AWS Verified Access provides secure access to corporate applications and resources without a VPN. It enhances your security posture by allowing you to define fine-grained access policies based on a user's identity and device security state, and enforcing policies on every access request. It simplifies security operations by allowing administrators to create, group, and manage access policies for applications and resources with similar security requirements from a single interface. Verified Access logs each access attempt, so you can efficiently respond to security and connectivity incidents.
Using Verified Access, you can configure fine-grained access policies for your corporate applications and resources such as databases and EC2 instances. Verified Access constantly validates each access request against granular, contextual access policies and dynamically adjusts access permissions. It ensures that access is granted and maintained only when users meet specified security requirements, such as user identity and device security posture.
Verified Access is seamlessly integrated with AWS IAM Identity Center, which allows end users to authenticate with SAML-based third-party identity providers (IdPs). If you already have a custom IdP solution that is OpenID Connect compatible, Verified Access can also authenticate users by directly connecting with your IdP.
Verified Access is integrated with third-party device management services to provide additional security context. Therefore, you can additionally assess access attempts using the security and compliance state of the user’s device.
Verified Access passes signed identity context, such as user alias, to your applications. This helps you personalize your applications using this context, removing the need to reauthenticate the user at your application. The signed context also protects your applications in case Verified Access is accidentally disabled, as the application can reject the request if it doesn’t receive the context.
With Verified Access, you can group applications with similar security needs and create and manage access policies from a single interface. Each application within a group shares a global policy, establishing a baseline security level. This removes the need to manage individual policies for each application. For example, you can group all “dev” applications and set a group-wide access policy.
Verified Access offers continuous monitoring and detailed logging of access attempts so you can quickly respond to security and connectivity incidents. Verified Access supports delivery of these logs to Amazon Simple Storage Service (Amazon S3), Amazon CloudWatch Logs, and Amazon Kinesis Data Firehose. Verified Access supports the Open Cybersecurity Schema Framework (OCSF) logging format, making it easier for you to analyze logs using one of the supported security information and event management (SIEM) and observability providers.
Provides secure access to HTTP(S) applications, such as browser-based applications, and TCP applications such as Git repositories, which can be accessed using a command-line terminal or desktop application.
Provide access to a group of AWS infrastructure resources such as EC2 instances within a VPC, by specifying their IP address and Port range.