- To monitor API calls
- To give internet access to instances in private subnets
- To encrypt data in transit
- To manage network access control lists