Category
End user computing
1. Introduction
Amazon WorkSpaces Core is an AWS End user computing service designed to let organizations use the Amazon WorkSpaces client applications to access virtual desktops provided by third-party VDI (virtual desktop infrastructure) solutions. In other words, it’s a way to standardize the end-user connection experience on WorkSpaces clients while the actual desktop infrastructure is delivered and managed by a supported provider.
At a simple level: WorkSpaces Core helps you connect users to virtual desktops using the familiar Amazon WorkSpaces clients, without requiring you to run fully managed Amazon WorkSpaces Personal desktops for every scenario.
At a more technical level: WorkSpaces Core acts as a control/connection enablement layer that integrates Amazon WorkSpaces clients with a supported VDI provider’s control plane and desktop/session hosts. Your provider typically manages the desktop brokering, images, pools, and session lifecycle; AWS provides the WorkSpaces client compatibility and supporting service endpoints. The exact integration details (supported providers, protocols, identity flows, and required network paths) must be confirmed in the official documentation because they can evolve.
What problem it solves: Many enterprises want a consistent, secure client experience (and sometimes a consistent procurement and governance model) while continuing to use an existing VDI provider or a specialized desktop platform. WorkSpaces Core addresses this by bridging Amazon WorkSpaces clients with partner VDI environments so you can reduce client sprawl and simplify user access patterns—especially in hybrid or multi-environment deployments.
Service status note: Amazon WorkSpaces Core is a distinct offering under the Amazon WorkSpaces family. If you are looking for AWS-managed persistent desktops, you likely want Amazon WorkSpaces Personal. If you want non-persistent pooled desktops, look at Amazon WorkSpaces Pools. If you want application streaming, look at Amazon AppStream 2.0. This tutorial stays focused on Amazon WorkSpaces Core.
2. What is Amazon WorkSpaces Core?
Official purpose (in practical terms)
Amazon WorkSpaces Core provides capabilities that enable Amazon WorkSpaces client applications to be used with third-party virtual desktop solutions. It’s positioned for organizations that want to keep (or adopt) a VDI provider while leveraging the WorkSpaces client footprint and AWS governance.
Because AWS product capabilities can change, verify the latest positioning and supported integrations in the official AWS documentation: – https://docs.aws.amazon.com/ (search for Amazon WorkSpaces Core)
Core capabilities (high-level)
WorkSpaces Core commonly centers on: – Client access enablement via Amazon WorkSpaces clients (Windows, macOS, Linux, mobile, web availability varies—verify in docs). – Integration hooks/APIs that allow a supported provider to register and broker desktops for users. – AWS-side governance and auditing (for example, via AWS CloudTrail for relevant API activity—confirm scope in docs). – Standardization: consistent end-user launch workflow (registration/URL, sign-in sequence, client behavior), depending on provider integration.
Major components (conceptual model)
Exact naming differs by provider integration; conceptually, you should expect: – End-user device + Amazon WorkSpaces Client – WorkSpaces Core service endpoints (AWS-managed) – VDI provider control plane (partner-managed) – Desktop/session hosts (where the OS actually runs—could be in AWS, on-premises, or another environment depending on provider architecture) – Identity source (often AD/IdP; the exact flow is provider-specific)
Service type
- Managed AWS service used for end-user desktop access enablement with partner VDI platforms.
- Part of AWS End user computing.
Scope: regional/global and account boundaries
- Most Amazon WorkSpaces family services are regional (you select an AWS Region where service endpoints and integrations operate).
- Your usage is AWS account-scoped for billing and governance.
- Provider resources may live outside AWS or across multiple environments.
Because WorkSpaces Core integrates with external providers, your effective “footprint” is often multi-domain: – AWS Region(s) for WorkSpaces Core endpoints and logging – Provider regions/zones for brokering – Network connectivity between end-user devices, provider endpoints, and desktop hosts
Verify current regional availability and endpoint requirements in the official AWS documentation and product pages.
How it fits into the AWS ecosystem
Amazon WorkSpaces Core often appears in architectures alongside: – AWS IAM (access control for administrators and automation) – AWS CloudTrail (audit API activity) – Amazon VPC (network segmentation; VPC endpoints/PrivateLink where applicable) – AWS Direct Connect / AWS VPN (hybrid connectivity to corporate networks or on-prem desktop hosts) – Amazon Route 53 Resolver (hybrid DNS patterns) – AWS KMS (encryption keys for logs and data at rest in AWS services you enable) – Amazon CloudWatch (metrics/log collection for AWS-side components; partner tools handle desktop-plane telemetry)
3. Why use Amazon WorkSpaces Core?
Business reasons
- Standardize the client experience: reduce the number of endpoint clients users must install and support.
- Leverage AWS procurement and governance: for organizations standardizing on AWS billing and account structures, WorkSpaces Core can fit into existing chargeback/showback models.
- Hybrid-friendly: maintain an existing VDI investment while modernizing access patterns.
Technical reasons
- Decouple client from desktop infrastructure: keep your chosen desktop/session host platform while using WorkSpaces clients.
- Integration flexibility: third-party VDI platforms often provide advanced desktop brokering and enterprise features; WorkSpaces Core aims to integrate without forcing a full migration to another desktop service.
Operational reasons
- Centralize access tooling: consistent deployment, patching, and policy of a single client across endpoints.
- Reduce helpdesk variance: fewer “which client do I use?” tickets, fewer end-user onboarding steps.
Security/compliance reasons
- Improve control of desktop access entry points: standard client, standardized access methods, consistent sign-in flows (depending on provider).
- AWS-side auditability: CloudTrail visibility for AWS interactions; centralized logging for AWS components you deploy (VPC Flow Logs, CloudTrail, etc.).
- Network isolation: use AWS networking and hybrid connectivity patterns to keep desktop hosts private.
Scalability/performance reasons
- Scale user access patterns without rethinking endpoint tooling.
- Support distributed users by aligning provider regions and AWS Regions (where relevant).
When teams should choose it
Choose Amazon WorkSpaces Core when: – You have (or want) a third-party VDI platform but want to adopt Amazon WorkSpaces clients as a standard. – You need hybrid (on-prem + cloud) desktop strategies. – You want AWS-based governance and logging around the client enablement layer.
When teams should not choose it
Avoid or reconsider WorkSpaces Core if: – You want AWS to manage the desktop service end-to-end with minimal partner dependency → evaluate Amazon WorkSpaces Personal. – You want application streaming rather than full desktops → evaluate Amazon AppStream 2.0. – Your environment requires highly specialized client/protocol features only available in a provider’s native client (verify provider parity first). – Your provider is not supported by WorkSpaces Core (verify supported partners in AWS docs).
4. Where is Amazon WorkSpaces Core used?
Industries
Commonly seen in: – Financial services (regulated desktops, contractor access) – Healthcare (clinical apps, shared workstations, data controls) – Government/public sector (controlled environments, auditing) – Manufacturing (shop-floor kiosks, engineering desktops) – Education (labs, student desktops) – Media/entertainment (secure editorial access; confirm graphics/performance support with provider)
Team types
- End user computing (EUC) teams
- Enterprise IT / workplace engineering
- Security engineering (desktop access control, audit)
- Platform and network teams (VPC, DNS, routing)
- Service desk/helpdesk
- Vendor management/procurement teams
Workloads
- Persistent knowledge-worker desktops
- Non-persistent task-worker desktops
- Contractor desktops
- BYOD access to corporate desktops (with controls)
- Hybrid desktops connected to on-prem resources
Architectures
- Hybrid VDI: users connect with WorkSpaces client → provider brokers sessions → desktops run on EC2 or on-prem
- Multi-region access: provider presence in multiple regions; optimize latency with region selection and split-DNS
- Private network access: desktops isolated in private subnets; user traffic traverses secure gateways
Production vs dev/test usage
- Production: standardize client and access for large user populations; integrate with enterprise identity and network controls.
- Dev/test: validate provider integration, network paths, DNS, certificate trust, and operational runbooks before a wider rollout.
5. Top Use Cases and Scenarios
Below are realistic scenarios where Amazon WorkSpaces Core may fit. Each scenario assumes you are using a supported third-party VDI provider—verify provider support and integration requirements in official docs.
1) Standardize endpoint clients across multiple desktop platforms
- Problem: Different business units use different desktop platforms; endpoints have multiple VDI clients.
- Why WorkSpaces Core fits: You can converge on Amazon WorkSpaces clients for user access where supported.
- Example: Finance uses provider A, Engineering uses provider B; both adopt WorkSpaces clients for consistent onboarding and support.
2) Hybrid VDI: keep on-prem desktop hosts while modernizing access
- Problem: Desktop hosts are on-prem for data locality/compliance; remote access tooling is fragmented.
- Why it fits: WorkSpaces clients become a standardized access entry point.
- Example: Hospital desktops remain on-prem; clinicians use WorkSpaces client from managed laptops.
3) Mergers and acquisitions (M&A) desktop consolidation
- Problem: Two companies merge with different EUC stacks; immediate migration is risky.
- Why it fits: A common client layer reduces change while infrastructure convergence happens later.
- Example: Acquire a company running a different VDI; adopt WorkSpaces client as interim standard.
4) Contractor/vendor access with controlled desktop entry points
- Problem: Contractors need secure access without corporate device enrollment.
- Why it fits: WorkSpaces clients plus provider identity policies can enforce restrictions.
- Example: External auditors use WorkSpaces client + MFA to access virtual desktops with no data exfiltration.
5) Seasonal scaling for task workers
- Problem: Need to onboard many temporary users quickly; endpoint complexity slows onboarding.
- Why it fits: Standard client deployment + provider pooling can streamline onboarding.
- Example: Retail support ramp-up for holiday season; WorkSpaces client is packaged via MDM.
6) Global enterprise with regional desktop presence
- Problem: Users in different geographies need low-latency desktops.
- Why it fits: Provider can deploy desktop hosts regionally; users keep the same client experience.
- Example: APAC users are routed to regional desktop farms; Europe users to EU farms.
7) High-security desktops with private connectivity
- Problem: Desktop hosts must not be internet reachable; access must traverse approved paths.
- Why it fits: Integrate WorkSpaces client access with strict network segmentation and private routing.
- Example: Government agency uses private subnets + Direct Connect; no public IPs on desktop hosts.
8) Reduce helpdesk tickets through consistent onboarding flows
- Problem: New user onboarding involves many steps and client variations.
- Why it fits: One standard client, standardized connection sequence.
- Example: “Install WorkSpaces client + enter registration code” becomes the universal instruction (provider permitting).
9) Desktop access for third-party devices (BYOD) with fewer local requirements
- Problem: BYOD devices vary; supporting multiple native clients is painful.
- Why it fits: Standard WorkSpaces client options can reduce variability.
- Example: Consulting firm allows BYOD but standardizes on WorkSpaces client and provider policy.
10) Coexistence strategy before migrating to fully managed AWS desktops
- Problem: You want to eventually adopt AWS-managed desktops, but not all apps are ready.
- Why it fits: WorkSpaces Core can be an intermediate layer while you rationalize applications and images.
- Example: Run provider desktops for legacy apps now; plan gradual adoption of WorkSpaces Personal for standard users later.
11) Regulated audit + centralized AWS account governance
- Problem: Need auditable controls around access enablement across environments.
- Why it fits: AWS account governance (CloudTrail, SCPs, tagging) can apply to the AWS-side integration layer.
- Example: Security mandates CloudTrail retention and encryption for all AWS activity related to desktop access services.
12) Simplify endpoint packaging through a single MDM app catalog entry
- Problem: MDM app catalogs contain multiple VDI clients and plug-ins.
- Why it fits: Consolidate to WorkSpaces clients where feasible.
- Example: Intune/Jamf catalog publishes only WorkSpaces client plus configuration profile.
6. Core Features
Because WorkSpaces Core is integration-oriented, some feature specifics depend on the supported provider. The items below describe the most important feature themes and what you should validate for your provider.
6.1 WorkSpaces client compatibility (key feature)
- What it does: Enables end users to access third-party virtual desktops using Amazon WorkSpaces client applications (where supported).
- Why it matters: Reduces endpoint tool sprawl and training overhead.
- Practical benefit: Standard installation, upgrade, and support workflows for the client across the org.
- Limitations/caveats: Not every provider feature maps 1:1 to the WorkSpaces client experience; verify capabilities such as multi-monitor, USB redirection, printing, smart cards, and media optimization with your provider’s integration documentation.
6.2 Integration with supported VDI providers
- What it does: Establishes an AWS-supported pathway for providers to integrate their brokering/session model with WorkSpaces clients.
- Why it matters: Lets you keep provider investments while leveraging AWS client standardization.
- Practical benefit: Hybrid or multi-platform VDI strategies become more manageable for end users.
- Limitations/caveats: Provider support is explicit—confirm the current supported provider list and version requirements.
6.3 AWS account governance for the AWS-side components
- What it does: Allows you to manage AWS-side settings using IAM, tagging, CloudTrail, and centralized logging patterns.
- Why it matters: Large organizations need standard guardrails (SCPs, least privilege, audit).
- Practical benefit: Consistent operational controls across AWS accounts/environments.
- Limitations/caveats: Governance applies to AWS-side resources. Desktop/session-plane governance remains provider-specific.
6.4 Hybrid networking alignment (VPC, routing, DNS)
- What it does: Supports designs where desktop hosts or identity services are in private networks and connected via VPN/Direct Connect.
- Why it matters: Most enterprise VDI deployments rely on private connectivity and internal DNS.
- Practical benefit: Keep desktops off the public internet; reduce attack surface.
- Limitations/caveats: You are responsible for network correctness: routes, firewall rules, DNS resolution, and latency management.
6.5 Auditability and traceability (AWS-side)
- What it does: Enables auditing of AWS API activity (for example using CloudTrail) and VPC traffic logging (VPC Flow Logs) for AWS components you deploy.
- Why it matters: Desktop access is security-sensitive; you need logs to investigate incidents.
- Practical benefit: Centralize logs into a security account (S3 + CloudWatch + SIEM).
- Limitations/caveats: CloudTrail doesn’t log inside the desktop OS; you still need endpoint/EDR and OS-level logging.
6.6 Centralized security controls (IAM, KMS, SCPs)
- What it does: Applies standard AWS security patterns: IAM roles, encryption keys for logs, guardrails.
- Why it matters: Prevent drift and enforce encryption/logging baselines.
- Practical benefit: Repeatable, reviewable deployments.
- Limitations/caveats: Guardrails can accidentally block operations; test SCPs and restrictive IAM in non-prod first.
6.7 Enterprise deployment patterns (multi-account, shared services)
- What it does: Lets you position WorkSpaces Core-related resources (logging, endpoints, connectivity) in a landing zone model.
- Why it matters: Enterprises rarely run EUC in a single flat account.
- Practical benefit: Separate security, network, and workload concerns.
- Limitations/caveats: Cross-account routing, DNS, and logging must be designed carefully.
7. Architecture and How It Works
7.1 High-level service architecture
A typical WorkSpaces Core architecture has two major planes:
-
Client / Access plane (AWS + end-user device) – End users install the Amazon WorkSpaces client. – The client connects to WorkSpaces Core-related endpoints and the provider integration endpoints (exact sequence is provider-specific).
-
Desktop / Session plane (provider-managed) – The provider brokers the session. – The desktop OS runs on session hosts (which might be on Amazon EC2, on-prem, or other infrastructure depending on the provider).
