Any security benefits on separating AWS subnet?

In case of we have proper security groups and private/public subnets,
is there any security benefit on separating AWS private subnet?

For example, I have 1 ELB(public subnet) and 2 EC2(Frontend and Backend in the same private subnet).
ELB -> Frontend -> Backend network security is properly secured by security groups.

At this point, is there any security advantage on separating subnets between Frontend and Backend?

Before: ELB(Public subnet) -> EC2(Frontend, Private subnet A) -> EC2(Backend, Private subnet A)
After: ELB(Public subnet) -> EC2(Frontend, Private subnet A) -> EC2(Backend, Private subnet B)


Firstly is it required by the any form of security compliance? If so the buck stops there and you have no choice but to fulfill the requirements on what the papers and/or your boss commands.

In general practices though it's really depends on if it the additional inconveniences incurred.

Personally as long as it's your OWN VLAN and the provider isn't shoving everyone onto a shared network where everyone who got a AWS instance can connect to it as it were to be more or less the internet at their scales. Then I would think it suffice to have one private and one public.

Unless of course the application vendor recommend exotic configurations or something that a segregation of such is just easier than making some exceptions to the existing infrastructure.