Xoxoftware - XOXO Creative Studio | Web & Mobile App Development | Fred Cheung | Hong Kong
AWSSecurity

Amazon GuardDuty

Intelligent threat detection — continuous monitoring of AWS accounts using VPC Flow Logs, CloudTrail, and DNS logs to identify malicious activity.

Overview

Amazon GuardDuty is a managed threat detection service — it continuously analyses AWS CloudTrail event logs, VPC Flow Logs, and DNS query logs using machine learning, anomaly detection, and integrated threat intelligence to identify malicious or unauthorised activity.

GuardDuty requires no agents, no log collection infrastructure, and no rule writing. Enable it with one click and it begins analysing data sources automatically.


Core Concepts

ConceptDescription
DetectorThe GuardDuty resource in a region; enabling GuardDuty creates a detector
FindingA security issue detected by GuardDuty (e.g., compromised instance, unusual API call)
Finding TypeClassification of the threat (e.g., Recon:EC2/PortProbeUnprotectedPort)
SeverityLow (1–3.9), Medium (4–6.9), High (7–10) based on confidence and impact
Threat IntelligenceAWS-curated and third-party IP reputation lists and known malware indicators
Suppression RuleFilters out known-good findings to reduce noise (does not delete, only hides)
Trusted IP ListIPs that GuardDuty will not flag (e.g., corporate VPN endpoints)
Threat IP ListCustom IP blacklist to generate findings when traffic matches

Data Sources

Data SourceDetects
CloudTrail Management EventsUnusual API calls, unauthorised access attempts, suspicious account activity
CloudTrail S3 Data EventsAnomalous S3 API patterns (data exfiltration)
VPC Flow LogsPort scanning, unusual outbound traffic, cryptocurrency mining
DNS LogsDNS queries to known malicious domains
EKS Audit LogsSuspicious Kubernetes API activity
Lambda Network LogsAnomalous Lambda function network activity
RDS Login EventsBrute-force or anomalous database login attempts
Runtime MonitoringContainer and EC2 runtime behaviour (file access, process execution)

GuardDuty does not require enabling Flow Logs or CloudTrail separately — it independently accesses these data streams.


Finding Categories

CategoryExamples
ReconnaissancePort scanning, API enumeration from unusual IPs
Instance CompromiseCryptocurrency mining, malware communication, data exfiltration
Account CompromiseAPI calls from unusual locations, disabled security controls, anomalous credential use
S3 CompromiseUnusual bucket access patterns, public bucket policy changes
KubernetesAnonymous access, privilege escalation, suspicious pod/container activity
MalwareDetected via EBS malware scanning (on-demand and automated)

Multi-Account Management

ApproachDescription
AWS OrganizationsDesignate a GuardDuty delegated administrator account
Invitation-basedManually invite and accept member accounts
Centralised findingsAll member account findings visible in the admin account

SAA/SAP Tip: In a multi-account setup, designate a security tooling account as the GuardDuty delegated administrator. This centralises all findings without granting the management account operational access.


Automation and Response

GuardDuty findings can trigger automated remediation:

GuardDuty Finding
    → EventBridge Rule (match finding type + severity)
        → Lambda Function
            → Isolate instance (modify SG)
            → Block IP (update NACL)
            → Send alert (SNS → Slack/PagerDuty)
            → Create JIRA ticket

Common Use Cases

  • Compromised instance detection — Identify EC2 instances communicating with known command-and-control servers.
  • Cryptocurrency mining — Detect unauthorised mining activity on EC2 instances.
  • Data exfiltration — Identify unusual S3 access patterns or large outbound data transfers.
  • Brute-force attacks — Detect SSH/RDP brute-force attempts and anomalous RDS login activity.
  • Centralised security monitoring — Aggregate findings across 100+ accounts in a delegated admin model.
  • Automated incident response — EventBridge + Lambda to isolate compromised instances in seconds.

SAA/SAP Exam Tips

SAA/SAP Tip: GuardDuty is the go-to answer for "detect compromised EC2 instances," "identify malicious activity," or "threat detection across AWS accounts." It is agentless and requires no log collection setup.

Exam Trap: GuardDuty detects threats but does not prevent them. For prevention, combine GuardDuty with automated remediation (EventBridge + Lambda) or AWS WAF/Shield. GuardDuty = detection; WAF = prevention.


Cross-Cloud Equivalents

ProviderService / SolutionNotes
AWSAmazon GuardDutyBaseline
AzureMicrosoft Defender for CloudBroader scope; includes recommendations
GCPGoogle Security Command Center + Event Threat DetectionSimilar finding-based model
On-PremisesCrowdStrike, SentinelOne, Splunk SIEMEndpoint detection + SIEM platforms

Pricing Model

DimensionUnitNotes
CloudTrail management eventsPer million eventsTiered; first 500M cheaper
VPC Flow Logs analysisPer GBTiered pricing by volume
DNS query logsPer million queriesIncluded in base analysis
S3 data event analysisPer million eventsTiered by volume
EKS audit log analysisPer million eventsAdditional charge
Malware scanning (EBS)Per GB scannedOn-demand or automated
30-day free trialAll featuresFull functionality for evaluation

Built by Fred Cheung @CookedRicer · Powered by Fumadocs & Github Copilot

On this page