GuardDuty

Security Specialty

Solution Architect Associate

  • Is a threat detection service that uses Machine Learning to continually monitor your AWS infrastructure for malicious behavior
  • It monitors for things like:
    • Unusual API calls (like known malicious IP addresses)
    • Attempts to disable CloudTrail logging
    • Unauthorized deployments
    • Compromised instances
    • Reconnaissance by would be attackers
    • Port scanning, failed logins, etc.
  • Sends Alerts to the GuardDuty console when it detects things
  • Receives feeds from 3rd parties like Proofpoint, CrowdStrike, AWS Security, etc. to keep itself up to date on known malicous attacks
  • Monitors CloudTrail logs, VPC Flow Logs, and DNS Logs
  • Provides centralized thread detection across multiple AWS accounts and automate response using CloudWatch Events and Lambda
  • Machine Learning and anomaly detection are used to help with all this
  • When you first set up GuardDuty it takes between 7 and 14 days to establish a normal activity baseline
  • With that baseline established, it will be able to monitor for behavior it considerrs a threat