@aws-mdaa/bedrock-settings-l3-construct
v1.5.0
Published
MDAA Bedrock Settings L3 Construct
Readme
Construct Overview
The Bedrock Settings CDK L3 construct is used to configure and deploy Amazon Bedrock model invocation logging settings to S3 and/or CloudWatch.
Deployed Resources
- Bedrock Model Invocation Logging Configuration: Configures Amazon Bedrock to log model invocations to specified destinations
- S3 Bucket: (Optional) Encrypted S3 bucket for storing Bedrock model invocation audit logs
- CloudWatch Log Group: (Optional) Encrypted CloudWatch Log Group for storing Bedrock model invocation audit logs
- KMS Key: Encrypts Bedrock logging resources (S3 bucket and CloudWatch logs)
- IAM Service Role: Allows Bedrock service to write logs to CloudWatch and S3
- Custom Resource: Lambda-based custom resource that configures Bedrock logging settings via API calls
Configuration Options
- enableAuditLoggingToS3: Enable S3 bucket creation and logging for model invocation audit logs
- enableAuditLoggingToCloudwatch: Enable CloudWatch Log Group creation and logging for model invocation audit logs
At least one of these options must be enabled.
Logging Capabilities
The construct enables comprehensive logging of Bedrock model invocations including:
- Text data delivery
- Image data delivery
- Embedding data delivery
- Video data delivery
S3 Configuration
When S3 logging is enabled:
- Creates encrypted S3 bucket with naming pattern:
bedrock-logs-{account}-{region} - Logs stored with prefix:
bedrock-model-invocation-logs/bedrock-model-invocation-{region} - Bucket policy allows Bedrock service to write objects
CloudWatch Configuration
When CloudWatch logging is enabled:
- Creates encrypted CloudWatch Log Group:
bedrock-model-invocation-{region} - Infinite retention period for audit compliance
- Large data delivery fallback to S3 for oversized log entries
- Service role with permissions to write to CloudWatch Logs
Security Features
- All resources encrypted with customer-managed KMS key
- Least privilege IAM policies with resource-specific permissions
- Service principals restricted to specific account and region
- Bucket policies with condition-based access controls
