Benchmark: SageMaker
Description
This section contains recommendations for configuring SageMaker resources.
Usage
Install the mod:
mkdir dashboardscd dashboardspowerpipe mod initpowerpipe mod install github.com/turbot/steampipe-mod-aws-compliance
Start the Powerpipe server:
steampipe service startpowerpipe server
Open http://localhost:9033 in your browser and select SageMaker.
Run this benchmark in your terminal:
powerpipe benchmark run aws_compliance.benchmark.all_controls_sagemaker
Snapshot and share results via Turbot Pipes:
powerpipe benchmark run aws_compliance.benchmark.all_controls_sagemaker --share
Controls
- SageMaker endpoint configuration encryption should be enabled
- SageMaker models should be in a VPC
- SageMaker models should have network isolation enabled
- SageMaker notebook instances should not have direct internet access
- SageMaker notebook instances should be encrypted using CMK
- SageMaker notebook instance encryption should be enabled
- SageMaker notebook instances should be in a VPC
- SageMaker notebook instances root access should be disabled
- SageMaker training jobs should be in VPC
- SageMaker training jobs should be enabled with inter-container traffic encryption
- SageMaker training jobs should have network isolation enabled
- SageMaker training jobs volumes and outputs should have KMS encryption enabled