchsecurity.techtarget.com/definition/security-token
https://en.wikipedia.org/wiki/Software_token
https://en.wikipedia.org/wiki/Port_(computer_networking)
http://www.esg-global.com/blog/software-defined-perimeter-sdp-essentials
https://ijcsits.org/papers/vol2no42012/21vol2no4.pdf
https://luxsci.com/blog/ssl-versus-tls-whats-the-difference.html
https://www.w3.org/Protocols/
https://en.wikipedia.org/wiki/Transmission_Control_Protocol
http://www.networksorcery.com/enp/protocol/udp.htm
https://www.nist.gov/itl/tig/projects/special-publication-800-63
https://en.wikipedia.org/wiki/OSI_model#Comparison_with_TCP/IP_model
https://fidoalliance.org/assets/downloads/FIDO-U2F-UAF-Tutorial-v1.pdf
https://fidoalliance.org/specs/fido-uaf-v1.2-rd-20171128/fido-uaf-overview-v1.2-rd-20171128.pdf
https://www.kaspersky.com/resource-center/definitions/utm
Software Defined Perimeter Working Group Glossary © Copyright 2018, Cloud Security Alliance. All rights reserved 18