cartography
cartography copied to clipboard
[Feature] Add support for AWS Bedrock
Summary
Add support for ingesting AWS Bedrock resources into Cartography. Amazon Bedrock is AWS's fully managed service for building generative AI applications using foundation models. This feature would allow Cartography to track Bedrock model access, custom models, provisioned throughput, guardrails, and agents.
Motivation
AWS Bedrock is increasingly used for enterprise AI/ML workloads and represents a critical attack surface for organizations adopting generative AI. By ingesting Bedrock resources, Cartography can surface:
- Which IAM principals have access to invoke foundation models
- Custom models and their training data sources (S3 buckets)
- Provisioned throughput configurations and costs
- Guardrails configured for content filtering and safety
- Bedrock Agents and their associated Lambda functions/knowledge bases
- Model invocation logging configurations (CloudWatch/S3)
This unlocks graph-based security analysis such as:
- Identifying over-permissioned access to expensive or sensitive models
- Tracking data flows from S3 training data to custom models
- Auditing guardrail coverage across model deployments
- Mapping agent architectures and their attack surfaces
Proposed Solution
Extend the AWS intel module to call the Bedrock APIs and model the following resources:
New Nodes:
AWSBedrockFoundationModel- Available foundation modelsAWSBedrockCustomModel- Custom fine-tuned modelsAWSBedrockProvisionedModelThroughput- Provisioned throughput reservationsAWSBedrockGuardrail- Content filtering guardrailsAWSBedrockAgent- Bedrock agentsAWSBedrockKnowledgeBase- Knowledge bases for RAG
New Relationships:
(:AWSAccount)-[:RESOURCE]->(:AWSBedrockCustomModel)(:AWSBedrockCustomModel)-[:TRAINED_FROM]->(:S3Bucket)(:AWSBedrockAgent)-[:INVOKES]->(:AWSLambda)(:AWSBedrockAgent)-[:USES_KNOWLEDGE_BASE]->(:AWSBedrockKnowledgeBase)(:AWSBedrockKnowledgeBase)-[:BACKED_BY]->(:S3Bucket)(:AWSBedrockGuardrail)-[:APPLIED_TO]->(:AWSBedrockCustomModel)
AWS APIs to integrate:
bedrock:ListFoundationModelsbedrock:ListCustomModelsbedrock:ListProvisionedModelThroughputsbedrock:ListGuardrailsbedrock-agent:ListAgentsbedrock-agent:ListKnowledgeBases
Alternatives Considered
- Relying solely on IAM permission analysis for Bedrock access - this misses the resource-level detail needed for comprehensive security analysis
- Using CloudTrail logs only - this provides invocation history but not the resource configuration graph