Join Bedrock Data at AWS re:Invent 2025! Learn more
a bunch of purple cubes are stacked on top of each other on a purple background .

Uncovering Sensitive Data with Sysdig and Bedrock Data: A Technical Deep Dive

This blog walks through how the Sysdig and Bedrock Security integration works under the hood, why its architecture is distinct, and what advantages it provides over traditional discovery models.
August 26, 2025|3 min read
a man in a brown shirt is standing in front of a bush .

Praveen Yarlagadda

Founding Engineer

Share:

Sysdig and Bedrock Data have built a deep integration designed to uncover sensitive data with precision, and do so without adding friction to security or operations teams. This blog walks through how the integration works under the hood, why its architecture is distinct, and what advantages it provides over traditional discovery models.

About the Partnership


Bedrock Data and Sysdig Partner to Unify Cloud and Data Security

Data security findings: A technical deep dive

Uncover and Protect Sensitive Data With Bedrock Data + Sysdig

Architectural Overview

Here’s a visual breakdown of how the integration works:

Diagram of the Bedrock Data & Sysdig Integration

Bedrock Data & Sysdig Integration

OwnerResponsibility
SysdigSysdig Secure orchestrates enablement, customer coordination, and visualization of findings, embedding sensitive data into its existing graph of misconfigurations, runtime events, and vulnerabilities.
CustomerCustomer cloud infrastructure account hosts Bedrock scanners deployed via CloudFormation (or equivalent) templates. These scanners operate entirely within the customer’s environment, adhering to least-privilege IAM (identity and access management) policies.
Bedrock DataThe Bedrock Data Platform contains the Metadata Lake, Graph API, tenant and scan services, which classifies sensitive data using contextual logic rather than basic pattern matching.
SysdigSysdig Connector provides the feedback loop, securely transmitting classified findings from Bedrock back into Sysdig’s workflows.

Unlike legacy discovery tools that often pull raw data into central processing, Bedrock’s metadata-only architecture and serverless scanning design eliminate data exfiltration risk. Sensitive data never leaves the customer’s account; only metadata and classification results are transmitted. This supports stringent compliance requirements for regulated industries like finance and healthcare.

How the Integration Works

The process begins when a Sysdig customer opts into the integration. Sysdig initiates the workflow by calling Bedrock’s Graph API to provision a tenant in Bedrock’s platform. This tenant is logically isolated: each customer’s metadata, scan configurations, and findings remain completely separate from others.

Once provisioned, Sysdig works with the customer to identify the AWS accounts and regions to include in the scans. Bedrock generates CloudFormation templates and IAM roles tailored for least-privilege deployment, ensuring scanners have access only to metadata — not to the underlying data itself.

After deployment, Bedrock enumerates supported cloud data stores, such as S3, RDS, and GCS data stores, and collects metadata describing object names, schemas, and usage patterns. This process uses adaptive sampling to scale across large, dynamic environments without consuming excessive resources or requiring agents.

Only the metadata is streamed to Bedrock’s platform, where custom, fine-tuned AI models are applied to distinguish between test data and production PII, or recognize sensitive content embedded in backups, reducing false positives compared to the use of regex-only tools.

Once analysis is complete, classified findings are pushed back to Sysdig Secure via REST APIs. Security teams can then view sensitive data risks directly in Sysdig, correlate them with runtime signals, and enforce policies without switching tools.

Technical Benefits

For security engineering and operations teams, the integration offers several tangible advantages:

AdvantageDescription
Automated Sensitive Data DiscoveryContinuous, in-place scanning ensures new data stores and snapshots are analyzed without manual intervention or data movement.
Direct Policy Enforcement in SysdigFindings integrate with Sysdig’s runtime controls, enabling immediate actions — like blocking access or generating compliance evidence.
Least-Privilege DeploymentIAM roles and artifacts follow strict least-privilege principles, minimizing blast radius and simplifying audits.
AI-Powered ClassificationBedrock applies context-aware detection rather than relying solely on static patterns.
Unified Risk ModelingFindings flow into Sysdig’s risk graph, correlating with vulnerabilities, misconfigurations, and runtime anomalies to prioritize true business risks.
Query via SysQLTeams can create custom automated queries for sensitive data, like identifying exposed PCI data or AI workloads with sensitive access. For example:
MATCH CloudResource IN ZoneWHERE CloudResource.isExposed = true AND Zone.name IN ['pci-dev']MATCH CloudResource CONTAINS SensitiveDataWHERE SensitiveData.dataClass IN ['Credit Card PAN']RETURN DISTINCT CloudResource, Zone, SensitiveDataLIMIT 50;

Getting Started

Enabling the integration is straightforward:

  1. Request activation through your Sysdig account team.
  2. Define AWS targets for scanning.
  3. Deploy Bedrock artifacts (CloudFormation templates and IAM roles).
  4. View sensitive data findings directly within the Sysdig Secure console.

Conclusion

The Sysdig–Bedrock integration unifies runtime security and data sensitivity awareness in a single workflow. By leveraging metadata-driven scanning and serverless architecture it delivers precision that traditional discovery tools can’t match, all while reducing operational overhead. For teams operating in fast-moving, multi-account cloud environments, this integration provides a scalable, secure, and technically sound path to uncovering and protecting sensitive data.

Next Steps

Request a demo of the Sysdig–Bedrock integration.

Related Content

Subscribe to our newsletter

See the difference with Bedrock