aws guardduty

How to turn on intelligent Threat Detection using Amazon GuardDuty

Amazon GuardDuty is a fully managed threat detection service to monitors any malicious or unauthorized behavior to ensure the security of your AWS accounts and workloads.

As an AWS Certified Cloud Practitioner, it is crucial to ensure the security of the AWS infrastructure and you can achieve it with the help of Amazon GuardDuty.

In this blog, we are going to explore Amazon GuardDuty and its features, the working of Amazon Guardduty, and how to achieve intelligent Threat Detection using Amazon GuardDuty.

Let’s dive in!

What is AWS GuardDuty?

Amazon GuardDuty is a threat monitoring service that keeps an eye out for illegal activity and harmful activities to safeguard workloads, and data stored in Amazon S3, and AWS accounts.

As soon as an IT or security administrator activates GuardDuty through the AWS Management Console, the controlled cloud-hosted service starts scanning the AWS environment.

Although there is a 30-day free trial when you enable GuardDuty, the service is not free. Pricing is determined by the quantity of VPC Flow Log and DNS Log data evaluated monthly as well as the number of AWS CloudTrail events examined.

AWS GuardDuty Features

Accuracy

Amazon GuardDuty ensures effective threat detection for the accounts that are subjected to theft using continuous monitoring in real-time.

GuardDuty finds the activity of the accounts comprised such as resources accessed from uncommon locations at unexpected times.

Continuous monitoring

Amazon GuardDuty continuously monitors and assesses data from AWS CloudTrail, VPC Flow Logs, and DNS Logs in AWS accounts and workloads. It allows for aggregated threat detection by linking AWS accounts, eliminating the need for a per-account approach. Moreover, there is no requirement to manually collect, analyze, or correlate extensive amounts of AWS data from numerous accounts.

Threat severity levels

Amazon GuardDuty employs three severity categories to help clients prioritize their response to potential attacks. 

  • A “Low” sensitivity indication signifies the detection and prevention of suspicious or malicious activity to safeguard your resources. 
  • A “Medium” risk level indicates questionable behavior, such as a notable volume of traffic sent through the Tor network or unusual activity. 
  • A resource assigned a “High” severity rating indicates that it has been compromised and is actively being exploited for malicious purposes, such as an Amazon EC2 instance or a set of IAM user credentials.

High available threat detection

Amazon GuardDuty is crafted to autonomously oversee the utilization of resources within your AWS accounts, workloads, and Amazon S3 data. It enhances detection capabilities precisely when needed and reduces usage during periods when it is no longer necessary.

One-click deployment

Configuring Amazon GuardDuty is a seamless process, requiring just one click or API request for a single AWS account. With a few extra steps, you can easily enable GuardDuty across multiple accounts using the AWS Management Console. Additionally, GuardDuty provides native support for handling multiple accounts and offers integration with AWS Organizations.

How to turn on intelligent Threat Detection using Amazon GuardDuty

In these guided hands-on labs, you will learn how to enable Amazon Guardduty and explore some threat detection functionalities.

To start with it, you have to access the Whizlabs hands-on labs page. Then type Amazon Guardduty in the search box and the lab page will be displayed.

Follow the instructions given under lab steps. 

Task 1: Sign in to the AWS Management Console

Click the “Open Console” button, and you will be directed to the AWS Console in a new browser tab. On the AWS sign-in page, keep the Account ID as the default setting. It is crucial not to modify or remove the 12-digit Account ID displayed in the AWS Console; failure to do so may hinder your progress in the lab.

Proceed by copying your User Name and Password from the Lab Console to the IAM Username and Password fields in the AWS Console. Click the “Sign in” button to complete the sign-in process.

Once successfully signed in to the AWS Management Console, set the default AWS Region to US East (N. Virginia) by choosing us-east-1.

Note: There is no validation function for this lab.

Task 2: Enabling Amazon GuardDuty

Ensure you select the US East (N. Virginia) region (us-east-1) from the AWS Management Console dashboard, located in the top right corner. 

free

Navigate to the Services menu at the top, then click on GuardDuty under the Security, Identity, and Compliance section. Proceed by clicking on “Get started.”

Click on Enable GuardDuty with one click and this service will be activated.

findings

In the Findings page, you will see the warning You don’t have any findings because there is no malicious activity happening in your AWS Account. Ignore the warnings, wherever you find them.

