Network Security
VPC endpoints, PrivateLink configuration, and network architecture for private Bedrock access.
Authoritative Sources
Key guidance documents from authoritative organizations. Click to view the original source.
Kwatra & Kaushik (Packt, 2024) detail Bedrock's on-demand, provisioned-throughput, and model-customization network architectures. Each model provider gets a dedicated deployment account per region that customers and other vendors cannot access. All internal traffic uses TLS 1.2+, no customer data is persisted in the Bedrock service account, and model providers never see customer prompts, outputs, or training data — even for Amazon's own Titan models.
Customer Configuration Responsibilities
Configuration tasks the customer owns in the shared responsibility model. Use the verification commands below to validate settings.
3. Network Security (VPC & PrivateLink)
Limit network exposure for Bedrock jobs and runtime invocations.
VPC configuration for jobs
Configure VPC connectivity for customization, batch inference, and knowledge base ingestion.
PrivateLink interface endpoints
Create VPC interface endpoints for Bedrock and Bedrock Runtime.
Endpoint policies
Attach endpoint policies to restrict access through PrivateLink endpoints.
Security groups
Limit inbound and outbound traffic for Bedrock-related subnets.
Subnet selection
Use dedicated subnets for Bedrock connectivity when possible.
S3 gateway endpoints
Use gateway endpoints for S3 data access from VPCs.
DNS and route tables
Validate route table associations and private DNS resolution for endpoints.
Verification Commands
Commands and queries for testing and verifying security configurations.
Network & VPC
5 commandsaws ec2 describe-vpc-endpoints --filters Name=service-name,Values=com.amazonaws.$REGION.bedrock* aws ec2 describe-vpc-endpoints --filters Name=service-name,Values=com.amazonaws.$REGION.s3 aws ec2 describe-security-groups --group-ids SG_ID aws ec2 describe-subnets --subnet-ids SUBNET_ID aws ec2 describe-route-tables --filters Name=vpc-id,Values=VPC_ID