FedRAMP AI Studio

Automated SSP Narrative Generation
← Back to Dashboard

Generated Diagram (Use Case 11) DRAFT

Account: 154776478584 Run: 4f6cda72-e405-4f30-9bde-aa3f17639f45 Models: gpt-5.2 /
Diagram saved. ID: a54d969f-da87-4cc8-9ab9-b2bfc7dd58a3 — Retrievable via DB and viewable at /ui/diagrams/a54d969f-da87-4cc8-9ab9-b2bfc7dd58a3
This page renders the Mermaid diagram (Mermaid-only mode).

Summarizer Output (Step 1)

{
  "app_summary": "Two EC2 instances (stopped): \u0027First Instance\u0027 i-0601780d500bb51ea in subnet-0b8c568bc3659b486 (172.31.27.120) and \u0027Second Instance\u0027 i-0322a28bf1a8a68c5 in subnet-05c9a438bb7c68867 (172.31.87.12). Both use security group sg-090ff45d5d6ad1cd4 and have no IAM instance profile. No load balancer, API Gateway, or container services evidenced.",
  "boundary_label": "FedRAMP Authorization Boundary: AWS Account 154776478584 (us-east-1) - VPC vpc-033668c99bb7641b0",
  "data_summary": "No RDS instances, no S3 buckets, and no other data stores observed. Depict only EC2 attached storage as implicit/placeholder local/EBS storage (3 EBS volumes counted but not enumerated). Treat application data persistence as unknown/placeholder until storage services are evidenced.",
  "flow_labels": {
    "admin_flow": "Administrator -\u003e (placeholde",
    "app_to_data": "EC2 -\u003e (placeholder) data se",
    "ingress_flow": "Ingress via Internet Gateway",
    "log_flow": "Workloads/VPC -\u003e (placeholde",
    "user_flow": "External User (Internet) -\u003e "
  },
  "grouping_hints": {
    "data_tier": "Show a \u0027Data Tier\u0027 lane/container inside the VPC but mark as \u0027Not evidenced\u0027 and keep empty except for an optional placeholder for \u0027Attached/EBS volumes\u0027 to reflect volume count without inventing resource IDs.",
    "perimeter": "Outer: \u0027Internet/External Actors\u0027. Inner: \u0027AWS Account 154776478584 (us-east-1)\u0027 containing the VPC boundary; show IGW at VPC edge connecting to Internet.",
    "security": "Create a \u0027Security Controls\u0027 side grouping listing: Security Groups (3, include sg-090ff45d5d6ad1cd4 attached to both EC2), Network ACL (1), Route Table (1). Avoid port-level rules since not provided.",
    "subnets": "Within VPC, group subnets under a single \u0027Public Subnets (map_public_ip_on_launch=true)\u0027 container; optionally subdivide by AZ labels (1a/1b/1c/1d/1e/1f) with subnet IDs as captions. Place EC2 instances inside their respective subnet groups."
  },
  "layout_hints": {
    "legend_position": "right",
    "responsive_canvas": true,
    "side_panels": true,
    "subnet_columns": 2,
    "support_panel_position": "left"
  },
  "network_summary": "VPC 172.31.0.0/16 (default) with IGW igw-0c2d9b6f737cc026e attached. Six subnets across AZs (all map_public_ip_on_launch=true). No NAT gateways and no VPC endpoints; assume direct internet egress/ingress via IGW where routing permits (route table details not provided).",
  "overview": "Single AWS account/region with one VPC, one attached Internet Gateway, six public subnets, and two stopped EC2 instances. No observed managed data stores, VPC endpoints, NAT gateways, or logging services in evidence.",
  "placeholder_sections": [
    "management_path",
    "cloudtrail",
    "cloudwatch_logs",
    "vpc_flow_logs",
    "data_services"
  ],
  "security_summary": "Network controls evidenced: 3 security groups, 1 network ACL, 1 route table (details not included). Identity evidence exists (roles/users/password policy/credential report) but specific IAM principals and permissions not enumerated here; represent IAM as an account-level shared control placeholder if needed. Logging/monitoring not evidenced (no CloudTrail, CloudWatch Logs, or VPC Flow Logs).",
  "style_goals": [
    "Emphasize the authorization boundary as the AWS account + VPC boundary, with clear inside/outside separation",
    "Minimize clutter by aggregating the six public subnets into an AZ-aligned subnet group panel unless detailed per-subnet placement is required",
    "Use explicit placeholders for missing but expected services (management access and logging) and visually distinguish them from evidenced resources"
  ],
  "title": "AWS us-east-1 Default VPC (154776478584) - Authorization Boundary \u0026 Data Flow"
}

