A company has created an account for individual Development teams, resulting in a total of 200 accounts. All accounts have a single virtual private cloud (VPC) in a single region with multiple microservices running in Docker containers that need to communicate with microservices in other accounts. The Security team requirements state that these microservices must not traverse the public internet, and only certain internal services should be allowed to call other individual services. If there is any denied network traffic for a service, the Security team must be notified of any denied requests, including the source IP.
How can connectivity be established between service while meeting the security requirements?
Warrenn
Highly Voted 3 years, 7 months agoexamacc
3 years, 7 months agomimadour21698
Most Recent 2 years agojoanneli77
2 years, 7 months agoheany
2 years, 7 months agohilft
2 years, 9 months agoaandc
2 years, 10 months agoNi_yot
3 years, 2 months agocldy
3 years, 4 months agoAzureDP900
3 years, 4 months agoandylogan
3 years, 6 months agoKopa
3 years, 6 months agoStelSen
3 years, 6 months agoDashL
3 years, 6 months ago01037
3 years, 6 months agonisoshabangu
3 years, 6 months agoRadhaghosh
3 years, 6 months agoWhyIronMan
3 years, 6 months agoksl4u
3 years, 6 months ago