Class 19 Read: Cloud Detective Controls - taylortommy23/401-Reading-Notes GitHub Wiki
What are some of the IoCs that GuardDuty can detect?
- Unauthorized Access Attempts, Compromised EC2 Instances, Reconnaissance Activities, Account Compromise Indicators, and Unusual Network Traffic
What are some of the data sources which GuardDuty can use?
- It can use VPC Flow Logs, CloudTrail Event Logs, and DNS Logs.
How does GuardDuty use access behavior to spot potential malicious activity?
- By analyzing and correlating this information, GuardDuty can provide timely and accurate alerts about potential security threats, allowing AWS users to quickly respond to mitigate risks.
Resource: https://docs.aws.amazon.com/guardduty/latest/ug/what-is-guardduty.html https://www.youtube.com/watch?v=czsuZXQvD8E