Pulse x reMKTR

Block Risky Sites Fast with WorkSpaces Secure Browser

Written by Jacob Heinz | Dec 15, 2025 9:53:08 PM

Your browser is your biggest security blind spot. One bad click on a sketchy site, and now helpdesk fights fires while Legal drafts incident emails.

Here’s the flip. Amazon WorkSpaces Secure Browser just added web content filtering. Block 25+ categories by default, like gambling, malware, and adult content. Allowlist the URLs you trust, including deep links your apps require. Log every decision to Amazon S3 for compliance and audits. No added cost. Ten Regions. Pay-as-you-go streaming. Push policy, get control, keep users moving.

If you run a modern workplace, this is a rare win-win. Security gets stronger, auditors get their logs, and users keep deep-linking into SaaS without roadblocks. You cut risk without breaking workflows or habits.

And you don't need a six month project plan. Configure categories, tune URL rules, wire logs to S3, and use Chrome Enterprise policies to harden the browser shell. That's it. Lightweight, fast, and built for VDI and zero-trust edge cases.

Here’s why this matters right now. Most attacks still start with the human element. Think social engineering, dodgy links, and risky clicks that catch folks. The 2024 Verizon Data Breach Investigations Report shows 68% involve a human component. Your browser is exactly where those moments happen.

Now add SaaS sprawl and contractors on unmanaged devices. Plus users who live inside deep links all day. You need control without slowdown or drama. A streamed, managed browser with policy filtering and S3-backed evidence gives you that.

TL;DR

  • Block 25+ risky web categories in Amazon WorkSpaces Secure Browser, with no added cost.
  • Allowlist granular URLs and deep links so work keeps flowing smoothly.
  • Stream decisions to Amazon S3 for compliance, investigations, and clean reporting.
  • Enforce Chrome Enterprise policies for consistent, reliable browser security.
  • Launch in minutes and scale across 10 AWS Regions with pay-as-you-go.

Meet Secure Browser Filtering

What it is

Amazon WorkSpaces Secure Browser is a managed, streamed browser for your users. The new move is built-in web content filtering, ready to use. Block categories like malware, phishing, adult, gambling, and more than two dozen others. You set the policy, and the browser enforces it per session and per user.

If you’ve duct-taped proxies, PAC files, and onboarding docs for years, this removes a lot of accidental complexity. It’s built for VDI and hybrid setups that need control without tossing heavy agents on every device.

Plain-English version of how it works. Users connect to a browser that runs in AWS, not local machines. Rendering happens in the cloud, and only pixels stream down. Network egress stays inside your AWS boundary, and policies get evaluated centrally. Every decision can be logged with details. That isolation layer slices off a huge chunk of endpoint risk, while keeping UX familiar.

Where this shines:

  • Contractors and third-party vendors hitting sensitive apps from unmanaged laptops.
  • BYOD programs where agents are a non-starter and just don’t stick.
  • High-risk roles like finance, admins, and support that click under pressure.
  • Regulated teams that need evidence of control without rebuilding the network.
  • VDI environments that want clean, consistent browsing with fewer moving parts.

What’s new

  • 25+ category blocks available right out of the box.
  • URL allowlists for the exact destinations your apps need to reach.
  • Compliance-friendly logging of requests and decisions to Amazon S3.
  • Chrome Enterprise policy support for consistent, hardened controls.
  • Integrates with Session Logger workflows in VDI environments today.
  • No added cost; available in 10 AWS Regions with pay-as-you-go streaming.

First-hand example. A global marketing team let creatives deep-link into ad platforms. Shady sites flagged under malware and illegal streaming got blocked automatically. Result? Fewer escalations, no nasty surprises, and clean S3 logs when audit needed a paper trail. That’s the point: strong defaults, minimal friction for everyone.

To translate those bullets to outcomes. Categories give broad guardrails that catch obvious bad and gray-area risky. Allowlists unlock exact app paths for daily work, so users don’t feel walls. S3 logging turns ‘we think we blocked it’ into hard evidence with timestamp, URL, category, and decision. Chrome policies lock down the browser shell, so extensions, downloads, and updates behave the same.

