Shield on Cloud Next is a comprehensive suite of advanced networking features that enables organizations to implement enhanced security controls and maintain strict compliance requirements for their digital experiences. This solution provides seamless network isolation, secure connectivity, and flexible access management capabilities in Cloud Next. In Shield on Cloud Next, subscriber deployments in an isolated network environment are separated from other subscriber deployments at the network level.
Shield on Cloud Next delivers a modern, integrated approach that allows you to manage advanced network configurations and security controls for your Cloud Platform applications. Like Shield, it provides enterprise-grade networking capabilities that enable you to implement robust security measures and maintain strict compliance requirements. This solution addresses the demanding security requirements of organizations that operate in highly regulated environments.
With Shield on Cloud Next, you can:
Shield on Cloud Next is built on the Cloud Next infrastructure while Shield was built on the Cloud Classic infrastructure.
Advanced network isolation
Secure connectivity
Access management
Private IP range with optional VPN connection
Shield and internal DNS
Currently, Shield on Cloud Next does not support resolution to your internal DNS servers. While Shield on Cloud Next gives you access to your internal network through a VPN gateway, your network systems are only accessible through IP. Therefore, if you have a service or site in your internal network that changes IP addresses and resolves to an internal-only DNS, the system does not resolve the domain for that service or site.
Shared Services
While Shield on Cloud Next provides network isolation for your environments, Cloud Platform shared services are not hosted in your Shield on Cloud Next VPC. This includes, but is not limited to:
Git, which is your code repository
Acquia Search
CD and IDE environments
Any SaaS offerings
Feature | Shield | Shield on Cloud Next |
---|---|---|
Network Isolation | Provides network isolation for production and non-production servers based on EC2 instances in separate VPCs. | Provides network isolation for environments based on Kubernetes infrastructure, with isolated pods in subnet. |
VPN Support | Supports VPN connectivity with IKEv1 and IKEv2. | Maintains existing VPN connections and configurations. |
IP Allowlisting for SSH access | Is available for Shield subscribers on Cloud Platform Enterprise and has a limit of 25 IP addresses or CIDR ranges. | Preserves existing security configurations. |
Infrastructure | Is based on the traditional Cloud Classic infrastructure. | Is based on the modern Cloud Next infrastructure. |
Performance | Supports standard performance. | Supports enhanced performance and scalability. |
Migration Path | - | Has seamless migration path to the Cloud Next infrastructure. |
With Shield on Cloud Next, organizations can:
Acquia recommends that you exercise caution when you send high traffic to and from Acquia.
Contact your account manager for guidance on the upgrade process to Shield on Cloud Next.
If you use the Private SSH Ingress feature:
After Acquia upgrades your VPC from Shield to Shield on Cloud Next, Acquia gets a list of DNS resolver endpoint IPs. The SSH endpoint can be resolved through that or propagated to your peer VPC, if that is set up. In addition, Acquia generates the IP addresses for the SSH endpoint. As you need IP and host header, Acquia shares IP after SSH stack is ready on Cloud Next. Host header remains the same as the current one. You must upgrade the SSH endpoint after Acquia communicates the new endpoint. If this is not done, private SSH ingress feature does not work.
After Acquia provisions Shield on Cloud Next and provides connection information to you, it is your responsibility to configure your VPN device, establish the secure tunnel, and keep the network connection alive.
You must also confirm that your secondary tunnel is configured properly in case your primary tunnel becomes unavailable. When properly configured, your gateway must fail over to the secondary tunnel in your tunnel pair, if needed.
This service will be made available to customers in the near future. Through this service, you will be able to manage your configurations and provision resources related to Shield on Cloud Next. This service will expose multiple APIs through https://cloudapi-docs.acquia.com/. For example, you will be able to use these APIs to add environments to your private network.
Meanwhile, you can use the Cloud Platform user interface to allowlist IPs or contact Support if you need additional help.
Watch our video for an overview of Acquia's Product Resources and Enablement
If this content did not answer your questions, try searching or contacting our support team for further assistance.
Thu Aug 28 2025 15:58:39 GMT+0000 (Coordinated Universal Time)