CloudRaya Documentation

Designing Secure VPCs

Designing a secure Virtual Private Cloud (VPC) is the foundation of a stable, scalable, and safe cloud environment.

In CloudRaya, security is not added at the end.

It is designed into the network from the beginning through proper VPC structure, subnet segmentation, and traffic control.

This guide explains how to design secure VPC architectures, what to avoid, and how CloudRaya’s networking model supports secure design by default.

Why VPC Design Matters

A poorly designed VPC can lead to:

  • Unintended public exposure
  • Flat networks with no isolation
  • Difficult scaling and troubleshooting
  • High blast radius when incidents occur

A well-designed VPC allows you to:

  • Isolate workloads and environments
  • Control traffic paths explicitly
  • Minimize security risks
  • Scale infrastructure cleanly over time

Understand CloudRaya’s VPC Security Model

Before designing, it is important to understand how CloudRaya handles networking:

  • Every resource operates inside a VPC
  • VPCs are scoped to a single Cloud Zone
  • Traffic is controlled using Access Control Lists (ACL) at the subnet level
  • Public access is explicit, never implicit

This means:

  • No resource is publicly reachable unless you configure it
  • Network boundaries are enforced by design

Design Principle 1: Separate Environments Early

Do not mix environments inside a single VPC unless absolutely necessary.

Create separate VPCs for:

  • Production
  • Staging
  • Development
  • Testing

Benefits:

  • Strong isolation between environments
  • Reduced risk of accidental access
  • Easier ACL management
  • Cleaner troubleshooting

Avoid using a single VPC with many subnets to represent environments unless you fully understand the trade-offs.


Design Principle 2: Use Subnets for Workload Isolation

Subnets are your primary segmentation tool inside a VPC.

Common Subnet Patterns

  • Public-facing services (web, API)
  • Application layer
  • Database layer
  • Management

Each subnet can have its own ACL, allowing you to control traffic between layers.

Example

  • Web subnet: allow HTTP/HTTPS from the internet
  • App subnet: allow traffic only from web subnet
  • Database subnet: allow traffic only from app subnet

This limits lateral movement and reduces blast radius.


Design Principle 3: Keep Private Resources Private

Not every service needs a Public IP.

Best Practice

  • Assign Public IPs only to:
    • Web servers
    • Load Balancers
  • Keep databases, internal services, and admin tools on private IPs only

Design Principle 4: Control Traffic with ACLs

ACLs are the core of traffic control in CloudRaya.

Key Characteristics

  • Applied at the subnet level
  • Affect all VMs in the subnet
  • Control inbound and outbound traffic

Best Practices

  • Start with minimal allow rules
  • Explicitly define required ports and protocols
  • Avoid “allow all” rules unless temporarily needed
  • Review ACL rules regularly

Think of ACLs as network firewalls, not optional settings.


Design Principle 5: Minimize Blast Radius

Assume failures will happen. Design so they do not spread.

Techniques

  • Separate workloads by subnet or VPC
  • Limit ACL rules between layers
  • Avoid shared subnets for unrelated services
  • Do not reuse public IPs unnecessarily

A smaller blast radius means:

  • Faster recovery
  • Lower operational risk
  • Easier incident containment

Design Principle 6: Plan IP Addressing Ahead

Even though CloudRaya automatically generates valid IP ranges, planning still matters.

Recommendations

  • Allocate enough CIDR space for growth
  • Avoid overly small subnets that limit scaling
  • Keep subnet purposes clear and documented

Good IP planning prevents:

  • Subnet exhaustion
  • Complex future migrations
  • Overlapping network issues

Design Principle 7: Use VPN for Secure Access

VPN provides secure access to private resources without exposing them publicly.

When to Use VPN

  • Administrative access
  • Internal dashboards
  • Database access
  • Private APIs

VPN connections terminate at the VPC router, allowing secure access to private IPs inside the VPC.

This is more secure than opening public ports.


Secure VPC Architecture Examples

A well-designed VPC starts with the right architecture.

See how secure VPCs are commonly structured in CloudRaya for different workloads and environments.

Secure VPC Architecture Examples

Common VPC Design Mistakes to Avoid

  • Putting all workloads in one subnet
  • Assigning Public IPs to every VM
  • Using overly permissive ACL rules
  • Mixing production and non-production resources
  • Treating VPCs as optional configuration

These mistakes often lead to security incidents and operational complexity.


How CloudRaya Helps Enforce Secure Design

CloudRaya’s platform encourages secure architecture by:

  • Automatically isolating VPCs per Cloud Zone
  • Requiring explicit Public IP assignment
  • Applying ACLs at the subnet level
  • Integrating VPN directly into VPC networking

Security is not an add-on, it is part of the network design.


When to Revisit Your VPC Design

Review your VPC design when:

  • Adding new services
  • Scaling applications
  • Introducing VPN or Load Balancers
  • Experiencing security incidents
  • Expanding to new Cloud Zones

Regular review keeps your architecture healthy and secure.


Summary

  • Secure VPC design starts with structure, not rules
  • Separate environments early
  • Use subnets for isolation
  • Control traffic explicitly with ACLs
  • Keep private resources private
  • Design to limit blast radius

A well-designed VPC makes everything else (security, scaling, and operations) simpler.

📄 Virtual Private Cloud (VPC)

📄 Create a VPC

📄 Access Control List (ACL)

📄 Public IP Address

📄 VPN

📄 Networking Best Practices

© 2026 CloudRaya Product Team. All rights reserved.

On this page