Logging, Monitoring & Compliance
CloudWatch logging, Config Rules, threat detection, incident response, and compliance configuration.
Authoritative Sources
Key guidance documents from authoritative organizations. Click to view the original source.
21 automated AWS Config security controls for Bedrock deployments covering wildcard permissions, guardrails enforcement, encryption, VPC endpoints, logging, and RAG knowledge base security. MIT-0 licensed.
Configuration Examples(3)
Customer Configuration Responsibilities
Configuration tasks the customer owns in the shared responsibility model. Use the verification commands below to validate settings.
4. Logging and Monitoring
Capture audit events and operational telemetry for Bedrock usage.
CloudTrail API logging
Enable CloudTrail trails and log delivery for Bedrock API calls.
CloudWatch Logs for invocation logging
Configure log groups and IAM roles for model invocation logging.
S3 log destinations
Provide secure buckets and policies for invocation log delivery.
VPC Flow Logs
Enable flow logs to monitor network activity to/from Bedrock jobs.
Metrics visibility
Grant least-privilege access to Bedrock and Guardrails metrics.
GuardDuty
Enable GuardDuty for threat detection on Bedrock API activity.
9. Incident Response
Prepare for Bedrock-related incidents under your shared responsibility scope.
Security baselines
Define expected behavior to detect deviations in AI workloads.
Incident response plans
Document and test response procedures for AI incidents.
10. Compliance Configuration
Align Bedrock usage with regulatory and data governance requirements.
Data sensitivity classification
Classify data and apply handling controls based on sensitivity.
Regulatory requirements
Configure controls to meet applicable legal or industry requirements.
Tagging hygiene
Avoid sensitive data in resource tags or free-form metadata.
Verification Commands
Commands and queries for testing and verifying security configurations.
Logging & Monitoring
5 commandsaws bedrock get-model-invocation-logging-configuration aws ec2 describe-flow-logs --filter Name=resource-id,Values=VPC_ID aws cloudtrail describe-trails aws cloudtrail get-event-selectors --trail-name TRAIL_NAME aws logs describe-log-groups --log-group-name-prefix /aws/bedrock Threat Detection
2 commandsaws guardduty list-detectors aws guardduty get-detector --detector-id DETECTOR_ID