Ensure that your Amazon Bedrock knowledge base transient data is encrypted with Amazon KMS Customer Managed Keys (CMKs) instead of AWS managed keys. This approach grants you more granular control over the data encryption at rest and helps meet compliance requirements. Once configured, while converting your data into embeddings, Amazon Bedrock will encrypt your transient data using your own KMS Customer Managed Key (CMK).
excellence
By default, while converting your data into embeddings, Amazon Bedrock encrypts your transient data with an AWS-managed key. When you use your own KMS Customer Managed Keys (CMKs) to protect your transient data, you have full control over who can use the encryption keys to access your data. This improves data security posture and compliance by adhering to strict encryption requirements for sensitive data. The Amazon KMS service allows you to easily create, rotate, disable, and audit Customer Managed Keys for your knowledge base transient data.
Audit
To obtain the encryption configuration information available for your Amazon Bedrock knowledge base transient data, perform the following operations:
Getting the encryption configuration information for knowledge base data sources via AWS Command Line Interface (CLI) is not currently supported.Remediation / Resolution
To encrypt your Amazon Bedrock knowledge base transient data using your own KMS Customer Master Key (CMK), you must reconfigure your knowledge base data sources, by performing the following operations:
Enabling encryption for Amazon Bedrock knowledge base transient data using AWS Command Line Interface (CLI) is not currently supported.