Skip to content

[FEATURE] AWS Config Rules Solution for Bedrock Security Compliance #258

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Closed
cyphronix opened this issue Aug 5, 2024 · 1 comment
Closed
Assignees
Labels

Comments

@cyphronix
Copy link
Contributor

cyphronix commented Aug 5, 2024

Community Note

  • Please vote on this issue by adding a 👍 reaction to the original issue to help the community and maintainers prioritize this request
  • Please do not leave "+1" or "me too" comments, they generate extra noise for issue followers and do not help prioritize the request
  • If you are interested in working on this issue or have submitted a pull request, please leave a comment

Is your feature request related to a problem? Please describe

Maintaining security compliance and consistently enforcing security controls across an AWS Bedrock environment can be challenging and error-prone if done manually. Without automated compliance checks, there is a risk of misconfigured resources, security vulnerabilities, and potential violations of industry standards or regulatory requirements.

Describe the solution you'd like

Develop a set of AWS Config rules to automatically evaluate and remediate the configuration of AWS resources used in the Bedrock environment against predefined security best practices and compliance requirements. These rules should cover areas such as Identity and Access Management (IAM), data encryption, logging and monitoring, network isolation, and content filtering.

Describe alternatives you've considered

One alternative is to manually audit and review AWS resource configurations periodically. However, this approach is time-consuming, prone to human error, and may not provide continuous monitoring and enforcement of security controls.

Additional context

The solution should include AWS Config rules to detect insecure S3 bucket configurations, ensure IAM role and policy compliance, and monitor for appropriate logging and monitoring configurations, among other security controls.

@IevIe
Copy link
Contributor

IevIe commented Apr 14, 2025

Completed with SRA GenAI Deep-dive capability two controls #292

@IevIe IevIe closed this as completed Apr 14, 2025
@github-project-automation github-project-automation bot moved this from In Progress to Done / Launched in Security Reference Architecture (SRA) Apr 14, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
Status: Done / Launched
Development

No branches or pull requests

2 participants