Home/Blog/Cloud/Zero Trust Access Compared: Cloudflare Access vs AWS Verified Access vs Azure Entra vs Google BeyondCorp
Cloud

Zero Trust Access Compared: Cloudflare Access vs AWS Verified Access vs Azure Entra vs Google BeyondCorp

A deep technical comparison of Zero Trust Network Access platforms — Cloudflare Access, AWS Verified Access, Azure Entra Private Access, and Google BeyondCorp Enterprise — covering architecture, identity integration, device posture, pricing, and migration strategies.

By InventiveHQ Team

Introduction

Zero Trust Network Access represents the most significant architectural shift in corporate security since the firewall. The premise is simple: stop trusting the network. Instead of VPNs that grant broad access to everyone inside the tunnel, verify every user, every device, and every request — regardless of network location.

Google formalized this concept in its 2014 BeyondCorp paper, describing how Google eliminated its corporate VPN by treating every network (including the corporate LAN) as untrusted. A decade later, every major cloud provider offers a commercial Zero Trust solution, but their implementations reflect very different architectural philosophies.

Cloudflare Access is part of Cloudflare One, a comprehensive SASE (Secure Access Service Edge) platform that provides ZTNA, DNS filtering, SWG (Secure Web Gateway), and CASB from Cloudflare's edge network.

AWS Verified Access provides ZTNA specifically for applications hosted on AWS, integrating with AWS networking primitives and identity services.

Azure Entra Private Access (formerly Azure AD Application Proxy + Global Secure Access) is Microsoft's ZTNA, deeply integrated with Entra ID (Azure AD) and the Microsoft 365 ecosystem.

Google BeyondCorp Enterprise commercializes Google's internal Zero Trust architecture, built on Chrome Enterprise, Identity-Aware Proxy, and Google's global network.

Architecture and Approach

Cloudflare Access: ZTNA at the Edge

Cloudflare Access operates through Cloudflare's global network, creating a security layer between users and applications without requiring those applications to be on any specific cloud.

How it works:

  1. User navigates to a protected application URL
  2. Cloudflare intercepts the request at the edge (the same network handling CDN and WAF)
  3. User is redirected to authenticate with their configured identity provider
  4. Cloudflare evaluates access policies: identity (who), device posture (what), location (where), and context (when/how)
  5. If authorized, the request is forwarded to the origin application through a Cloudflare Tunnel (encrypted outbound connection from origin to Cloudflare — no inbound ports required)
  6. Subsequent requests are validated against the session policy

Key architectural elements:

Cloudflare Tunnel (cloudflared): A lightweight daemon that runs on your origin infrastructure and creates an encrypted outbound connection to Cloudflare's network. Because the tunnel is outbound-only, your origin server needs no public IP address, no open inbound ports, and no firewall rules. This dramatically reduces attack surface.

WARP client: For non-HTTP applications (SSH, RDP, private networks), users install the WARP client which creates a WireGuard-based tunnel to Cloudflare. The WARP client also provides device posture signals (OS version, disk encryption, MDM enrollment, running processes).

Policy engine: Access policies combine multiple signals:

SignalExamples
IdentityEmail, group membership, IdP attributes
Device postureOS version, disk encryption, firewall status, specific software running
LocationCountry, IP range
Authentication methodMFA requirement, specific IdP
Network contextManaged network (office), gateway policy compliance
TimeSession duration limits, time-of-day restrictions

What makes Cloudflare Access distinctive:

  • Free for up to 50 users — the most accessible entry point for ZTNA
  • Cloud-agnostic — protects applications on AWS, Azure, GCP, on-premises, or SaaS equally
  • Browser-based SSH/VNC — users can SSH into servers through a browser session without installing an SSH client
  • Application-level isolation — each application has independent access policies; compromising access to one app does not grant access to others
  • Part of a broader SASE platform — DNS filtering (Gateway), SWG, CASB, DLP, and email security are complementary Cloudflare One products

AWS Verified Access: ZTNA for AWS Workloads

AWS Verified Access provides Zero Trust access to applications running on AWS. It was generally available from June 2023, making it the newest solution in this comparison.