Task 3: Exploring Amazon GuardDuty

Settings

Navigate to the left panel and click on “Settings.” You will find a Detector ID, which represents the GuardDuty service as a resource.

settings

For service roles, GuardDuty utilizes a service role to oversee your data sources on your behalf.

Concerning findings export options, findings are automatically sent to CloudWatch Events, and there’s the additional option to export them to an S3 bucket. The export process for new findings takes place within 5 minutes, and no adjustments are necessary.

If you choose to suspend GuardDuty, it ceases monitoring your AWS environment, preventing the generation of new findings. Existing findings are preserved and remain unaffected.

However, disabling GuardDuty not only halts its monitoring and generation of new findings but also results in the loss of existing findings and configurations. Once disabled, the data cannot be recovered later.

Lists

Select “Lists” beneath the “Settings” section. In the List Manager, you can include Trusted IP Lists and Threat IP Lists.

list management

Trusted IP Lists include IP addresses authorized for secure communication with your AWS environment. GuardDuty refrains from generating findings for IP addresses present in these trusted lists, acknowledging them as secure.

On the other hand, Threat IP Lists comprise known malicious IP addresses. GuardDuty actively generates findings for any IP addresses identified within threat lists, helping to identify and respond to potential security threats.

Accounts

Click on Accounts above the settings.

accounts

You have the option to extend invitations to other accounts, inviting them to enable GuardDuty and establish an association with your AWS account. Upon acceptance, your account assumes the role of the master GuardDuty account.

The account accepting the invitation transforms into a member account linked to your master account. This arrangement allows you to oversee and administer GuardDuty findings on behalf of the associated member account. 

Notably, a master account in GuardDuty, for each region, can manage up to 1000 member accounts.

Task 4: Generating Sample Findings

To simulate and explore sample security findings in our AWS Account, follow these steps:

Navigate to the “Settings” section from the left panel.

Scroll down and click on “Generate sample findings.”

findings of accounts

Go to “Findings” from the left panel and wait for the loading process to complete. In the top-right corner, you should observe several findings.

This process allows you to generate and examine example security findings in your AWS environment.

You can use filter criteria to filter your findings.

filter

Click on one of the sample findings.

You can see various parameters like severity, region, Account ID, Resource ID, Resource Affected, etc.

filterpara

Go through the sample to learn more about the different severities.

Task 5: Validation of the Lab

Once the lab steps are completed, please click on the Validation button on the right-side panel.

validatelab

This will validate the resources in the AWS account and display whether you have completed this lab successfully or not.

Task 6: Disabling GuardDuty

Go to the settings and click on DisableGuardDuty under suspend GuardDuty to stop it.

Click on Disable to confirm and you have successfully disabled GuardDuty.

disable guarduty

AWS GuardDuty Use Cases

  • Protect your compute workloads: detect whether your EC2 instance is mining cryptocurrency or communicating with IP addresses and domains connected with known dangerous actors.
  • Protect your AWS credentials: detect whether your AWS credentials are used unusually or suspiciously, such as from IP addresses connected with known malicious actors, or in a manner that differs from their expected behavior.
  • Protect your data stored in Amazon S3 buckets: identify when data stored in your Amazon S3 buckets are accessed in an unusually suspicious manner, such as when an unusual volume of items is obtained from an odd location, or when the S3 bucket is visited from IP addresses connected with known malicious actors.

Also Read: Free AWS Cloud Practitioner Exam Questions

How does AWS GuardDuty work?

Amazon GuardDuty provides continuous monitoring of AWS CloudTrail, Amazon VPC Flow Logs, and DNS logs to detect potential security threats. Utilizing built-in threat intelligence, anomaly detection, and machine learning capabilities developed by the AWS security team, the service conducts near-real-time analysis.

amazonguarduty working

Source: AWS

GuardDuty classifies AWS cloud threats into three categories:

  • Attacker reconnaissance: This includes identifying failed login patterns, unusual API activity, and instances of port scanning.
  • Compromised resources: GuardDuty detects threats such as cryptojacking, abnormal increases in network traffic, and unauthorized access to EC2 instances through an external IP address.
  • Compromised accounts: This category involves recognizing API calls from unexpected locations, attempts to disable CloudTrail, and irregular deployments of instances or infrastructure.

While administrators can specify a list of “safe” IP addresses for GuardDuty, the service does not support custom detection criteria. However, administrators can provide feedback on GuardDuty findings by indicating approval or disapproval.

GuardDuty sends security alerts to the Management Console in JSON format, enabling administrators or automated workflows to take appropriate actions. For instance, Amazon CloudWatch Events can leverage GuardDuty findings to trigger AWS Lambda code for adjusting security configurations.

Security findings are retained in the GuardDuty console and APIs for 90 days.

GuardDuty accounts management 

You can assign administration to any account inside the organization when using GuardDuty with an AWS Organizations organization.

Only the organization management account has the authority to designate GuardDuty delegation administrators.

GuardDuty is automatically activated in the chosen Region for a delegated administrator account, which also gains the authority to enable & maintain GuardDuty for all accounts in the organization within that Region.

The delegated administrator account may be linked with additional organization accounts for inspection and addition as GuardDuty partner accounts.

Key considerations for GuardDuty delegated administrators

Capable of handling up to 5000 members, GuardDuty sets a maximum limit of 5000 member accounts for each delegated administrator. While this limit may be sufficient for many businesses, those with more than 5000 clients can track the total number of accounts under the “Accounts” section in the GuardDuty interface.

To address potential concerns, GuardDuty employs various notification methods if the member accounts exceed the 5000 limit, including alerts through CloudWatch, the AWS Health Dashboard, and an email sent to the delegated administrator account.

It’s essential to note that GuardDuty operates as a regional service, unlike AWS Organizations. 

Consequently, delegated administrators and their associated member accounts must be added to each desired region to activate account management via AWS Organizations across all regions. 

Organizations are limited to having a single delegated administrator per organization, and each account can only have one delegated administrator.

While the management account of your organization can serve as the delegated administrator, it is not recommended by AWS Security best practices, adhering to the principle of least privilege.

Notably, changing the delegated administrator does not disable GuardDuty for member accounts. When a delegated administrator is removed, all associated member accounts cease being GuardDuty members, but GuardDuty is not deactivated in those accounts.

Amazon GuardDuty Pricing

Upon initial activation, AWS offers a complimentary 30-day full-access trial for Amazon GuardDuty, allowing users to assess its suitability. Following this trial period, Amazon GuardDuty provides an estimated cost, representing the potential expenses if the free trial were not available.

The pricing for analyzing AWS log data is influenced by the extent of the analysis conducted. 

Unlike CloudTrail Event Logs, which incur charges based on a per-million-events-per-month model, VPC Flow Logs and DNS Logs are billed on a per-gigabyte-per-month basis. 

Pricing structures may vary by region but typically include the following tiers:

Service Usage Tier Price per Unit
VPC Flow Log and DNS Log Analysis First 500 GB / month $1.00 per GB
Next 2000 GB / month $0.50 per GB
Over 2500 GB / month $0.25 per GB
AWS CloudTrail Event Analysis Per 1,000,000 events/month $4.00 per 1,000,000

 

GuardDuty offers continuous monitoring of your infrastructure, ensuring cost efficiency by billing only for the actual detection capacity utilized. In essence, charges are incurred solely for the volume of service utilized.

Conclusion

By following the outlined steps, you can enable GuardDuty with just a click or API request. The service is designed to automatically monitor and assess potential threats, allowing you to customize settings based on your security preferences. 

With its ability to adapt to varying resource utilization needs, GuardDuty provides a proactive defence against suspicious or malicious activities. 

By leveraging its three severity categories, Low, Medium, and High, GuardDuty assists in prioritising responses to potential threats, ensuring a robust and dynamic security posture for your AWS accounts and workloads.

About Karthikeyani Velusamy

Karthikeyani is an accomplished Technical Content Writer with 3 years of experience in the field where she holds Bachelor's degree in Electronics and Communication Engineering. She is well-versed in core skills such as creative writing, web publications, portfolio creation for articles. Committed to delivering quality work that meets deadlines, she is dedicated to achieving exemplary standards in all her writing projects. With her creative skills and technical understanding, she is able to create engaging and informative content that resonates with her audience.

Leave a Comment

Your email address will not be published. Required fields are marked *


Scroll to Top