6. Infrastructure security for agentic AI systems on AWS
Infrastructure security for agentic AI systems requires isolation strategies and immutable deployment practices to contain potential compromises. Account separation and automated deployment pipelines reduce both the attack surface and operational risk.
This section contains the following best practices:
6.1 Use the AWS Security Reference Architecture for AI systems (AI-specific)
The AWS Security
Reference Architecture (AWS SRA)
6.2 Apply defense-in-depth principles (General)
Apply defense-in-depth principles throughout the infrastructure to
create multiple security barriers that help protect against various attack vectors.
This approach reduces the likelihood of any single control failure resulting in a
system breach. For more information, see Architect defense-in-depth security for generative AI applications using the
OWASP Top 10 for LLMs
6.3 Reduce human access to infrastructure (General)
The AWS Well-Architected Framework recommends that you automate generative AI application lifecycle with infrastructure as code and that you use runbooks for standard activities such as deployment. Make sure that your infrastructure deployment includes tested, standardized runbooks. This reduces the likelihood of human error introducing vulnerabilities during the deployment process. Deploy immutable infrastructure and implement break-glass-procedures to prevent unauthorized modifications and promote consistent security configurations across environments. For more information about controlling changes, see How do you implement change? in the AWS Well-Architected Framework.
The AWS Well-Architected Framework also recommends that you deploy software programmatically and that you use multiple environments. Use automated pipelines to deploy code across environments, and regularly assess the security properties of the pipeline.
6.4 Deploy adequate edge protection (General)
Deploy edge protections that help protect against common web application threats,
such as those outlined in the OWASP Web Application Security
Project