Skip to main content

Amazon GuardDuty

Updated Aug 30, 2020 ·
NOTES

This is not an exhaustive documentation of all the existing AWS Services. These are summarized notes that I used for the AWS Certifications.

To see the complete documentation, please go to: AWS documentation

Overview

AWS GuardDuty is an intelligent threat detection service that uses AI/Machine Learning to monitor one or more AWS accounts for malicious behavior.

  • Leverages third-party feeds from cybersecurity partners

  • Automate response and alerting using CloudWatch and Lamdba

  • Monitors different sources of data:

    • CloudTrail
      • DNS
      • VPC Flow logs

Use cases

  • Reconnaissance

    • Unusual API activity.
    • Unusual patterns of failed login requests.
  • Instance compromise

    • Backdoor command and control (C&C) activity.
    • Outbound instance communication with known malicious IP.
  • Account compromise

    • Attempts on disabling AWS CloudTrail logging.
    • Unusual instances/infrastructure launches.

How to get started

  • Easy activation via console.
  • If threat is detected, it will appear in GuardDuty dashboard and CloudWatch events.
  • takes 7-14 days to set a baseline.
  • prices varies according to volume of data.