Introduction to Verified Permissions
Amazon Verified Permissions is a fully managed authorization service that uses the provably correct Cedar policy language, so you can build more secure applications. With Verified Permissions, developers can build applications faster by externalizing authorization and centralizing policy management. They can also align authorization within the application with Zero Trust principles. Security and audit teams can better analyze and audit who has access to what within applications.
Benefits
Use cases
Customer testimonials
-
TELUS
TELUS Communications is a Canadian national telecommunications company that provides a wide range of telecommunications products and services including internet access, voice, entertainment, video, and security. TELUS is developing a smart living solution that will use the latest advancements in cloud technologies to create automation experiences across connected devices. TELUS is using Amazon Verified Permissions to control permissions to smart home devices such as cameras and door locks. For example, a customer can define permissions that allows their neighbor to turn on/off the outside lights but not unlock the main door.
There's no way we could have written an authorization engine for our home automation use cases and get the authorization engine solid and tested in the time it took us to implement permissions management with Amazon Verified Permissions.
Edwin Voskamp, Distinguished Engineer, TELUS -
Grosvenor Engineering Group
Grosvenor Engineering Group oversees a portfolio of 1.5 billion assets, such as HVAC, fire control, and electrical systems, across 45,000 buildings in Australia and New Zealand. To ensure efficient and secure operations, the company recognized the need for a robust authorization system to manage access to the assets within buildings.
One of the critical requirements was to provide granular access control, allowing technicians to be granted access only to specific buildings or assets within a building. This approach enhances security by limiting access to authorized personnel and assets, mitigating potential risks. They decided to use Amazon Verified Permissions as their authorization system as it raised their security posture, provided flexibility and was scalable.
Using Cedar and Amazon Verified Permissions to solve our use cases helped us achieve high performance and brought the flexibility and scale that pays off in the long run for our application. Our switching costs were low because of the consumption-based pricing model of AVP.
Con Tsalikis - CTO, Grosvenor Engineering Group -
STEDI
Stedi is a healthcare clearinghouse and Electronic Data Interchange (EDI) platform – they enable healthcare technology businesses and established players to exchange mission-critical transactions, such as healthcare insurance claims, eligibility checks, and more. Stedi uses Amazon API Gateway to protect access to endpoints that process transactions. The API Gateway calls Amazon Verified Permissions to evaluate authorization policies written in Cedar. These policies determine which API endpoints a given user is permitted to access.
Stedi built fine-grained RBAC on a tight timeline using Amazon Verified Permissions. By batching authorization requests and caching decisions, we are able to cost-effectively process up to 700M requests per month with low latencies.
Zack Kanter - Founder & CEO, Stedi -
Twilio
Twilio is a communications platform as a service that provides tools for developers to build communication workflows into their applications across channels like voice, text, chat, video, and email. Twilio Flex, a digital engagement product offered by Twilio, allows companies to manage customer interactions throughout their lifecycle - from sales to support. For instance, Flex can be set up as a contact center where customers can reach out through multiple channels (chat, voice, email, text) and get routed to agents with the right skills to handle their requests. As Twilio Flex grew from its 2019 launch, the team needed to implement sophisticated authorization, moving beyond their initial basic resource-based permission model to handle more complex access control requirements. They evaluated different authorization approaches and ultimately chose to implement Amazon Verified Permissions to meet their needs for granular permissions while maintaining high availability.
As Twilio Flex evolved, we needed an authorization system that could grow with us. For coarse grained access, we use a token that grants access to a set of APIs based on a role. We then use Amazon Verified Permissions to manage more granular permissions, expressed as Cedar policies, which determine the data that a user may access through these APIs. Using Cedar enables us to externalize our authorization logic, which simplifies our codebase and improves our security posture. Cedar's expressiveness allows us to write policies that meet our customers' unique needs. AVP's architecture allows us to combine centralized control for permissions audits, with distributed decision-making for performance and reliability.
Peter Lavelle - Principal Engineer, Twilio -
FIS
FIS a global leader in financial services technology, manages $50 trillion in annual payments and serves 80% of the top 50 insurers worldwide with its industry leading FIS Insurance Risk Suite - Prophet solution. With 10,000 users across 80 countries, FIS Prophet team recognized the need for a robust permissions management framework to ensure compliance with regulations like Sarbanes-Oxley while providing granular access control for actuaries, model approvers, and auditors.
FIS built a comprehensive permissions management frameworks for Prophet, using Amazon Verified Permissions (AVP). This permissions frameworks enables fine-grained access control, combining both role-based and attribute-based permissions to enhance security and enable compliance.
With Amazon Verified Permissions (AVP), and Cedar policy language, we can define permissions externally and manage all the policies in one centralized location. AVP provides a clear audit trail by logging every action—who made it, when it was made—and stores all these records securely for review whenever needed.
Ana Kosutic - Software Engineer, FIS