Secure Amazon SageMaker Studio presigned URLs Part 1: Foundational infrastructure
You can access Amazon SageMaker Studio notebooks from the Amazon SageMaker console via AWS Identity and Access Management (IAM) authenticated federation from your identity provider (IdP), such as Okta. When a Studio user opens the notebook link, Studio validates the federated user’s IAM policy to authorize access, and generates and resolves the presigned URL for the user. Because the SageMaker console runs on an internet domain, this generated presigned URL is visible in the browser session. This presents an undesired threat vector for exfiltration and gaining access to customer data when proper access controls are not enforced.
Studio supports a few methods for enforcing access controls against presigned URL data exfiltration:
Client IP validation using the IAM policy condition aws:sourceIp
Client VPC validation using the IAM condition aws:sourceVpc
Client VPC endpoint validation using the IAM policy condition aws:sourceVpce
When you access Studio notebooks from the SageMaker console, the only available option is to use client IP validation with the IAM policy condition aws:sourceIp. However, you can use browser traffic routing products such as Zscaler to ensure scale and compliance for your workforce internet access. These traffic routing products generate their own source IP, whose IP range is not controlled by the enterprise customer. This makes it impossible for these enterprise customers to use the aws:sourceIp condition.
To use client VPC endpoint validation using the IAM policy condition aws:sourceVpce, the creation of a presigned URL needs to originate in the same customer VPC where Studio is deployed, and resolution of the presigned URL needs to happen via a Studio VPC endpoint on the customer VPC. This resolution of the presigned URL during access time for corporate network users can be accomplished using DNS forwarding rules (both in Zscaler and corporate DNS) and then into the customer VPC endpoint using an AWS Route 53 inbound resolver.
In this part, we discuss the overarching architecture for securing studio pre-signed url and demonstrate how to set up the foundational infrastructure to create and launch a Studio presigned URL through your VPC endpoint over a private network without traversing the internet. This serves as the foundational layer for preventing data exfiltration by external bad actors gaining access to Studio pre-signed URL and unauthorized or spoofed corporate user access within a corporate environment.
The following diagram illustrates over-arching solution architecture.
The process includes the following steps:
A corporate user authenticates via their IdP, connects to their corporate portal, and opens the Studio link from the corporate portal.
The corporate portal application makes a private API call using an API Gateway VPC endpoint to create a presigned URL.
The API Gateway VPC endpoint “create presigned URL” call is forwarded to the Route 53 inbound resolver on the customer VPC as configured in the corporate DNS.
The VPC DNS resolver resolves it to the API Gateway VPC endpoint IP. Optionally, it looks up a private hosted zone record if it exists.
The API Gateway VPC endpoint routes the request via the Amazon private network to the “create presigned URL API” running in the API Gateway service account.
API Gateway invokes the create-pre-signedURL private API and proxies the request to the create-pre-signedURL Lambda function.
The create-pre-signedURL Lambda call is invoked via the Lambda VPC endpoint.
The create-pre-signedURL function runs in the service account, retrieves authenticated user context (user ID, Region, and so on), looks up a mapping table to identify the SageMaker domain and user profile identifier, makes a sagemaker createpre-signedDomainURL API call, and generates a presigned URL. The Lambda service role has the source VPC endpoint conditions defined for the SageMaker API and Studio.
The generated presigned URL is resolved over the Studio VPC endpoint.
Studio validates that the presigned URL is being accessed via the customer’s VPC endpoint defined in the policy, and returns the result.
The Studio notebook is returned to the user’s browser session over the corporate network without traversing the internet.
The following sections walk you through how to implement this architecture to resolve Studio presigned URLs from a corporate network using VPC endpoints. We demonstrate a complete implementation by showing the following steps:
Set up the foundational architecture.
Configure the corporate app server to access a SageMaker presigned URL via a VPC endpoint.
Set up and launch Studio from the corporate network.
Set up the foundational architecture
In the post Access an Amazon SageMaker Studio notebook from a corporate network, we demonstrated how to resolve a presigned URL domain name for a Studio notebook from a corporate network without traversing the internet. You can follow the instructions in that post to set up the foundational architecture, and then return to this post and proceed to the next step.
Configure the corporate app server to access a SageMaker presigned URL via a VPC endpoint
To enable accessing Studio from your internet browser, we set up an on-premises app server on Windows Server on the on-premises VPC public subnet. However, the DNS queries for accessing Studio are routed through the corporate (private) network. Complete the following steps to configure routing Studio traffic through the corporate network:
Connect to your on-premises Windows app server.
Choose Get Password then browse and upload your private key to decrypt your password.
Use an RDP client and connect to the Windows Server using your credentials.
Resolving Studio DNS from the Windows Server command prompt results in using public DNS servers, as shown in the following screenshot.
Now we update Windows Server to use the on-premises DNS server that we set up earlier.
Navigate to Control Panel, Network and Internet, and choose Network Connections.
Right-click Ethernet and choose the Properties tab.
Update Windows Server to use the on-premises DNS server.
Now you update your preferred DNS server with your DNS server IP.
Navigate to VPC and Route Tables and choose your STUDIO-ONPREM-PUBLIC-RT route table.
Add a route to 10.16.0.0/16 with the target as the peering connection that we created during the foundational architecture setup.
Set up and launch Studio from your corporate network
To set up and launch Studio, complete the following steps:
Download Chrome and launch the browser on this Windows instance.
You may need to turn off Internet Explorer Enhanced Security Configuration to allow file downloads and then enable file downloads.
In your local device Chrome browser, navigate to the SageMaker console and open the Chrome developer tools Network tab.
Launch the Studio app and observe the Network tab for the authtokenparameter value, which includes the generated presigned URL along with the remote server address that the URL is routed to for resolution.In this example, the remote address 184.108.40.206 is one of the public DNS server addresses to resolve the SageMaker DNS domain name d-h4cy01pxticj.studio.us-west-2.sagemaker.aws.
Repeat these steps from the Amazon Elastic Compute Cloud (Amazon EC2) Windows instance that you configured as part of the foundational architecture.
We can observe that the remote address is not the public DNS IP, instead it’s the Studio VPC endpoint 10.16.42.74.
In this post, we demonstrated how to resolve a Studio presigned URL from a corporate network using Amazon private VPC endpoints without exposing the presigned URL resolution to the internet. This further secures your enterprise security posture for accessing Studio from a corporate network for building highly secure machine learning workloads on SageMaker. In part 2 of this series, we further extend this solution to demonstrate how to build a private API for accessing Studio with aws:sourceVPCE IAM policy validation and token authentication. Try out this solution and leave your feedback in the comments!
About the Authors
Ram Vittal is a machine learning solutions architect at AWS. He has over 20+ years of experience architecting and building distributed, hybrid and cloud applications. He is passionate about building secure and scalable AI/ML and Big Data solutions to help enterprise customers with their cloud adoption and optimization journey to improve their business outcomes. In his spare time, he enjoys tennis and photography.
Neelam Koshiya is an enterprise solution architect at AWS. Her current focus is to help enterprise customers with their cloud adoption journey for strategic business outcomes. In her spare time, she enjoys reading and being outdoors.
Leave A Reply