What to look for when creating secure, auditable peering within AWS VPCs?
Why does it matter?
- There is a need for application segmentation depending on security rules, business units, cost centers and mission criticality. Thus, smaller VPCs are preferred. This leads to a comprehensive connectivity requirement across VPCs.
- There is a need for central security enforcement that implements firewall policies for cross VPC traffic.
- There is a need for enterprise grade encryption based on private keys when communicating across VPCs.
What to look for?
- For maximum cloud infrastructure agility, there is a need for orchestration of connectivity, route table updates, and firewall policies and active monitoring.
- Should be able to use non-shared keys for encryption.
- Should be able to visualize and log packet statistics for mission critical application traffic.
- Should be able to monitor and alert on peering status.
- Should be easy to troubleshoot with advanced capabilities like packet capture.
for more information please contact us at [email protected]