Ensure that your Amazon Bedrock AgentCore runtimes are configured to use VPC network mode so that runtime workloads operate within your organization's private network boundaries. Amazon Bedrock AgentCore runtimes support two network modes: PUBLIC and VPC. By default, runtimes are deployed in PUBLIC mode, which means they run on shared AWS infrastructure with potential exposure to the public internet. When VPC mode is configured, Amazon Bedrock creates Elastic Network Interfaces (ENIs) in your specified subnets using the AWSServiceRoleForBedrockAgentCoreNetwork service-linked role, assigning each ENI a private IP address from your VPC and attaching the security groups you define. This enables the runtime to securely communicate with private resources such as databases, internal APIs, and other services within your VPC without traversing the public internet.
Configuring VPC mode requires providing a networkModeConfig object containing at least one subnet ID and at least one security group ID. The security groups attached to the ENIs control which resources the runtime can communicate with, enabling you to apply the principle of least privilege at the network level. To enable internet access for runtimes that require it (for example, to call external APIs), place the runtime in private subnets with a route to a NAT Gateway rather than using a public subnet, since AgentCore creates ENIs with private IP addresses only. Additionally, VPC endpoints for AWS services used by the runtime can improve security, reduce latency, and eliminate NAT Gateway charges for those service calls.
Deploying Amazon Bedrock AgentCore runtimes in VPC mode provides critical network-level isolation that reduces the attack surface of your AI agent infrastructure. When a runtime operates in PUBLIC mode, it runs on shared infrastructure without the network boundaries of your organization's VPC, which means it cannot access private resources directly and its outbound traffic is not subject to your network-level security controls such as VPC security groups, network ACLs, and VPC flow logs. Placing runtimes inside a VPC enables you to enforce network segmentation, restrict outbound connectivity to only the resources and services required, capture network traffic logs for security auditing and incident response, and prevent unauthorized lateral movement within your environment in the event of a runtime compromise. This is especially important for production AI agent workloads that process sensitive data or interact with critical internal systems, where defense-in-depth requires that both IAM-level and network-level controls are applied together.
Audit
To determine if your Amazon Bedrock AgentCore runtimes are configured to use VPC network mode, perform the following operations:
Remediation / Resolution
To configure your Amazon Bedrock AgentCore runtimes to use VPC network mode, perform the following operations:
Before configuring VPC mode, ensure you have an Amazon VPC with subnets located in the supported Availability Zones for your region and appropriate security groups that control the runtime's outbound network access. For internet access from within the VPC, place the runtime in private subnets with a route to a NAT Gateway. For private connectivity to AWS services, configure the required VPC endpoints. For more information, see the AgentCore VPC documentation.References
- AWS Documentation
- Configure Amazon Bedrock AgentCore Runtime and tools for VPC
- Protecting your data using VPC and AWS PrivateLink
- NetworkConfiguration
- VpcConfig
- GetAgentRuntime
- UpdateAgentRuntime
- AWS Command Line Interface (CLI) Documentation
- list-agent-runtimes
- get-agent-runtime
- update-agent-runtime
- Terraform Documentation
- Resource: aws_bedrockagentcore_agent_runtime