<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic TrustSec approach for AWS workspaces in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/trustsec-approach-for-aws-workspaces/m-p/5319911#M597757</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;We use AWS workspaces for our endusers to reach on-prem resources through VPN/Direct Connect. For the endpoints connecting to on-prem through wired,wireless and VPN we leverage ISE and TrustSec architecture to enforce traffic based on SGTs across our network (switches and firewalls). We aim to keep the same SGT policies enforcing traffic coming in from AWS workspaces. What is the best approach?&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Antonio.&lt;/P&gt;</description>
    <pubDate>Tue, 12 Aug 2025 11:00:39 GMT</pubDate>
    <dc:creator>Antonio Macia</dc:creator>
    <dc:date>2025-08-12T11:00:39Z</dc:date>
    <item>
      <title>TrustSec approach for AWS workspaces</title>
      <link>https://community.cisco.com/t5/network-access-control/trustsec-approach-for-aws-workspaces/m-p/5319911#M597757</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;We use AWS workspaces for our endusers to reach on-prem resources through VPN/Direct Connect. For the endpoints connecting to on-prem through wired,wireless and VPN we leverage ISE and TrustSec architecture to enforce traffic based on SGTs across our network (switches and firewalls). We aim to keep the same SGT policies enforcing traffic coming in from AWS workspaces. What is the best approach?&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Antonio.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Aug 2025 11:00:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/trustsec-approach-for-aws-workspaces/m-p/5319911#M597757</guid>
      <dc:creator>Antonio Macia</dc:creator>
      <dc:date>2025-08-12T11:00:39Z</dc:date>
    </item>
    <item>
      <title>Re: TrustSec approach for AWS workspaces</title>
      <link>https://community.cisco.com/t5/network-access-control/trustsec-approach-for-aws-workspaces/m-p/5320143#M597771</link>
      <description>&lt;P&gt;ISE 3.4 patch 1 provides a cloud workload connector as part of the Common Policy Framework. This would allow you to ingest workload tags from AWS, assign SGTs to those workloads, and share those IP/SGT mappings with your firewalls for consistent policy enforcement.&lt;/P&gt;
&lt;P&gt;See the following link for more details on Common Policy and Workload Connector -&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/collections/common-policy.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/ise/collections/common-policy.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Aug 2025 22:03:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/trustsec-approach-for-aws-workspaces/m-p/5320143#M597771</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2025-08-12T22:03:05Z</dc:date>
    </item>
    <item>
      <title>Re: TrustSec approach for AWS workspaces</title>
      <link>https://community.cisco.com/t5/network-access-control/trustsec-approach-for-aws-workspaces/m-p/5320875#M597781</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/388087"&gt;@Greg Gibbs&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Per my understanding with the cloud workload connector we can create rules to map SGTs to AWS instances based on some attributes that the instance has, but I'm not sure if it is possible&amp;nbsp;to apply different SGTs to the same AWS workspace depending on the user logged in. Can this be done?&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;</description>
      <pubDate>Fri, 15 Aug 2025 05:35:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/trustsec-approach-for-aws-workspaces/m-p/5320875#M597781</guid>
      <dc:creator>Antonio Macia</dc:creator>
      <dc:date>2025-08-15T05:35:52Z</dc:date>
    </item>
    <item>
      <title>Re: TrustSec approach for AWS workspaces</title>
      <link>https://community.cisco.com/t5/network-access-control/trustsec-approach-for-aws-workspaces/m-p/5320886#M597782</link>
      <description>&lt;P&gt;Ah, so you're referring to AWS Workspaces, as in virtual desktops.&lt;/P&gt;
&lt;P&gt;This would be a similar issue as with other VDI solutions. There would have to be a 1:1 mapping between the desktop instance and IP address and ISE would have to have some way identifying and authorizing the user logged in, similar to 802.1x.&lt;BR /&gt;I don't see how this would be possible.&lt;/P&gt;</description>
      <pubDate>Fri, 15 Aug 2025 06:05:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/trustsec-approach-for-aws-workspaces/m-p/5320886#M597782</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2025-08-15T06:05:46Z</dc:date>
    </item>
  </channel>
</rss>

