🌐
Amazon Web Services
docs.aws.amazon.com › amazon ec2 › user guide › security in amazon ec2 › data protection in amazon ec2
Data protection in Amazon EC2 - Amazon Elastic Compute Cloud
An additional layer of encryption ... EC2 instances of all types. In addition, some instance types use the offload capabilities of the underlying Nitro System hardware to automatically encrypt in-transit traffic between instances....
🌐
AWS
docs.aws.amazon.com › amazon vpc › aws transit gateway › work with aws transit gateway › transit gateways in aws transit gateway › encryption support for aws transit gateway
Encryption Support for AWS Transit Gateway - Amazon VPC
To support the end to end encryption of data between VPCs through the TGW, the transit gateway attached to the VPC should also have Encryption Support enabled. Transit gateway provides you with the option to enable encryption-in-transit capabilities by using AWS Nitro encryption capable instances.
🌐
AWS re:Post
repost.aws › questions › QUuT3eSlZQQU2pWU8JC-IWIA › nitro-instances-built-in-encryption-in-transit
Nitro instances-built in encryption in transit | AWS re:Post
October 31, 2019 - It's built in automatically at the VPC layer. No action for the customer to take nor way for them to validate. A bit more info here: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/enhanced-networking-ena.html#ena-data-encryption-in-transit
🌐
AWS
aws.amazon.com › blogs › publicsector › encryption-in-transit-public-sector-workloads-aws-nitro-enclaves-aws-certificate-manager
Encryption-in-transit for public sector workloads with AWS Nitro Enclaves and AWS Certificate Manager | AWS Public Sector Blog
March 1, 2021 - Best practices for protection of data in transit include enforcing appropriately defined encryption requirements, authenticating network communications, and implementing secure key and certificate management systems.
🌐
AWS
aws.amazon.com › blogs › aws › introducing-vpc-encryption-controls-enforce-encryption-in-transit-within-and-across-vpcs-in-a-region
Introducing VPC encryption controls: Enforce encryption in transit within and across VPCs in a Region | AWS News Blog
4 weeks ago - You can configure specific exclusions for resources such as internet gateways or NAT gateways, that don’t support encryption (because the traffic flows outside of the AWS network). Other resources must be encryption-compliant and can’t be excluded. After activation, enforce mode provides that all future resources are only created on compatible Nitro instances, and unencrypted traffic is dropped when incorrect protocols or ports are detected.
🌐
AWS
docs.aws.amazon.com › aws whitepapers › aws whitepaper › the components of the nitro system
The components of the Nitro System - The Security Design of the AWS Nitro System
For additional information and a list of supported instance types, refer to Encryption in transit. The encryption keys used for EBS, local instance storage, and for VPC networking are only ever present in plaintext in the protected volatile memory of the Nitro Cards; they are inaccessible to both AWS operators as well as any customer code running on the host system’s main processors.
🌐
AWS
docs.aws.amazon.com › amazon fsx › ontap user guide › security in amazon fsx for netapp ontap › data protection in amazon fsx for netapp ontap › encrypting data in transit
Encrypting data in transit - FSx for ONTAP
This is because the supported Amazon ... instances. Nitro-based encryption is enabled automatically when the supported client instance types are located in the same AWS Region and in the same VPC or in a VPC peered with the file system's VPC....
🌐
Uptycs
uptycs.com › blog › harnessing-the-aws-nitro-architecture-to-encrypt-inter-node-traffic-in-kubernetes
Harness AWS Nitro Architecture: Encrypt Kubernetes Inter-Node Traffic
September 25, 2025 - Communication between these special Nitro instance classes, when the instances are located within the same VPC, is fully encrypted using AES at line-rate speeds (up to 100 GB/s). By utilizing these encryption-capable Nitro instance classes for ...
🌐
AWS
docs.aws.amazon.com › amazon vpc › user guide › managing security responsibilities for amazon virtual private cloud › enforce vpc encryption in transit
Enforce VPC encryption in transit - Amazon Virtual Private Cloud
To elaborate, any traffic between a resource in VPC 1 and a resource in VPC 4 will be encrypted until the TGW using the encryption offered by the nitro system hardware. Beyond that encryption status depends on the resource in VPC 4 and is not guaranteed to be encrypted.
Find elsewhere
🌐
AWS
docs.aws.amazon.com › amazon fsx › ontap user guide › security in amazon fsx for netapp ontap › data protection in amazon fsx for netapp ontap › encrypting data in transit › encrypting data in transit with aws nitro system
Encrypting data in transit with AWS Nitro System - FSx for ONTAP
This is because the supported Amazon ... instances. Nitro-based encryption is enabled automatically when the supported client instance types are located in the same AWS Region and in the same VPC or in a VPC peered with the file system's VPC....
