Project: Secure VPC Networking Environment for Café Application

Timeline: September 2025
Role: Cloud Solutions Architect
Skills: AWS VPC, Subnets, Bastion Host, NAT Gateway, EC2, Security Groups, Network ACLs

Project Summary

Designed and deployed a secure Amazon VPC architecture for a café’s application. The solution ensured administrative access via a bastion host, placed application workloads in private subnets, and implemented layered security controls with NAT Gateway, security groups, and custom Network ACLs. The project demonstrates hands-on AWS networking, access control, and secure environment design.


Objectives

  • Build a VPC with public and private subnets for workload separation.
  • Deploy a bastion host for secure administrative access.
  • Enable outbound internet connectivity for private resources via NAT Gateway.
  • Enforce resource- and subnet-level security with security groups and custom NACLs.
  • Validate connectivity and access restrictions across resources.

Implementation & Highlights

1. Public Subnet & Bastion Host

  • Created a public subnet with route to Internet Gateway.
  • Deployed bastion host EC2 with SSH restricted to admin IP.

Bastion Host Setup


2. Private Subnet & Application Server

  • Created a private subnet for application workloads.
  • Deployed private EC2 instance, accessible only via bastion host.

Private Instance


3. NAT Gateway for Outbound Connectivity

  • Launched a NAT Gateway in the public subnet with Elastic IP.
  • Configured route table to allow private instance outbound access for updates.

NAT Gateway


4. Secure SSH Passthrough

  • Enabled SSH agent forwarding to access private instance via bastion host.
  • Verified successful login and outbound connectivity (ping test).

SSH Passthrough SSH Passthrough


5. Custom Network ACL

  • Created and applied custom NACL to private subnet.
  • Configured rule to block ICMP traffic → verified denial of ping after rule applied.

NACL Rules NACL Rules


Outcome & Impact

  • Delivered a secure VPC environment with layered security controls.
  • Achieved isolation of workloads in private subnet while maintaining required internet access.
  • Implemented best practices for administrative access via bastion host.
  • Gained practical skills in designing production-ready AWS VPC architectures.

Back to Projects