Evidence JSON (Audit Trail)

{
  "account_id": "154776478584",
  "counts": {
    "assets": [
      {
        "count": 3,
        "resource_type": "ebs_volume"
      },
      {
        "count": 2,
        "resource_type": "ec2_instance"
      }
    ],
    "data_stores": [],
    "identities": [
      {
        "count": 1,
        "resource_type": "iam_credential_report"
      },
      {
        "count": 1,
        "resource_type": "iam_password_policy"
      },
      {
        "count": 4,
        "resource_type": "iam_role"
      },
      {
        "count": 5,
        "resource_type": "iam_user"
      }
    ],
    "network_components": [
      {
        "count": 1,
        "resource_type": "internet_gateway"
      },
      {
        "count": 1,
        "resource_type": "network_acl"
      },
      {
        "count": 1,
        "resource_type": "route_table"
      },
      {
        "count": 3,
        "resource_type": "security_group"
      },
      {
        "count": 6,
        "resource_type": "subnet"
      },
      {
        "count": 1,
        "resource_type": "vpc"
      }
    ]
  },
  "ingestion_run_id": "4f6cda72-e405-4f30-9bde-aa3f17639f45",
  "notes": {
    "no_hallucination": true,
    "resource_types_supported": [
      "vpc",
      "subnet",
      "internet_gateway",
      "nat_gateway",
      "vpc_endpoint",
      "vpc_flow_log",
      "ec2_instance",
      "rds_instance",
      "s3_bucket",
      "cloudtrail_trail",
      "cloudwatch_log_group"
    ],
    "sample_limit": 50
  },
  "resources": {
    "cloudtrail_trails": [],
    "cloudwatch_log_groups": [],
    "ec2_instances": [
      {
        "account_id": "154776478584",
        "data": {
          "ebs_optimized": false,
          "iam_instance_profile": null,
          "instance_id": "i-0601780d500bb51ea",
          "instance_type": "t2.medium",
          "launch_time": "2022-09-10T16:59:37Z",
          "monitoring_enabled": false,
          "private_ip": "172.31.27.120",
          "public_ip": null,
          "security_group_ids": [
            "sg-090ff45d5d6ad1cd4"
          ],
          "state": "stopped",
          "subnet_id": "subnet-0b8c568bc3659b486",
          "tags": {
            "Name": "First Instance"
          },
          "vpc_id": "vpc-033668c99bb7641b0"
        },
        "id": "32a0eba7-e121-4edc-b1c1-bffef2933ace",
        "region": "us-east-1",
        "resource_id": "i-0601780d500bb51ea",
        "resource_type": "ec2_instance"
      },
      {
        "account_id": "154776478584",
        "data": {
          "ebs_optimized": false,
          "iam_instance_profile": null,
          "instance_id": "i-0322a28bf1a8a68c5",
          "instance_type": "t2.micro",
          "launch_time": "2022-09-20T23:57:09Z",
          "monitoring_enabled": false,
          "private_ip": "172.31.87.12",
          "public_ip": null,
          "security_group_ids": [
            "sg-090ff45d5d6ad1cd4"
          ],
          "state": "stopped",
          "subnet_id": "subnet-05c9a438bb7c68867",
          "tags": {
            "Name": "Second Instance"
          },
          "vpc_id": "vpc-033668c99bb7641b0"
        },
        "id": "5e7c6ca8-9065-4bcc-9165-dc107f489b27",
        "region": "us-east-1",
        "resource_id": "i-0322a28bf1a8a68c5",
        "resource_type": "ec2_instance"
      }
    ],
    "internet_gateways": [
      {
        "account_id": "154776478584",
        "data": {
          "attachments": [
            {
              "State": "available",
              "VpcId": "vpc-033668c99bb7641b0"
            }
          ],
          "internet_gateway_id": "igw-0c2d9b6f737cc026e",
          "tags": {}
        },
        "id": "7ba32aea-41e3-41ff-ad43-ae942914a211",
        "region": "us-east-1",
        "resource_id": "igw-0c2d9b6f737cc026e",
        "resource_type": "internet_gateway"
      }
    ],
    "nat_gateways": [],
    "rds_instances": [],
    "s3_buckets": [],
    "subnets": [
      {
        "account_id": "154776478584",
        "data": {
