Securing private applications with CrowdStrike Zero Trust Assessment and AWS Verified Access
CrowdStrike Zero Trust Assessment (CrowdStrike ZTA) provides customers the ability to assess their endpoint security posture, allowing AWS Verified Access to provide conditional access to resources that comply with their organization’s device posture policies.
Additional Resources
CrowdStrike AWS Verified Access GitHub: https://github.com/CrowdStrike/aws-verified-access
Third-party Trust Providers: https://docs.aws.amazon.com/verified-access/latest/ug/trust-data-third-party-trust.html#trust-data-iam-cs
AWS Supported Trust Providers: https://docs.aws.amazon.com/verified-access/latest/ug/device-trust.html#supported-trust-providers
Example Verified Access Logs: https://docs.aws.amazon.com/verified-access/latest/ug/verified-access-logs-examples.html#access-granted-oidc-crowdstrike