A company uses AWS CloudFormation to deploy applications within multiple VPCs that are all attached to a transit gateway Each VPC that sends traffic to the public internet must send the traffic through a shared services VPC Each subnet within a VPC uses the default VPC route table and the traffic is routed to the transit gateway The transit gateway uses its default route table for any VPC attachment
A security audit reveals that an Amazon EC2 instance that is deployed within a VPC can communicate with an EC2 instance that is deployed in any of the company's other VPCs A solutions architect needs to limit the traffic between the VPCs. Each VPC must be able to communicate only with a predefined, limited set of authorized VPCs.
What should the solutions architect do to meet these requirements'?
You can segment your network by creating multiple route tables in an AWS Transit Gateway and associate Amazon VPCs and VPNs to them. This will allow you to create isolated networks inside an AWS Transit Gateway similar to virtual routing and forwarding (VRFs) in traditional networks. The AWS Transit Gateway will have a default route table. The use of multiple route tables is optional.
Cornell
5 hours agoDevorah
5 days agoSheridan
11 days agoShawnta
16 days agoJamie
21 days agoLinn
26 days agoGeorgeanna
1 month agoJackie
1 month agoRoyce
1 month agoJudy
2 months agoStephaine
2 months agoChu
2 months agoColene
2 months agoBernardine
3 months agoArlette
3 months agoHillary
3 months agoLynette
3 months agoVanesa
2 months agoMargarett
2 months ago