Zero trust on AWS
Advancing your security model with a zero trust approachWhat is zero trust on AWS?
Zero trust is a security model centered on the idea that access to data should not be solely made based on network location. It requires users and systems to strongly prove their identities and trustworthiness, and enforces fine-grained identity-based authorization rules before allowing them to access applications, data, and other systems. With zero trust, these identities often operate within highly flexible identity-aware networks that further reduce surface area, eliminate unneeded pathways to data, and provide straightforward outer security guardrails.
Building a zero trust architecture on AWS
Moving to a zero trust security model starts with evaluating your workload portfolio and determining where the enhanced flexibility and security of zero trust would provide the greatest benefits. Then, you’ll apply zero trust concepts - rethinking identity, authentication, and other context indicators such as device state and health – in order to make real and meaningful security improvements over the status quo. To help you on this journey, a number of AWS identity and networking services provide core zero trust building blocks as standard features that can be applied to both new and existing workloads.
Benefits
Explore use cases
Get started with related AWS services
Resources
Learn more about zero trust on AWS with blog posts, videos, workshops, What's New posts, and training.