Skip to content

Latest commit

 

History

History

guard-duty

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
 
 

NOTE: This video has not been released yet.

You can find the 5-minute video that walks through all of the steps described here.

In this episode, we'll be looking at Amazon GuardDuty. GuardDuty helps protect your AWS accounts, workloads, and data with intelligent threat detection and continuous monitoring.

GuardDuty continuously analyzes events for potential threats across multiple sources includes VPC Flow Logs, DNS Logs, and CloudTrail event logs. It uses this data to produces findings based on input lists and machine learning threat models. There are currently 17 types of findings. They include Backdoor, Behavior, CredentialAccess, CryptoCurrency, DefenseEvasion, Discovery, Exfiltration, Impact, InitialAccess, PenTest, Persistence, Policy, PrivilegeEscalation, Recon, Stealth, Trojan, and UnauthorizedAccess across EC2, IAM, and S3 resources.

GuardDuty alerts can be integrated into event-based remediation controls using services such as Amazon EventBridge Rules, AWS Lambda, AWS Systems Manager, and AWS Step Functions.

CloudFormation Support

Launch CloudFormation Stack

  1. From your AWS CloudShell Environment in the us-west-2 region, run the commands below to launch the main CloudFormation Stack:
sudo rm -rf ~/aws-security-hub-workshop
git clone https://github.com/aws-samples/aws-security-hub-workshop.git
cd ~/aws-security-hub-workshop/templates

aws cloudformation deploy \
--stack-name aws-5-mins-sh-guardduty \
--template-file sechub-workshop-setup-template.json  \
--capabilities CAPABILITY_IAM CAPABILITY_AUTO_EXPAND \
--parameter-overrides EnableGuardDuty="Yes-Enable GuardDuty" \
EnableSecurityHub="Yes-Enable Security Hub" EnableConfig="Yes-Enable Config" \
--no-fail-on-empty-changeset \
--region us-west-2

There is one main CloudFormation stack and five nested stacks that get launched. These nested stacks provision the Security Hub, Config, GuardDuty, Inspector, and Secrets Manager resources. It takes about 4 minutes for all of the CloudFormation stacks to be created. After all the CloudFormation stacks are complete, go to the web consoles for Security Hub, Config, GuardDuty, Inspector, and Secrets Manager to see the resources that were created when launching the stacks as shown below.

Pricing

AWS charges $4.00 per 1 million CloudTrail management events per month, $0.80 per 1 million S3 data events (Past 500 million events per month, this price reduces), and $1.00 per GB of VPC Flow Logs and DNS Logs analyzed (Past 500 GB per month, this price reduces). For more information, see Amazon GuardDuty Pricing.

Delete Resources

aws s3api list-buckets --query 'Buckets[?starts_with(Name, `aws-5-mins-`) == `true`].[Name]' --output text | xargs -I {} aws s3 rb s3://{} --force


aws cloudformation delete-stack --stack-name aws-5-mins-sh-guardduty --region us-west-2
aws cloudformation wait stack-delete-complete --stack-name aws-5-mins-sh-guardduty --region us-west-2