This architecture was designed for a production web application requiring strong security, controlled access, and reliable performance on AWS. The primary focus was isolating critical components, eliminating public exposure of the database, and enforcing a zero-trust access model while keeping the system highly available and globally performant.

The system is deployed inside an Amazon VPC with public and private subnets. The application server resides in the public subnet behind an ALB, while the database server resides in a private subnet accessible only from the application layer and bastion host. Edge services handle DNS, CDN, and threat protection before traffic reaches the VPC.
The architecture uses a secure VPC design with public and private subnets:
MongoDB is hosted on a private EC2 instance with only private IP access. Security groups allow connections strictly from the application server and bastion host. Backups are stored in S3 through a VPC endpoint, ensuring backup traffic never traverses the public internet. Encryption at rest is enforced using KMS
Application updates are deployed to EC2 instances behind the ALB with controlled restarts to avoid downtime. Administrative access for deployments and database maintenance is performed via the bastion host. Backup and restore procedures are scripted and validated to ensure data integrity during releases and migrations.