Infrastructure Security in Amazon SageMaker
As a managed service, Amazon SageMaker is protected by the Amazon global network security
procedures that are described in the Amazon Web Services: Overview of Security Processes
You use Amazon published API calls to access Amazon SageMaker through the network. Clients must support Transport Layer Security (TLS) 1.0 or later. We recommend TLS 1.2 or later. Clients must also support cipher suites with perfect forward secrecy (PFS) such as Ephemeral Diffie-Hellman (DHE) or Elliptic Curve Ephemeral Diffie-Hellman (ECDHE). Most modern systems such as Java 7 and later support these modes.
Additionally, requests must be signed by using an access key ID and a secret access key that is associated with an IAM principal. Or you can use the Amazon Security Token Service (Amazon STS) to generate temporary security credentials to sign requests.
Topics
- SageMaker Scans Amazon Web Services Marketplace Training and Inference Containers for Security Vulnerabilities
- Connect to Resources From Within a VPC
- Run Training and Inference Containers in Internet-Free Mode
- Connect to SageMaker Through a VPC Interface Endpoint
- Give SageMaker Access to Resources in your Amazon VPC
SageMaker Scans Amazon Web Services Marketplace Training and Inference Containers for Security Vulnerabilities
To meet our security requirements, algorithms and model packages listed in Amazon Web Services Marketplace are
scanned for Common Vulnerabilities and Exposures (CVE). CVE is a list of publicly known
information about security vulnerability and exposure. The National Vulnerability
Database (NVD) provides CVE details such as severity, impact rating, and fix
information. Both CVE and NVD are available for public consumption and free for security
tools and services to use. For more information, see http://cve.mitre.org/about/faqs.html#what_is_cve