Back to controls

AI model network isolation should be enabled

Network-isolated model containers reduce model exfiltration, supply-chain callback, prompt-injection pivot, and unapproved data egress risk. AI model runtimes should not have arbitrary outbound network reachability unless the use case requires it and the egress path is explicitly controlled.

Category

Controls

High

Applies to

AWS

Coverage

1 queries

Asset types

2 covered

Overview

Network-isolated model containers reduce model exfiltration, supply-chain callback, prompt-injection pivot, and unapproved data egress risk. AI model runtimes should not have arbitrary outbound network reachability unless the use case requires it and the egress path is explicitly controlled.

Remediation guidance

Remediation

Enable network isolation for SageMaker models where supported. If the model needs controlled egress, route traffic through approved private endpoints, proxies, or VPC controls with logging and allowlists.

  1. Identify model containers without network isolation.
  2. Validate whether external network access is required.
  3. Enable network isolation or document a time-bound exception with compensating egress controls.

Query logic

These are the stored checks tied to this control.

AI model network isolation should be enabled

Connectors

AWS

Covered asset types

AI ServicesModel

Expected check: eq []

{
  sageMakerModels(where: { enableNetworkIsolation: { eq: false } }) { ...AssetFragment }
}
Cyscale Logo
Cyscale is an agentless cloud-native application protection platform (CNAPP) that automates the contextual analysis of cloud misconfigurations, vulnerabilities, access, and data, to provide an accurate and actionable assessment of risk.

Stay connected

Receive new blog posts and product updates from Cyscale

By clicking Subscribe, I agree to Cyscale’s Privacy Policy


© 2026 Cyscale Limited

LinkedIn icon
Twitter icon
Facebook icon
crunch base icon
angel icon