7.2 Control flow vs data flow (conceptual)
- Control flow: authentication, brokering decisions, session establishment, policy checks.
- Data flow: display protocol traffic, input events, device redirection traffic (if enabled).
In many VDI designs: – Control traffic may traverse identity systems (AD/IdP), broker services, and policy components. – Data traffic is the high-volume stream (pixels/audio/input). Latency, packet loss, and path stability are critical.
7.3 Integrations with related AWS services
Common integrations around WorkSpaces Core deployments: – Amazon VPC: private subnets for broker components (if any in AWS), interface endpoints, routing. – AWS Direct Connect / Site-to-Site VPN: connectivity to on-prem directories, file shares, app backends, or on-prem desktop hosts. – Amazon Route 53 Resolver: hybrid DNS for AD and internal service discovery. – AWS CloudTrail: audit AWS API activity related to setup and operations. – Amazon S3 + AWS KMS: long-term storage and encryption of logs (CloudTrail, Flow Logs exports). – Amazon CloudWatch: alarm on AWS-side infrastructure signals (NAT gateway metrics, VPN tunnel state, etc.).
7.4 Dependency services (what you typically need anyway)
Even when the desktop plane is provider-managed, most real deployments require: – A VPC and subnets designed for EUC connectivity – DNS resolution for identity and internal apps – Egress controls (NAT/firewalls) for patching and allowlists – Central logging (CloudTrail, Flow Logs) – Certificate trust (internal CA or public CA, depending on provider endpoints)
7.5 Security/authentication model (what to expect)
The exact identity/auth flow depends on the provider integration, but you should plan for: – A user identity source (often Microsoft AD or SAML/OIDC IdP) – Optional MFA (IdP- or provider-enforced) – Device posture (MDM/EDR) enforced outside AWS unless your provider offers posture checks – Strong controls around registration codes / tenant URLs (treat them like sensitive onboarding artifacts)
7.6 Networking model (what to design for)
Design for: – Predictable DNS (split-horizon, conditional forwarding) – Low-latency paths between users and desktop endpoints – No public exposure for desktop hosts (prefer private subnets) – Controlled egress for desktops (patching, updates, app dependencies) – Private connectivity to internal systems (file shares, license servers, databases)
7.7 Monitoring/logging/governance considerations
Because WorkSpaces Core is only one layer in the overall solution, monitoring is also layered:
- AWS-side
- CloudTrail for API audit
- VPC Flow Logs for network visibility
- CloudWatch alarms for VPN/Direct Connect, NAT gateways, interface endpoints, and general network health
-
AWS Config for drift detection on VPC/security groups/logging settings
-
Provider-side
- Broker health, session success rates, login failures
- Desktop host capacity
- Protocol performance metrics (latency, round-trip time, packet loss)
-
Image/pool deployment health
-
Desktop OS-side
- Windows Event Logs / syslog
- EDR telemetry
- Application logs
7.8 Simple architecture diagram (conceptual)
flowchart LR
U[End User Device\nAmazon WorkSpaces Client] -->|Connects| AWS[Amazon WorkSpaces Core\n(AWS-managed endpoints)]
AWS -->|Integration| P[Supported VDI Provider\nControl Plane]
P -->|Brokers session| H[Desktop/Session Hosts\n(EC2 / On-prem / Provider)]
H --> A[Internal Apps & Data\n(File shares, ERP, etc.)]
7.9 Production-style architecture diagram (more realistic)
flowchart TB
subgraph Endpoints["User Endpoints"]
U1[Laptop/Thin Client\nWorkSpaces Client]
U2[BYOD Device\nWorkSpaces Client]
end
subgraph AWS["AWS Account(s)"]
subgraph Net["Shared Network (VPC)"]
RT[Route Tables]
SG[Security Groups]
R53[Route 53 Resolver\nInbound/Outbound]
VPN[AWS Site-to-Site VPN\nor Direct Connect]
NAT[NAT Gateway / Egress FW]
FL[VPC Flow Logs]
end
subgraph SecOps["Security & Logging"]
CT[CloudTrail]
S3[S3 Log Archive]
KMS[AWS KMS Keys]
CW[CloudWatch Alarms]
end
end
subgraph Provider["VDI Provider (Supported)"]
CP[Provider Control Plane\n(Broker, policies)]
GW[Provider Access Gateway\n(if applicable)]
DH[Desktop Hosts / Farms\n(EC2 or on-prem)]
end
subgraph Corp["Corporate / On-Prem"]
AD[AD / IdP / MFA]
FS[File Shares / App Backends]
SIEM[SIEM / SOC Tooling]
end
U1 --> CP
U2 --> CP
CP --> GW --> DH
DH --> FS
DH -->|DNS queries| R53
R53 --> AD
AWS --> VPN --> Corp
FL --> CW
CT --> S3
FL --> S3
S3 --> SIEM
KMS --- S3
Diagram notes: – The user path to the provider (CP/GW) and the exact AWS endpoints involved can differ by integration. – Keep desktop hosts private and route to corporate resources via VPN/Direct Connect. – Centralize AWS logs to an immutable log archive account wherever possible.
8. Prerequisites
AWS account requirements
- An active AWS account with billing enabled.
- A chosen AWS Region that supports Amazon WorkSpaces Core (verify regional availability in official docs).
- If using multi-account landing zones: an AWS Organizations structure is recommended (not required).
Permissions / IAM roles
You typically need: – Permission to create and manage: – VPC resources (subnets, route tables, security groups, endpoints) – CloudTrail – S3 buckets (log archive) – KMS keys (for log encryption) – CloudWatch alarms/log groups – For least privilege, separate roles: – Network admin (VPC/DNS/connectivity) – Security admin (CloudTrail/KMS/S3 log archive) – EUC admin (WorkSpaces Core/provider onboarding operations)
If your provider requires IAM roles for integration, follow the provider’s AWS integration guide exactly.
Billing requirements
- You will incur AWS charges for any AWS infrastructure you deploy (VPC endpoints, NAT gateways, VPN/Direct Connect, logging).
- WorkSpaces Core itself has its own pricing model (see Section 9).
- Your VDI provider will have separate commercial terms.
CLI/SDK/tools needed (for this tutorial lab)
- AWS CLI v2 installed and configured
https://docs.aws.amazon.com/cli/latest/userguide/cli-chap-getting-started.html - Optional: Session Manager plugin (if you use AWS Systems Manager for bastionless admin of EC2 test instances)
- A text editor
Region availability
- Verify via official AWS product pages and documentation:
- WorkSpaces Core product page (verify exact URL from AWS)
- AWS Regional Services List (general reference): https://aws.amazon.com/about-aws/global-infrastructure/regional-product-services/
Quotas/limits
- VPC limits (subnets, route tables, security groups)
- NAT gateway scaling and cost
- CloudTrail event and S3 storage (practical limits)
- Provider-specific quotas (users, sessions, hosts)
Prerequisite services (common)
Depending on design: – Amazon VPC – AWS CloudTrail – Amazon S3 – AWS KMS – Amazon Route 53 Resolver – AWS Direct Connect or Site-to-Site VPN – Your VDI provider tenancy (supported integration)
9. Pricing / Cost
Amazon WorkSpaces Core pricing must be verified in the official AWS pricing page because it can change by Region and offering structure:
- Official pricing page (verify): https://aws.amazon.com/workspaces/core/pricing/
- AWS Pricing Calculator: https://calculator.aws/
9.1 Pricing dimensions (how to think about it)
WorkSpaces Core pricing is typically based on a combination of: – User entitlement / subscription (often per user, per month), or other unit measures described by AWS – Potential feature tiers or editions (if offered) – Potential additional charges for associated AWS resources you deploy (networking, logging, storage)
Because WorkSpaces Core integrates with third-party VDI providers, expect two cost planes: 1. AWS costs – WorkSpaces Core charges (per the AWS pricing page) – AWS infrastructure you deploy (VPC endpoints, NAT, VPN, data transfer, logging) 2. Provider costs – VDI licensing, brokering, support contracts – Desktop host compute/storage licensing (if provided by the vendor or via your own infrastructure)
9.2 Free tier
- Do not assume a free tier exists. Verify on the pricing page.
