Select your cookie preferences

We use essential cookies and similar tools that are necessary to provide our site and services. We use performance cookies to collect anonymous statistics, so we can understand how customers use our site and make improvements. Essential cookies cannot be deactivated, but you can choose “Customize” or “Decline” to decline performance cookies.

If you agree, AWS and approved third parties will also use cookies to provide useful site features, remember your preferences, and display relevant content, including relevant advertising. To accept or decline all non-essential cookies, choose “Accept” or “Decline.” To make more detailed choices, choose “Customize.”

Skip to main content

AWS Verified Access

Provide secure access to corporate applications and resources without a VPN

Benefits

Improve your security posture by defining granular access policies based upon user’s identity and device security status for your corporate applications including web-based applications accessed using browsers and infrastructure resources such as databases and EC2 instances.

Deliver a streamlined user experience through secure virtual access to corporate applications and resources without using a VPN.

Simplify policy management by grouping different types of applications or resources with similar security needs and defining policies at the group level. Administrators can efficiently define, monitor and update policies for corporate applications and resources from a single interface.

Get comprehensive logging and visibility into access attempts to quickly identify and resolve security and connectivity incidents.

Why AWS Verified Access?

AWS Verified Access provides secure access to corporate applications and resources without a VPN. It enhances your security posture by allowing you to define fine-grained access policies based on a user's identity and device security state, and enforcing policies on every access request. It simplifies security operations by allowing administrators to create, group, and manage access policies for applications and resources with similar security requirements from a single interface. Verified Access logs each access attempt, so you can efficiently respond to security and connectivity incidents.

Use cases

Administrators can easily provide fine-grained, least-privilege access to specific applications across distributed and a wide range of end-users, such as remote employees and external contractors or employees. Administrators can efficiently manage and revoke access from a single interface when projects are completed, reducing security risks.

Application owners can apply zero trust access controls to their corporate applications by constantly verifying each access request against granular, conditional access policies. This ensures that access is granted per application only when specific security requirements like user identity and device security posture are met and maintained.

IT administrators can use the same access policies for corporate web-based and non-web-based applications, as well as for infrastructure resources such as databases and EC2 instances accessed over protocols like SSH, TCP, and RDP.