How it works:

  1. Create Verified Access instances, trust providers (IdP + device trust), and groups
  2. Define access policies using Cedar, AWS's purpose-built policy language
  3. Create Verified Access endpoints for each application (associated with an ALB, NLB, or network interface)
  4. Users access the application URL, authenticate, and have their device posture checked
  5. Verified Access evaluates Cedar policies against identity and device trust signals
  6. If authorized, traffic is forwarded to the application endpoint

Key architectural elements:

Cedar policy language: AWS built a dedicated policy language for Verified Access (and other AWS authorization services). Cedar policies are more expressive than simple allow/deny rules:

permit(
  principal in Group::"engineering",
  action == Action::"access",
  resource == Application::"internal-dashboard"
) when {
  context.device.os_version >= "14.0" &&
  context.device.disk_encryption == true &&
  context.identity.mfa == true
};

Trust providers: Verified Access integrates with IAM Identity Center (AWS SSO), OIDC-compatible IdPs (Okta, Ping), and device trust providers (CrowdStrike, Jamf, JumpCloud).

What makes Verified Access distinctive:

  • Deep AWS networking integration — endpoints map directly to ALBs, NLBs, and ENIs
  • Cedar policy language — more powerful than most ZTNA policy engines for complex authorization logic
  • No client required for web applications — browser-based access without agent installation
  • AWS IAM integration — policies can reference IAM Identity Center groups and attributes

Limitations to acknowledge:

  • Only protects applications hosted on AWS (cannot protect on-premises or multi-cloud apps natively)
  • Relatively new with a smaller feature set than Cloudflare Access or Azure Entra
  • No free tier
  • Limited non-HTTP protocol support compared to Cloudflare's tunneling capabilities

Azure Entra Private Access: Enterprise Identity-First ZTNA

Microsoft's ZTNA is evolving rapidly. Azure Entra Private Access (part of Microsoft's Global Secure Access) replaces the legacy Azure AD Application Proxy and provides ZTNA tightly integrated with Entra ID (formerly Azure AD).

How it works:

  1. Deploy a Private Network Connector on your network (similar to Cloudflare Tunnel)
  2. Define application segments (IP ranges, FQDNs, ports) that represent internal applications
  3. Create conditional access policies in Entra ID combining user identity, group membership, device compliance, location, and risk level
  4. Users install the Global Secure Access client (or use browser-based access for web apps)
  5. Traffic to configured application segments routes through Microsoft's network to the Private Network Connector, which forwards it to the internal application

Key architectural elements:

Entra ID Conditional Access: Microsoft's policy engine is the most mature enterprise identity platform. Conditional Access policies combine:

SignalDetails
User/groupSpecific users, group membership, guest vs member
DeviceCompliance state (Intune), hybrid joined, registered
LocationNamed locations, IP ranges, countries
Risk levelSign-in risk, user risk (from Identity Protection)
ApplicationPer-application policies
Session controlsApp enforced restrictions, MCAS session control, sign-in frequency

Microsoft Intune integration: For device posture, Entra Private Access leverages Intune's device compliance policies. If a device is not compliant (missing updates, no encryption, jailbroken), access is denied. This is the deepest device management integration of any ZTNA platform — but it requires Intune enrollment, which means Microsoft device management.

What makes Azure Entra Private Access distinctive:

  • Deepest enterprise identity integration — if your organization uses Entra ID (Azure AD), the conditional access policies, MFA, Identity Protection risk scores, and Privileged Identity Management are all native
  • Intune device compliance — the most comprehensive device posture system, but requires Intune MDM
  • Microsoft 365 ecosystem — seamless access to SharePoint, Teams, and other M365 services with consistent policies
  • Quick access — simplified configuration for common scenarios (RDP, SMB file shares, internal web apps)

Limitations to acknowledge:

  • Requires Entra ID (Azure AD) as the identity provider — does not work as easily with non-Microsoft IdPs
  • Global Secure Access client is required for non-web applications
  • Licensing complexity — different capabilities at P1, P2, and Entra Suite tiers
  • Strongest when paired with Microsoft endpoint management (Intune), weaker without it

Google BeyondCorp Enterprise: Chrome-Centric Zero Trust

Google BeyondCorp Enterprise commercializes the principles from Google's internal Zero Trust implementation. It takes a distinctive approach by centering the security model on the Chrome browser.

