Scheduled Service Outage Notice: From Saturday, January 31st at 10:00 PM EST through Sunday, February 1st at Noon EST, many Wharton and University systems will be unavailable or degraded due to scheduled ISC datacenter maintenance. For more information, see ISC Datacenter Maintenance 

AWS at Wharton Guardrails

The Cloud Architecture Team and the Information Security Office have implemented guardrails to ensure security, control, and consistency within the AWS Cloud Environment. Some of these guardrails may restrict the use of certain AWS services; therefore, we recommend that account owners review them carefully.

AWS Regions Allowed for Cloud Deployments

Only US regions are available by default in order to maintain a cost-effective security posture.

US Regions

  • N. Virginia (us-east-1)
  • Ohio (us-east-2)
  • N. California (us-west-1)
  • Oregon (us-west-2)

Requesting Additional Regions

To access other regions, please submit an exception request with the Information Security Office at https://technology.wharton.upenn.edu/iso.

Bedrock Large Language Models

Data Classification

Bedrock is not approved for use with High Data by the University (https://support.wharton.upenn.edu/help/data-classification-and-management-standard). AWS Accounts identified as handling high data are not eligible for access to AWS Bedrock Serverless offerings.

Approving Purchases for LLMs for Bedrock in AWS Marketplace

The terms for AWS Bedrock Serverless offerings must be approved by University Procurement before the models related to them are made available. This protects account owners from inappropriate terms in the “click-through” agreements.

As terms may change, it is possible that previously available models may be revoked. Wharton Computing will send communications to account owners in the event of such a change.

Approved LLM models/Resellers

The following models and/or resellers whose EULA have been reviewed and approved by Penn procurement:

  • Anthropic models (all)
  • Cohere
  • Minstral Models
  • Twelve Labs

The following models have been denied:

  • No terms have been reviewed and denied.

If you have a need to purchase a model that has not been approved or scheduled, please submit a request with the Information Security Officehttps://technology.wharton.upenn.edu/exception-form/.