Amazon Verified Permissions

Fully managed Cedar service for fine grained authorization

Introduction to Verified Permissions

Amazon Verified Permissions is a fully managed authorization service that uses the provably correct Cedar policy language, so you can build more secure applications. With Verified Permissions, developers can build applications faster by externalizing authorization and centralizing policy management. They can also align authorization within the application with Zero Trust principles. Security and audit teams can better analyze and audit who has access to what within applications.

Benefits

Accelerate application development by decoupling authorization from business logic.
Protect application resources and manage user access to the principle of least privilege.

Simplify compliance audits at scale using automated analysis to confirm that permissions written in Cedar work as intended.

Build applications aligned with Zero Trust principles of continual real-time authorization decisions.

Use cases

Create policies from templates and enforce those controls in Amazon API Gateway and AWS AppSync.

Administrators can create application-wide policies written in Cedar, and developers can grant user permissions to access data and resources.

Review Cedar policy model changes and monitor authorization requests using Verified Permissions.

Customer testimonials

  • TELUS

    TELUS Communications is a Canadian national telecommunications company that provides a wide range of telecommunications products and services including internet access, voice, entertainment, video, and security. TELUS is developing a smart living solution that will use the latest advancements in cloud technologies to create automation experiences across connected devices. TELUS is using Amazon Verified Permissions to control permissions to smart home devices such as cameras and door locks. For example, a customer can define permissions that allows their neighbor to turn on/off the outside lights but not unlock the main door.

    There's no way we could have written an authorization engine for our home automation use cases and get the authorization engine solid and tested in the time it took us to implement permissions management with Amazon Verified Permissions.

    Edwin Voskamp, Distinguished Engineer, TELUS
    Watch the video »
  • Grosvenor Engineering Group

    Grosvenor Engineering Group oversees a portfolio of 1.5 billion assets, such as HVAC, fire control, and electrical systems, across 45,000 buildings in Australia and New Zealand. To ensure efficient and secure operations, the company recognized the need for a robust authorization system to manage access to the assets within buildings.

    One of the critical requirements was to provide granular access control, allowing technicians to be granted access only to specific buildings or assets within a building. This approach enhances security by limiting access to authorized personnel and assets, mitigating potential risks. They decided to use Amazon Verified Permissions as their authorization system as it raised their security posture, provided flexibility and was scalable.

    Using Cedar and Amazon Verified Permissions to solve our use cases helped us achieve high performance and brought the flexibility and scale that pays off in the long run for our application. Our switching costs were low because of the consumption-based pricing model of AVP.

    Con Tsalikis - CTO, Grosvenor Engineering Group
    Watch this video to learn more on how Grosvenor Engineering group authorize request for their serverless application »
  • STEDI

    Stedi is a healthcare clearinghouse and Electronic Data Interchange (EDI) platform – they enable healthcare technology businesses and established players to exchange mission-critical transactions, such as healthcare insurance claims, eligibility checks, and more. Stedi uses Amazon API Gateway to protect access to endpoints that process transactions. The API Gateway calls Amazon Verified Permissions to evaluate authorization policies written in Cedar. These policies determine which API endpoints a given user is permitted to access.

    Stedi built fine-grained RBAC on a tight timeline using Amazon Verified Permissions. By batching authorization requests and caching decisions, we are able to cost-effectively process up to 700M requests per month with low latencies.

    Zack Kanter - Founder & CEO, Stedi
  • Twilio

    Twilio is a communications platform as a service that provides tools for developers to build communication workflows into their applications across channels like voice, text, chat, video, and email. Twilio Flex, a digital engagement product offered by Twilio, allows companies to manage customer interactions throughout their lifecycle - from sales to support. For instance, Flex can be set up as a contact center where customers can reach out through multiple channels (chat, voice, email, text) and get routed to agents with the right skills to handle their requests. As Twilio Flex grew from its 2019 launch, the team needed to implement sophisticated authorization, moving beyond their initial basic resource-based permission model to handle more complex access control requirements. They evaluated different authorization approaches and ultimately chose to implement Amazon Verified Permissions to meet their needs for granular permissions while maintaining high availability.

    As Twilio Flex evolved, we needed an authorization system that could grow with us. For coarse grained access, we use a token that grants access to a set of APIs based on a role. We then use Amazon Verified Permissions to manage more granular permissions, expressed as Cedar policies, which determine the data that a user may access through these APIs. Using Cedar enables us to externalize our authorization logic, which simplifies our codebase and improves our security posture. Cedar's expressiveness allows us to write policies that meet our customers' unique needs. AVP's architecture allows us to combine centralized control for permissions audits, with distributed decision-making for performance and reliability.

    Peter Lavelle - Principal Engineer, Twilio
  • FIS

    FIS a global leader in financial services technology, manages $50 trillion in annual payments and serves 80% of the top 50 insurers worldwide with its industry leading FIS Insurance Risk Suite - Prophet solution. With 10,000 users across 80 countries, FIS Prophet team recognized the need for a robust permissions management framework to ensure compliance with regulations like Sarbanes-Oxley while providing granular access control for actuaries, model approvers, and auditors.

    FIS built a comprehensive permissions management frameworks for Prophet, using Amazon Verified Permissions (AVP). This permissions frameworks enables fine-grained access control, combining both role-based and attribute-based permissions to enhance security and enable compliance.

    With Amazon Verified Permissions (AVP), and Cedar policy language, we can define permissions externally and manage all the policies in one centralized location. AVP provides a clear audit trail by logging every action—who made it, when it was made—and stores all these records securely for review whenever needed.

    Ana Kosutic - Software Engineer, FIS

Explore more of AWS