AWS Solutions Architect Associate Certification

Services Security

GuardDuty

In this article, we explore AWS GuardDuty—a powerful security service that continuously monitors your AWS environment for suspicious and malicious activity. By leveraging machine learning and threat intelligence, GuardDuty detects potential threats, including unauthorized access, compromised instances, and harmful network traffic. When threats are identified, GuardDuty promptly generates alerts and provides actionable insights to help you respond effectively.

GuardDuty analyzes logs from several critical sources:

  • CloudTrail logs: Detect unusual API activity.
  • VPC flow logs: Monitor for irregular internal traffic and suspicious IP addresses.
  • DNS logs: Identify signs of compromised EC2 instances.
  • EKS audit logs: Track unusual activity within your EKS cluster.

Aggregating data from these sources allows GuardDuty to identify suspicious patterns and produce detailed reports on its findings.

GuardDuty can also be integrated with other AWS services to automate remediation processes, such as triggering a Lambda function or notifying the appropriate teams when threats are detected.

The image illustrates how GuardDuty works, showing a flow from data collection (CloudTrail events, VPC flow logs, etc.) to detection, triggering, and taking action using AWS services.

When a potential threat is detected, GuardDuty assigns a severity score ranging from 1 to 10:

  • Low severity (1-3): The event is unusual but typically does not require immediate action.
  • Medium severity (4-6): Suspicious activity deviates from the norm and may indicate a resource compromise.
  • High severity (7-10): Indicates a critical issue where a resource is almost certainly compromised and demands immediate attention.

This scoring system helps prioritize your response efforts effectively.

GuardDuty also supports the use of custom datasets for enhanced threat detection. You can configure two sets of IP addresses:

  • Trusted IP List (Whitelist): Identifies safe IP addresses within your AWS infrastructure, reducing false positives.
  • Threat IP List: Contains known malicious IPs—supplied by third parties or defined internally—to ensure that any interaction with these addresses triggers an alert.

Note

Integrating custom IP lists can significantly enhance the detection accuracy by minimizing false positives and enabling a more targeted security posture.

Detection Categories

GuardDuty classifies detected threats into several categories. The table below provides an overview of each category and its common characteristics:

Detection CategoryDescription
ReconnaissanceIncludes unusual API activity, port scanning, atypical login patterns or failures, and unauthorized port probing from known malicious IPs.
Instance CompromiseIndicates possible unauthorized cryptocurrency mining, the presence of malware that employs evasion techniques, malicious command and control, outbound denial of service attacks, or erratic network traffic.
Account CompromiseEncompasses suspicious activities such as API calls from unusual locations, use of anonymizing proxies, attempts to disable logging, changes that weaken password policies, unexpected resource deployments, region changes, or API calls from malicious IPs.
Bucket CompromiseInvolves irregular S3 data access patterns, potential credential misuse, abnormal S3 activity from remote locations, or unauthorized access attempts from suspicious IP addresses.

The image lists four GuardDuty detection categories: reconnaissance, instance compromise, account compromise, and bucket compromise, each represented by a numbered icon.

Warning

High severity alerts should be prioritized immediately. Make sure your incident response plan is up-to-date and that your team is prepared to act swiftly in the event of a critical threat.

Watch Video

Watch video content

Previous
Artifact