deploying-software-defined-perimeter
Deploy a Software-Defined Perimeter using the CSA v2.0 specification with Single Packet Authorization, mutual TLS, and SDP controller/gateway configuration to enforce zero trust network access.
Best use case
deploying-software-defined-perimeter is best used when you need a repeatable AI agent workflow instead of a one-off prompt.
Deploy a Software-Defined Perimeter using the CSA v2.0 specification with Single Packet Authorization, mutual TLS, and SDP controller/gateway configuration to enforce zero trust network access.
Teams using deploying-software-defined-perimeter should expect a more consistent output, faster repeated execution, less prompt rewriting.
When to use this skill
- You want a reusable workflow that can be run more than once with consistent structure.
When not to use this skill
- You only need a quick one-off answer and do not need a reusable workflow.
- You cannot install or maintain the underlying files, dependencies, or repository context.
Installation
Claude Code / Cursor / Codex
Manual Installation
- Download SKILL.md from GitHub
- Place it in
.claude/skills/deploying-software-defined-perimeter/SKILL.mdinside your project - Restart your AI agent — it will auto-discover the skill
How deploying-software-defined-perimeter Compares
| Feature / Agent | deploying-software-defined-perimeter | Standard Approach |
|---|---|---|
| Platform Support | Not specified | Limited / Varies |
| Context Awareness | High | Baseline |
| Installation Complexity | Unknown | N/A |
Frequently Asked Questions
What does this skill do?
Deploy a Software-Defined Perimeter using the CSA v2.0 specification with Single Packet Authorization, mutual TLS, and SDP controller/gateway configuration to enforce zero trust network access.
Where can I find the source code?
You can find the source code on GitHub using the link provided at the top of the page.
SKILL.md Source
# Deploying Software-Defined Perimeter
## Prerequisites
- Understanding of zero trust principles (NIST SP 800-207)
- Knowledge of CSA Software-Defined Perimeter specification
- Familiarity with PKI and mutual TLS authentication
- Experience with network security architecture
## Overview
A Software-Defined Perimeter (SDP) implements zero trust by creating a dynamically provisioned, identity-centric perimeter around individual resources. Defined by the Cloud Security Alliance (CSA), SDP makes application infrastructure invisible to unauthorized users through a "dark cloud" approach where services are hidden until authenticated and authorized. Unlike traditional VPN, SDP establishes one-to-one encrypted connections between verified users and specific applications.
This skill covers deploying SDP using the CSA v2.0 specification, implementing Single Packet Authorization (SPA), configuring the SDP controller and gateway, and validating the deployment against NIST SP 800-207 requirements.
## When to Use
- When deploying or configuring deploying software defined perimeter capabilities in your environment
- When establishing security controls aligned to compliance requirements
- When building or improving security architecture for this domain
- When conducting security assessments that require this implementation
## Prerequisites
- Familiarity with zero trust architecture concepts and tools
- Access to a test or lab environment for safe execution
- Python 3.8+ with required dependencies installed
- Appropriate authorization for any testing activities
## Architecture
### SDP Components (CSA Specification)
```
┌─────────────────────┐
│ SDP Controller │
│ - Authentication │
│ - Authorization │
│ - Policy management │
│ - Key management │
└──────────┬──────────┘
│
┌──────┴──────┐
│ │
v v
┌────────┐ ┌────────────┐
│ IH │ │ AH │
│(Client)│ │(Gateway) │
│ │ │ │
│ SPA │──│ Protected │
│ mTLS │ │ Resources │
└────────┘ └────────────┘
IH = Initiating Host (User Device)
AH = Accepting Host (Application Gateway)
SPA = Single Packet Authorization
```
### SDP Deployment Models
1. **Client-to-Gateway**: User device connects through SDP gateway to backend applications
2. **Client-to-Server**: Direct connection between user and application server
3. **Server-to-Server**: Workload-to-workload communication through SDP
4. **Gateway-to-Gateway**: Site-to-site connectivity replacing traditional VPN tunnels
## Key Concepts
### Single Packet Authorization (SPA)
SPA is a network security mechanism where the SDP gateway drops all TCP/UDP packets by default. A cryptographically signed single packet must be sent before any connection is established. The gateway validates the SPA packet, and only then opens a temporary port for the authenticated session. This makes the gateway invisible to port scanners.
### Mutual TLS (mTLS)
After SPA validation, both the client and server authenticate each other using X.509 certificates. This bidirectional authentication prevents man-in-the-middle attacks and ensures both endpoints are verified.
### Dynamic Provisioning
SDP connections are provisioned on-demand based on real-time policy evaluation. No persistent network tunnels exist; each session is individually authorized and encrypted.