Policy design

Choose categories

Start simple, then grow when needed. If you’re healthcare, block categories with obvious compliance risk. Examples include adult, anonymizers, gambling, malware, and phishing. If you’re fintech or a public company, add crypto mining, file sharing, and known botnets. Don’t boil the ocean on day one, ship a tight baseline.

Pro tip: don’t guess what users need, just don’t. Pull the last 30–60 days of browser telemetry if you have it. Or run a discovery period with monitor-only in a pilot for safe data. You’ll get real clickstream patterns that inform your policy. When you enable blocking, nobody screams because deep links still work.

Baselines that usually work on day one:

  • Block: malware, phishing, newly-registered domains, anonymizers/proxies, cryptomining, adult, illegal streaming, known botnets.
  • Monitor: file sharing, social media, and webmail, then decide by role. Marketing may need social; finance probably doesn’t during core hours.
  • Permit with allowlists: vendor portals, SSO callbacks, and deep links needed by finance, procurement, and HR.

When to tighten:

  • Privileged roles like admins, finance, and payroll handling sensitive data.
  • Teams soaked in high-volume social content where phishing risk spikes.

When to loosen (safely):

  • Engineering teams that need docs, repos, and forums to move fast. Allowlists for vendor domains and doc CDNs help.
  • Research roles; keep categories blocked but widen allowlists to vetted sources.

Turn logs

All web decisions can be logged to Amazon S3 with rich context. That includes blocks or allows, categories, URL, timestamp, and user or session metadata. It’s not just forensics, it’s a compliance superpower too. You can prove enforcement at a specific time and correlate with identity systems. Use lifecycle policies to retain what you need and keep storage lean.

First-hand example. A regional bank piped S3 logs into a detection rule. It flagged attempts to reach anonymizers from privileged accounts quickly. That turned into a weekly security review with clean evidence, not vibes.

Make logs useful on day two:

  • Create an S3 bucket with server-side encryption enabled by default.
  • Use lifecycle policies to move older logs to infrequent access and Glacier.
  • Partition logs by date like year=YYYY/month=MM/day=DD to keep queries cheap.
  • Define a basic schema in Athena: timestamp, action, category, url, user, group, session_id, and region.
  • Wire CloudWatch metrics and alarms for spikes in blocks by category or group.

Compliance mapping ideas:

  • SOC 2: show logical access controls and monitoring with S3 logs, plus policy change history.
  • HIPAA or regulated: document blocked risky categories and logging; retain records per policy.
  • Zero Trust per NIST SP 800-207: central policy, continuous evaluation, and least-privilege access.

Privacy guardrails:

  • Avoid logging full POST bodies or session tokens, keep that out. URL, category, and decision are usually enough.
  • Mask usernames in broad dashboards; keep unmasked data for need-to-know work.

Layer Chrome policies

Use Chrome Enterprise policies to lock down extensions, downloads, and risky behaviors. Combine that with content filtering for true defense-in-depth. You get category blocks plus hardened browser controls.

Helpful anchor links for your runbook: Amazon S3 for storage and lifecycle policies. Also Chrome Enterprise policy references to control downloads, extensions, and safe browsing.

Practical policy starters:

  • SafeBrowsingProtectionLevel: enforce enhanced protection in the browser.
  • ExtensionInstallBlocklist: block everything by default, then add exceptions.
  • ExtensionInstallAllowlist or ExtensionInstallForcelist: approve what you need.
  • DownloadRestrictions: limit or block executable and archive downloads.
  • URLBlocklist and URLAllowlist: backstop against shadow IT domains that slip through.
  • Browser updates: enforce auto-update and pin minimum versions to close CVEs.

