Skip to content

One VPC for everything or a VPC per app, what's sensible?

For most SMBs, one VPC per environment (prod, staging) is enough, with separate subnets per app or tier. More VPCs means more peering, more NAT, more cost.

Try this first

  1. 1Start with one VPC per environment and a /16 CIDR roomy enough not to fill up in 5 years, e.g. 10.0.0.0/16 for prod and 10.1.0.0/16 for staging.
  2. 2Split per AZ into a public and private subnet, and put all workloads in private. Public is only for load balancers and NAT gateways.
  3. 3Use separate subnets or security-groups per app, not separate VPCs. That keeps routing simple and NAT cost low.
  4. 4Only consider a separate VPC if the app has a different security profile (tenant isolation, payments, compliance scope).
  5. 5Document your CIDR plan in a shared table, otherwise you'll get collisions the moment someone wants to connect on-prem or another cloud.

When to bring us in

If you're building multi-tenant SaaS where each customer needs network isolation, the design is materially different. A short review pays off before you commit.

See also

None of the above fits?

Describe your situation below. We pass your input plus the steps you already saw to our AI and return tailored next-step advice. If it's too risky to DIY, we'll say so.

Who are you?

For the AI question we need your email and company, so we can follow up if the AI gets stuck, and to prevent abuse.

Limited to 2 questions per hour and 5 per day, kept lean so the AI stays useful. For more, contacting us directly works better for you and us.

Or skip the DIY entirely

Our Managed IT clients do not look these things up. One point of contact, a fixed monthly price, resolved within working hours.