9.3 Primary cost drivers (AWS side)
- Number of entitled users (if pricing is per user)
- Network egress and data transfer
- Desktop protocols can generate significant traffic.
- Internet egress from AWS is charged; inter-AZ traffic can also matter.
- NAT gateways
- NAT gateway hourly + per-GB processing can be a major cost line item.
- Site-to-Site VPN
- Tunnel hourly charges + data transfer
- Direct Connect
- Port hours + data transfer out + colocation/provider costs
- Logging
- CloudTrail data events (if enabled)
- S3 storage for logs
- CloudWatch Logs ingestion and retention
- Interface VPC endpoints / PrivateLink
- Hourly per endpoint + data processing, if used
9.4 Hidden/indirect costs (often overlooked)
- Endpoint management: packaging and maintaining the WorkSpaces client (MDM tooling cost)
- Security tooling: EDR, DLP, UEBA, SIEM ingestion costs
- Microsoft licensing (if Windows desktops are involved): depends on where desktops run and your licensing agreements
- Operational overhead: monitoring, incident response, and provider management
9.5 Network/data transfer implications
For EUC, traffic patterns are continuous and user-driven: – Video meetings, multi-monitor, high-resolution screens can increase bandwidth. – Latency sensitivity is high; optimizing the user-to-desktop path can reduce retransmits and improve experience.
9.6 Cost optimization strategies
- Reduce NAT gateway usage where safe:
- Prefer VPC endpoints for AWS service access (S3 gateway endpoint, interface endpoints) to avoid NAT for AWS APIs.
- Centralize and control egress:
- Use egress firewalls and allowlists.
- Cache updates or use internal repositories for patching.
- Right-size logging:
- Enable CloudTrail with appropriate retention and encryption.
- Use S3 lifecycle policies to transition old logs to cheaper storage classes.
- Optimize network placement:
- Place desktop hosts close to users (region/edge strategy with your provider).
- Avoid cross-AZ data paths for high-volume traffic where possible.
- Tag everything:
- Cost allocation tags on VPC components and logging buckets.
9.7 Example low-cost starter estimate (model, not numbers)
A small pilot typically includes: – WorkSpaces Core for a small set of pilot users (per pricing page) – Minimal AWS network/logging: – 1 VPC – 2 private subnets (multi-AZ) – CloudTrail + S3 log archive – Optional: a VPN for access to on-prem identity/resources – Prefer endpoints over NAT if possible
Use the AWS Pricing Calculator to model: – WorkSpaces Core unit pricing (as listed) – VPN tunnel hours (if used) – NAT gateway hours + GB processed (if used) – S3 storage for logs and lifecycle tiers
9.8 Example production cost considerations
In production, the top contributors are often: – User scale (subscriptions/entitlements) – Bandwidth (protocol traffic + internet egress) – Always-on network components (NAT gateways, VPN tunnels, endpoints) – Provider licensing and support – SIEM ingest (log volume grows quickly)
10. Step-by-Step Hands-On Tutorial
This lab is designed to be safe and low-cost on AWS while being honest about what WorkSpaces Core requires: a supported VDI provider to deliver actual desktops. The lab focuses on building an AWS foundation you can use for WorkSpaces Core integrations (networking + logging + governance), and then shows how to validate readiness and proceed to provider onboarding.
If you already have a supported provider tenant, you can extend the lab to a real end-to-end user connection using the WorkSpaces client.
Objective
- Set up a minimal AWS “EUC foundation” for Amazon WorkSpaces Core: – Centralized CloudTrail – Encrypted S3 log archive with lifecycle – VPC with private subnets – Optional VPC Flow Logs
- Validate that the foundation is working (logs landing in S3, Flow Logs active).
- Prepare for provider onboarding (what info you’ll need, what to test).
Lab Overview
You will create: – An S3 bucket for logs (encrypted, versioned, lifecycle-managed) – A KMS key for log encryption (optional but recommended) – An organization-friendly CloudTrail (single account or multi-account pattern simplified) – A VPC with two private subnets – VPC Flow Logs to CloudWatch Logs (optional) or S3 – A minimal set of tags for cost allocation
Expected cost: low, but not zero. CloudTrail, S3 storage, KMS requests, CloudWatch logs, and NAT/VPN (if you add them) can incur charges. Keep retention short for the lab and clean up at the end.
Step 1: Set variables and confirm AWS CLI access
1) Configure AWS CLI credentials (already done if you can run sts get-caller-identity).
aws sts get-caller-identity
Expected outcome: Your AWS Account and IAM principal ARN are returned.
2) Choose a region and set environment variables:
export AWS_REGION="us-east-1" # change as needed
export PROJECT="wscore-lab"
Expected outcome: Variables are set for subsequent commands.
Step 2: Create a KMS key for log encryption (recommended)
Create a KMS key and alias.
KEY_ID=$(aws kms create-key \
--region "$AWS_REGION" \
--description "KMS key for ${PROJECT} CloudTrail/S3 encryption" \
--query 'KeyMetadata.KeyId' --output text)
aws kms create-alias \
--region "$AWS_REGION" \
--alias-name "alias/${PROJECT}-logs" \
--target-key-id "$KEY_ID"
echo "KMS KeyId: $KEY_ID"
Expected outcome: A KMS key exists with alias alias/wscore-lab-logs.
Note: Key policies and cross-account log archive patterns can get complex. This lab keeps it single-account. For production, design a dedicated log archive account and carefully scope key policies.
Step 3: Create an encrypted S3 bucket for logs
1) Create the bucket (name must be globally unique):
ACCOUNT_ID=$(aws sts get-caller-identity --query Account --output text)
BUCKET="${PROJECT}-logs-${ACCOUNT_ID}-${AWS_REGION}"
aws s3api create-bucket \
--region "$AWS_REGION" \
--bucket "$BUCKET" \
$( [ "$AWS_REGION" != "us-east-1" ] && echo "--create-bucket-configuration LocationConstraint=$AWS_REGION" )
2) Enable versioning:
aws s3api put-bucket-versioning \
--region "$AWS_REGION" \
--bucket "$BUCKET" \
--versioning-configuration Status=Enabled
3) Default encryption with KMS:
aws s3api put-bucket-encryption \
--region "$AWS_REGION" \
--bucket "$BUCKET" \
--server-side-encryption-configuration "{
\"Rules\": [{
\"ApplyServerSideEncryptionByDefault\": {
\"SSEAlgorithm\": \"aws:kms\",
\"KMSMasterKeyID\": \"arn:aws:kms:${AWS_REGION}:${ACCOUNT_ID}:alias/${PROJECT}-logs\"
}
}]
}"
4) Add a lifecycle policy (example: transition older logs; adjust to your needs):
aws s3api put-bucket-lifecycle-configuration \
--region "$AWS_REGION" \
--bucket "$BUCKET" \
--lifecycle-configuration '{
"Rules": [
{
"ID": "LogLifecycle",
"Status": "Enabled",
"Filter": {},
"Transitions": [
{ "Days": 30, "StorageClass": "STANDARD_IA" }
],
"NoncurrentVersionTransitions": [
{ "NoncurrentDays": 30, "StorageClass": "STANDARD_IA" }
]
}
]
}'
Expected outcome: An encrypted, versioned S3 bucket exists and is ready to receive logs.
