AWS Verified Access uses Zero Trust principles to authenticate application requests. Credit: CIS Amazon Web Services has launched a service that secures user access to its cloud applications without requiring a VPN. AWS Verified Access, which the company previewed last November, validates every application request using Zero Trust principles before granting access to applications. Since AWS previewed the networking service, it has added two new features: AWS Web Application Firewall (WAF) and the ability to pass signed identity context to customers’ application endpoints. Specifically the service uses a web access-control list (ACL) to protect a set of AWS resources, the company wrote in a blog outlining the service. Customers create a web ACL and define its protection strategy by adding rules. Each rule contains a statement that defines the inspection criteria, and an action to take if a web request meets the criteria, AWS stated. Customers can configure rules to block requests, let them through, count them, or run bot controls against them that use CAPTCHA puzzles or other client browser challenges. Customers can define rules inside a web ACL or in reusable rule groups. AWS Managed Rules and AWS Marketplace sellers can provide managed rule groups or organizations can define their own rule, according to AWS. To broaden its reach, Verified Access integrates with AWS identity and device security partners including: Beyond Identity, CrowdStrike, CyberArk, Cisco Duo, Jamf, JumpCloud, Okta, and Ping Identity. In addition, observability partners—including Datadog, IBM, New Relic, Rapid7, Sumo Logic, and Trellix—can ingest Verified Access logs and provide actionable data from users trying to access customer applications, AWS stated. As for the new features, integration with a WAF protects web applications (HTTP/S) from application-layer threats, AWS stated. Customers can filter out common exploits, such as SQL injection and cross-site scripting (XSS) using AWS WAF, while enabling AWS Zero Trust-based fine-grained access for applications using user-identity and device security status, AWS stated. Passing signed identity context to customers’ application endpoints is the other new feature. “Verified Access now passes signed identity context, including things like email, username, and other attributes from the identity provider to the applications,” AWS stated. The feature lets customers personalize application access using this context, eliminating the need to re-authenticate the user for personalization. The signed context allows the application to verify cryptographically that Verified Access has authenticated the request, AWS stated. Pricing for the service is based on per-hour and per-GB for data processed for each application utilizing Verified Access. Related content news Cisco Live: AI takes center stage Cisco CEO Chuck Robbins says the AI evolution is coming on fast, like the cloud transition on steroids. By Michael Cooney Jun 05, 2024 8 mins Generative AI Network Security Networking analysis Juniper tunes AI to find and fix SD-WAN, WAN routing problems New AI-driven management capabilities aim to provide greater visibility into SD-WAN performance and reduce WAN troubleshooting time. By Michael Cooney Jun 05, 2024 4 mins SASE SD-WAN Network Management Software news Cisco shows off new AI features to secure data flows The networking giant is busy embedding AI capabilities across the Cisco Security Cloud and beyond. By John E. Dunn Jun 04, 2024 4 mins Generative AI Network Security Networking news Network jobs watch: Hiring, skills and certification trends What IT leaders need to know about expanding responsibilities, new titles and hot skills for network professionals and I&O teams. By Denise Dubie Jun 04, 2024 10 mins Careers Data Center Networking PODCASTS VIDEOS RESOURCES EVENTS NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe