- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
",t};e.buildCustomizationMenuUi=t;function n(e){let t='
",t}function s(e){let n=e.filter.currentValue||e.filter.defaultValue,t='${e.filter.label}
`,e.filter.options.forEach(s=>{let o=s.id===n;t+=``}),t+="${e.filter.label}
`,t+=`This control checks whether your customer-managed IAM policies for write access to Bedrock Knowledge Base (KB) sources include appropriate security conditions to restrict access. Without these conditions, principals could inadvertently gain excessive permissions, leading to KB poisoning risks.
The control fails if the policy allows any write actions without a condition providing additional security context:
bedrock:createknowledgebase
bedrock:updateknowledgebase
bedrock:deleteknowledgebase
bedrock:ingestknowledgebasedocuments
bedrock:associateagentknowledgebase
bedrock:disassociateagentknowledgebase
bedrock:deleteknowledgebasedocuments
bedrock:createagent
bedrock:updateagent
bedrock:deleteagent
bedrock:createprompt
bedrock:updateprompt
bedrock:deleteprompt
bedrock:createdatasource
bedrock:updatedatasource
bedrock:deletedatasource
bedrock:createflow
bedrock:updateflow
bedrock:deleteflow
bedrock:create*
bedrock:update*
bedrock:delete*
bedrock:modify*
bedrock:*
*
The control specifically verifies the presence of security conditions, such as aws:PrincipalArn
, aws:SourceIp
, aws:ResourceTag
, or aws:MultiFactorAuthPresent
, ensuring that access is appropriately restricted.
See the IAM JSON Policy Elements: Condition and Creating and Managing IAM Policies documentation for guidance on modifying policies to include necessary security conditions.