You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I have searched existing issues, Prowler Hub, and the public roadmap, and this check does not already exist.
Provider
AWS
New provider name
No response
Service or product area
sagemaker
Suggested check name
sagemaker_sso_configured
Context and goal
Security condition to validate: Each SageMaker Domain is configured with AuthMode: SSO and references an IdentityStoreId for centralized identity management.
Why it matters: IAM-mode domains create per-user IAM users/roles managed locally to SageMaker, drifting from the org's IdP and weakening lifecycle controls (offboarding, MFA, session policies). SSO mode anchors access to AWS IAM Identity Center.
Resource involved: SageMaker Domain (AuthMode, SingleSignOnApplicationArn, IAM Identity Center Identity Store).
Expected behavior
Resource or scope to evaluate: Each SageMaker Domain in the account.
PASS when: Domain AuthMode is SSO and is associated with an IAM Identity Center instance (Identity Store ID present).
FAIL when: Domain AuthMode is IAM, or SSO is set but no Identity Store association exists.
Existing check search
Provider
AWS
New provider name
No response
Service or product area
sagemaker
Suggested check name
sagemaker_sso_configured
Context and goal
Expected behavior
References
Suggested severity
Medium
Additional implementation notes
No response