CSA Logo2 300x115 CSA Defines Software Defined Perimeter to Secure Cloud Against HackersCloud Security Alliance (CSA), the nonprofit organization whose mission is to promote the use of best practices for providing security assurance within cloud computing, is led by a broad coalition of industry professionals, companies, associations and other key stakeholders. Its mission is to promote the use of best practices for providing security assurance within cloud computing, and provide education on the uses of cloud computing to help secure all other forms of computing.

The next thing CSA has done is to announce a new project called Software Defined Perimeter (SDP) Initiative to develop an architecture that can be created with safe and trust entities between with certain end-to-end networks IP addresses, allowing you to create systems that are extremely resistant to network attacks.

The machine to machine (M2M) communication and Internet of Things (IoT) is growing by connecting all kinds of smart devices and increasing the risk for each of these endpoints. The IoT begins to reveal its true potential as intelligent devices connected to the internet are expected to reach 15 billion units by 2015, tripled from 2 billion in 2010. In addition, bring your own device (BYOD) and cloud computing infrastructure are now accepted by employees as primary devices of choice.

According to the CSA, the SDP leverages known security concepts such as federation, Secure Assertion Markup Language (SAML), Transport Layer Security (TLS). The framework recommends security controls to reduce as far as possible based on attacks against applications and network endpoint accessible from internet. The key is annular connectivity between devices and between users until they are authenticated and authorized. So that the SDP initiative could reduce security risks and reinforce company policies in a combination of technologies corporate, public or user information.

CSA says it is critical to the future of cloud technology that it is demonstrably more secure than legacy IT systems. SDP is an important component to allow both cloud providers and customers to secure applications all the way from the back end to the consumer device.

CSA is making this royalty-free research publicly available in order to catalyze the development of more secure clouds and BYOD deployments. Some of the largest brands and companies have agreed to participate in this initiative, and will be disclosed in the course of this initiative.

The non-profit organization recently published a guide for mobile computing and current threats to protect them. CSA has updated its Cloud Control Matrix (CCM) with recommendations of best practices for securing the cloud. The CCM Version 3.0 document, “Security Guidance for Critical Areas of Focus in Cloud Computing version 3.0” addresses information security risks over the access of, transfer to, and securing of cloud data in the mobile security; supply chain management, transparency and accountability; interoperability and portability; encryption and key management domain.

CSA plans to present an implementation case study at the RSA Conference in February next year, which are now open for participation, collaboration and peer review. The case study will comprises Software Defined Perimeter Whitepaper, Software Defined Perimeter “Deep Dive”, Software Defined Perimeter “Enterprise Implementation”, Software Defined Perimeter “Hacker Contest”, and Software Defined Perimeter “Developer’s Workshop”.

  • reader

    its software defined perimeter (not parameter)

Hottest IT Skills in 2013 – Cloud, Mobile and BI
In 2012, more than 1.7 million jobs in the field of cloud computing remained unoccupied, according to analysts firm IDC. READ MORE
How Cloud Computing Influences Digital Marketing
Cloud marketing has the ability to drastically change the ways in which they reach and engage their audience, particularly with regard to distributing and storing mission-critical data. READ MORE
Gartner: BYOD to Take Center Stage For Mobile App Use by 2017
More and more companies encourage their employees to work on their devices, thus reducing the cost of computer equipment, but also increase the cost to maintain licenses and safety. READ MORE
Maturity in the Cloud: Start Thinking Like a Grown-Up
Despite the inclination to wait until all of the cloud’s kinks have been worked out, holding off on cloud initiatives until the industry matures won’t guarantee success. READ MORE
PwC: Cloud, SaaS and Mobile Are Changing Software Industry
The software industry is undergoing major changes by trends such as cloud, SaaS, mobile technology and the “consumerization of IT”. READ MORE
10 Cloud Computing Game Changers
Here are the ten most influential cloud computing companies, and the reason why. READ MORE