AWS Security Blog
Tag: HAQM GuardDuty
Testing and evaluating GuardDuty detections
HAQM GuardDuty is a threat detection service that continuously monitors, analyzes, and processes HAQM Web Services (AWS) data sources and logs in your AWS environment. GuardDuty uses threat intelligence feeds, such as lists of malicious IP addresses and domains, file hashes, and machine learning (ML) models to identify suspicious and potentially malicious activity in your […]
Using HAQM Detective for IAM investigations
January 31, 2025: This post was revised to update several paragraphs in the section Scenario 1: Automated investigations. Uncovering AWS Identity and Access Management (IAM) users and roles potentially involved in a security event can be a challenging task, requiring security analysts to gather and analyze data from various sources, and determine the full scope […]
Get to know HAQM GuardDuty Runtime Monitoring for HAQM EC2
In this blog post, I take you on a deep dive into HAQM GuardDuty Runtime Monitoring for EC2 instances and key capabilities that are part of the feature. Throughout the post, I provide insights around deployment strategies for Runtime Monitoring and detail how it can deliver security value by detecting threats against your HAQM Elastic […]
How AWS tracks the cloud’s biggest security threats and helps shut them down
Threat intelligence that can fend off security threats before they happen requires not just smarts, but the speed and worldwide scale that only AWS can offer. Organizations around the world trust HAQM Web Services (AWS) with their most sensitive data. One of the ways we help secure data on AWS is with an industry-leading threat […]
Navigating the threat detection and incident response track at re:Inforce 2024
A full conference pass is $1,099. Register today with the code flashsale150 to receive a limited time $150 discount, while supplies last. We’re counting down to AWS re:Inforce, our annual cloud security event! We are thrilled to invite security enthusiasts and builders to join us in Philadelphia, PA, from June 10–12 for an immersive two-and-a-half-day […]
Investigating lateral movements with HAQM Detective investigation and Security Lake integration
According to the MITRE ATT&CK framework, lateral movement consists of techniques that threat actors use to enter and control remote systems on a network. In HAQM Web Services (AWS) environments, threat actors equipped with illegitimately obtained credentials could potentially use APIs to interact with infrastructures and services directly, and they might even be able to use […]
Using HAQM GuardDuty ECS runtime monitoring with Fargate and HAQM EC2
Containerization technologies such as Docker and orchestration solutions such as HAQM Elastic Container Service (HAQM ECS) are popular with customers due to their portability and scalability advantages. Container runtime monitoring is essential for customers to monitor the health, performance, and security of containers. AWS services such as HAQM GuardDuty, HAQM Inspector, and AWS Security Hub […]
Four use cases for GuardDuty Malware Protection On-demand malware scan
HAQM GuardDuty is a threat detection service that continuously monitors your HAQM Web Services (AWS) accounts and workloads for malicious activity and delivers detailed security findings for visibility and remediation. GuardDuty Malware Protection helps detect the presence of malware by performing agentless scans of the HAQM Elastic Block Store (HAQM EBS) volumes that are attached to […]
Security at multiple layers for web-administered apps
In this post, I will show you how to apply security at multiple layers of a web application hosted on AWS. Apply security at all layers is a design principle of the Security pillar of the AWS Well-Architected Framework. It encourages you to apply security at the network edge, virtual private cloud (VPC), load balancer, […]
How AWS threat intelligence deters threat actors
Every day across the HAQM Web Services (AWS) cloud infrastructure, we detect and successfully thwart hundreds of cyberattacks that might otherwise be disruptive and costly. These important but mostly unseen victories are achieved with a global network of sensors and an associated set of disruption tools. Using these capabilities, we make it more difficult and […]