Amazon Web Services
docs.aws.amazon.com › amazon ec2 › user guide › security in amazon ec2 › data protection in amazon ec2
Data protection in Amazon EC2 - Amazon Elastic Compute Cloud
An additional layer of encryption ... EC2 instances of all types. In addition, some instance types use the offload capabilities of the underlying Nitro System hardware to automatically encrypt in-transit traffic between instances....
AWS
docs.aws.amazon.com › amazon vpc › aws transit gateway › work with aws transit gateway › transit gateways in aws transit gateway › encryption support for aws transit gateway
Encryption Support for AWS Transit Gateway - Amazon VPC
To support the end to end encryption of data between VPCs through the TGW, the transit gateway attached to the VPC should also have Encryption Support enabled. Transit gateway provides you with the option to enable encryption-in-transit capabilities by using AWS Nitro encryption capable instances.
Videos
04:09
Introducing AWS Nitro Enclaves - YouTube
01:04:20
AWS re:Inforce 2019: How Encryption Works in AWS (FND310-R) - YouTube
52:12
AWS re:Inforce 2019: Security Benefits of the Nitro Architecture ...
39:16
AWS re:Invent 2021 - Powering next-gen Amazon EC2: Deep dive on ...
AWS re:Post
repost.aws › questions › QUuT3eSlZQQU2pWU8JC-IWIA › nitro-instances-built-in-encryption-in-transit
Nitro instances-built in encryption in transit | AWS re:Post
October 31, 2019 - It's built in automatically at the VPC layer. No action for the customer to take nor way for them to validate. A bit more info here: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/enhanced-networking-ena.html#ena-data-encryption-in-transit
AWS
aws.amazon.com › blogs › aws › introducing-vpc-encryption-controls-enforce-encryption-in-transit-within-and-across-vpcs-in-a-region
Introducing VPC encryption controls: Enforce encryption in transit within and across VPCs in a Region | AWS News Blog
4 weeks ago - You can configure specific exclusions for resources such as internet gateways or NAT gateways, that don’t support encryption (because the traffic flows outside of the AWS network). Other resources must be encryption-compliant and can’t be excluded. After activation, enforce mode provides that all future resources are only created on compatible Nitro instances, and unencrypted traffic is dropped when incorrect protocols or ports are detected.
AWS
docs.aws.amazon.com › aws whitepapers › aws whitepaper › the components of the nitro system
The components of the Nitro System - The Security Design of the AWS Nitro System
For additional information and a list of supported instance types, refer to Encryption in transit. The encryption keys used for EBS, local instance storage, and for VPC networking are only ever present in plaintext in the protected volatile memory of the Nitro Cards; they are inaccessible to both AWS operators as well as any customer code running on the host system’s main processors.
AWS
docs.aws.amazon.com › amazon fsx › ontap user guide › security in amazon fsx for netapp ontap › data protection in amazon fsx for netapp ontap › encrypting data in transit
Encrypting data in transit - FSx for ONTAP
This is because the supported Amazon ... instances. Nitro-based encryption is enabled automatically when the supported client instance types are located in the same AWS Region and in the same VPC or in a VPC peered with the file system's VPC....
AWS
docs.aws.amazon.com › amazon vpc › user guide › managing security responsibilities for amazon virtual private cloud › enforce vpc encryption in transit
Enforce VPC encryption in transit - Amazon Virtual Private Cloud
To elaborate, any traffic between a resource in VPC 1 and a resource in VPC 4 will be encrypted until the TGW using the encryption offered by the nitro system hardware. Beyond that encryption status depends on the resource in VPC 4 and is not guaranteed to be encrypted.
AWS
docs.aws.amazon.com › amazon fsx › ontap user guide › security in amazon fsx for netapp ontap › data protection in amazon fsx for netapp ontap › encrypting data in transit › encrypting data in transit with aws nitro system
Encrypting data in transit with AWS Nitro System - FSx for ONTAP
This is because the supported Amazon ... instances. Nitro-based encryption is enabled automatically when the supported client instance types are located in the same AWS Region and in the same VPC or in a VPC peered with the file system's VPC....
