Securely Connect AWS DevOps Agent to Private Services in Your VPCs
AWS DevOps Agent is useful until it has to talk to something that sits behind a private subnet. Then the architecture problem is no longer about prompts or models. It is about how to give the agent a private path without turning your internal service into a public endpoint.
AWS answered that in the April 2026 post by using a VPC Lattice resource gateway. The pattern is simple enough to explain and strict enough to be safe: the agent creates a managed path into your VPC, the service stays private, and your security groups still decide what is reachable.
Connection Table
| Component | Role | What you configure | Gotcha |
|---|---|---|---|
| AWS DevOps Agent | Initiates the request | Agent Space and private connection | It cannot reach private endpoints by default |
| Resource gateway | Managed entry point | VPC, subnets, and optional security groups | Only the service can route through it |
| ENIs in your subnet | Private traffic path | Subnet placement and SG rules | They are not public interfaces |
| Target service | Internal API, MCP server, or observability tool | DNS name or IP target | Public DNS name may still be required |
| CloudTrail | Audit trail | Org logging and trail retention | You want proof of who created the path |
Traffic Flow
flowchart LR
Agent[AWS DevOps Agent] --> Gateway[Service-managed resource gateway]
Gateway --> ENI[ENIs in your subnets]
ENI --> Service[Private MCP server or internal API]
Agent --> Trail[CloudTrail and VPC Lattice logs]
Why This Matters
This is the safer version of the old “just put it behind a bastion” story. You do not need to publish a service on the public internet just because an AI tool needs to reach it. That matters for internal dashboards, self-hosted observability, and private package registries, which are exactly the kinds of systems teams attach to DevOps Agent first.
The operational gotcha is that this is not a generic tunnel. It is an opinionated network path with AWS-managed pieces. If you already use PrivateLink or a centralized network model with Transit Gateway, treat this as another private access option, not a replacement for the network design you already have.
Related reading
- AWS DevOps Agent overview
- Private networking patterns on AWS
- shared network routing patterns
- central inspection and traffic control
Comments