Ensure that your Amazon VPC network uses the highly available Managed NAT Gateway service instead of an NAT instance in order to enable EC2 instances running within a private subnet to connect to the Internet or with other AWS components.
This rule can help you with the following compliance standards:
- APRA
- MAS
- NIST4
For further details on compliance standards supported by Conformity, see here.
This rule can help you work with the AWS Well-Architected Framework.
This rule resolution is part of the Conformity Security & Compliance tool for AWS.
efficiency
AWS provides two types of NAT devices: Managed NAT Gateways and NAT instances instantiated from a public AMIs. Using the Managed NAT Gateway service instead of an NAT instance to forward traffic for the EC2 instances available in a private subnet has multiple advantages. For example, the Managed NAT Gateway provides built-in redundancy for high availability (using the multi-AZ configuration) compared to the NAT instance which use just a script to manage failover, Managed NAT Gateway provides better bandwidth (traffic bursts up to 10Gbps) than the NAT instance which is limited to the bandwidth allocated for the EC2 instance type used. Lastly, the Managed NAT Gateway service is using optimized software to handle NAT traffic and is fully managed by AWS compared to the NAT instance which is not optimized and requires scaling and regular maintenance such as installing software updates or security patches.
Audit
To determine if your Virtual Private Clouds (VPCs) are using Managed NAT Gateways as NAT devices, perform the following actions:
Remediation / Resolution
To enable the Managed NAT Gateway service for your VPC networks, perform the following actions:
References
- AWS Documentation
- Amazon VPC FAQs
- What is Amazon VPC?
- NAT
- NAT Gateways
- NAT Instances
- Comparison of NAT Instances and NAT Gateways
- Scenario 2: VPC with Public and Private Subnets (NAT)
- AWS Command Line Interface (CLI) Documentation
- ec2
- describe-vpcs
- describe-nat-gateways
- allocate-address
- describe-subnets
- create-nat-gateway
- create-route
- replace-route