Top answer 1 of 3
2
I would generally recommend controlling encryption explicitly in situations where it's considered important to have encryption.
One practical point I'd like to add to the advice offered by others is that when an ALB or NLB is configured with a target group set to use TLS, the load balancer won't validate the target's TLS certificate in any way. The load balancer will accept self-signed certificates just as well as ones issued by a public CA, and it won't care if the certificate is expired or if the name is "localhost", an IP address, or anything else generally not acceptable.
The reasoning is that the physical and logical layer security measures in VPCs are a massively more effective defence against man-in-the-middle attacks than a strategy relying on authenticating with TLS certificates based on the expectation that their private keys would be kept secret for the one or more years that the certificate is valid, despite having to be stored in a file on a virtual server's disks, included in backups, possibly exported inadvertently by operators, and so on.
This is documented here for ALBs but also applies to NLBs: https://docs.aws.amazon.com/elasticloadbalancing/latest/application/load-balancer-target-groups.html#target-group-routing-configuration
This generally makes it effortless and maintenance-free simply to enable TLS encryption for connections between ALBs/NLBs and their targets, without having to consider certificate issuance or renewals. Explicitly enabling TLS also ensures that traffic is always encrypted in transit for the entire distance between the AWS resource where one end of the TLS connection is configured (like your ALB), all the way to the middleware or operating system layer on the EC2 instance where TLS is set to be terminated. Any middleware/application components that might take an interest would also see connections arriving over TLS instead of cleartext HTTP.
2 of 3
0
1. Traffic from ALB to EC2 is not encrypted by default. In the majority of systems, it's enough to have traffic encrypted only between the end-user and the Load Balancer, then traffic between the Load Balancer and the EC2 instance is not encrypted in order to offload EC2 CPU. If you need end-to-end encryption, your EC2 must also listen to the HTTPS port. Here is an article how to implement this: https://faun.pub/end-to-end-ssl-encryption-with-aws-application-load-balancer-b43db918bd9e
2. No. The same as the previous case
AWS
aws.amazon.com › about-aws › whats-new › 2022 › 12 › amazon-fsx-netapp-ontap-nitro-based-encryption-data-transit
What's New at AWS - Cloud Innovation & News
September 10, 2025 - Starting today, Amazon FSx for NetApp ONTAP provides automatic encryption of data in transit between Nitro-based compute instances and new FSx for ONTAP file systems.
AWS
docs.aws.amazon.com › aws whitepapers › aws whitepaper › nitro system security in context
Nitro System security in context - The Security Design of the AWS Nitro System
All data flowing across the AWS global network that interconnects our data centers and Regions is automatically encrypted at the physical layer before it is transmitted between our secured facilities. Additional encryption layers exist as well; for example, all inter-Region VPC peering traffic, ...
Reddit
reddit.com › r/aws › trying to understand aws nitro
r/aws on Reddit: Trying to understand AWS Nitro
March 5, 2024 -
Only one question i have.
Do AWS nitro instances encrypt traffic from one nitro node to another nitro node?
AWS
docs.aws.amazon.com › aws whitepapers › aws whitepaper › general design principles and controls › data protection
Data protection - Applying Security Practices to a Network Workload on AWS for Communications Service Providers
Specific AWS instance types use the offload capabilities of the underlying AWS Nitro System · hardware to automatically encrypt in-transit traffic between specific type of instances, using Authenticated Encryption with Associated Data (AEAD) algorithms with 256-bit encryption.
Aws
maturitymodel.security.aws.dev › en › 3.-efficient › acm
Encryption in transit :: AWS Security Maturity Model
Configure encryption whenever sensitive data is transmitted, or adopt the good practice of encrypting everything in transit to prevent transmition of sensitive data without encryption by mistake.
Remktr
remktr.com › blog › encrypted-ec2-cross-region-migration
Move Encrypted EC2 Across Regions Without Breaking Compliance
October 20, 2025 - It encrypts in transit and supports ... re‑encrypt with a KMS key in the destination—no key sharing required. AWS Nitro provides encryption in transit between EC2 and EBS when EBS encryption is enabled....