Step 4: Create a CloudTrail trail and send logs to S3
1) Create the CloudTrail trail:
TRAIL_NAME="${PROJECT}-trail"
aws cloudtrail create-trail \
--region "$AWS_REGION" \
--name "$TRAIL_NAME" \
--s3-bucket-name "$BUCKET" \
--kms-key-id "arn:aws:kms:${AWS_REGION}:${ACCOUNT_ID}:alias/${PROJECT}-logs"
2) Start logging:
aws cloudtrail start-logging \
--region "$AWS_REGION" \
--name "$TRAIL_NAME"
Expected outcome: CloudTrail begins delivering management events to your S3 bucket.
3) Generate a test event to ensure logs appear (for example, list S3 buckets):
aws s3api list-buckets > /dev/null
4) Verify CloudTrail status:
aws cloudtrail get-trail-status \
--region "$AWS_REGION" \
--name "$TRAIL_NAME"
Expected outcome: IsLogging should be true. S3 delivery typically appears within minutes.
Step 5: Create a VPC with two private subnets (foundation for private desktop connectivity)
This VPC is a generic EUC foundation. Even if desktops are not hosted in AWS, you commonly need VPC connectivity for identity, DNS, and logging patterns.
1) Create VPC:
VPC_ID=$(aws ec2 create-vpc \
--region "$AWS_REGION" \
--cidr-block "10.50.0.0/16" \
--tag-specifications "ResourceType=vpc,Tags=[{Key=Name,Value=${PROJECT}-vpc},{Key=Project,Value=${PROJECT}}]" \
--query 'Vpc.VpcId' --output text)
aws ec2 modify-vpc-attribute --region "$AWS_REGION" --vpc-id "$VPC_ID" --enable-dns-support "{\"Value\":true}"
aws ec2 modify-vpc-attribute --region "$AWS_REGION" --vpc-id "$VPC_ID" --enable-dns-hostnames "{\"Value\":true}"
echo "VPC: $VPC_ID"
2) Pick two AZs and create two private subnets:
AZS=($(aws ec2 describe-availability-zones --region "$AWS_REGION" --query 'AvailabilityZones[0:2].ZoneName' --output text))
AZ1="${AZS[0]}"
AZ2="${AZS[1]}"
SUBNET1=$(aws ec2 create-subnet \
--region "$AWS_REGION" \
--vpc-id "$VPC_ID" \
--availability-zone "$AZ1" \
--cidr-block "10.50.10.0/24" \
--tag-specifications "ResourceType=subnet,Tags=[{Key=Name,Value=${PROJECT}-private-a},{Key=Project,Value=${PROJECT}}]" \
--query 'Subnet.SubnetId' --output text)
SUBNET2=$(aws ec2 create-subnet \
--region "$AWS_REGION" \
--vpc-id "$VPC_ID" \
--availability-zone "$AZ2" \
--cidr-block "10.50.20.0/24" \
--tag-specifications "ResourceType=subnet,Tags=[{Key=Name,Value=${PROJECT}-private-b},{Key=Project,Value=${PROJECT}}]" \
--query 'Subnet.SubnetId' --output text)
echo "Subnets: $SUBNET1 $SUBNET2"
Expected outcome: A VPC with two private subnets exists. This is a starting point for integrating with identity systems and provider connectivity patterns.
This lab does not create NAT gateways or VPN connections by default to keep costs down. Add them only if your provider onboarding requires specific egress or hybrid connectivity.
Step 6: Enable VPC Flow Logs (optional but recommended for troubleshooting)
Flow Logs help when users cannot connect and you need to confirm allowed/denied traffic patterns.
1) Create a CloudWatch Logs group:
LOG_GROUP="/${PROJECT}/vpc-flowlogs"
aws logs create-log-group --region "$AWS_REGION" --log-group-name "$LOG_GROUP" || true
aws logs put-retention-policy --region "$AWS_REGION" --log-group-name "$LOG_GROUP" --retention-in-days 7
2) Create an IAM role for Flow Logs:
cat > /tmp/flowlogs-trust.json << 'EOF'
{
"Version": "2012-10-17",
"Statement": [{
"Effect": "Allow",
"Principal": { "Service": "vpc-flow-logs.amazonaws.com" },
"Action": "sts:AssumeRole"
}]
}
EOF
ROLE_NAME="${PROJECT}-flowlogs-role"
aws iam create-role \
--role-name "$ROLE_NAME" \
--assume-role-policy-document file:///tmp/flowlogs-trust.json || true
aws iam attach-role-policy \
--role-name "$ROLE_NAME" \
--policy-arn "arn:aws:iam::aws:policy/service-role/AmazonAPIGatewayPushToCloudWatchLogs" || true
The managed policy above is not specifically for VPC Flow Logs. For production you should create a least-privilege policy for
logs:CreateLogStreamandlogs:PutLogEventson your log group. Because policies change, verify the current recommended IAM policy for VPC Flow Logs in official AWS docs.
3) Create Flow Logs on the VPC:
ROLE_ARN=$(aws iam get-role --role-name "$ROLE_NAME" --query 'Role.Arn' --output text)
aws ec2 create-flow-logs \
--region "$AWS_REGION" \
--resource-type VPC \
--resource-ids "$VPC_ID" \
--traffic-type ALL \
--log-destination-type cloud-watch-logs \
--log-group-name "$LOG_GROUP" \
--deliver-logs-permission-arn "$ROLE_ARN"
Expected outcome: VPC Flow Logs are enabled. (It can take a few minutes for records to appear.)
Step 7: Prepare for provider onboarding (WorkSpaces Core-specific readiness checklist)
At this point, your AWS-side foundation is ready. Next, you need to onboard a supported VDI provider for WorkSpaces Core.
Gather and validate the following before starting provider onboarding: – Identity choice: AD, SAML/OIDC, MFA requirements – DNS strategy: split-horizon domains, conditional forwarders, resolver endpoints – Network paths: from user endpoints to provider gateways; from desktops to corporate apps – Egress policy: allowlists for updates and required endpoints – Logging and incident response: where provider logs will be exported, and how correlation will work
Expected outcome: You have a concrete plan for integration inputs and the AWS foundation to support it.
Step 8 (Optional): Install Amazon WorkSpaces client and validate basic connectivity
1) Download the Amazon WorkSpaces client for your OS from the official AWS page (verify current URL): – https://clients.amazonworkspaces.com/ (commonly used; verify if redirected/updated)
2) Install and launch the client.
3) Enter the registration code / tenant URL provided by your WorkSpaces Core-supported VDI provider (this is provider-specific).
Expected outcome: The client proceeds to the provider sign-in flow. If successful, you should see an available desktop and be able to start a session.
Validation
Use these checks to confirm your lab foundation is working:
1) CloudTrail is logging – In S3, confirm CloudTrail objects exist:
aws s3 ls "s3://${BUCKET}/AWSLogs/${ACCOUNT_ID}/CloudTrail/" --recursive | head
2) Flow Logs are being delivered (if enabled)
aws logs describe-log-streams \
--region "$AWS_REGION" \
--log-group-name "$LOG_GROUP" \
--order-by LastEventTime --descending \
--max-items 5
3) VPC resources exist
aws ec2 describe-vpcs --region "$AWS_REGION" --vpc-ids "$VPC_ID"
aws ec2 describe-subnets --region "$AWS_REGION" --subnet-ids "$SUBNET1" "$SUBNET2"
Troubleshooting
Common issues you may hit in real WorkSpaces Core onboarding:
1) WorkSpaces client can’t proceed after entering registration code – Verify you are using the correct registration code/URL. – Confirm corporate proxy/SSL inspection isn’t breaking TLS. – Ask your provider for the required endpoint allowlist and confirm outbound firewall rules.
2) Users authenticate but don’t see desktops – This is usually provider-side brokering, entitlement, or identity mapping. – Validate group membership and user-to-desktop assignments in the provider admin console.
