Check provider logo

Amazon Bedrock guardrail has prompt attack filter strength set to HIGH

bedrock_guardrail_prompt_attack_filter_enabled

Severityhigh
Servicebedrock
by Prowler

Bedrock guardrails have the Prompt attack filter set to HIGH strength to detect and block injection and jailbreak patterns. Guardrails missing this setting or using lower strengths are identified.

Risk

Without HIGH prompt-attack filtering, models are exposed to prompt injection/jailbreaks:

  • Confidentiality: coerced disclosure of sensitive data
  • Integrity: policy evasion and manipulated outputs
  • Operations: unintended tool execution and workflow tampering
Run this check with Prowler CLI

prowler aws --checks bedrock_guardrail_prompt_attack_filter_enabled

Recommendation

Set the Prompt attack filter to HIGH and apply defense in depth:

  • Tag user/external inputs as untrusted for evaluation
  • Combine with denied topics and sensitive-info filters
  • Enforce least privilege and approvals for risky actions
  • Monitor guardrail hits and tune to reduce false negatives

Remediation

CLI

aws bedrock update-guardrail --guardrail-identifier <guardrail_id> --content-policy-config 'filtersConfig=[{type=PROMPT_ATTACK,inputStrength=HIGH}]'

Native IaC
Terraform
Other
  1. Open the AWS Console and go to Amazon Bedrock
  2. Select Guardrails, then choose your guardrail
  3. In Content filters, find Prompt attacks
  4. Set Strength to High
  5. Click Save

Source Code

Resource Type

Other

References