The alarm hits at 02:14. Logs spike. Endpoints slow. The map lights up red from Sydney to Sao Paulo. You need to move fast, contain damage, and guard every packet. The playbook calls for isolation inside a VPC private subnet, running through a hardened proxy, with zero trust for anything beyond your defined paths.
Incident response begins here: control the flow, hide the origin, and force all traffic through layers you command. A VPC private subnet limits entry points. The proxy shields the subnet, filtering requests before they touch sensitive workloads. Deployed well, they work as one—network segmentation keeping inside traffic invisible, and the proxy acting as the only mouthpiece to the outside.
Deployment is measured in precision. Start by defining your VPC with private subnets in multiple availability zones for resilience. Attach routes to your NAT gateway only when outbound traffic is required, and send that traffic through a proxy fleet built for deep inspection and logging. Your proxy layer should authenticate every request, strip unneeded headers, and enforce outbound ACLs. Keep control of DNS resolution inside the VPC, so no resolver leaks your intent.
For security teams, visibility during an active incident is critical. Forward proxy logs to a secure storage bucket with lifecycle policies. Stream session data to an analysis tool in real-time, but never bypass private subnet rules for faster access. Contain first, investigate second. Every outbound call must have a fingerprint you can trace.