AWS Verified Access uses Zero Trust principles to authenticate application requests. Credit: CIS Amazon Web Services has launched a service that secures user access to its cloud applications without requiring a VPN. AWS Verified Access, which the company previewed last November, validates every application request using Zero Trust principles before granting access to applications. Since AWS previewed the networking service, it has added two new features: AWS Web Application Firewall (WAF) and the ability to pass signed identity context to customers’ application endpoints. Specifically the service uses a web access-control list (ACL) to protect a set of AWS resources, the company wrote in a blog outlining the service. Customers create a web ACL and define its protection strategy by adding rules. Each rule contains a statement that defines the inspection criteria, and an action to take if a web request meets the criteria, AWS stated. Customers can configure rules to block requests, let them through, count them, or run bot controls against them that use CAPTCHA puzzles or other client browser challenges. Customers can define rules inside a web ACL or in reusable rule groups. AWS Managed Rules and AWS Marketplace sellers can provide managed rule groups or organizations can define their own rule, according to AWS. To broaden its reach, Verified Access integrates with AWS identity and device security partners including: Beyond Identity, CrowdStrike, CyberArk, Cisco Duo, Jamf, JumpCloud, Okta, and Ping Identity. In addition, observability partners—including Datadog, IBM, New Relic, Rapid7, Sumo Logic, and Trellix—can ingest Verified Access logs and provide actionable data from users trying to access customer applications, AWS stated. As for the new features, integration with a WAF protects web applications (HTTP/S) from application-layer threats, AWS stated. Customers can filter out common exploits, such as SQL injection and cross-site scripting (XSS) using AWS WAF, while enabling AWS Zero Trust-based fine-grained access for applications using user-identity and device security status, AWS stated. Passing signed identity context to customers’ application endpoints is the other new feature. “Verified Access now passes signed identity context, including things like email, username, and other attributes from the identity provider to the applications,” AWS stated. The feature lets customers personalize application access using this context, eliminating the need to re-authenticate the user for personalization. The signed context allows the application to verify cryptographically that Verified Access has authenticated the request, AWS stated. Pricing for the service is based on per-hour and per-GB for data processed for each application utilizing Verified Access. Related content news Network jobs watch: Hiring, skills and certification trends What IT leaders need to know about expanding responsibilities, new titles and hot skills for network professionals and I&O teams. By Denise Dubie Jun 04, 2024 10 mins Careers Data Center Networking news 2024 global network outage report and internet health check ThousandEyes tracks internet and cloud traffic and provides Network World with weekly updates on the performance of ISPs, cloud service providers, and UCaaS providers. By Ann Bednarz Jun 04, 2024 52 mins Internet Service Providers Network Management Software Cloud Computing how-to Pipe viewer: Using the pv command on Linux The pv command is especially helpful when you are running tasks that take a long time to complete and you want some feedback that displays your progress. By Sandra Henry Stocker Jun 04, 2024 3 mins Linux news AMD updates Instinct data center GPU line Unveiled at Computex 2024. the new AI processing card from AMD will come with much more high-bandwidth memory than its predecessor. By Andy Patrizio Jun 04, 2024 3 mins CPUs and Processors Data Center PODCASTS VIDEOS RESOURCES EVENTS NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe