Many organizations depend on the Safe File Switch Protocol (SFTP) because the business normal for exchanging important enterprise knowledge. Historically, securely connecting to non-public SFTP servers required customized infrastructure, guide scripting, or exposing endpoints to the general public web.
At present, AWS Switch Household SFTP connectors now help connectivity to distant SFTP servers by way of Amazon Digital Personal Cloud (Amazon VPC) environments. You possibly can switch recordsdata between Amazon Easy Storage Service (Amazon S3) and personal or public SFTP servers whereas making use of the safety controls and community configurations already outlined in your VPC. This functionality helps you combine knowledge sources throughout on-premises environments, partner-hosted non-public servers, or internet-facing endpoints, with the operational simplicity of a completely managed Amazon Internet Providers (AWS) service.
New capabilities with SFTP connectors
The next are the important thing enhancements:
- Join to non-public SFTP servers – SFTP connectors can now attain endpoints which might be solely accessible inside your AWS VPC connection. These embody servers hosted in your VPC or a shared VPC, on-premises programs linked over AWS Direct Join, and partner-hosted servers linked by way of VPN tunnels.
- Safety and compliance – All file transfers are routed by way of the safety controls already utilized in your VPC, reminiscent of AWS Community Firewall or centralized ingress and egress inspection. Personal SFTP servers stay non-public and don’t must be uncovered to the web. You can even current static Elastic IP or carry your personal IP (BYOIP) addresses to fulfill associate allowlist necessities.
- Efficiency and ease – Through the use of your personal community assets reminiscent of NAT gateways, AWS Direct Join or VPN connections, connectors can benefit from greater bandwidth capability for large-scale transfers. You possibly can configure connectors in minutes by way of the AWS Administration Console, AWS Command Line Interface (AWS CLI), or AWS SDKs with out constructing customized scripts or third-party instruments.
How VPC- primarily based SFTP connections work
SFTP connectors use Amazon VPC Lattice assets to ascertain safe connectivity by way of your VPC. Key constructs embody a useful resource configuration and a useful resource gateway. The useful resource configuration represents the goal SFTP server, which you specify utilizing a non-public IP handle or public DNS identify. The useful resource gateway gives SFTP connector entry to those configurations, enabling file transfers to stream by way of your VPC and its safety controls.
The next structure diagram illustrates how visitors flows between Amazon S3 and distant SFTP servers. As proven within the structure, visitors flows from Amazon S3 by way of the SFTP connector into your VPC. A useful resource gateway is the entry level that handles inbound connections from the connector to your VPC assets. Outbound visitors is routed by way of your configured egress path, utilizing Amazon VPC NAT gateways with Elastic IPs for public servers or AWS Direct Join and VPN connections for personal servers. You should use current IP addresses out of your VPC CIDR vary, simplifying associate server allowlists. Centralized firewalls within the VPC implement safety insurance policies, and customer-owned NAT gateways present greater bandwidth for large-scale transfers.
When to make use of this characteristic
With this functionality, builders and IT directors can simplify workflows whereas assembly safety and compliance necessities throughout a spread of eventualities:
- Hybrid environments – Switch recordsdata between Amazon S3 and on-premises SFTP servers utilizing AWS Direct Join or AWS Website-to-Website VPN, with out exposing endpoints to the web.
- Companion integrations – Join with enterprise companions’ SFTP servers which might be solely accessible by way of non-public VPN tunnels or shared VPCs. This avoids constructing customized scripts or managing third-party instruments, lowering operational complexity.
- Regulated industries – Route file transfers by way of centralized firewalls and inspection factors in VPCs to adjust to monetary companies, authorities, or healthcare safety necessities.
- Excessive-throughput transfers – Use your personal community configurations reminiscent of NAT gateways, AWS Direct Join, or VPN connections with Elastic IP or BYOIP to deal with large-scale, high-bandwidth transfers whereas retaining IP addresses already on associate allowlists.
- Unified file switch answer – Standardize on Switch Household for each inside and exterior SFTP connectivity, lowering fragmentation throughout file switch instruments.
Begin constructing with SFTP connectors
To start transferring recordsdata with SFTP connectors by way of my VPC setting, I observe these steps:
First, I configure my VPC Lattice assets. Within the Amazon VPC console, below PrivateLink and Lattice within the navigation pane, I select Useful resource gateways, select Create useful resource gateway to create one to behave because the ingress level into my VPC. Subsequent, below PrivateLink and Lattice within the navigation pane, I select Useful resource configuration and select Create useful resource configuration to create a useful resource configuration for my goal SFTP server. Specify the non-public IP handle or public DNS identify, and the port (sometimes 22).
Then, I configure AWS Identification and Entry Administration (IAM) permissions. I make sure that the IAM function used for connector creation has switch:*
permissions, and VPC Lattice permissions (vpc-lattice:CreateServiceNetworkResourceAssociation
, vpc-lattice:GetResourceConfiguration,
vpc-lattice:AssociateViaAWSService
). I replace the belief coverage on the IAM function to specify switch.amazonaws.com
as a trusted principal. This permits AWS Switch Household to imagine the function when creating and managing my SFTP connectors.
After that, I create an SFTP connector by way of the AWS Switch Household console. I select SFTP Connectors after which select Create SFTP connector. Within the Connector configuration part, I choose VPC Lattice because the egress sort, then present the Amazon Useful resource Identify (ARN) of the Useful resource Configuration, Entry function, and Connector credentials. Optionally, embody a trusted host key for enhanced safety, or override the default port if my SFTP server makes use of a nonstandard port.
Subsequent, I take a look at the connection. On the Actions menu, I select Check connection to substantiate that the connector can attain the goal SFTP server.
Lastly, after the connector standing is ACTIVE, I can start file operations with my distant SFTP server programmatically by calling Switch Household APIs reminiscent of
StartDirectoryListing
, StartFileTransfer
, StartRemoteDelete
, or StartRemoteMove
. All visitors is routed by way of my VPC utilizing my configured assets reminiscent of NAT gateways, AWS Direct Join, or VPN connections along with my IP addresses and safety controls.
For the whole set of choices and superior workflows, confer with the AWS Switch Household documentation.
Now accessible
SFTP connectors with VPC-based connectivity are actually accessible in 21 AWS Areas. Examine the AWS Providers by Area for the newest supported AWS Areas. Now you can securely join AWS Switch Household SFTP connectors to non-public, on-premises, or internet-facing servers utilizing your personal VPC assets reminiscent of NAT gateways, Elastic IPs, and community firewalls.
— Betty