• United States



Contributing Writer

Software-defined perimeter: Important initiative, ineffective name

Apr 10, 20185 mins
Access ControlIdentity Management SolutionsNetwork Security

A geeky and confusing name doesn’t communicate business, privacy, and security benefits. My suggestion: ubiquitous security access services (USAS).

locks on binary code
Credit: Thinkstock

For the past year or so, I’ve made the following statement, “No one has an SDP budget, but everyone has an SDP requirement.” 

Why the disconnect? Let’s start with the demand side. At large organizations, technology users are a disparate group of employees, business partners, consultants, customers, business partners, suppliers, etc. Individuals within each group access business applications and technology services from different devices and locations, while applications reside in data centers, public clouds, at SaaS service providers, etc. 

Each end of the access pipe is dynamic, yet IT and security professionals must figure a way to provide users with seamless and secure access to business applications and IT services. Old standards such as RADIUS servers, 802.1X, and VPNs simply weren’t built with these use cases in mind.

Enter software-defined perimeter (SDP).  In my view, SDP is all about creating dynamic and secure network segments between a source and destination system. Typically, the source is an endpoint system, and the destination is a business application. But that isn’t always the case (the source could be an IoT device, or both source and destination could be two cloud-based workloads for example). Additionally, the source can be any type of device in any location, and the destination can be any type of application or service in any location, accommodating for mobility, BYOD, and cloud computing. 

SDP connections rely on strong authentication of users and devices and then enforce access policies based upon identity attributes (i.e. of users, device type, device profile, locations, etc.) and other risk factors. SDP also sets up a direct and encrypted link between the two systems. In other words, there is no need to “hairpin” the connection through a VPN on a corporate network. Finally, users/devices are permitted to access certain assets on the network but remain blind to all other assets (where they don’t have permission).

Geeky terms confuse the market

SDP is timely and meets lots of enterprise requirements, so there should be universal demand for this type of technology, right? Unfortunately, the supply-side is doing its best to confuse the market by presenting this technology with geeky terminology such as:

  • Software-defined perimeter. I’m met with blank stares whenever I use the term in an end-user presentation. The word “perimeter” is most associated with security technologies like firewalls and gateway devices or network architectures like DMZs, so many people tend to associate SDP with things like virtual firewalls rather than dynamic and secure access controls.  You know you are in trouble when you must pause and define a concept. 
  • ‘Black Clouds.’ This one came out of the U.S. Defense Information Security Agency (DISA) around 2007. The point was to communicate that access controls were enforced on a need-to-know basis, so if you didn’t need to know, the cloud (i.e. network) was black or invisible to you. It’s a good concept, but the term “black cloud” is also meaningless without a whole lot more detail.
  • Zero-trust networking. I give Forrester a lot of credit for coming up with this one. The problem here is that zero-trust presents network security and access controls from a networking technology perspective (i.e. looking from the network up to the application). I find that most SDP projects are driven by business rather than technical needs, and zero-trust networking means nothing to business planners. 
  • BeyondCorp. If you want to understand SDP architecture, use cases, lessons learned, and best practices, it’s well worth your time to research what Google has done with BeyondCorp (i.e. the name of its proprietary SDP architecture). Once again, however, BeyondCorp doesn’t communicate anything to business, IT, and security decision makers without a whole lot more context. 

I firmly believe that these geeky terms are confusing the market and stalling progress. 

Refer to SDP as ubiquitous secure access services (USAS)

My suggestion is that we abandon the techno-speak and start to refer to SDP as ubiquitous secure access services (USAS). In parsing this term:

  • Ubiquitous, as access controls are designed to connect any user/device, from any location, to any business application or services regardless of whether they are on premises, reside in public clouds, or live in SaaS data centers.
  • Secure, as access controls are based upon strong authentication, end-to-end encryption, and a trust relationship between source and destination systems. Furthermore, users/devices are provided access directly to authorized applications/services while remaining black-listed from unauthorized applications/services (and the network itself).
  • Access, as USAS is designed to enable approved business access requirements and can be governed by granular access polices. In other words, the driver is business access; everything else is about how we make this happen. 
  • Services, because access controls are provided to all types of users who need secure connectivity to all types of applications. In other words, USAS becomes a network service, much like file and print became LAN-based network services in the 1990s.

Whether USAS catches on or not, my main point is that IT and security professionals remain in the dark about SDP, zero-trust networks, and BeyondCorp when they should be embracing this technology for secure business enablement. We as an industry need to educate and help the IT and security community rather than continuing to confuse them. 

Contributing Writer

Jon Oltsik is a distinguished analyst, fellow, and the founder of the ESG’s cybersecurity service. With over 35 years of technology industry experience, Jon is widely recognized as an expert in all aspects of cybersecurity and is often called upon to help customers understand a CISO's perspective and strategies. Jon focuses on areas such as cyber-risk management, security operations, and all things related to CISOs.

More from this author