-
Notifications
You must be signed in to change notification settings - Fork 218
Description
Receiving the following error when trying to implement Bedrock due to the GRREGIONDENY SCP :
"User: arn:aws:sts::123456789012:assumed-role/AmazonBedrockExecutionRoleForAgents_ABCD1234567/BedrockAgents-xxxxxx is not authorized to perform: bedrock:InvokeModel on resource: arn:aws:bedrock:::foundation-model/anthropic.claude-3-5-haiku-20241022-v1:0 with an explicit deny in a service control policy"
According to the below document, us.anthropic.claude-3-5-haiku-20241022-v1:0 cross-region inference profile requests can be routed to one of us-east-1, us-east-2, or us-west-2:
https://docs.aws.amazon.com/bedrock/latest/userguide/inference-profiles-support.html
Creating this Feature Request to allow the Bedrock service to be added to the existing exclusion mechanism as used by GGREGIONDENY
Or to allow users to govern authorized regions for inference using inference profiles in Bedrock which could be modeled as custom inference profiles or a separate guardrail resource that governs which regions Bedrock will select from an inference profile.
The following workarounds in the meantime have been noted:
-
(Recommended)Migrate to OU-level region deny, use the built-in exemption feature to exempt bedrock:Invoke* from OU level region deny in addition to adopting the OU level region deny control CTMULTISERVICEPV1. Optionally, can add a custom SCP statement to deny bedrock:Invoke* when a request is made to an undesired region.
-
Configure the Landing Zone level control (GRREGIONDENY) with additional regions required for cross-region inference (e.g. us-east-2). To ensure that actions other than bedrock:InvokeModel cannot be used in the new region, a custom SCP can be used to deny all operations in the new region with a condition based on the bedrock:InferenceProfileArn condition key as described here:
https://aws.amazon.com/blogs/machine-learning/enable-amazon-bedrock-cross-region-inference-in-multi-account-environments/
However these workarounds are not viable for large Organizations with a large number of OUs and accounts.