3) Desktop connects but internal apps fail – DNS mismatch is a frequent root cause. – Validate: – conditional forwarding for AD domains – routing from desktop networks to app subnets – firewall rules and security groups – MTU issues over VPN
4) No CloudTrail or Flow Logs – CloudTrail: verify trail status and S3 bucket policy/KMS permissions. – Flow Logs: verify the delivery IAM role policy and CloudWatch log group permissions (use least privilege in prod; verify recommended policy).
Cleanup
To avoid ongoing charges, remove resources created in the lab.
1) Stop CloudTrail logging and delete trail:
aws cloudtrail stop-logging --region "$AWS_REGION" --name "$TRAIL_NAME"
aws cloudtrail delete-trail --region "$AWS_REGION" --name "$TRAIL_NAME"
2) Delete VPC Flow Logs (if created)
List and delete:
aws ec2 describe-flow-logs --region "$AWS_REGION" --filter "Name=resource-id,Values=$VPC_ID" --query 'FlowLogs[].FlowLogId' --output text
Then delete (replace IDs):
aws ec2 delete-flow-logs --region "$AWS_REGION" --flow-log-ids fl-xxxxxxxx
3) Delete subnets and VPC:
aws ec2 delete-subnet --region "$AWS_REGION" --subnet-id "$SUBNET1"
aws ec2 delete-subnet --region "$AWS_REGION" --subnet-id "$SUBNET2"
aws ec2 delete-vpc --region "$AWS_REGION" --vpc-id "$VPC_ID"
4) Delete CloudWatch log group:
aws logs delete-log-group --region "$AWS_REGION" --log-group-name "$LOG_GROUP"
5) Empty and delete S3 bucket:
aws s3 rm "s3://${BUCKET}" --recursive
aws s3api delete-bucket --region "$AWS_REGION" --bucket "$BUCKET"
6) Schedule KMS key deletion (cannot be immediate):
aws kms schedule-key-deletion --region "$AWS_REGION" --key-id "$KEY_ID" --pending-window-in-days 7
11. Best Practices
Architecture best practices
- Design for hybrid DNS early: Most “desktop connects but apps fail” issues are DNS/routing problems.
- Separate subnets by role: even if desktops are provider-managed, isolate identity/DNS, shared services, and any EUC-related components.
- Prefer private connectivity to sensitive internal resources (VPN/Direct Connect).
- Plan for multi-region if your workforce is global; test latency and route selection per geography.
IAM/security best practices
- Least privilege IAM for administrators and automation.
- Use separate roles for network, security logging, and EUC operations.
- Use SCPs (AWS Organizations) to enforce:
- CloudTrail cannot be disabled
- S3 buckets for logs must be encrypted
- public S3 access blocks enabled
- Protect onboarding artifacts: registration codes/tenant URLs should be shared securely and rotated per policy.
Cost best practices
- Minimize NAT gateways; prefer VPC endpoints where possible.
- Apply S3 lifecycle policies for logs.
- Keep CloudWatch log retention short unless you have a compliance reason.
- Tag everything with cost allocation tags (Project, Environment, Owner, CostCenter).
Performance best practices
- Measure real user latency and packet loss from major user sites.
- Place desktops and gateways close to users (provider architecture decision).
- Avoid hairpinning protocol traffic through centralized egress points unless required.
Reliability best practices
- Build multi-AZ foundations (subnets, resolver endpoints, redundant VPN tunnels).
- For Direct Connect, consider backup VPN.
- Document failover behavior: what happens when a region/provider endpoint is unavailable?
Operations best practices
- Define operational ownership boundaries:
- AWS team owns VPC, DNS, connectivity, logging
- Provider team owns brokering, host capacity, desktop images, session policies
- Implement standard runbooks:
- user onboarding/offboarding
- access incidents
- performance incidents
- provider escalation paths
- Centralize logs in a security account and integrate with SIEM.
Governance/tagging/naming best practices
- Use consistent naming:
env-app-component(e.g.,prod-euc-resolver-outbound)- Require tags:
Environment,Project,Owner,DataClassification,CostCenter- Use AWS Config to detect drift on:
- VPC flow logs enabled
- CloudTrail enabled and encrypted
- S3 public access blocks enabled
12. Security Considerations
Identity and access model
- Admin access to AWS resources is controlled by IAM (users/roles).
- End-user access to desktops is controlled by the provider’s identity integration. WorkSpaces Core affects the client access layer; verify:
- Whether authentication is AD, SAML/OIDC, or provider-native
- MFA enforcement points
- Conditional access capabilities (device posture, geolocation, risk-based auth)
Encryption
- Use KMS encryption for:
- CloudTrail logs in S3
- VPC Flow Logs destinations (where applicable)
- Any configuration/state stored in AWS services
- For desktop/session encryption:
- Verify protocol encryption with your provider.
- Verify certificate management (public CA vs internal CA).
Network exposure
- Keep desktop hosts in private subnets (no public IPs).
- Restrict inbound/outbound with:
- security groups / NACLs (AWS)
- on-prem firewalls
- provider policy controls
- Use allowlists for outbound traffic where feasible.
Secrets handling
- Treat provider onboarding credentials, API keys, and registration artifacts as secrets.
- Store secrets in AWS Secrets Manager or a central enterprise vault (if provider integration requires AWS-side secrets).
- Rotate credentials and restrict who can generate/issue onboarding codes.
Audit/logging
- Enable CloudTrail across accounts and regions as required by policy.
- Enable VPC Flow Logs for EUC-related networks.
- Ensure logs are immutable:
- S3 Object Lock (if required by compliance; verify requirements)
- restricted delete permissions
- multi-account log archive
Compliance considerations
WorkSpaces Core may appear in compliance scope because it is part of desktop access: – Document data flows: where pixels traverse, where authentication happens, where logs are stored. – Map controls across AWS and provider responsibilities (shared responsibility model).
Common security mistakes
- Leaving desktop hosts reachable from the internet
- Inadequate DNS and routing controls leading to split-tunnel leakage
- No centralized logging; inability to investigate access events
- Oversharing registration codes or not expiring them
- Lack of MFA/conditional access for desktop sign-in
Secure deployment recommendations
- Enforce MFA at the IdP/provider.
- Centralize and encrypt logs; restrict deletion.
- Run routine access reviews and entitlement audits.
- Conduct a network threat model:
- user endpoint compromise
- credential theft
- lateral movement from desktops to internal apps
13. Limitations and Gotchas
Because WorkSpaces Core depends on provider integration, many limitations are provider-specific. Common “gotchas” you should plan for:
Known limitations / boundaries (verify in docs)
- Supported VDI providers are limited to those with an official integration.
- Feature parity with a provider’s native client may not be complete (USB redirection, smart cards, specialized peripherals, etc.).
- Regional availability: WorkSpaces Core may not be offered in every AWS Region.
Quotas
- VPC component quotas (subnets, endpoints, route tables)
- Logging volume/retention constraints (practical operational limits)
- Provider quotas: users, sessions, brokers, host capacity
Regional constraints
- Some users may experience poor performance if desktops are far from them.
- Some compliance regimes require data residency; ensure region/provider placement meets requirements.
Pricing surprises
- NAT gateways and egress bandwidth costs can dominate EUC bills.
- SIEM ingestion of verbose logs can exceed expectations.
- Provider licensing and Windows licensing can be major line items outside AWS.
Compatibility issues
- Corporate proxies and TLS inspection can break client flows.
- Endpoint OS policies (MDM restrictions) can block device redirection features.
- DNS split-horizon mistakes can cause intermittent authentication failures.
Operational gotchas
- Blame ambiguity: “Is it AWS, the provider, the network, the IdP, or the endpoint?”
- Solve with clear RACI, shared dashboards, and correlation IDs where possible.
- Change control: provider upgrades may alter endpoints or auth flows.