How it works:

  1. Chrome Enterprise provides the endpoint: device signals, certificate-based device trust, DLP, and threat protection
  2. Identity-Aware Proxy (IAP) protects web applications by verifying identity and context before forwarding requests
  3. Endpoint Verification (Chrome extension or agent) collects device posture data
  4. VPC Service Controls provide network-level protection for GCP services
  5. Context-aware access policies combine identity, device, and request context

Key architectural elements:

Chrome as the security perimeter: Google's philosophy is that the browser is the primary application runtime for modern work. By instrumenting Chrome, Google can:

  • Enforce DLP policies at the browser level (prevent copy/paste, downloads, screenshots)
  • Detect threats in browsing sessions (phishing, malware downloads)
  • Verify device posture through the browser extension (no MDM required for basic signals)
  • Provide URL filtering and content inspection

Identity-Aware Proxy (IAP): Protects applications by requiring authentication and authorization before any traffic reaches the application. IAP sits in front of:

  • GCP App Engine, Compute Engine, GKE applications
  • On-premises applications (via Cloud IAP connector)
  • Any HTTPS application

What makes BeyondCorp Enterprise distinctive:

  • Chrome-centric security model — device signals and DLP enforcement through the browser, reducing dependence on endpoint agents
  • Google's internal Zero Trust heritage — the architecture descends from the system that eliminated Google's own VPN
  • Threat and data protection — browser-level DLP, phishing protection, and content inspection
  • Certificate-based device identity — strong device authentication without requiring MDM

Limitations to acknowledge:

  • Chrome-centric approach is a limitation if your organization uses other browsers significantly
  • IAP primarily protects GCP-hosted applications (on-premises support exists but is less streamlined)
  • Custom pricing makes cost comparison difficult
  • Smaller market share and community than Cloudflare Access or Azure Entra

Feature Comparison

FeatureCloudflare AccessAWS Verified AccessAzure Entra Private AccessGoogle BeyondCorp Enterprise
Free tierYes (50 users)NoNoNo
Agent required (web apps)NoNoNo (browser) / Yes (non-web)No (Chrome)
Agent for non-webWARP clientLimitedGlobal Secure Access clientEndpoint Verification agent
Identity providersSAML, OIDC, social (GitHub, Google), one-time PINIAM Identity Center, OIDCEntra ID (primary), federated IdPsGoogle Workspace, SAML, OIDC
MFA integrationVia IdP, built-in TOTPVia IdPEntra MFA (native)Google MFA, third-party
Device postureWARP client (OS, encryption, firewall, processes, MDM)CrowdStrike, Jamf, JumpCloudIntune compliance (deep)Endpoint Verification, Chrome signals
Policy languageVisual rules + APICedar (powerful, programmatic)Conditional Access UI + Graph APIContext-aware access policies
SSH/RDP accessBrowser-rendered SSH/VNCLimitedQuick Access (RDP, SMB)IAP TCP forwarding
Private network accessWARP + Tunnel (full private network)VPC endpointsPrivate Network ConnectorIAP connector
No public IP requiredYes (Cloudflare Tunnel)Yes (VPC endpoints)Yes (Private Network Connector)Partial (IAP connector)
SWG (Secure Web Gateway)Yes (Gateway)NoYes (Internet Access)Yes (Chrome Enterprise)
DNS filteringYes (Gateway)NoYes (Internet Access)No (separate product)
CASBYes (API-driven)NoYes (Defender for Cloud Apps)No (separate product)
DLPYes (in-line and API)NoYes (Purview)Yes (Chrome DLP)
Email securityYes (Area 1)NoYes (Defender for Office 365)Yes (Gmail security)
Multi-cloud supportYes (any application, any cloud)AWS onlyPrimarily Azure + on-premisesPrimarily GCP + on-premises
Browser isolationYes (Remote Browser Isolation)NoNoYes (Chrome Enterprise)

The SASE Dimension

ZTNA is often just one component of a broader Secure Access Service Edge (SASE) architecture. Here's how each provider's ZTNA fits into their broader security platform:

Cloudflare One (most comprehensive standalone SASE):

  • Access (ZTNA) + Gateway (SWG/DNS filtering) + Browser Isolation + CASB + DLP + Area 1 (email security)
  • All services run on the same edge network with a single management plane

AWS: No unified SASE platform. Verified Access handles ZTNA; other security functions require third-party products or separate AWS services.

