This question involves creating a network architecture in AWS that routes inbound internet traffic through a central networking account using AWS Organizations. Given the requirements, we need to find a solution that meets the following criteria:
No Internet Gateway: The solution should not deploy an internet gateway in the new accounts.
Route Tables Management: There should be no changes to route tables for public subnets in the new accounts.
Centralized Traffic Management: All inbound internet traffic should route through the central networking account's custom firewall appliance.
Let's analyze each of the provided options:
Option A: It involves sharing the route table from the networking account and using an IAM permissions boundary to block internet gateway creation. While this seems logical, it does not address routing all internet traffic through the central account's custom appliance effectively.
Option B: This option suggests using VPC peering and changing route tables in the networking account to point traffic to new VPCs. However, modifying route tables in new accounts would conflict with the requirement not to change them for any public subnets.
Option C: Sharing public subnets through AWS RAM and enforcing a policy to block internet gateway creation is a viable option. By using the public subnets shared across new accounts, it ensures all traffic passes through the central networking account without modifying route tables or deploying new internet gateways.
Option D: This option involves an inline policy to block route modifications and using a transit gateway for routing. The appliance mode on the transit gateway and direct routing can appropriately channel traffic as needed. However, it requires setting up a transit gateway across multiple accounts.
Chosen Option:
Option C is the most suitable solution. It leverages AWS Resource Access Manager to share public subnets from the central networking account, thus ensuring that all inbound traffic routes through this account. Additionally, an SCP (Service Control Policy) blocks internet gateway deployment in the new accounts, aligning perfectly with the provided requirements.
This setup effectively centralizes traffic management via the existing custom firewall appliance in the central account without making any route table changes in the new accounts or deploying new internet gateways in these accounts.