- Image lifecycle: if desktops are provider-managed, ensure you still have patch SLAs and rollout methods.
Migration challenges
- Migrating users from provider-native client to WorkSpaces client can change workflows.
- SSO and MFA behavior may differ; pilot with representative user groups.
- Peripheral-heavy users (call centers, CAD peripherals) require dedicated testing.
Vendor-specific nuances
- Providers differ in:
- gateway placement
- protocol selection
- identity mapping
- logging export options
- session reliability controls
Validate each in provider documentation.
14. Comparison with Alternatives
Amazon WorkSpaces Core sits in a specific niche: WorkSpaces client enablement for supported third-party VDI. Below is a practical comparison.
| Option | Best For | Strengths | Weaknesses | When to Choose |
|---|---|---|---|---|
| Amazon WorkSpaces Core | Standardizing on WorkSpaces clients while using a supported third-party VDI provider | Client standardization, AWS governance/logging for AWS-side components, hybrid flexibility | Requires supported provider; not a full desktop service by itself; some features may be provider-dependent | You want WorkSpaces clients + partner VDI desktops |
| Amazon WorkSpaces Personal | Fully managed persistent desktops on AWS | AWS-managed provisioning, simplified ops, AWS-native integrations | Less flexibility if you rely heavily on a specific third-party VDI stack | You want AWS-managed desktops end-to-end |
| Amazon WorkSpaces Pools | Non-persistent pooled desktops (where available) | Pooled economics and simplified non-persistent delivery | Not for persistent “personal” desktops; availability and features vary | Task workers or shift-based pooled desktops |
| Amazon AppStream 2.0 | Application streaming (not full desktops) | App-level delivery, reduced desktop management | Not a full desktop; app compatibility work | You need specific apps, not full desktop environments |
| Amazon WorkSpaces Web | Secure web browsing / web app access | Browser isolation model, simpler for web apps | Not VDI; limited for thick-client workloads | You need secure browser access rather than desktops |
| Self-managed VDI on EC2 (DIY) | Full control, custom brokering | Maximum control and customization | High ops burden; complex scaling and security | You have strong VDI expertise and want full control |
| Azure Virtual Desktop (AVD) | Microsoft-centric EUC | Deep Microsoft integration | Azure-specific; different client and ops model | You are primarily in Azure/Microsoft ecosystem |
| Google Cloud / partner DaaS | Specific partner ecosystems | Provider-specific optimizations | Less AWS governance alignment | You operate primarily outside AWS |
15. Real-World Example
Enterprise example: Global bank standardizing EUC access during hybrid transition
- Problem: The bank has an established third-party VDI platform in multiple regions, but endpoint teams struggle with multiple clients, inconsistent onboarding, and audit fragmentation. They also need to keep many desktops close to regulated datasets on-prem.
- Proposed architecture:
- Users run Amazon WorkSpaces client on managed endpoints.
- WorkSpaces Core integrates with the bank’s supported VDI provider.
- Desktop hosts remain split: on-prem for regulated workloads; EC2-based farms for less sensitive workloads.
- Connectivity uses Direct Connect with VPN backup.
- Central logging: CloudTrail + S3 log archive + SIEM, plus provider log exports.
- Why WorkSpaces Core was chosen:
- Standardize client experience while keeping the existing provider.
- Align EUC access enablement with AWS account governance and centralized logging.
- Expected outcomes:
- Reduced endpoint support complexity.
- Better audit readiness and clearer operational boundaries.
- Faster onboarding for contractors and new business units.
Startup/small-team example: Consulting company offering secure contractor desktops
- Problem: A 200-person consulting company frequently onboards contractors who need access to internal systems without granting VPN access from unmanaged devices.
- Proposed architecture:
- WorkSpaces Core + supported provider’s desktop platform.
- Contractors use WorkSpaces client on their own devices.
- Desktops run in a dedicated environment with strict egress allowlists and no clipboard/file transfer (policy-driven).
- Logs are centralized into S3 and forwarded to a lightweight SIEM.
- Why WorkSpaces Core was chosen:
- Faster onboarding with a standard client.
- Stronger separation between contractor devices and corporate network.
- Expected outcomes:
- Reduced security risk versus direct VPN access.
- Predictable onboarding/offboarding process.
- Clear cost allocation per contractor cohort.
16. FAQ
1) Is Amazon WorkSpaces Core the same as Amazon WorkSpaces Personal?
No. WorkSpaces Personal is a fully managed AWS desktop service. Amazon WorkSpaces Core is oriented around enabling the WorkSpaces client experience with supported third-party VDI providers.
2) Does WorkSpaces Core run the desktop OS for me?
WorkSpaces Core is not typically the component that runs the desktop OS. The desktop/session hosts are provided/managed by your supported VDI provider (or where your provider deploys them). Verify your provider’s architecture.
3) Do I still need a VDI provider with WorkSpaces Core?
Yes—WorkSpaces Core is designed around integration with supported third-party VDI solutions.
4) What client do end users install?
End users typically use the Amazon WorkSpaces client. Confirm OS support and features via the official client download page and provider integration notes.
5) Does WorkSpaces Core support SSO and MFA?
Often yes via provider/IdP integration, but the exact support and configuration is provider-specific. Validate SSO/MFA flows with your provider documentation.
6) Is Amazon WorkSpaces Core regional?
In practice, AWS EUC services are region-based and you must select regions for deployments. Verify current region availability for WorkSpaces Core in AWS docs.
7) How do I log and audit WorkSpaces Core activity?
Use AWS CloudTrail for AWS API auditing and VPC Flow Logs for VPC traffic visibility where applicable. Provider-side brokering/auth logs must be exported from the provider platform.
8) What are the biggest cost drivers?
Commonly: per-user entitlements (if applicable), data transfer/egress, NAT gateways, hybrid connectivity (VPN/Direct Connect), and provider licensing.
9) Does WorkSpaces Core reduce bandwidth needs?
Not inherently. Bandwidth is dominated by the desktop streaming protocol and user behavior (video, multiple monitors, resolution). Optimize region placement and network paths.
10) Can I keep desktops fully private (no public IPs)?
That’s a best practice. Use private subnets and private connectivity patterns. Exact requirements depend on provider gateway placement and architecture.
11) Can I use it for call centers with USB headsets and peripherals?
Possibly, but peripheral support is one of the most variable areas. Validate headset/USB redirection and softphone optimizations with your provider integration.
12) How do I handle DNS for hybrid desktops?
Use Route 53 Resolver endpoints and conditional forwarding to on-prem DNS/AD, or the equivalent enterprise DNS strategy. DNS is critical for reliable sign-in and app access.
13) What happens if the provider service is down?
WorkSpaces client access will likely be impacted because brokering is provider-dependent. Plan monitoring, escalation paths, and regional failover where supported.
14) Is WorkSpaces Core suitable for regulated industries?
It can be, but you must design for compliance: logging, encryption, identity controls, and data residency across AWS and provider components.
15) How do I get started quickly?
Start with a pilot: set up AWS logging + VPC foundations, choose a supported provider, validate identity and network paths, and run a representative user test plan.
16) Can I migrate from WorkSpaces Core to WorkSpaces Personal later?
Potentially, but it is not a direct “in-place” switch because they are different service models. Plan migrations at the user/application/image level.
17) Do I need AWS Direct Connect?
Not always. VPN may be enough for smaller deployments, but Direct Connect is common for predictable latency and throughput in enterprise settings.