## Workflow
### Phase 1: SDP Controller Deployment
1. **Deploy SDP Controller**
- Install SDP controller on hardened, redundant infrastructure
- Configure PKI integration for certificate issuance
- Set up authentication backend (LDAP, SAML, OIDC)
- Configure policy database with application definitions
- Enable audit logging for all controller decisions
2. **Configure Authentication**
- Integrate with enterprise IdP via SAML 2.0 or OIDC
- Configure device certificate enrollment (SCEP/EST)
- Enable multi-factor authentication requirements
- Set up certificate revocation checking (OCSP/CRL)
3. **Define Access Policies**
- Map users/groups to authorized applications
- Define device posture requirements per application
- Configure contextual conditions (location, time, risk level)
- Set session duration and re-authentication intervals
### Phase 2: SDP Gateway Deployment
4. **Deploy Accepting Hosts (Gateways)**
- Install SDP gateway instances in front of protected applications
- Configure default-drop firewall rules (deny all inbound)
- Enable SPA listener on designated ports
- Configure mTLS with controller-issued certificates
- Set up health monitoring and failover
5. **Configure Application Definitions**
- Register each protected application with the controller
- Define backend server IPs, ports, and protocols
- Configure load balancing for multi-instance applications
- Set up application health checks
### Phase 3: Client Deployment
6. **Deploy Initiating Hosts (Clients)**
- Install SDP client software on user endpoints
- Enroll device certificates through automated provisioning
- Configure SPA key material distribution
- Test authentication flow: SPA → mTLS → application access
7. **Validate End-to-End Flow**
- Verify SPA packets are accepted by gateway
- Confirm mTLS handshake succeeds with valid certificates
- Test application access through the SDP tunnel
- Verify unauthorized access is blocked (no SPA = invisible gateway)
### Phase 4: Operational Validation
8. **Security Testing**
- Port scan the SDP gateway to confirm invisibility (all ports show filtered/closed)
- Attempt connection without valid SPA (must fail silently)
- Test with revoked client certificate (must be denied)
- Attempt lateral movement from one authorized app to another unauthorized app
- Validate audit trail completeness
9. **Monitoring and Maintenance**
- Configure SIEM integration for SDP controller and gateway logs
- Set up alerting for failed SPA attempts and certificate errors
- Establish certificate rotation schedule
- Document incident response procedures for SDP events
## Validation Checklist
- [ ] SDP Controller deployed with HA and audit logging
- [ ] IdP integration tested with SAML/OIDC and MFA
- [ ] SDP Gateways deployed with default-drop firewall
- [ ] SPA mechanism validated (gateway invisible to port scans)
- [ ] mTLS established between clients and gateways
- [ ] Access policies enforce least-privilege per user/app
- [ ] Device certificate enrollment automated
- [ ] Unauthorized access attempts blocked silently
- [ ] Lateral movement between apps prevented
- [ ] Logs streaming to SIEM with alerting configured
- [ ] Certificate rotation and revocation procedures tested
## References
- CSA Software-Defined Perimeter Architecture Guide v3
- CSA SDP Specification v2.0
- NIST SP 800-207: Zero Trust Architecture
- CISA Zero Trust Maturity Model v2.0
- fwknop: Single Packet Authorization implementationRelated Skills
implementing-sigstore-for-software-signing
Implements Sigstore-based software signing and verification using Cosign keyless signing, Rekor transparency log verification, and Fulcio certificate authority integration to establish cryptographic provenance for container images, binaries, and software artifacts. The practitioner configures OIDC-based identity binding, verifies signing events against the Rekor transparency log, and integrates signing workflows into CI/CD pipelines. Activates for requests involving software supply chain signing, keyless container signing, Sigstore deployment, or artifact provenance verification.
deploying-tailscale-for-zero-trust-vpn
Deploy and configure Tailscale as a WireGuard-based zero trust mesh VPN with identity-aware access controls, ACLs, and exit nodes for secure peer-to-peer connectivity.
deploying-ransomware-canary-files
Deploys and monitors ransomware canary files across critical directories using Python's watchdog library for real-time filesystem event detection. Places strategically named decoy files that mimic high-value targets (financial records, credentials, database exports) in locations ransomware typically enumerates first. Monitors for any read, modify, rename, or delete operations on canary files and triggers immediate alerts via email, Slack webhook, or syslog when interaction is detected, providing early warning before full encryption begins.
deploying-palo-alto-prisma-access-zero-trust
Deploying Palo Alto Networks Prisma Access for SASE-based zero trust network access using GlobalProtect agents, ZTNA Connectors, security policy enforcement, and integration with Strata Cloud Manager for unified security management.
deploying-osquery-for-endpoint-monitoring
Deploys and configures osquery for real-time endpoint monitoring using SQL-based queries to inspect running processes, open ports, installed software, and system configuration. Use when building visibility into endpoint state, threat hunting across fleet, or implementing compliance monitoring. Activates for requests involving osquery deployment, endpoint visibility, fleet management, or SQL-based endpoint querying.
deploying-edr-agent-with-crowdstrike
Deploys and configures CrowdStrike Falcon EDR agents across enterprise endpoints to enable real-time threat detection, behavioral analysis, and automated response. Use when onboarding endpoints to EDR coverage, configuring detection policies, or integrating Falcon telemetry with SIEM platforms. Activates for requests involving CrowdStrike deployment, Falcon sensor installation, EDR policy configuration, or endpoint detection and response.
deploying-decoy-files-for-ransomware-detection
Deploys canary files (honeytokens) across file systems to detect ransomware encryption activity in real time. Uses strategically placed decoy documents monitored via file integrity monitoring or OS-level watchdogs to trigger alerts when ransomware modifies or encrypts them. Activates for requests involving ransomware canary deployment, honeyfile setup, deception-based ransomware detection, or file integrity monitoring for encryption.
deploying-cloudflare-access-for-zero-trust
Deploying Cloudflare Access with Cloudflare Tunnel to provide zero trust access to self-hosted and private applications, configuring identity-aware access policies, device posture checks, and WARP client enrollment for VPN replacement.
deploying-active-directory-honeytokens
Deploys deception-based honeytokens in Active Directory including fake privileged accounts with AdminCount=1, fake SPNs for Kerberoasting detection (honeyroasting), decoy GPOs with cpassword traps, and fake BloodHound paths. Monitors Windows Security Event IDs 4769, 4625, 4662, 5136 for honeytoken interaction. Use when implementing AD deception defenses for detecting lateral movement, credential theft, and reconnaissance.
zx-calculus
Coecke's ZX-calculus for quantum circuit reasoning via string diagrams with Z-spiders (green) and X-spiders (red)
zulip-cogen
Zulip Cogen Skill 🐸⚡
zls-integration
zls-integration skill