AWS Certified Solutions Architect Professional SAP-C02 Practice Question
A financial services company is modernizing a monolithic on-premises application by refactoring it into containerized microservices to be deployed on Amazon ECS. A key security requirement is that all east-west traffic (service-to-service communication) between the microservices must be routed through a fleet of third-party network security appliances for deep packet inspection. The company wants to use AWS Fargate to minimize infrastructure management overhead. Which architectural challenge must a solutions architect address to meet these requirements when using the Fargate launch type?
The use of an Application Load Balancer (ALB) for Fargate services encrypts all east-west traffic, which prevents network security appliances from performing deep packet inspection.
Fargate tasks use the awsvpc network mode, giving each task a dedicated ENI within a subnet, which complicates routing intra-VPC traffic to a centralized inspection appliance.
Fargate does not support the host network mode, which is required to bind the security appliances directly to the same underlying instance as the application containers.
AWS Fargate tasks cannot be assigned security groups, which prevents the implementation of the network traffic filtering rules required by the security appliances.
The correct answer identifies the fundamental networking challenge with inspecting east-west traffic for Fargate tasks. Fargate tasks are required to use the awsvpc network mode, where each task is assigned its own Elastic Network Interface (ENI) and a private IP address from the VPC's subnet. This means that when one microservice communicates with another in the same VPC, the traffic flows directly between their ENIs within the subnet. Standard VPC routing does not intercept this intra-subnet traffic, making it difficult to force it through a centralized inspection point. To solve this, an architect must implement an advanced networking pattern. Common solutions include using an AWS Transit Gateway to route traffic between different VPCs (or different subnets) to a dedicated 'inspection VPC' where the security appliances are hosted. Another modern approach involves using a service mesh that can control and redirect traffic at the application layer.
Incorrect answers are:
Fargate tasks absolutely can and do use security groups. A security group is associated with each task's ENI, providing stateful, instance-level firewall capabilities. Stating that they cannot be assigned is factually incorrect.
While it's true that Fargate does not support host network mode, this mode is irrelevant to the problem of inspecting traffic between separate tasks. Host mode ties a container's networking directly to the underlying host's network stack, which is a concept antithetical to the Fargate serverless model.
An Application Load Balancer (ALB) primarily manages north-south (ingress) traffic from clients to the services. It does not typically handle direct east-west (service-to-service) communication. Even if it did, the challenge is routing the traffic for inspection, not the encryption itself.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the `awsvpc` network mode in AWS Fargate?
Open an interactive chat with Bash
How can a Transit Gateway help with routing intra-VPC traffic?
Open an interactive chat with Bash
What role does a service mesh play in traffic control for microservices?
Open an interactive chat with Bash
AWS Certified Solutions Architect Professional SAP-C02
Accelerate Workload Migration and Modernization
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
IT & Cybersecurity Package Join Premium for Full Access