Does AWS Route53 DNS support any kind of proprietary access list (ACL) to limit some DNS records (TXT records) to the public, but still keep those TXT records reachable from within AWS account?
I know DNS server's intention is to expose all DNS records to public, but some TXT records could be too revealing about implementation.
Example: Kubernetes "external DNS controller" which creates A-records and adds the TXT records. DNS controller relies on "owner" attribute in TXT record to determine if it allows making changes to that record, so TXT records can't be removed entirely.
service-a.example.com. A 192.0.2.4
service-a.example.com. TXT "heritage=external-dns,external-dns/owner=eks/my-eks-cluster,external-dns/resource=service/test/my-svc2"
R53 offers private hosted zones that you can associated with your VPCs so that internal traffic can add/updated/resolve records while keeping this information private. Perhaps you can leverage a private hosted zone for DNS that needs to remain internal.