          "availability_zone": "us-east-1d",
          "available_ip_address_count": 4090,
          "cidr_block": "172.31.16.0/20",
          "map_public_ip_on_launch": true,
          "state": "available",
          "subnet_id": "subnet-0b8c568bc3659b486",
          "tags": {},
          "vpc_id": "vpc-033668c99bb7641b0"
        },
        "id": "0ca7e857-501a-4579-9f30-b196928262be",
        "region": "us-east-1",
        "resource_id": "subnet-0b8c568bc3659b486",
        "resource_type": "subnet"
      },
      {
        "account_id": "154776478584",
        "data": {
          "availability_zone": "us-east-1a",
          "available_ip_address_count": 4091,
          "cidr_block": "172.31.32.0/20",
          "map_public_ip_on_launch": true,
          "state": "available",
          "subnet_id": "subnet-0c567848e2f3285b9",
          "tags": {},
          "vpc_id": "vpc-033668c99bb7641b0"
        },
        "id": "0163976f-cd7a-4344-89e7-21923ede5856",
        "region": "us-east-1",
        "resource_id": "subnet-0c567848e2f3285b9",
        "resource_type": "subnet"
      },
      {
        "account_id": "154776478584",
        "data": {
          "availability_zone": "us-east-1f",
          "available_ip_address_count": 4091,
          "cidr_block": "172.31.64.0/20",
          "map_public_ip_on_launch": true,
          "state": "available",
          "subnet_id": "subnet-06c23e873cdba6e94",
          "tags": {},
          "vpc_id": "vpc-033668c99bb7641b0"
        },
        "id": "6de8f5bc-f770-4210-8378-7e35eb23fb8d",
        "region": "us-east-1",
        "resource_id": "subnet-06c23e873cdba6e94",
        "resource_type": "subnet"
      },
      {
        "account_id": "154776478584",
        "data": {
          "availability_zone": "us-east-1c",
          "available_ip_address_count": 4090,
          "cidr_block": "172.31.80.0/20",
          "map_public_ip_on_launch": true,
          "state": "available",
          "subnet_id": "subnet-05c9a438bb7c68867",
          "tags": {},
          "vpc_id": "vpc-033668c99bb7641b0"
        },
        "id": "e784ece9-6419-44d7-9377-18245fcb7131",
        "region": "us-east-1",
        "resource_id": "subnet-05c9a438bb7c68867",
        "resource_type": "subnet"
      },
      {
        "account_id": "154776478584",
        "data": {
          "availability_zone": "us-east-1b",
          "available_ip_address_count": 4091,
          "cidr_block": "172.31.0.0/20",
          "map_public_ip_on_launch": true,
          "state": "available",
          "subnet_id": "subnet-0b3e792cb9abb6b15",
          "tags": {},
          "vpc_id": "vpc-033668c99bb7641b0"
        },
        "id": "c9ced59b-6593-4686-a676-5f738af9753e",
        "region": "us-east-1",
        "resource_id": "subnet-0b3e792cb9abb6b15",
        "resource_type": "subnet"
      },
      {
        "account_id": "154776478584",
        "data": {
          "availability_zone": "us-east-1e",
          "available_ip_address_count": 4091,
          "cidr_block": "172.31.48.0/20",
          "map_public_ip_on_launch": true,
          "state": "available",
          "subnet_id": "subnet-006336d9696975386",
          "tags": {},
          "vpc_id": "vpc-033668c99bb7641b0"
        },
        "id": "9941a8ef-7fbb-44f9-b1da-eef0274aac63",
        "region": "us-east-1",
        "resource_id": "subnet-006336d9696975386",
        "resource_type": "subnet"
      }
    ],
    "vpc_endpoints": [],
    "vpc_flow_logs": [],
    "vpcs": [
      {
        "account_id": "154776478584",
        "data": {
          "cidr_block": "172.31.0.0/16",
          "dhcp_options_id": "dopt-0823549fe54a61393",
          "instance_tenancy": "default",
          "is_default": true,
          "state": "available",
          "tags": {},
          "vpc_id": "vpc-033668c99bb7641b0"
        },
        "id": "10082cf8-7102-4134-a934-89c21d1accc0",
        "region": "us-east-1",
        "resource_id": "vpc-033668c99bb7641b0",
        "resource_type": "vpc"
      }
    ]
  }
}