Deep links and allowlists

How allowlists help

Categories are your coarse filter; URL allowlists are your scalpel tool. When an app relies on deep links, you can be precise. Think SaaS routes like /app/invoices/123?view=pdf that users hit often. Allow the exact destination while keeping the broader category locked down. That stops malware sites without breaking your accounting team’s vendor portal.

When you set allowlists, think in terms of:

  • The exact domain required, like app.vendor.com versus vendor.com.
  • Specific paths that host your business-critical routes and content.
  • Login flows that bounce across subdomains like SSO, MFA, and callbacks.

Pattern tips

  • Start with login flows first, since SSO often chains multiple hosts.
  • SSO may hit auth.youridp.com, accounts.vendor.com, and the app itself.
  • Capture deep-link patterns from confirmed workflows, and actually test them.
  • Keep allowlists tight; avoid broad domains with user-generated content.
  • Revisit regularly; SaaS vendors evolve their URL structures often.

First-hand example. A procurement team needed deep links into a supplier’s invoice portal. It lived under supplier.com/portal/payments/ with specific flows. The security team allowlisted only /portal/payments/ and SSO callbacks. The rest of the supplier’s domain stayed under category enforcement. Users didn’t notice, but attackers hit a wall.

Common SaaS patterns to pre-plan:

  • Salesforce: my.salesforce.com and your custom domain; include lightning.force.com assets.
  • ServiceNow: yourinstance.service-now.com and any /nav_to.do links used.
  • Workday: wdX.myworkday.com plus your tenant path; watch MFA redirects.
  • Microsoft 365: login.microsoftonline.com, aadcdn.msauth.net, and your app endpoints.
  • Okta: yourtenant.okta.com, yourtenant.okta-emea.com, and device-trust pages if used.
  • CDNs: static asset hosts like cloudfront.net and akamaized.net used by apps.

Avoid wildcard traps. The pattern *.vendor.com might include forums and sandboxes. Prefer explicit subdomains and paths that you can defend.

Rollout without drama

Portal settings

If you’re configuring portal settings for Amazon WorkSpaces Secure Browser, treat it carefully. It’s like a change to your identity perimeter, so act accordingly.

  • Enforce category blocks for a default 'all users' policy baseline.
  • Create groups for high-risk personas like admins and finance with stricter rules.
  • Wire logs to Amazon S3 with lifecycle policies that fit retention.
  • Apply Chrome Enterprise policies for extensions, downloads, and safe browsing.
  • Pair with your Session Logger in VDI for session context alongside URL decisions.

Add a few governance basics:

  • Change control: track policy edits with tickets and owner sign-off.
  • Communications: a short ‘what’s changing and why’ note to pilot users.
  • Exception workflow: a form for temporary allowlist requests with auto-expiry.

Pilot to production

  • Day 1–2: pilot with 10–20 users across roles in your company. Use monitor-only if available, or a light baseline with strong categories.
  • Day 3–4: tune allowlists for deep links, tighten Chrome policies, confirm SSO flows work.
  • Day 5: turn on block for non-negotiable categories like malware, phishing, adult.
  • Day 6–7: expand by org unit or group with a simple rollback plan ready.

Operational realities: you’re not racking appliances or shipping boxes. This is pay-as-you-go browser streaming live in 10 AWS Regions. Roll out quickly, measure impact via S3 logs, and standardize where it works. Security wins, IT breathes, and Legal seriously stops pacing.

Instrument the rollout:

  • Metrics to watch: block rate by category and top allowlisted domains.
  • Track incidents per week and helpdesk tickets tied to browsing patterns.
  • UX checks: page load time, login success rate, and extension behavior.
  • Region placement: choose the closest Region to users for snappy performance.

Cost performance and scale

  • Pricing: filtering has no added cost; you pay for streamed sessions. S3 storage costs apply based on your retention and compression.
  • Performance: pick a nearby Region and keep extensions minimal to stay quick. Review network egress rules if you proxy elsewhere for control.
  • Scale: start with critical groups, then roll to departments you trust. Policies are central, so consistency stays high as you expand.

