Centralized audit logging in a VPC private subnet with a proxy deployment gives you control and visibility without exposing sensitive data. Teams that run this pattern keep their audit trails secure, compliant, and query-ready while keeping ingress and egress locked down. The architecture is simple in theory but unforgiving in execution: secure log ingress, predictable routing, no public endpoints, and direct observability from a single point of truth.
The core idea is to consolidate system, application, and access logs in a central logging service that lives in a private subnet inside your VPC. All traffic goes through a tightly configured proxy. This design ensures you meet compliance frameworks like SOC 2, PCI-DSS, and ISO 27001 without building a fragile patchwork of firewalls, scripts, and public gateways.
A proxy deployment inside the private subnet handles authenticated connections from workload subnets and other VPC networks through peering or Transit Gateway. It routes logs to the central system, applying TLS termination or mutual TLS where required. This way, even cross-region logging flows through the same policy-controlled environment. Network ACLs and security groups lock all inbound internet access, reducing the attack surface to near zero.