That’s the point. In a PCI DSS compliant VPC, the private subnet is your fortress, and a proxy deployment is the drawbridge you control. Credit card data never touches the open web. Traffic flows only where you allow it, through layers built to meet strict PCI DSS network segmentation rules. Every route is deliberate. Every connection is traced.
A private subnet in an AWS VPC gives you network isolation by default. No public IPs. No inbound access unless you add it. For PCI DSS, this is non-negotiable. Outbound traffic is often needed — to send logs, pull updates, talk to APIs — but you control it with a proxy. The proxy lives in a public subnet or a hardened private subnet with NAT capabilities. Packets leave through it, tagged, logged, and inspected.
Designing this well starts with the security baseline:
- Subnet layout: One subnet for internet-facing services, one or more private subnets for sensitive workloads.
- Routing tables: Private subnets have no direct route to the internet gateway. They route outbound traffic to the proxy or NAT.
- Proxy configuration: Only approved destinations. Only approved ports. Detailed logs of every connection.
- Access control: Security groups and NACLs to restrict lateral movement and unauthorized access.
PCI DSS requirement 1.2.1 demands restricting inbound and outbound connections to what is necessary. A proxy deployment between private subnets and the public network enforces this rule. It simplifies reporting and proves network segmentation in an audit.