Quick gut check

  • Start with a tight baseline and block obvious risky categories first.
  • Make allowlists precise, target domains, paths, and SSO endpoints.
  • Turn on S3 logging early, because evidence beats anecdotes every time.
  • Layer Chrome Enterprise policies for defense-in-depth at the browser.
  • Pilot with mixed personas like finance, engineering, CX, and admin roles.
  • Iterate weekly and tune categories and allowlists as traffic rolls in.

FAQ

What is Secure Browser

It’s a managed, streamed browser from AWS that isolates web access. You get a consistent, controllable browser with policy enforcement, logging, and pay-as-you-go pricing. It’s designed for modern workplace, VDI, and zero-trust use cases.

What’s included

You can block 25+ content categories like gambling, adult, malware, and phishing. Use granular URL allowlists for approved destinations and deep links. Log decisions to Amazon S3 for compliance, investigations, and reporting.

Does this add cost

No added cost for the web content filtering feature at all. You still pay for streaming sessions on a pay-as-you-go basis. S3 storage costs apply for logs based on retention policies.

You add specific URLs users need, down to domain and path level. Deep links like vendor.com/app/invoices/123 keep working while the broader category stays blocked. Start with SSO endpoints and exact app paths from daily workflows.

Which Regions support

It’s available in 10 AWS Regions today and ready to go. Check your Region on the AWS Global Infrastructure pages and WorkSpaces product pages. If it’s listed, then you’re good to go.

Enforce Chrome Enterprise policies

Yes, absolutely. Apply Chrome Enterprise policies to control extensions, downloads, and safe browsing. Pairing category filtering with Chrome policies gives layered protection with consistent UX.

How is this different

A streamed, managed browser keeps risky content off endpoints by design. You still get policy-based filtering and logging, without agents or PAC file gymnastics. Great for BYOD and contractor scenarios where agents aren’t feasible.

Performance impact for users

With a nearby AWS Region and a lean policy set, UX is smooth. The browser renders in the cloud and only pixels stream back. Keep extensions low and allowlist needed CDNs to keep page load times normal.

Use on unmanaged devices

Yes, that’s a core use case and works well. Users access a managed browser session without heavy installs on personal machines. Policies and logging still apply because control lives in the service.

Handle temporary exceptions

Use a time-bound allowlist process, with request form and owner approval. Add auto-expiry for 7–14 days and log everything for review. Revisit expired entries weekly to curb policy drift.

Monitor and alert

Stream logs to S3, then query with Athena for fast answers. Wire CloudWatch metrics for spikes by category or user group. Send alerts to your SIEM for correlation with identity and endpoint signals.

Help with zero trust

Yes. A centrally-managed, isolated browser with policy controls and logging aligns well. Verify explicitly, apply least privilege, and assume breach by default.

Launch day playbook

  • Define your baseline blocklist: malware, phishing, adult, and anonymizers.
  • Create user groups like admins, finance, and engineering with tailored rules.
  • Add allowlists for critical SaaS deep links and SSO endpoints today.
  • Enable S3 logging with lifecycle policies aligned to retention needs.
  • Apply Chrome Enterprise policies for extensions, downloads, and updates.
  • Pilot with 10–20 users, review logs, and tune categories and URLs.
  • Roll out by org unit, then monitor weekly and adjust as apps evolve.

Add a few more day-one moves:

  • Stand up an Athena table and three starter queries immediately.
  • Track top blocked categories, top allowlisted domains, and spike detector by group.
  • Publish a short ‘How to request an exception’ doc in your IT portal.
  • Nominate two pilot champions in each department to funnel feedback.
  • Schedule a 30-minute review after week one to promote monitored categories.

You don’t need a forklift project to get real control, not today. Categories, precise allowlists, and S3 logging deliver 80% of the value on day one. And they do it without slowing anyone down or causing noise. If you run modern workplace or VDI, this platform move shrinks risk and simplifies runbooks. Start with a crisp baseline, instrument everything, and iterate. That’s the play.

References