Best practices for using Amazon Bedrock policies - AWS Organizations

Best practices for using Amazon Bedrock policies

Use a valid guardrail identifier

An incorrect or malformed identifier will cause all Amazon Bedrock API calls across the target organization to fail. Monitor CloudTrail for invalid effective policy alerts to detect misconfigurations quickly.

Exclude automated reasoning policies

Guardrails that include an automated reasoning policy are not supported for organization-level enforcement. Verify that your selected Amazon Bedrock Guardrail does not contain one.

Grant the necessary IAM permissions

Use Amazon Bedrock Guardrails resource-based policies to grant the organization and its member accounts permissions to evaluate the enforced guardrail at runtime.

Review Amazon Bedrock Service Limits for Guardrails

Member account calls using the Amazon Bedrock Policy will count towards the Service Quotas for the member. Review the Service Quotas Console and be sure that your Guardrails runtime limits are sufficient for your call volume.

Start small, then scale

Attach your policy to a few accounts to start, making sure the policy is being applied in the way you expect. Make sure to test that the Guardrail permissions are configured to allow cross-account access.

Validate changes to your Amazon Bedrock policies using DescribeEffectivePolicy

After you make a change to an Amazon Bedrock policy, check the effective policies for representative accounts below the level where you made the change. You can view the effective policy by using the AWS Management Console, or by using the DescribeEffectivePolicy API operation or one of its AWS CLI or AWS SDK variants. Ensure that the change you made had the intended impact on the effective policy.

Communicate and train

Ensure your organizations understand the purpose and impact of your Amazon Bedrock policies. Provide clear guidance on Amazon Bedrock Guardrails behavior and what to expect.