Microsoft Global Secure Access (strongest for Microsoft-centric enterprises):

  • Entra Private Access (ZTNA) + Entra Internet Access (SWG) + Defender for Cloud Apps (CASB) + Purview (DLP)
  • Deep integration with Microsoft 365 and Windows

Google BeyondCorp Enterprise (Chrome-centric):

  • BeyondCorp (ZTNA + threat protection) + Chrome Enterprise (DLP, browser security)
  • Unique browser-centric approach

Pricing Comparison

Prices as of February 2026. All prices in USD.

TierCloudflare Zero TrustAWS Verified AccessAzure EntraGoogle BeyondCorp
Free50 users
Entry$7/user/month (Pay-as-you-go)~$0.27/hr per instance + data processingIncluded in Entra P1 ($6/user/mo)Custom pricing
Standard$7/user/monthSameIncluded in Entra P2 ($9/user/mo)Custom ($6-10/user/mo estimate)
EnterpriseCustomCustom + hourlyEntra Suite ($12/user/mo)Custom

Cost at Different Scales

50 users (small business):

ProviderMonthly CostNotes
Cloudflare$0Free tier covers 50 users
AWS~$200-500Minimum instance hours + data
Azure$300-450Requires Entra P1 minimum ($6/user)
GoogleCustom (~$300-500)BeyondCorp Enterprise licensing

500 users (mid-market):

ProviderMonthly CostNotes
Cloudflare$3,500$7/user/month
AWS~$1,000-3,000Varies by instance count and data
Azure$4,500-6,000Entra P2 ($9) or Suite ($12) per user
Google~$3,000-5,000Custom pricing

5,000 users (enterprise):

ProviderMonthly CostNotes
CloudflareCustom (volume discounts)Typically $4-6/user at scale
AWSCustomInstance-based pricing becomes complex
Azure$45,000-60,000P2 or Suite licensing
GoogleCustomVolume discounts available

The Azure Licensing Nuance

Azure's pricing is misleading in isolation. Most enterprises already pay for Entra P1 or P2 licensing as part of their Microsoft 365 E3/E5 agreements. If you are already paying for M365 E5, Entra Private Access is included at no additional cost — making it effectively free for Microsoft-first organizations. This changes the cost calculation dramatically.

Cloudflare's free tier for 50 users is the most accessible entry point, but for enterprises already on Microsoft 365 E5, Azure's ZTNA is a $0 incremental cost.

Calculate Your Costs

Use the calculator below to estimate costs for your specific workload:

Zero Trust / ZTNA Cost Calculator

Compare zero trust network access costs per user.

users
AWS Verified Access1st
$197.10/mo
$2,365.20/yearPer-instance hourly pricing ($0.27/hr). Requires separate VPN or Direct Connect for some use cases.
Cloudflare Access2nd
$350.00/mo
$4,200.00/yearFirst 50 users free, then $7/user/mo. Includes ZTNA, SWG, and CASB.
Google BeyondCorp3rd
$600.00/mo
$7,200.00/year~$6/user/mo for BeyondCorp Enterprise. Integrated with Chrome browser.
Azure Entra ID P24th
$900.00/mo
$10,800.00/year$9/user/mo for Entra ID P2. Includes conditional access, identity protection, and PIM.

Estimates based on published pricing as of February 2026. Actual costs may vary by region, commitment, and usage patterns.

Implementation Complexity

Cloudflare Access: Simplest Setup

  1. Sign up for Cloudflare Zero Trust (free)
  2. Add your identity provider (Google Workspace, Okta, Azure AD, etc.)
  3. Create an application and define access policies
  4. Deploy cloudflared on your origin server (one binary, one command)
  5. Users navigate to the application URL and authenticate

Time to first protected application: 30 minutes to 2 hours

AWS Verified Access: AWS Networking Knowledge Required

  1. Create a Verified Access instance
  2. Configure trust providers (IAM Identity Center, OIDC IdP, device trust)
  3. Create a Verified Access group with Cedar policies
  4. Create a Verified Access endpoint (requires ALB/NLB/ENI)
  5. Configure DNS to point to the Verified Access endpoint
  6. Users authenticate and access the application

Time to first protected application: 2-4 hours (longer if unfamiliar with AWS networking)

