Skip to content

Commit

Permalink
autogenerate docs
Browse files Browse the repository at this point in the history
  • Loading branch information
christophetd committed Oct 3, 2024
1 parent 371ee23 commit 3cd6396
Showing 1 changed file with 1 addition and 3 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -45,6 +45,4 @@ stratus detonate aws.impact.bedrock-invoke-model
Through CloudTrail's <code>ListFoundationModels</code> and <code>InvokeModel</code> events.
If model invocation logging is enabled, invocations requests are logged on CloudWatch and/or S3 buckets with additional details, including prompt content and response. This greatly helps in detecting malicious invocations.

It is not recommended to alert on every model invokation, thus you can consider the following options for a more reasonable detection:
- Detecting <code>InvokeModel</code> with "ValidationException", raised when using an invalid request parameter. This is a technique used by some attackers to verify if they have proper permissions.
- Adding other APIs in your detection pattern, such as <code>PutFoundationModelEntitlement</code> and <code>PutUseCaseForModelAccess</code>, used for enabling models before invoking them.

0 comments on commit 3cd6396

Please sign in to comment.