Different SDP deployment models have different advantages and disadvantages depending on the organization’s use case, such as the type of resources to be protected, the location of the clients and servers, the network topology, the scalability, the performance, and the security requirements. Network architects should consider their use case before selecting an SDP model that best suits their needs and goals.
References =
Certificate of Competence in Zero Trust (CCZT) prepkit, page 21, section 3.1.2
6 SDP Deployment Models to Achieve Zero Trust | CSA, section “Deployment Models Explained”
Software-Defined Perimeter (SDP) and Zero Trust | CSA, page 7, section 3.1
Why SDP Matters in Zero Trust | SonicWall, section “SDP Deployment Models”
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit