I am implementing a Transit Gateway in a dedicated Transit Gateway account. Im then looking at connecting upto 6 AWS VPCs from separate accounts. I believe I need to add all 6 Transit Gateway attachments to the same Transit Gateway route table to allow connectivity between them - as AWS does not let you associate a TGW Attachment with more than one TGW Route Table.
This works and all VPCs can talk to each other - but what's the best practice to control access between VPCs. Lets say D is the Transit Gateway account.
VPC A/B/C/D are all on the TGW route table. What if I don't want VPC A to talk to VPC B, but allow VPC A to talk to VPC C. I know that this won't occur unless I add the subnet VPC routes in/propagate them but Id like more control.
For example two TGW route tables, one with the TGW Attachment (D), VPC A, VPC B. Another TGW route table with the TGW Attachment (D), VPC A, VPC C.
I presume one way to do it would be to add NACLs to the Transit Gateway subnets, but that would only block entire VPCs.