Azure Entra Private Access: Microsoft-Familiar, Complex Licensing

  1. Enable Global Secure Access in Entra admin center
  2. Install Private Network Connector on-premises or in Azure
  3. Configure application segments (IP/FQDN/port)
  4. Create conditional access policies in Entra ID
  5. Deploy Global Secure Access client to users
  6. Users authenticate via Entra ID and access applications

Time to first protected application: 2-4 hours (assumes existing Entra ID deployment)

Google BeyondCorp Enterprise: Chrome-First

  1. Enable BeyondCorp Enterprise in Google Cloud console
  2. Deploy Endpoint Verification (Chrome extension)
  3. Configure Identity-Aware Proxy for applications
  4. Create context-aware access levels
  5. Apply access levels to IAP-protected resources
  6. Users authenticate through Google identity and access applications in Chrome

Time to first protected application: 3-6 hours (Chrome Enterprise setup adds complexity)

Decision Framework

Choose Cloudflare Access When:

  • Multi-cloud or hybrid — you need ZTNA that works identically across AWS, Azure, GCP, and on-premises
  • Budget-conscious or getting started — free tier for 50 users, $7/user for larger deployments
  • Simplest deployment — Cloudflare Tunnel eliminates inbound firewall rules, public IPs, and VPN infrastructure
  • Broader SASE needs — Access is part of Cloudflare One (SWG, DNS filtering, CASB, DLP, email security)
  • Developer-friendly — browser-based SSH/VNC, social IdP support (GitHub, Google), and API-first design
  • You are not locked into a single cloud or identity provider

Choose AWS Verified Access When:

  • AWS-native workloads only — your applications are on AWS and you want ZTNA without a third-party vendor
  • Cedar policy language appeals — the most expressive ZTNA policy language for complex authorization logic
  • AWS networking integration — you want ZTNA that plugs into VPC, ALB, and IAM natively
  • You accept the limitations — newer product, no multi-cloud, limited non-HTTP support

Choose Azure Entra Private Access When:

  • Microsoft-first organization — Entra ID for identity, Intune for device management, Microsoft 365 for productivity
  • Already paying for M365 E5 — ZTNA is included at no additional cost
  • Deepest device compliance — Intune integration provides the most comprehensive device posture checking
  • Enterprise identity maturity — Conditional Access, Privileged Identity Management, and Identity Protection are already deployed
  • Windows-heavy environment — native Windows device integration is unmatched

Choose Google BeyondCorp Enterprise When:

  • GCP-native workloads — Identity-Aware Proxy is the most streamlined ZTNA for GCP applications
  • Chrome-centric workforce — Chrome Enterprise provides browser-level security, DLP, and threat protection
  • Google Workspace identity — seamless integration with Google Workspace for authentication
  • You value the BeyondCorp philosophy — Google literally wrote the book on Zero Trust networking

The Strategic Picture

Zero Trust is the security category where each provider's strengths are most sharply differentiated by their existing market position:

Cloudflare wins on accessibility and flexibility. Free for 50 users, works with any cloud, any identity provider, any application. Cloudflare's ZTNA is the natural choice for organizations that are not committed to a single cloud or identity ecosystem — and the only choice that makes ZTNA economically viable for small businesses.

Azure wins on enterprise identity depth. If your organization has already invested in Entra ID, Intune, and Microsoft 365, Azure's ZTNA adds zero incremental cost and provides the deepest identity-context-device integration. The conditional access policy engine is the most mature enterprise identity platform.

Google wins on architectural purity. BeyondCorp is the closest commercial implementation to the Zero Trust ideal that Google pioneered internally. The Chrome-centric model is innovative but only compelling if Chrome is your primary application runtime.

AWS wins on AWS-native simplicity — if your applications are exclusively on AWS and you want ZTNA from your cloud provider, Verified Access avoids a third-party dependency. But it is the most limited of the four solutions.

The honest recommendation for most organizations: start with Cloudflare Access (free for 50 users, simplest deployment, cloud-agnostic) unless you are deeply embedded in the Microsoft ecosystem (choose Azure Entra) or exclusively on GCP (consider BeyondCorp). ZTNA is one of those categories where starting quickly and iterating is more valuable than spending months evaluating — the sooner you replace VPN access with per-application Zero Trust policies, the sooner your security posture improves.

