Internetwork traffic privacy - Amazon DynamoDB
Services or capabilities described in Amazon Web Services documentation might vary by Region. To see the differences applicable to the China Regions, see Getting Started with Amazon Web Services in China.

Internetwork traffic privacy

Connections are protected both between Amazon DynamoDB and on-premises applications and between DynamoDB and other Amazon resources within the same Amazon Region.

Traffic between service and on-premises clients and applications

You have two connectivity options between your private network and Amazon:

Access to DynamoDB via the network is through Amazon published APIs. Clients must support Transport Layer Security (TLS) 1.0. We recommend TLS 1.2 or above. Clients must also support cipher suites with Perfect Forward Secrecy (PFS), such as Ephemeral Diffie-Hellman (DHE) or Elliptic Curve Diffie-Hellman Ephemeral (ECDHE). Most modern systems such as Java 7 and later support these modes. Additionally, you must sign requests using an access key ID and a secret access key that are associated with an IAM principal, or you can use the Amazon Security Token Service (STS) to generate temporary security credentials to sign requests.

Traffic between Amazon resources in the same Region

An Amazon Virtual Private Cloud (Amazon VPC) endpoint for DynamoDB is a logical entity within a VPC that allows connectivity only to DynamoDB. The Amazon VPC routes requests to DynamoDB and routes responses back to the VPC. For more information, see VPC endpoints in the Amazon VPC User Guide. For example policies that you can use to control access from VPC endpoints, see Using IAM policies to control access to DynamoDB.


Amazon VPC endpoints are not accessible via Amazon Site-to-Site VPN or Amazon Direct Connect.