Continuous threat detection using CloudTrail, VPC Flow Logs, DNS, and EKS audit telemetry
Amazon GuardDuty is a threat detection service that continuously monitors for malicious activity and unauthorized behavior. It uses threat intelligence feeds, machine learning, and anomaly detection—with no deployed agents for its core log-based sources. You enable it per Region, optionally delegate administration from a security account, and route findings to ticketing, chat, or automation.
kubectl access, anonymous API calls, and privileged API activity.Additional GuardDuty features (e.g. Malware Protection for EC2/EBS, S3 protection, RDS login analytics) extend coverage using AWS-managed processing of the relevant telemetry.
| Category | What it indicates |
|---|---|
| Reconnaissance | Port and vulnerability scanning, probing, unusual discovery activity. |
| Instance / workload compromise | Brute force, cryptocurrency, backdoors, malware, suspicious outbound traffic. |
| Account compromise | Credential theft patterns, unusual console/API behavior, root misuse signals. |
| Bucket / object risk (S3) | Exfiltration-style API access, suspicious data access when S3 protection is enabled. |
GuardDuty assigns a severity score (roughly 0.1–8.9+) used for prioritization and routing. Thresholds are approximate; always read the full finding JSON.
| Band | Score (typical) | Meaning | Example handling |
|---|---|---|---|
| Low | < 4.0 | Suspicious but often benign or early-stage. | Log, tune suppressions, low-priority queue. |
| Medium | 4.0 – 6.9 | Likely risk; needs analyst review. | Ticket, correlate with CloudTrail/VPC flow. |
| High | 7.0+ | Strong indicator of compromise or active threat. | Immediate containment, IR playbook. |
GuardDuty publishes findings to AWS Security Hub as standardized AwsSecurityFinding objects. Security Hub becomes a single pane of glass for aggregation with Inspector, Macie, Config, IAM Access Analyzer, Firewall Manager, and partner products. Use Hub insights, automation rules, and custom actions to route severity-tagged GuardDuty findings into your SOC queue or remediation Lambdas.
{
"type": "GuardDuty finding",
"title": "Recon:EC2/Portscan",
"severity": 5.2,
"resource": { "type": "EC2 instance", "id": "i-0abc123def456789" },
"detail": "An instance is probing a large number of distinct ports on internal IPs."
}
{
"type": "GuardDuty finding",
"title": "CryptoCurrency:EC2/BitcoinTool.B!DNS",
"severity": 8.4,
"resource": { "type": "EC2 instance", "id": "i-0fedcba987654321" },
"detail": "DNS queries to known cryptocurrency mining pool domains."
}
{
"type": "GuardDuty finding",
"title": "UnauthorizedAccess:IAMUser/InstanceCredentialExfiltration",
"severity": 7.1,
"resource": { "type": "IAMUser", "name": "ci-deploy-bot" },
"detail": "Instance role credentials used from an IP geolocation inconsistent with normal usage."
}