AWS Verified Access

Provide secure access to corporate applications and resources without a VPN

Benefits

Improve your security posture by defining granular access policies based upon user’s identity and device security status for your corporate applications including web-based applications accessed using browsers and infrastructure resources such as databases and EC2 instances.

Deliver a streamlined user experience through secure virtual access to corporate applications and resources without using a VPN.

Simplify policy management by grouping different types of applications or resources with similar security needs and defining policies at the group level. Administrators can efficiently define, monitor and update policies for corporate applications and resources from a single interface.

Get comprehensive logging and visibility into access attempts to quickly identify and resolve security and connectivity incidents.

Why AWS Verified Access?

AWS Verified Access provides secure access to corporate applications and resources without a VPN. It enhances your security posture by allowing you to define fine-grained access policies based on a user's identity and device security state, and enforcing policies on every access request. It simplifies security operations by allowing administrators to create, group, and manage access policies for applications and resources with similar security requirements from a single interface. Verified Access logs each access attempt, so you can efficiently respond to security and connectivity incidents.

Use cases

Administrators can easily provide fine-grained, least-privilege access to specific applications across distributed and a wide range of end-users, such as remote employees and external contractors or employees. Administrators can efficiently manage and revoke access from a single interface when projects are completed, reducing security risks.

Application owners can apply zero trust access controls to their corporate applications by constantly verifying each access request against granular, conditional access policies. This ensures that access is granted per application only when specific security requirements like user identity and device security posture are met and maintained.

IT administrators can use the same access policies for corporate web-based and non-web-based applications, as well as for infrastructure resources such as databases and EC2 instances accessed over protocols like SSH, TCP, and RDP.