Frequently Asked Questions

Find answers to common questions

ZTNA is a security model that eliminates implicit trust based on network location. Instead of a VPN that grants broad network access once connected, ZTNA verifies identity, device posture, and context for every access request to every application. Users only reach the specific applications they are authorized for, with continuous verification throughout the session. All four providers implement this model differently.

Yes. Cloudflare Access is free for up to 50 users as part of the Cloudflare Zero Trust free plan. This includes application access policies, identity provider integration, and basic device posture checking. The free tier is one of the most significant differentiators — no other provider offers production-quality ZTNA at no cost. Pay-as-you-go starts at $7/user/month, and Enterprise plans offer custom pricing with advanced features.

Traditional VPNs create a tunnel to the corporate network, giving users broad access to everything on that network. ZTNA replaces this with per-application access: users authenticate, their identity and device are verified, and they receive access only to specific applications — never to the underlying network. This eliminates lateral movement (if credentials are compromised, the attacker can only reach authorized apps, not the entire network), reduces attack surface, and improves performance (no hair-pinning traffic through a VPN concentrator).

All four support SAML 2.0 and OIDC, meaning they work with Okta, Azure AD/Entra ID, Google Workspace, OneLogin, PingIdentity, and others. Azure Entra Private Access has the deepest integration with Entra ID (formerly Azure AD) — if your organization already uses Entra ID for identity, Microsoft's ZTNA provides the most seamless experience. Cloudflare Access supports the broadest range of IdPs simultaneously, including social login (GitHub, Google) for developer tools.

Device posture checking verifies the security state of the device making an access request — Is the OS updated? Is disk encryption enabled? Is an endpoint protection agent running? Is the device managed by MDM? This prevents compromised or unmanaged devices from accessing corporate resources, even if the user's credentials are valid. Cloudflare WARP client, AWS Verified Access device trust, Azure Intune, and Google's endpoint verification all provide device posture signals.

Google's original BeyondCorp (published 2014) was an internal project that eliminated Google's corporate VPN, treating every network as untrusted. BeyondCorp Enterprise is the commercial product based on those principles. The internal system is deeply customized for Google's infrastructure; the commercial product provides context-aware access through Chrome Enterprise, Identity-Aware Proxy, and endpoint verification. The philosophy is the same, but the commercial product is more constrained than Google's internal implementation.

Yes. Cloudflare Access supports SSH, RDP, and arbitrary TCP connections through the cloudflared tunnel client. For SSH, Cloudflare renders a browser-based terminal — users authenticate through the browser and get an SSH session without installing an SSH client. For non-web applications, the WARP client creates a private network tunnel. Cloudflare also supports private DNS resolution for routing to internal hostnames.

AWS Verified Access (GA since June 2023) provides ZTNA for applications hosted on AWS. It integrates with AWS IAM Identity Center (formerly SSO), third-party IdPs via OIDC, and device trust providers (CrowdStrike, Jamf, JumpCloud). Verified Access is the newest of the four solutions and has fewer features than Cloudflare Access or Azure Entra Private Access. It is best suited for organizations already on AWS that want ZTNA without a third-party vendor. It does not support non-AWS hosted applications natively.

At 500 users/month: Cloudflare Zero Trust (Teams Standard) costs approximately $3,500 ($7/user). AWS Verified Access costs approximately $3,600 ($0.27/hour per instance, varies by usage). Azure Entra Private Access is included with Microsoft Entra Suite or P2 licensing ($12/user, ~$6,000 — but includes other identity features). Google BeyondCorp Enterprise is custom-priced, typically $6-10/user ($3,000-$5,000). Cloudflare is the most cost-effective standalone ZTNA; Azure is cheapest if you are already paying for Entra P2.

Yes, especially with Cloudflare's free tier (up to 50 users). A small business can set up Cloudflare Access in an afternoon, connecting it to Google Workspace or Microsoft 365 for identity, and protect internal tools (admin panels, staging environments, internal dashboards) without a VPN. The free tier includes enough functionality for most small business needs. The other providers either lack free tiers or require significant infrastructure investment.

Is your cloud secure? Find out free.

Get a complimentary cloud security review. We'll identify misconfigurations, excess costs, and security gaps across AWS, GCP, or Azure.