Select your cookie preferences

We use essential cookies and similar tools that are necessary to provide our site and services. We use performance cookies to collect anonymous statistics, so we can understand how customers use our site and make improvements. Essential cookies cannot be deactivated, but you can choose “Customize” or “Decline” to decline performance cookies.

If you agree, AWS and approved third parties will also use cookies to provide useful site features, remember your preferences, and display relevant content, including relevant advertising. To accept or decline all non-essential cookies, choose “Accept” or “Decline.” To make more detailed choices, choose “Customize.”

Encryption of custom model import

Focus mode
Encryption of custom model import - Amazon Bedrock

Amazon Bedrock supports creating a custom model by using the custom model import feature to import models that you have created in other environments, such as Amazon SageMaker AI. Your custom imported models are managed and stored by AWS. For more information, see Import a model.

For encryption of your custom imported model, Amazon Bedrock provides the following options:

  • AWS owned keys – By default, Amazon Bedrock encrypts custom imported models with AWS owned keys. You can't view, manage, or use AWS owned keys, or audit their use. However, you don't have to take any action or change any programs to protect the keys that encrypt your data. For more information, see AWS owned keys in the AWS Key Management Service Developer Guide.

  • Customer managed keys (CMK) – You can choose to add a second layer of encryption over the existing AWS owned encryption keys by choosing a customer managed key(CMK). You create, own, and manage your customer managed keys.

    Because you have full control of this layer of encryption, in it you can perform the following tasks:

    • Establish and maintain key policies

    • Establish and maintain IAM policies and grants

    • Enable and disable key policies

    • Rotate key cryptographic material

    • Add tags

    • Create key aliases

    • Schedule keys for deletion

    For more information, see customer managed keys in the AWS Key Management Service Developer Guide.

Note

For all the custom models you import, Amazon Bedrock automatically enables encryption at rest using AWS owned keys to protect customer data at no charge. If you use a customer managed key, AWS KMS charges apply. For more information about pricing, see AWS Key Management Service Pricing..

How Amazon Bedrock uses grants in AWS KMS

If you specify a customer managed key to encrypt the imported model. Amazon Bedrock creates a primary AWS KMS grant associated with the imported model on your behalf by sending a CreateGrant request to AWS KMS. This grant allows Amazon Bedrock to access and use your customer managed key. Grants in AWS KMS are used to give Amazon Bedrock access to a KMS key in a customer’s account.

Amazon Bedrock requires the primary grant to use your customer managed key for the following internal operations:

  • Send DescribeKey requests to AWS KMS to verify that the symmetric customer managed KMS key ID you entered when creating the job is valid.

  • Send GenerateDataKey and Decrypt requests to AWS KMS to generate data keys encrypted by your customer managed key and decrypt the encrypted data keys so that they can be used to encrypt the model artifacts.

  • Send CreateGrant requests to AWS KMS to create scoped down secondary grants with a subset of the above operations (DescribeKey, GenerateDataKey, Decrypt), for the asynchronous execution of model import and for on-demand inference.

  • Amazon Bedrock specifies a retiring principal during the creation of grants, so the service can send a RetireGrant request.

You have full access to your customer managed AWS KMS key. You can revoke access to the grant by following the steps at Retiring and revoking grants in the AWS Key Management Service Developer Guide. or remove the service’s access to your customer managed key at any time by modifying the key policy. If you do so, Amazon Bedrock won’t be able to access the imported model encrypted by your key.

Life cycle of primary and secondary grants for custom imported models

  • Primary grants have a long lifespan and remain active as long as the associated custom models are still in use. When a custom imported model is deleted, the corresponding primary grant is automatically retired.

  • Secondary grants are short-lived. They are automatically retired as soon as the operation that Amazon Bedrock performs on behalf of the customers is completed. For example, once a custom model import job is finished, the secondary grant that allowed Amazon Bedrock to encrypt the custom imported model will be retired immediately.

PrivacySite termsCookie preferences
© 2025, Amazon Web Services, Inc. or its affiliates. All rights reserved.