Skip to content

[New Check]: SageMaker domains use SSO authentication #11050

@danibarranqueroo

Description

@danibarranqueroo

Existing check search

  • I have searched existing issues, Prowler Hub, and the public roadmap, and this check does not already exist.

Provider

AWS

New provider name

No response

Service or product area

sagemaker

Suggested check name

sagemaker_sso_configured

Context and goal

  • Security condition to validate: Each SageMaker Domain is configured with AuthMode: SSO and references an IdentityStoreId for centralized identity management.
  • Why it matters: IAM-mode domains create per-user IAM users/roles managed locally to SageMaker, drifting from the org's IdP and weakening lifecycle controls (offboarding, MFA, session policies). SSO mode anchors access to AWS IAM Identity Center.
  • Resource involved: SageMaker Domain (AuthMode, SingleSignOnApplicationArn, IAM Identity Center Identity Store).

Expected behavior

  • Resource or scope to evaluate: Each SageMaker Domain in the account.
  • PASS when: Domain AuthMode is SSO and is associated with an IAM Identity Center instance (Identity Store ID present).
  • FAIL when: Domain AuthMode is IAM, or SSO is set but no Identity Store association exists.

References

Suggested severity

Medium

Additional implementation notes

No response

Metadata

Metadata

Assignees

No one assigned

    Labels

    feature-requestNew feature request for Prowler.good first issueIndicates a good issue for first-time contributorsnew-checkprovider/awsIssues/PRs related with the AWS provider

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions