Attest any foundation model on Bedrock.
Claude, Llama, Mistral, Titan, Cohere, Jamba. One wrapper around the Bedrock Runtime client turns every invocation into signed, IAM-aware evidence.
A standardized attestation layer across Amazon Bedrock's multiple foundation model providers — four API methods, every provider, one evidence pipeline.
Four methods, every provider
The integration covers InvokeModel, InvokeModelWithResponseStream, Converse, and ConverseStream across every provider published on Bedrock. Uses existing IAM roles and AWS KMS customer-managed keys; PrivateLink routing keeps traffic within cloud boundaries. No additional egress points or credentials required.
import boto3
import veridra
client = boto3.client("bedrock-runtime", region_name="us-east-1")
wrapped = veridra.wrap_bedrock(client, system_id="fraud-risk-v2")
resp = wrapped.converse(
modelId="anthropic.claude-sonnet-4-v1:0",
messages=[{"role": "user", "content": [{"text": "..."}]}],
)What Veridra captures
Provider-normalized payloads
Different Bedrock providers use distinct schemas; Veridra normalizes these into canonical form while preserving raw payloads for replay accuracy. A decision signed against Claude on Bedrock is comparable, byte for byte, to the same decision signed against Mistral on Bedrock.
Converse API semantics
Full support for the unified Converse and ConverseStream APIs, including tool configuration, guardrail identifiers, system blocks, and inference configuration.
Bedrock Guardrails
Guardrail intervention records — PII redactions, topic blocks, content filters — are signed alongside model exchanges. The intervention itself becomes evidence.
IAM and account context
Caller IAM role ARN, account id, region, and Bedrock model ARN captured for compliance frameworks like FedRAMP and ISMAP.
Deployment
Implementation uses standard AWS SDKs (boto3, JavaScript, Go, Java) with the wrapper call veridra.wrap_bedrock(client, system_id="..."). Deployment requires two Terraform resources: an IAM policy granting the Veridra signer role kms:Sign, and a PrivateLink endpoint in workload VPCs.
- Single wrapper across all Bedrock providers — no provider-specific code paths.
- Compatible with Bedrock Agents (action groups, knowledge bases).
- VPC-endpoint policies can restrict traffic to specific AWS accounts.
- The signing key remains customer-controlled — the Veridra signer role has
kms:Signonly against the designated CMK.
kms:Sign Veridra requested. If you revoke the role, signing stops immediately — and that stop is itself a signed log entry in your tenant transparency log.