Securing private applications with CrowdStrike and AWS Verified Access

Securing private applications with CrowdStrike and AWS Verified Access

CrowdStrike Zero Trust Assessment (CrowdStrike ZTA) provides customers the ability to assess their endpoint security posture, allowing AWS Verified Access to provide conditional access to resources that comply with their organization’s device posture policies.

Additional Resources:

CrowdStrike AWS Verified Access GitHub: https://github.com/CrowdStrike/aws-verified-access
Third-party Trust Providers: https://docs.aws.amazon.com/verified-access/latest/ug/trust-data-third-party-trust.html#trust-data-iam-cs
AWS Supported Trust Providers: https://docs.aws.amazon.com/verified-access/latest/ug/device-trust.html#supported-trust-providers
Example Verified Access Logs: https://docs.aws.amazon.com/verified-access/latest/ug/verified-access-logs-examples.html#access-granted-oidc-crowdstrike