The air in the data center hums. You have a FedRAMP High Baseline to meet, and your VPC is locked down in private subnets with no direct public access. External traffic still needs to flow — securely, auditably, and without breaking compliance. The solution is a proxy deployment designed for isolation, monitoring, and control.
A FedRAMP High Baseline VPC private subnet proxy deployment minimizes exposure by routing outbound connections through a controlled proxy tier. That tier sits in an isolated subnet, accessible only from approved resources. No internet gateways attach to the private subnets themselves. Instead, a NAT gateway or dedicated proxy handles traffic, applying logging, TLS enforcement, and strict allowlists. This configuration aligns with FedRAMP's requirement for boundary protection and continuous monitoring.
Start with a VPC architecture split into at least two private subnets across multiple availability zones. Place your application instances here. Deploy a proxy — often using tools like Squid, Envoy, or a cloud provider's managed forwarding service — into a hardened subnet. Attach security groups that restrict inbound traffic to known sources, and outbound traffic to approved destinations. Use VPC flow logs and CloudTrail to capture every request, storing logs in a FedRAMP-compliant service for retention and audit.
For High Baseline compliance, encryption in transit is not optional. Configure your proxy to enforce TLS 1.2 or above. Disable plaintext protocols. Ensure no bypass routes exist around the proxy; this means eliminating misconfigured routes or temporary testing gateways that could allow unmonitored traffic.