🌐
AWS
aws.amazon.com › blogs › security › encryption-in-transit-over-external-networks-aws-guidance-for-nydfs-and-beyond
Encryption in transit over external networks: AWS guidance for NYDFS and beyond | Amazon Web Services
August 21, 2024 - Cross-Region traffic that uses Amazon VPC and Transit Gateway peering is automatically bulk-encrypted when it exits a Region. AWS provides secure and private connectivity between Amazon Elastic Compute Cloud (Amazon EC2) instances of all types.
Top answer
1 of 3
2
I would generally recommend controlling encryption explicitly in situations where it's considered important to have encryption. One practical point I'd like to add to the advice offered by others is that when an ALB or NLB is configured with a target group set to use TLS, the load balancer won't validate the target's TLS certificate in any way. The load balancer will accept self-signed certificates just as well as ones issued by a public CA, and it won't care if the certificate is expired or if the name is "localhost", an IP address, or anything else generally not acceptable. The reasoning is that the physical and logical layer security measures in VPCs are a massively more effective defence against man-in-the-middle attacks than a strategy relying on authenticating with TLS certificates based on the expectation that their private keys would be kept secret for the one or more years that the certificate is valid, despite having to be stored in a file on a virtual server's disks, included in backups, possibly exported inadvertently by operators, and so on. This is documented here for ALBs but also applies to NLBs: https://docs.aws.amazon.com/elasticloadbalancing/latest/application/load-balancer-target-groups.html#target-group-routing-configuration This generally makes it effortless and maintenance-free simply to enable TLS encryption for connections between ALBs/NLBs and their targets, without having to consider certificate issuance or renewals. Explicitly enabling TLS also ensures that traffic is always encrypted in transit for the entire distance between the AWS resource where one end of the TLS connection is configured (like your ALB), all the way to the middleware or operating system layer on the EC2 instance where TLS is set to be terminated. Any middleware/application components that might take an interest would also see connections arriving over TLS instead of cleartext HTTP.
2 of 3
0
1. Traffic from ALB to EC2 is not encrypted by default. In the majority of systems, it's enough to have traffic encrypted only between the end-user and the Load Balancer, then traffic between the Load Balancer and the EC2 instance is not encrypted in order to offload EC2 CPU. If you need end-to-end encryption, your EC2 must also listen to the HTTPS port. Here is an article how to implement this: https://faun.pub/end-to-end-ssl-encryption-with-aws-application-load-balancer-b43db918bd9e 2. No. The same as the previous case
🌐
AWS
aws.amazon.com › about-aws › whats-new › 2022 › 12 › amazon-fsx-netapp-ontap-nitro-based-encryption-data-transit
What's New at AWS - Cloud Innovation & News
September 10, 2025 - Starting today, Amazon FSx for NetApp ONTAP provides automatic encryption of data in transit between Nitro-based compute instances and new FSx for ONTAP file systems.
🌐
AWS
docs.aws.amazon.com › aws whitepapers › aws whitepaper › nitro system security in context
Nitro System security in context - The Security Design of the AWS Nitro System
All data flowing across the AWS global network that interconnects our data centers and Regions is automatically encrypted at the physical layer before it is transmitted between our secured facilities. Additional encryption layers exist as well; for example, all inter-Region VPC peering traffic, ...
🌐
Reddit
reddit.com › r/aws › introducing vpc encryption controls: enforce encryption in transit within and across vpcs in a region
r/aws on Reddit: Introducing VPC encryption controls: Enforce encryption in transit within and across VPCs in a Region
1 month ago - Edit: They updated the VPC Pricing Page already. https://aws.amazon.com/vpc/pricing ... This is how a true day 2 company operates. Continue this thread ... instance type which support encrypted in-transit between instances like R7g, M8g, etc…
🌐
AWS
docs.aws.amazon.com › aws whitepapers › aws whitepaper › general design principles and controls › data protection
Data protection - Applying Security Practices to a Network Workload on AWS for Communications Service Providers
Specific AWS instance types use the offload capabilities of the underlying AWS Nitro System · hardware to automatically encrypt in-transit traffic between specific type of instances, using Authenticated Encryption with Associated Data (AEAD) algorithms with 256-bit encryption.
🌐
Aws
maturitymodel.security.aws.dev › en › 3.-efficient › acm
Encryption in transit :: AWS Security Maturity Model
Configure encryption whenever sensitive data is transmitted, or adopt the good practice of encrypting everything in transit to prevent transmition of sensitive data without encryption by mistake.
🌐
Remktr
remktr.com › blog › encrypted-ec2-cross-region-migration
Move Encrypted EC2 Across Regions Without Breaking Compliance
October 20, 2025 - It encrypts in transit and supports ... re‑encrypt with a KMS key in the destination—no key sharing required. AWS Nitro provides encryption in transit between EC2 and EBS when EBS encryption is enabled....