Zero trust on AWS

Advancing your security model with a zero trust approach

What is zero trust on AWS?

Zero trust is a security model centered on the idea that access to data should not be solely made based on network location. It requires users and systems to strongly prove their identities and trustworthiness, and enforces fine-grained identity-based authorization rules before allowing them to access applications, data, and other systems. With zero trust, these identities often operate within highly flexible identity-aware networks that further reduce surface area, eliminate unneeded pathways to data, and provide straightforward outer security guardrails. 

Video Player is loading.
Current Time 0:00
Duration 3:36
Loaded: 0.00%
Stream Type LIVE
Remaining Time 3:36
 
1x
    • Chapters
    • descriptions off, selected

      Building a zero trust architecture on AWS

      Moving to a zero trust security model starts with evaluating your workload portfolio and determining where the enhanced flexibility and security of zero trust would provide the greatest benefits. Then, you’ll apply zero trust concepts - rethinking identity, authentication,  and other context indicators such as device state and health – in order to make real and meaningful security improvements over the status quo. To help you on this journey, a number of AWS identity and networking services provide core zero trust building blocks as standard features that can be applied to both new and existing workloads. 

      Benefits

      Explore use cases