Create a secure connection between assets and applications within your corporate network and assets and applications that reside in AWSUsers and applications within your existing infrastructure securely interact with assets in AWS as if they were local
Create an isolated environment within AWSEstablish subnets to control who and what can access your resourcesConnect your isolated AWS resources and your IT infrastructure via a VPN connectionLaunch AWS resources within the isolated networkUse your existing security and networking technologies to examine traffic to/from your isolated resourcesExtend your existing security and management policies within your IT infrastructure to your isolated AWS resources as if they were running within your infrastructure