17. Top Online Resources to Learn Amazon WorkSpaces Core
| Resource Type | Name | Why It Is Useful |
|---|---|---|
| Official documentation | AWS Documentation (search: Amazon WorkSpaces Core) https://docs.aws.amazon.com/ | Canonical feature scope, setup guidance, and integration references |
| Official product page | Amazon WorkSpaces Core product page (verify current URL) https://aws.amazon.com/workspaces/ | Service overview and positioning within AWS End user computing |
| Official pricing | Amazon WorkSpaces Core Pricing (verify) https://aws.amazon.com/workspaces/core/pricing/ | Current pricing dimensions and Region-specific details |
| Pricing tool | AWS Pricing Calculator https://calculator.aws/ | Build scenario-based estimates for pilots and production |
| Client downloads | Amazon WorkSpaces Clients (verify) https://clients.amazonworkspaces.com/ | Download official clients; confirm OS support and versions |
| Architecture guidance | AWS Architecture Center https://aws.amazon.com/architecture/ | Reference patterns for networking, logging, identity, and hybrid connectivity |
| Logging/audit | AWS CloudTrail User Guide https://docs.aws.amazon.com/awscloudtrail/latest/userguide/ | Essential for auditing AWS-side activity in EUC foundations |
| Networking | Amazon VPC documentation https://docs.aws.amazon.com/vpc/ | Required for private connectivity and segmentation designs |
| Hybrid DNS | Route 53 Resolver documentation https://docs.aws.amazon.com/Route53/latest/DeveloperGuide/resolver.html | Critical patterns for AD and hybrid name resolution |
| Community (general EUC) | AWS End User Computing Blog (verify) https://aws.amazon.com/blogs/desktop-and-application-streaming/ | Updates, patterns, and operational guidance (validate specifics for Core) |
18. Training and Certification Providers
| Institute | Suitable Audience | Likely Learning Focus | Mode | Website URL |
|---|---|---|---|---|
| DevOpsSchool.com | Engineers, architects, ops teams | AWS fundamentals, cloud operations, DevOps practices relevant to EUC foundations | Check website | https://www.devopsschool.com/ |
| ScmGalaxy.com | Beginners to intermediate | DevOps/SCM concepts; may complement AWS EUC operational readiness | Check website | https://www.scmgalaxy.com/ |
| CLoudOpsNow.in | Cloud ops practitioners | Cloud operations, monitoring, governance patterns | Check website | https://www.cloudopsnow.in/ |
| SreSchool.com | SREs, reliability engineers | Reliability engineering practices applicable to EUC platform operations | Check website | https://www.sreschool.com/ |
| AiOpsSchool.com | Ops teams exploring AIOps | Monitoring/automation concepts that can help with EUC incident response | Check website | https://www.aiopsschool.com/ |
19. Top Trainers
| Platform/Site | Likely Specialization | Suitable Audience | Website URL |
|---|---|---|---|
| RajeshKumar.xyz | DevOps/cloud training content | Beginners to intermediate | https://rajeshkumar.xyz/ |
| devopstrainer.in | DevOps tooling and cloud operations | Engineers and ops teams | https://www.devopstrainer.in/ |
| devopsfreelancer.com | Freelance DevOps consulting/training platform | Teams needing practical guidance | https://www.devopsfreelancer.com/ |
| devopssupport.in | DevOps support and training services | Operations teams | https://www.devopssupport.in/ |
20. Top Consulting Companies
| Company Name | Likely Service Area | Where They May Help | Consulting Use Case Examples | Website URL |
|---|---|---|---|---|
| cotocus.com | Cloud/DevOps consulting | Landing zones, networking, automation, governance | Multi-account logging baseline; VPC/DNS design for EUC; cost optimization reviews | https://cotocus.com/ |
| DevOpsSchool.com | Training + consulting | Enablement, platform setup, operational readiness | EUC foundation runbooks; CI/CD for infra; monitoring/logging setup | https://www.devopsschool.com/ |
| DEVOPSCONSULTING.IN | DevOps and cloud consulting | Operations, automation, security hardening | IAM least privilege reviews; CloudTrail/S3/KMS hardening; incident response playbooks | https://www.devopsconsulting.in/ |
21. Career and Learning Roadmap
What to learn before Amazon WorkSpaces Core
- AWS fundamentals: IAM, VPC, Regions/AZs, security groups, routing
- Networking: DNS, VPN, TCP/UDP basics, MTU, latency/jitter concepts
- Identity: AD basics, SAML/OIDC, MFA, conditional access patterns
- Logging/security: CloudTrail, KMS encryption, S3 lifecycle, SIEM basics
What to learn after Amazon WorkSpaces Core
- EUC operations: image lifecycle, patch orchestration, change management
- Advanced hybrid networking: Route 53 Resolver endpoints, Transit Gateway (where appropriate), Direct Connect designs
- Zero trust: device posture, risk-based access, session controls
- Cost optimization: egress optimization, NAT alternatives, log cost controls
Job roles that use it
- EUC / Virtual Desktop Engineer
- Cloud Network Engineer
- Cloud Security Engineer
- Solutions Architect (End User Computing)
- Platform Engineer (shared services)
- SRE/Operations (for the EUC platform layer)
Certification path (AWS)
WorkSpaces Core itself does not have a standalone certification, but relevant AWS certifications include:
– AWS Certified Solutions Architect – Associate/Professional
– AWS Certified Advanced Networking – Specialty
– AWS Certified Security – Specialty
Choose based on whether you’re designing (architect), operating (ops/SRE), or securing (security) the environment.
Project ideas for practice
- Build a multi-account log archive with CloudTrail + S3 Object Lock (if required).
- Design a hybrid DNS lab using Route 53 Resolver inbound/outbound endpoints.
- Create a cost model comparing NAT gateways vs VPC endpoints for EUC subnets.
- Write runbooks for:
- user onboarding/offboarding
- incident triage (auth vs network vs provider)
- performance investigation (latency/packet loss)
22. Glossary
- End user computing (EUC): Technologies that deliver desktops, apps, and secure access experiences to end users.
- VDI (Virtual Desktop Infrastructure): Centralized hosting of desktop environments delivered to user devices over a network.
- Broker: Component that authenticates users and assigns them to a desktop/session host.
- Session host/Desktop host: The machine (VM/host) where the desktop OS runs.
- Control plane: Management components (APIs, brokers, policies).
- Data plane: The traffic carrying the desktop experience (display, input, audio, device redirection).
- CloudTrail: AWS service that logs AWS API calls for audit and investigations.
- VPC Flow Logs: Network flow metadata logs for traffic in a VPC.
- KMS (Key Management Service): AWS service to create and control encryption keys.
- NAT Gateway: AWS managed NAT service for private subnet egress to the internet.
- Direct Connect: Dedicated private connectivity from on-premises to AWS.
- Site-to-Site VPN: Encrypted tunnels over the internet between on-premises and AWS.
- Split-horizon DNS: DNS design where the same domain resolves differently inside vs outside a network.
- Conditional forwarding: DNS technique to forward queries for specific domains to specific DNS servers.
- Least privilege: Granting only the permissions required to perform a task.
23. Summary
Amazon WorkSpaces Core (AWS) is an End user computing service focused on enabling users to access third-party VDI desktops using the Amazon WorkSpaces client experience. It matters when you want to standardize endpoint access and governance while continuing to use (or adopting) a supported VDI provider rather than moving fully to AWS-managed desktops.
Architecturally, treat WorkSpaces Core deployments as a multi-layer solution: AWS-side logging/governance and network foundations, plus provider-side brokering and desktop/session host operations. Cost is driven not only by WorkSpaces Core pricing dimensions (verify on the official pricing page), but also by network egress, NAT/VPN/Direct Connect, and provider licensing. Security success depends on correct identity integration, private networking, encryption of logs, and strong operational runbooks that clearly separate AWS vs provider responsibilities.
Use Amazon WorkSpaces Core when you need WorkSpaces client standardization with a supported VDI provider. If you want AWS to fully manage desktops, consider Amazon WorkSpaces Personal instead. The next learning step is to validate provider support in the official docs, run a small pilot with representative users, and operationalize logging, DNS, and connectivity before scaling.