Airgapped VPC for SageMaker: Zero Public Internet
Three Availability Zones form the mandatory minimum foundation for deploying a network-isolated Amazon SageMaker Unified Studio domain.
This architecture proves that strict regulatory adherence to HIPAA or FedRAMP standards demands eliminating public internet exposure entirely. You will learn how AWS PrivateLink, now available for this service as of January 2026, secures communication channels exclusively over private networks. The guide details constructing a custom VPC named airgapped with specific interface and gateway endpoints to ensure sensitive data never leaves controlled pathways. Finally, we examine the step-by-step configuration required to maintain full functionality for data cataloging and query execution within these hardened boundaries.
The global shift toward industrialized machine learning workflows makes such isolation critical, especially as the cloud computing market races toward a projected USD 1902.66 billion valuation by 2030. AWS documentation confirms that organizations can achieve granular traffic control and simplified compliance auditing by forcing all SageMaker Unified Studio operations through these private subnets. This approach allows enterprises to integrate existing private data sources without compromising the security posture required for modern AI initiatives.
The Role of Air-Gapped VPC Architecture in Secure AI Compliance
Defining the Air-Gapped VPC and AWS PrivateLink for SageMaker
An air-gapped VPC mandates 0 public subnets across three Availability Zones per Amazon. Com/blogs/big-data/how-to-set-up-an-air-gapped-vpc-for-amazon-sagemaker-unified-studio/ data shows. This architecture isolates Amazon SageMaker Unified Studio by preventing any direct internet egress. Traffic flows exclusively through the AWS backbone using AWS PrivateLink rather than traversing the public internet. Interface endpoints enable this secure channel between customer VPCs and managed services without exposing IP addresses.
The quick create stack template generates an Internet Gateway, rendering it unsuitable for strict enterprise compliance mandates. Operators must instead deploy a custom bring-your-own VPC configuration. The resulting topology relies on specific gateway and interface endpoints to maintain connectivity for dependencies like Amazon DataZone and AWS.
| Feature | Public-Enabled Template | Air-Gapped Architecture |
|---|---|---|
| Public Subnets | Present | 0 |
| Internet Gateway | Yes | No |
| Traffic Path | Public Internet | AWS Backbone |
| Compliance Fit | Low | High |
Misconfiguration causes total network isolation failure. The quick setup wizard offers speed but introduces an unacceptable attack surface for regulated workloads. True isolation requires deliberate endpoint provisioning rather than default connectivity patterns. Operators must verify that every required service has a corresponding VPC endpoint before deploying production workloads. Failure to map all dependencies results in silent application failures during runtime execution.
Checklist: Configuring 0 Public Subnets and 3 AZs for Compliance
data shows selecting 3 Availability Zones and 0 public subnets creates the mandatory air-gapped foundation. This configuration eliminates direct internet exposure, forcing all traffic through AWS PrivateLink interface endpoints. Operators must verify these settings before deploying SageMaker Unified Studio to satisfy HIPAA or FedRAMP mandates.
Validation requires confirming four specific architectural states within the VPC console:
- Zero Internet Gateways attached to the target VPC.
- Route tables containing only local and VPC endpoint routes.
- Three distinct private subnets spanning separate failure domains.
- Security groups restricting ingress to assigned project IDs.
| Feature | Public-Ready VPC | Air-Gapped VPC |
|---|---|---|
| Subnet Count | Mixed Public/Private | 0 Public Subnets |
| Routing | Includes IGW/NAT | Endpoint Only |
| Compliance | General Purpose | FedRAMP Ready |
| Exposure | Internet Facing | Private Backbone |
A single open route invalidates the entire isolation boundary. Most operators miss that gateway endpoints alone do not suffice without strict route table pruning. Deploying across three zones ensures high-availability while maintaining the zero-trust perimeter required for regulated AI workloads. Failure to distribute subnets risks single-point failures during zone outages.
Risk: Why Standard Quick-Create Templates Fail Enterprise Security Audits
The quick-create template generates an Internet Gateway, violating air-gap principles data. This default configuration forces traffic through the public internet, immediately disqualifying the environment from strict regulatory frameworks like HIPAA. Operators relying on this wizard inadvertently expose SageMaker Unified Studio to external threats despite internal isolation goals. The resulting architecture fails compliance requirements for AI because data paths traverse unmanaged public infrastructure rather than the secure AWS backbone.
InterLIR analysis indicates that remediating this error requires full-stack deletion and redeployment using a bring-your-own (BYO) VPC. Manual reconstruction consumes significant engineering hours and delays production timelines. The cost of Interface VPC endpoints varies by zone, creating unpredictable operational expenditures compared to flat-rate public access. Complex fixes involving Transit Gateway or Network Firewall introduce additional billing layers not present in the initial estimate.
| Component | Quick-Create Default | Compliant Requirement |
|---|---|---|
| Gateway Type | Internet Gateway | None (0 Public Subnets) |
| Audit Status | Non-Compliant | Compliant |
True air-gap status demands zero public subnets across three Availability Zones. Any deviation creates a permanent audit failure point.
Internal Mechanics of Private Connectivity via AWS PrivateLink
Mandatory Interface Endpoints for DataZone and STS
com. Amazonaws. ${region}. Datazone and com. Amazonaws. ${region}. Sts interface endpoints serve as mandatory gateways for governance and identity functions. These specific resources enable SageMaker Unified Studio to resolve metadata and assume IAM roles without public routing. Default VPC creation wizards omit these interfaces, leaving the environment functionally broken for catalog operations until manual provisioning occurs. DNS resolution within the VPC directs service traffic to private IP addresses managed by AWS PrivateLink. Skipping either endpoint causes immediate authentication failures or catalog invisibility, halting all data lineage tracking. Per-AZ hourly charges apply to each interface endpoint, compounding costs across the three required Availability Zones. Omitting the STS endpoint prevents the application from obtaining temporary credentials, effectively locking out all compute resources regardless of subnet configuration.
- Navigate to the VPC console and select Endpoints.
- Choose Create Endpoint and search for the specific service name.
- Select the private subnets matching the project security group.
- Attach the security group allowing TLS traffic on port.
| Service | Endpoint Type | Function |
|---|---|---|
| DataZone | Interface | Data catalog access |
| STS | Interface | Role assumption |
Notebooks launch but cannot access governed datasets if these paths remain unconfigured, creating a silent failure mode.
Resolving DNS for S3 Gateway and Glue Interface Endpoints
com. Amazonaws. ${region}. S3 requires a Gateway endpoint while com. Amazonaws. ${region}. Glue demands an Interface endpoint for functional DNS resolution. The VPC DNS resolver intercepts service hostnames and returns private IPs instead of public addresses. Enabling DNS hostnames and DNS support within VPC settings is necessary, or the SageMaker Unified Studio domain will fail to locate the Glue Data Catalog. Notebooks attempting to read datasets from S3 will timeout as traffic attempts to egress the isolated network boundary without this configuration. Misconfigured DNS forces applications to retry connections until they hit hard failure limits, wasting compute cycles. Standard troubleshooting often overlooks the distinct handling required for Gateway versus Interface types in the route table.
| Endpoint Type | DNS Record Source | Route Table Entry | Resolution Target |
|---|---|---|---|
| S3 Gateway | Managed by AWS Service | Prefix list injection | Regional IP space |
| Glue Interface | Private Hosted Zone | Local /32 specific | ENI Private IP |
Deploying this architecture requires strict adherence to four configuration states to ensure connectivity:
- Verify DNS support is enabled at the VPC level.
- Confirm the S3 gateway endpoint has an associated route table entry.
- Validate the Glue interface endpoint has an active DNS name in the private zone.
- Test hostname resolution from a compute instance within the target subnet.
Endpoint creation does not automatically fix routing, making the DNS layer a frequent single point of failure in air-gapped environments.
Validating Subnet IP Capacity and AZ Distribution
Three free IPs per subnet are mandatory for Redshift Serverless without Enhanced VPC Routing according to AWS VPC Requirements documentation. Insufficient addresses cause immediate resource provisioning failures during SageMaker Unified Studio deployment. The mechanism allocates elastic network interfaces for each compute node, consuming available host addresses rapidly during scaling events. Distributing subnets across only two Availability Zones satisfies basic redundancy but fails workloads requiring Enhanced VPC Routing. Three distinct AZs become strictly necessary when EVR is enabled to maintain fault tolerance. Over-provisioning CIDR blocks in private subnets increases blast radius if routing tables misconfigure. Operators often neglect to reserve IP space for future VPC endpoints, leading to fragmentation. Explicit validation of zone distribution prevents reliance on default VPC creation wizards that may not align with compute service constraints. Integrated analytics engines fail to initialize in the air-gapped environment if these specific topological rules go unmet.
Step-by-Step Implementation of Network-Isolated SageMaker Domains
Bring-Your-Own VPC Requirements for Air-Gapped Domains

Bring-your-own (BYO) VPC configurations serve customers with company-specific networking and security requirements. This architecture replaces the default Quick set up template, which generates an Internet Gateway that violates strict air-gap mandates. Operators must instead provision a custom VPC containing private subnets distributed across at least three Availability Zones to satisfy high-availability constraints. The mechanism enforces isolation by routing all traffic through AWS PrivateLink interface endpoints rather than public gateways. Consequently, the domain operates exclusively within the isolated environment, preventing any data egress to the public internet. This strictness introduces a hard dependency on manual endpoint configuration for every required service. Unlike the automated wizard, the BYO approach provides no fallback connectivity if specific interface endpoints are missing. InterLIR assessment indicates that skipping the initial three-AZ distribution forces a complete stack redeployment later, as subnet expansion cannot retroactively satisfy Enhanced VPC Path selection needs.
- Navigate to the SageMaker console and select Domains.
- Choose Quick set up but expand settings to select the existing airgapped-vpc.
- Assign at least two private subnets from different availability zones.
- Complete the wizard to generate the airgapped-domain identity.
Executing Quick Set Up with Private Subnets Only
Selecting a minimum of two private subnets is mandatory when configuring the domain to maintain isolation. Operators must navigate to Domains, choose Create Domain, and explicitly select Quick set up while expanding Quick set up settings. This sequence ensures the airgapped-domain binds strictly to the pre-provisioned airgapped-vpc rather than generating public-facing resources.
- Select airgapped-vpc from the Virtual private cloud dropdown menu.
- Choose only private subnet identifiers that reside within distinct Availability Zones.
- Click Continue to proceed to user configuration via AWS IAM Identity Center.
- Finalize the process by choosing Create domain to initiate resource provisioning.
A project is created using the guided wizard only after successful domain initialization. The mechanism forces all subsequent compute traffic through AWS PrivateLink interfaces, preventing accidental internet egress during the initial bootstrapping phase. Selecting fewer than two subnets satisfies basic connectivity but fails high-availability checks required for production workloads. InterLIR review indicates that skipping the explicit VPC selection step defaults the environment to a shared network space, instantly violating regulatory air-gap mandates.
Validation Steps for Zero Public Subnet Assignment
Selecting 0 for Number of public subnets during VPC creation enforces the initial air-gap boundary. Operators must verify this setting persists after provisioning, as default templates often reintroduce public exposure. The mechanism relies on explicit subnet selection to prevent Internet Gateway attachment, ensuring traffic remains within the AWS backbone. Skipping this validation allows latent public routes to compromise the entire airgapped-vpc architecture.
- Inspect the VPC route tables to confirm no destination cites `0.0.0.0/0` via an Internet Gateway.
- Verify that every associated subnet lacks a Public IP assignment flag.
- Cross-reference AWS IAM Identity Center user creation logs against the email address entered.
| Configuration Item | Required State | Risk if Misconfigured |
|---|---|---|
| Public Subnet Count | 0 | Direct internet egress |
| Subnet IP Assignment | Disabled | Exposure of private endpoints |
| User Provisioning | Email Verified | Unauthorized domain access |
False confidence in isolation often stems from unverified template defaults rather than active misconfiguration. A single overlooked public route renders the SageMaker Unified Studio domain non-compliant with FedRAMP controls.
Strategic Trade-offs Between Quick Create and Bring-Your-Own VPC Models
BYO VPC Definition: Private Subnets and DNS Hostnames

Private networking via VPC endpoints keeps traffic confined to the AWS backbone. This architecture forces all service communication through AWS PrivateLink, completely bypassing public routing tables. Operators must enable DNS hostnames to resolve service addresses internally while disabling auto-assign public IP on subnets prevents accidental internet exposure. Disabling public addressing breaks standard package managers unless local mirrors exist. Network teams must pre-stage artifacts or configure SageMaker to pull exclusively from private repositories. Skipping DNS hostname configuration causes immediate resolution failures for internal service discovery. The system relies on these hostnames to locate DataZone and Glue endpoints without external DNS queries. A failure here halts domain initialization before compute resources even attempt provisioning. Production environments exhibit a binary state: either the VPC is fully configured with correct DNS and subnet flags, or the domain remains unreachable. Partial configurations do not degrade gracefully; they fail outright. Teams validating readiness should verify that no subnet accepts a public IP assignment by default. This constraint ensures that even if a route to an Internet Gateway exists, instances cannot apply it for egress.
Production IP Capacity Planning for Five Year Growth
Planning IP capacity for at least 5 years prevents exhaustion in production environments. Calculating total address needs requires multiplying the number of users by apps per user, unique instance types, average training instances, and expected growth percentage. Operators must allocate sufficient CIDR blocks to accommodate this aggregate demand without fragmentation. Large CIDR ranges like /16 increase the blast radius of misconfigured security groups if not segmented correctly. Network teams face tension between maximizing available addresses for SageMaker Unified Studio scaling and minimizing the potential impact of lateral movement within the VPC. Failing to model unique instance types separately often leads to premature subnet saturation despite apparent overall availability.
- Estimate concurrent training instances per project team.
- Map distinct application workloads to specific subnet tiers.
- Apply a conservative growth multiplier to the base calculation.
- Reserve explicit IP ranges for future AWS PrivateLink endpoint expansion.
- Document IP allocation policies for audit compliance.
Amazon SageMaker Unified Studio does not have a standalone price; instead, costs are incurred based on underlying AWS resource usage. Exhausting IP space forces costly architectural reworks rather than simple expansions.
Quick Create vs BYO VPC: Security Trade-offs for Testing
Automated setup suits quick experiments where stringent security is not required. This mechanism deploys a CloudFormation template that provisions an Internet Gateway, enabling immediate public access for non-sensitive testing. This configuration violates air-gap mandates by design, allowing unfiltered egress traffic. Network architects must treat these environments as ephemeral sandboxes rather than protected zones. Production workloads demand the bring-your-own (BYO) VPC approach to enforce strict network control. Implementing private networking using VPC endpoints keeps traffic within the AWS backbone. Operators gain granular visibility over AWS PrivateLink flows while eliminating public IP dependencies entirely. Rigidity requires pre-provisioned private subnets and manual DNS configuration, slowing initial deployment speed. Development velocity conflicts with compliance posture. Relying on default templates for enterprise data introduces unacceptable risk profiles. Teams often overlook that SageMaker Unified Studio inherits the underlying VPC routing table immediately upon creation. A single misconfigured route in a quick-create environment exposes model weights to interception. Enterprises must mandate BYO VPC workflows before any project initialization occurs.
About
Alexander Timokhin, CEO of InterLIR, brings critical infrastructure expertise to the discussion on securing Amazon SageMaker Unified Studio. While InterLIR specializes in optimizing global IP resource allocation, Timokhin's deep understanding of network architecture and IT security makes him uniquely qualified to address complex VPC configurations. His daily work managing clean BGP routes and ensuring IP reputation directly correlates with the stringent requirements for network isolation discussed in this guide. As organizations strive to meet compliance standards like HIPAA within SageMaker, the need for reliable, private connectivity becomes paramount. Timokhin leverages his experience in scaling secure network environments to explain how AWS PrivateLink eliminates public exposure. By connecting InterLIR's mission of reliable network resource management with advanced AWS security patterns, he provides actionable insights for enterprises demanding strict regulatory adherence while industrializing their machine learning workflows on the AWS cloud.
Conclusion
Scaling AI infrastructure reveals that IP exhaustion is merely the first symptom of a deeper architectural debt. As the global cloud market surges toward nearly $2 trillion by 2030, organizations relying on ephemeral, quick-create networks will face prohibitive operational friction when attempting to migrate mature models to production. The initial velocity gained from default templates evaporates when security audits demand strict air-gapping, forcing expensive, disruptive re-architecting of entire data pipelines. You cannot retrofit enterprise-grade governance onto a foundation designed for temporary experimentation without incurring massive technical debt.
Adopt a strict Bring-Your-Own VPC mandate for all production-bound projects starting immediately, regardless of team size. While this approach increases initial setup time, it eliminates the existential risk of public exposure and ensures your network topology can sustain five years of aggressive AI workload growth. Treat any environment with automatic Internet Gateway provisioning as strictly disposable; never allow sensitive model weights or proprietary data to reside there even temporarily.
Start this week by auditing existing SageMaker projects to identify any instances running on auto-generated CloudFormation templates. Flag these environments for immediate migration to private subnets before the next compliance review cycle begins.