Amazon GuardDuty provides intelligent threat discovery to protect your AWS Account.
Amazon GuardDuty uses Machine Learning algorithms, anomaly detection, and 3rd party data to identify threats.
Amazon GuardDuty can be enabled with a single click, and there is no need to install software.
Input data for Amazon GuardDuty includes CloudTrail Events Logs, which record unusual API calls and unauthorized deployments.
CloudTrail Management Events, which record the creation of VPC subnets and trails, are also an input for Amazon GuardDuty.
CloudTrail S3 Data Events, which record get object, list objects, and delete object operations, are another input for Amazon GuardDuty.
VPC Flow Logs, which record unusual internal traffic and unusual IP addresses, are an input for Amazon GuardDuty.
DNS Logs, which record compromised EC2 instances sending encoded data within DNS queries, are an input for Amazon GuardDuty.
The optional feature for Amazon GuardDuty includes EKS Audit Logs, RDS & Aurora, EBS, Lambda, and S3 Data Events.
It's best practice to enable GuardDuty even if Regions you don't use.
GuardDuty can generate findings for the Recon:EC2/Portscan and UnauthorizedAccess:EC2/SSHBruteForce finding types.
Amazon GuardDuty provides Suppression Rules, which are a set of criteria that automatically filter and archive new findings.
The Threat IP List is a list of known malicious IP addresses and CIDR ranges, and GuardDuty generates findings based on these threat lists.
If GuardDuty is suspended or disabled, then no finding types are generated.
Suppressed findings are not sent to Security Hub, S3, Detective, or EventBridge.
Suppressed findings can be still viewed in the Archive.
The UnauthorizedAccess:EC2/SSHBruteForce finding type is triggered when SSH Brute Force attacks are targeting Bastion Hosts EC2 instances.
Suppression Rules can suppress entire findings types or define more granular criteria (e.g., suppress only specific EC2 instances).
Amazon GuardDuty works only for public IP addresses.
The Recon:EC2/Portscan finding type is triggered when there is a port scan on a specific EC2 instance, such as running a vulnerability assessment.
In a multi-account GuardDuty setup, only the GuardDuty administrator account can manage those lists.
The Trusted IP List is a list of IP addresses and CIDR ranges that you trust, and GuardDuty doesn't generate findings for these trusted lists.
Amazon GuardDuty can protect against CryptoCurrency attacks, which it has a dedicated "finding" for.
Sample findings can be generated in GuardDuty to test your automations.
Amazon GuardDuty provides RDSProtection Finding Types like CredentialAccess:RDS/ AnomalousBehaviorSuccessfulLogin.
Amazon GuardDuty findings are potential security issues for malicious events happening in your AWS account.
Amazon GuardDuty provides S3 Finding Types like Policy: S 3/AccountBlockPublicAccess.
In an AWS Organization, you can specify a member account as the Organization's delegated administrator for GuardDuty.
Each finding in GuardDuty has a severity value between 0.1 to 8+ (High, Medium, Low).
The Administrator account in Amazon GuardDuty can add and remove member accounts, manage GuardDuty within the associated member accounts, manage findings, suppression rules, trusted IP lists, threat lists.
Automate response to security issues revealed by GuardDuty Findings using EventBridge.
Amazon GuardDuty provides Kubernetes Audit Logs Finding Types like CredentialAccess:Kubernetes/MaliciouslPCaller.
GuardDuty pulls independent streams of data directly from CloudTrail logs, VPC Flow Logs or EKS logs.
Amazon GuardDuty rules can target AWS Lambda or SNS.
Amazon GuardDuty can be set up to be notified in case of findings.
In a multi-account strategy for Amazon GuardDuty, you can manage multiple accounts and associate the Member accounts with the Administrator account.
Amazon GuardDuty provides EC2 Finding Types such as UnauthorizedAccess:EC2/SSHBruteForce, CryptoCurrency:EC2/BitcoinTool.BIDNS.
Events from GuardDuty findings are published to both the administrator account and the member account that it is originated from.
The naming convention for GuardDuty findings is ThreatPurpose:ResourceTypeAffected/ThreatFamilyName/DetectionMechanism/Artifact.
E.g. UnauthorizedAccess:EC2/SSHBruteForce
GuardDuty uses AWS Config Rules to detect misconfigurations on EC2 instances.