Amazon GuardDuty Security Blogs
AWS re:Post questions for Amazon GuardDuty
Amazon GuardDuty FAQs
Amazon GuardDuty Pricing
Free Cybersecurity Training
Automated response & remediation
Integration with AWS Security Hub
EventBridge (Enrichment, Actions, Notifications)
Anomaly Detection & Machine Learning
EC2 findings
Backdoor:EC2/C&CActivity.B
Backdoor:EC2/C&CActivity.B!DNS
Backdoor:EC2/DenialOfService.Dns
Backdoor:EC2/DenialOfService.Tcp
Backdoor:EC2/DenialOfService.Udp
Backdoor:EC2/DenialOfService.UdpOnTcpPorts
Backdoor:EC2/DenialOfService.UnusualProtocol
Backdoor:EC2/Spambot
Behavior:EC2/NetworkPortUnusual
Behavior:EC2/TrafficVolumeUnusual
CryptoCurrency:EC2/BitcoinTool.B
CryptoCurrency:EC2/BitcoinTool.B!DNS
Impact:EC2/AbusedDomainRequest.Reputation
Impact:EC2/BitcoinDomainRequest.Reputation
Impact:EC2/MaliciousDomainRequest.Reputation
Impact:EC2/PortSweep
Impact:EC2/SuspiciousDomainRequest.Reputation
Impact:EC2/WinRMBruteForce
Recon:EC2/PortProbeEMRUnprotectedPort
Recon:EC2/PortProbeUnprotectedPort
Recon:EC2/Portscan
Trojan:EC2/BlackholeTraffic
Trojan:EC2/BlackholeTraffic!DNS
Trojan:EC2/DGADomainRequest.B
Trojan:EC2/DGADomainRequest.C!DNS
Trojan:EC2/DNSDataExfiltration
Trojan:EC2/DriveBySourceTraffic!DNS
Trojan:EC2/DropPoint
Trojan:EC2/DropPoint!DNS
Trojan:EC2/PhishingDomainRequest!DNS
UnauthorizedAccess:EC2/MaliciousIPCaller.Custom
UnauthorizedAccess:EC2/MetadataDNSRebind
UnauthorizedAccess:EC2/RDPBruteForce
UnauthorizedAccess:EC2/SSHBruteForce
UnauthorizedAccess:EC2/TorClient
UnauthorizedAccess:EC2/TorRelay
IAM findings
CredentialAccess:IAMUser/AnomalousBehavior
DefenseEvasion:IAMUser/AnomalousBehavior
Discovery:IAMUser/AnomalousBehavior
Exfiltration:IAMUser/AnomalousBehavior
Impact:IAMUser/AnomalousBehavior
InitialAccess:IAMUser/AnomalousBehavior
PenTest:IAMUser/KaliLinux
PenTest:IAMUser/ParrotLinux
PenTest:IAMUser/PentooLinux
Persistence:IAMUser/AnomalousBehavior
Policy:IAMUser/RootCredentialUsage
PrivilegeEscalation:IAMUser/AnomalousBehavior
Recon:IAMUser/MaliciousIPCaller
Recon:IAMUser/MaliciousIPCaller.Custom
Recon:IAMUser/TorIPCaller
Stealth:IAMUser/CloudTrailLoggingDisabled
Stealth:IAMUser/PasswordPolicyChange
UnauthorizedAccess:IAMUser/ConsoleLoginSuccess.B
UnauthorizedAccess:IAMUser/InstanceCredentialExfiltration.InsideAWS
UnauthorizedAccess:IAMUser/InstanceCredentialExfiltration.OutsideAWS
UnauthorizedAccess:IAMUser/MaliciousIPCaller
UnauthorizedAccess:IAMUser/MaliciousIPCaller.Custom
UnauthorizedAccess:IAMUser/TorIPCaller
S3 findings
Discovery:S3/MaliciousIPCaller
Discovery:S3/MaliciousIPCaller.Custom
Discovery:S3/TorIPCaller
Exfiltration:S3/MaliciousIPCaller
Exfiltration:S3/ObjectRead.Unusual
Impact:S3/MaliciousIPCaller
PenTest:S3/KaliLinux
PenTest:S3/ParrotLinux
PenTest:S3/PentooLinux
Policy:S3/AccountBlockPublicAccessDisabled
Policy:S3/BucketAnonymousAccessGranted
Policy:S3/BucketBlockPublicAccessDisabled
Policy:S3/BucketPublicAccessGranted
Stealth:S3/ServerAccessLoggingDisabled
UnauthorizedAccess:S3/MaliciousIPCaller.Custom
UnauthorizedAccess:S3/TorIPCaller
Kubernetes findings
CredentialAccess:Kubernetes/MaliciousIPCaller
CredentialAccess:Kubernetes/MaliciousIPCaller.Custom
CredentialAccess:Kubernetes/SuccessfulAnonymousAccess
CredentialAccess:Kubernetes/TorIPCaller
DefenseEvasion:Kubernetes/MaliciousIPCaller
DefenseEvasion:Kubernetes/MaliciousIPCaller.Custom
DefenseEvasion:Kubernetes/SuccessfulAnonymousAccess
DefenseEvasion:Kubernetes/TorIPCaller
Discovery:Kubernetes/MaliciousIPCaller
Discovery:Kubernetes/MaliciousIPCaller.Custom
Discovery:Kubernetes/SuccessfulAnonymousAccess
Discovery:Kubernetes/TorIPCaller
Execution:Kubernetes/ExecInKubeSystemPod
Impact:Kubernetes/MaliciousIPCaller
Impact:Kubernetes/MaliciousIPCaller.Custom
Impact:Kubernetes/SuccessfulAnonymousAccess
Impact:Kubernetes/TorIPCaller
Persistence:Kubernetes/ContainerWithSensitiveMount
Persistence:Kubernetes/MaliciousIPCaller
Persistence:Kubernetes/MaliciousIPCaller.Custom
Persistence:Kubernetes/SuccessfulAnonymousAccess
Persistence:Kubernetes/TorIPCaller
Policy:Kubernetes/AdminAccessToDefaultServiceAccount
Policy:Kubernetes/AnonymousAccessGranted
Policy:Kubernetes/ExposedDashboard
Policy:Kubernetes/KubeflowDashboardExposed
PrivilegeEscalation:Kubernetes/PrivilegedContainer
Pivot to Amazon Detective
Triage, Scoping, Response
Internal AWS Sources
CloudTrail Management Events
CloudTrail S3 Data Events
VPC Flow Logs
DNS logs
Kubernetes audit logs
Amazon GuardDuty Partners
Activation and Operationalization
Alert Logic
Sumo Logic
Turbot
Security Intelligence
Aviatrix
Check Point
Expel
FireEye
Fortinet
IBM
Juniper
McAfee
PaloAlto
Rapid7
Recorded Future
Sophos
Splunk
Trend Micro
Consulting and Integration
Accenture
Deloitte
Logicworks
Alerting and Ticketing
PagerDuty
Threat intelligence (IP and domains)
AWS Security
Threat Feed 3rd party providers
Proofpoint
CrowdStrike
Custom threat lists