A company uses AWS CloudFormation to deploy applications within multiple VPCs that are all attached to a transit gateway Each VPC that sends traffic to the public internet must send the traffic through a shared services VPC Each subnet within a VPC uses the default VPC route table and the traffic is routed to the transit gateway The transit gateway uses its default route table for any VPC attachment
A security audit reveals that an Amazon EC2 instance that is deployed within a VPC can communicate with an EC2 instance that is deployed in any of the company's other VPCs A solutions architect needs to limit the traffic between the VPCs. Each VPC must be able to communicate only with a predefined, limited set of authorized VPCs.
What should the solutions architect do to meet these requirements'?
You can segment your network by creating multiple route tables in an AWS Transit Gateway and associate Amazon VPCs and VPNs to them. This will allow you to create isolated networks inside an AWS Transit Gateway similar to virtual routing and forwarding (VRFs) in traditional networks. The AWS Transit Gateway will have a default route table. The use of multiple route tables is optional.
Cecilia
4 days agoJaney
10 days agoMarya
15 days agoNada
20 days agoArthur
25 days agoRoy
1 month agoStefan
1 month agoCornell
2 months agoDevorah
2 months agoSheridan
2 months agoShawnta
2 months agoJamie
2 months agoLinn
3 months agoGeorgeanna
3 months agoJackie
3 months agoRoyce
3 months agoJudy
3 months agoStephaine
4 months agoChu
4 months agoColene
4 months agoBernardine
5 months agoArlette
5 months agoHillary
5 months agoLynette
5 months agoVanesa
4 months agoMargarett
4 months ago