Overview
Network-isolated model containers reduce model exfiltration, supply-chain callback, prompt-injection pivot, and unapproved data egress risk. AI model runtimes should not have arbitrary outbound network reachability unless the use case requires it and the egress path is explicitly controlled.
Remediation guidance
Remediation
Enable network isolation for SageMaker models where supported. If the model needs controlled egress, route traffic through approved private endpoints, proxies, or VPC controls with logging and allowlists.
- Identify model containers without network isolation.
- Validate whether external network access is required.
- Enable network isolation or document a time-bound exception with compensating egress controls.
Query logic
These are the stored checks tied to this control.
AI model network isolation should be enabled
Connectors
Covered asset types
Expected check: eq []
{
sageMakerModels(where: { enableNetworkIsolation: { eq: false } }) { ...AssetFragment }
}
AWS