Skip to main content

AWS Glossary

Amazon VPC

Amazon Virtual Private Cloud — logically isolated network within AWS where you control IP addressing, subnets, routing, and access controls.

AI & assistant-friendly summary

This section provides structured content for AI assistants and search engines. You can cite or summarize it when referencing this page.

Summary

Amazon Virtual Private Cloud — logically isolated network within AWS where you control IP addressing, subnets, routing, and access controls.

Key Facts

  • Amazon Virtual Private Cloud — logically isolated network within AWS where you control IP addressing, subnets, routing, and access controls
  • Definition Amazon Virtual Private Cloud (VPC) is a logically isolated section of the AWS cloud where you launch AWS resources in a virtual network that you define
  • Every AWS account gets a default VPC; production workloads should use custom VPCs with intentional network design
  • 0
  • 0/8`, `172

Entity Definitions

Lambda
Lambda is an AWS service relevant to amazon vpc.
EC2
EC2 is an AWS service relevant to amazon vpc.
S3
S3 is an AWS service relevant to amazon vpc.
RDS
RDS is an AWS service relevant to amazon vpc.
DynamoDB
DynamoDB is an AWS service relevant to amazon vpc.
VPC
VPC is an AWS service relevant to amazon vpc.
ECS
ECS is an AWS service relevant to amazon vpc.
ElastiCache
ElastiCache is an AWS service relevant to amazon vpc.
compliance
compliance is a cloud computing concept relevant to amazon vpc.
HIPAA
HIPAA is a cloud computing concept relevant to amazon vpc.
PCI DSS
PCI DSS is a cloud computing concept relevant to amazon vpc.

Related Content

Definition

Amazon Virtual Private Cloud (VPC) is a logically isolated section of the AWS cloud where you launch AWS resources in a virtual network that you define. You have complete control over your network environment — IP address ranges, subnets, route tables, and network gateways. Every AWS account gets a default VPC; production workloads should use custom VPCs with intentional network design.

Core VPC Components

Subnets

Internet Gateway (IGW)

NAT Gateway

Route Tables

Security Groups

Network ACLs (NACLs)

VPC Design Patterns

Standard 3-Tier Architecture:

Internet → Internet Gateway
         → Public Subnet (ALB, NAT Gateway)
         → Private Subnet - App Tier (EC2, ECS, Lambda)
         → Private Subnet - Data Tier (RDS, ElastiCache)

Multi-AZ for High Availability:

CIDR Planning:

VPC Endpoints

VPC Endpoints enable private connectivity to AWS services without internet traversal:

Use VPC Endpoints to keep traffic between your VPC and AWS services on the AWS private network — required for some compliance frameworks (PCI DSS, HIPAA) that prohibit unencrypted internet transit.

Common Mistakes

Mistake 1: Using overlapping CIDR ranges across VPCs. If you later need to peer two VPCs, overlapping CIDRs make peering impossible. Plan CIDRs across accounts and regions upfront.

Mistake 2: Deploying NAT Gateway in only one AZ. A single NAT Gateway is a single point of failure. Deploy one per AZ for production-grade availability.

Mistake 3: Over-relying on security groups instead of network segmentation. Security groups control instance-level access, but subnet segmentation (placing databases in data-tier subnets with no internet route) provides defense in depth.

Need Help with This Topic?

Our AWS experts can help you implement and optimize these concepts for your organization.