AWS Verified Access allows you to provide secure network access without a VPN to corporate applications. Verified Access verifies each access request in real time and only connects users to the applications they are allowed to access, removing broad access to corporate applications, and reducing the associated risks. To verify users against specific security requirements, Verified Access integrates with AWS and third-party security services to source information about identity, device security status, and location. IT administrators can use Verified Access to author a set of policies that define a user’s ability to access each application. Verified Access also simplifies security operations by allowing administrators to efficiently set and monitor access policies, freeing time to update policies, respond to security and connectivity incidents, and audit for compliance standards.
Verified Access is seamlessly integrated with AWS IAM Identity Center, which allows end users to authenticate with Security Assertion Markup Language (SAML)–based third-party identity providers (IdPs). If you already have a custom IdP solution that is OpenID Connect compatible, Verified Access can also authenticate users by directly connecting with your IdP.
With Verified Access you can group applications with similar security needs. Each application within a group shares a global policy, achieving a minimum-security bar for the entire group, and removing the need to manage individual policies for each application. For example, you can group all “dev” applications and set a group-wide access policy.
Device posture assessment
Verified Access is integrated with third-party device management services to provide additional security context. This allows you to additionally assess access attempts using the security and compliance state of the user’s device.
Verified Access logs every access attempt so that you can quickly respond to security incidents and audit requests. Verified Access supports delivery of these logs to either Amazon Simple Storage Service (S3), Amazon CloudWatch Logs, and Amazon Kinesis Data Firehose. Verified Access supports the Open Cybersecurity Schema Framework (OCSF) logging format, making it easier for you to analyze logs using one of the supported security information and event management (SIEM) and observability providers.