Step 6: (Optional) Use AWS PrivateLink to set up a VPC endpoint for Session Manager
You can further improve the security posture of your managed nodes by configuring AWS Systems Manager to use an interface virtual private cloud (VPC) endpoint. Interface endpoints are powered by AWS PrivateLink, a technology that allows you to privately access Amazon Elastic Compute Cloud (Amazon EC2) and Systems Manager APIs by using private IP addresses.
AWS PrivateLink restricts all network traffic between your managed nodes, Systems Manager, and Amazon EC2 to the Amazon network. (Managed nodes don't have access to the internet.) Also, you don't need an internet gateway, a NAT device, or a virtual private gateway.
For information about creating a VPC endpoint, see Improve the security of EC2 instances by using VPC endpoints for Systems Manager.
The alternative to using a VPC endpoint is to allow outbound internet access on your managed nodes. In this case, the managed nodes must also allow HTTPS (port 443) outbound traffic to the following endpoints:
-
ec2messages.
region
.amazonaws.com -
ssm.
region
.amazonaws.com -
ssmmessages.
region
.amazonaws.com
Systems Manager uses the last of these endpoints,
ssmmessages.
, to
make calls from SSM Agent to the Session Manager service in the cloud.region
.amazonaws.com
To use optional features like AWS Key Management Service (AWS KMS) encryption, streaming logs to Amazon CloudWatch Logs (CloudWatch Logs), and sending logs to Amazon Simple Storage Service (Amazon S3) you must allow HTTPS (port 443) outbound traffic to the following endpoints:
-
kms.
region
.amazonaws.com -
logs.
region
.amazonaws.com -
s3.
region
.amazonaws.com
For more information about required endpoints for Systems Manager, see Reference: ec2messages, ssmmessages, and other API operations.