Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

Direct Internet Access Restriction for SageMaker Notebook Instances

This rule checks whether direct internet access is disabled for SageMaker notebook instances to ensure secure network configuration.

RuleAmazon SageMaker notebook instances should not have direct internet access
FrameworkAWS Foundational Security Best Practices
Severity
High

Rule Description

Amazon SageMaker notebook instances should not have direct internet access as a security best practice to reduce the attack surface and protect sensitive data from potential threats.

Troubleshooting Steps

  1. 1.
    Check the network configurations for the SageMaker notebook instance to ensure there is no direct internet access.
  2. 2.
    Verify the security group and network ACL settings to ensure that outbound internet traffic is blocked.
  3. 3.
    Check if there are any VPC endpoints configured that might allow internet access.

Remediation Steps

To restrict internet access for Amazon SageMaker notebook instances, you can follow these steps:

  1. 1.

    Update VPC Route Tables:

    • Navigate to the VPC console.
    • Select the VPC where the SageMaker notebook instance resides.
    • Edit the route table associated with the subnet of the notebook instance.
    • Remove the default route that allows internet access (0.0.0.0/0) or any specific routes allowing internet access.
    • Add specific routes for internal resources or services as needed.
  2. 2.

    Update Security Groups:

    • Go to the EC2 console.
    • Find the security group associated with the SageMaker notebook instance.
    • Edit the outbound rules of the security group to deny all traffic or allow traffic only to specific destinations within the VPC.
  3. 3.

    Disable Public IP Assignment:

    • If the SageMaker notebook instance has a public IP, disassociate it to prevent direct internet access.
  4. 4.

    Use Private Subnets:

    • Consider moving the SageMaker notebook instances to private subnets within the VPC to restrict external connectivity.
  5. 5.

    Monitor Network Traffic:

    • Set up VPC flow logs and CloudWatch logs to monitor network traffic for any unauthorized attempts to access the internet.

By following these steps, you can ensure that Amazon SageMaker notebook instances do not have direct internet access, aligning with AWS Foundational Security Best Practices.

Is your System Free of Underlying Vulnerabilities?
Find Out Now