Armakuni has been supporting the identity platform for the past 6 months and has exceeded all expectations. Charles loops me into the conversation right away. Armakuni is part of the One Team.
Strata 2026: 80% of production agents broke their permission scope at least once. Gartner 2026: only 21% of enterprises have governance mature enough to detect it. The gap is not policy. It is controls in code. Two hours on your agent inventory. Your team leaves with three things: a governance architecture, a per-agent OWASP Agentic Top 10 gap analysis, and reference Terraform mapped to the five pillars your auditor already uses.
Two hours on your agent inventory. We walk a security owner through every production agent, score each against OWASP Agentic T1-T5, and hand you the Terraform that closes the gaps. Bedrock Guardrails, AgentCore Policy, IAM scopes, Audit Manager framework. Wired on your agents.
Each pillar shuts a specific OWASP failure mode and emits the audit evidence that proves it shut. The visual on the left tracks the pillar you are on.
Each pillar maps to a specific OWASP Agentic failure mode and a specific AWS service surface that ships the telemetry to prove it.





Most agents run with more permission than the job requires. Per-agent IAM scoping (Access Analyzer, Verified Permissions, AgentCore Policy) turns the Strata 80% into zero: the agent cannot cross a scope it was never granted. The same controls show you which agents escalated, which held scope, and which integrations you are paying for and never using.
IAM · Access Analyzer · Verified Permissions · Bedrock AgentCore Policy
Untrusted input is the most common hijack vector. An uploaded document can carry prompt-injection payloads hidden inside otherwise harmless text. Bedrock Guardrails (input filters, denied topics, contextual grounding) stop the agent from executing them. The same surface reports injection-detection rate, false-positive rate, and latency impact so you can tune prompts instead of guessing.
Bedrock Guardrails · CloudTrail · Amazon GuardDuty
In multi-agent workflows, one agent's hallucination becomes the next agent's input. Bedrock Evaluations per hand-off, contextual grounding checks, and confidence thresholds stop the second agent from confidently acting on fabricated data. Same evaluations give you the A/B signal to swap in the cheaper model that still holds quality.
Bedrock Evaluations · Bedrock AgentCore · Step Functions
Long-running agents with shared memory inherit every corrupted entry. AgentCore Memory isolation, KMS-scoped session keys, and Step Functions tenant boundaries contain the blast radius to a single session. The same events attribute session cost per tenant and flag memory-scope leaks before the auditor does.
Bedrock AgentCore Memory · KMS · Step Functions
Agents handed the whole tool catalogue use tools they should not. AgentCore Policy allowlists, Verified Permissions parameter bounds, and Lambda approval handlers behind Step Functions mean tools are available only when the job calls for them. Same deny-events map the tool-usage heatmap that drives cost optimisation.
Bedrock AgentCore Policy · Verified Permissions · Lambda · Step Functions


Of the AK Way shipping production systems since 2014, under FCA, PRA, and Caldicott pressure.
Across the UK, US, and India post-Simform, with a Gen AI Delivery Lab built with AWS.
Early-access partner for Bedrock AgentCore Policy, GA March 2026. We were wiring it in preview.
AWS Premier tier, Security Competency, Strategic Collaboration Agreement for enterprise Gen AI.
The solution architect who runs your workshop is the same one who would audit your agent inventory. We have shipped production controls with Santander, HSBC, and NHS Wales, under FCA, PRA, and Caldicott pressure, on live systems with live auditors in the room.
A leading premium wildlife stock footage platform shipped agentic AI under audit with per-agent IAM scopes and Bedrock Guardrails on every model call.
Read use case →A regional agricultural cooperative in the U.S. Midwest deployed OWASP T1-T5 controls-as-code with AgentCore Memory isolation from day one.
Read use case →Award-winning LMS provider for enterprises and mid-size organizations earned C-Suite trust on a regulated platform with the governance architecture documented for the regulator.
Read use case →One of the largest cinema networks in the U.S. integrated AI on Connect with per-tool allow-lists and audit trails ready for live regulator review.
Read use case →SMS campaign automation platform for e-commerce and restaurant brands shipped agentic AI on the data layer with full per-query provenance and the orchestration layer in their AWS account.
Read use case →Pick a slot that works for your team. We confirm the agent inventory and environment ahead of time. You show up with the agents you want us to look at. Whatever we find is yours to keep, whether you engage us after or not.
No commitment · No sales follow-up unless you ask · You own the Terraform

The Gen AI Delivery Lab. Five reference patterns. PUSH framework qualification. Bedrock-native governance.
See the offering →
One-day hands-on workshop where your engineers build a Bedrock agent against your real data with the OWASP Agentic Top 10 controls baked in.
See the workshop →
A leading premium wildlife stock footage platform, the identity platform, A regional agricultural cooperative in the U.S. Midwest. Specific governance wins. Named stakeholders.
All case studies →AWS Premier Tier Services Partner




Active Competencies and Service Delivery Programs relevant to this offering.