-
To protect your aws accounts with intelligent threat detection (1*)
-
It has capable of analysing tens of billions of events per minute across multiple AWS data sources (2*) such as:
- AWS CloudTrail event logs,
- Amazon Virtual Private Cloud (Amazon VPC) Flow Logs,
- DNS query logs,
- Amazon Simple Storage Service (Amazon S3) data plane events,
- Amazon Elastic Kubernetes Service (Amazon EKS) audit logs, and
- Amazon Relational Database Service (Amazon RDS) login events
-
GuardDuty launched Amazon EKS protection to monitor control plane activity by analyzing Kubernetes audit logs from existing and new EKS clusters in your accounts.
-
Configure EKS Protection in GuardDuty:
To enable GuardDuty with using Terraform, the resource (6*) was used after customizing some parts.
Please check the files under the https://github.com/mehmetmgrsl/aws-guardduty-work/tree/main/guardduty_terraform_module.
- Run
- cd guardduty_terraform_module
- terraform init
- terraform plan
- terraform apply
-
Open the GuardDuty console at https://console.aws.amazon.com/guardduty/.
-
Choose Settings.
-
Under Sample findings, choose Generate sample findings.
-
Choose Findings. The sample findings are displayed on the Current findings page with the prefix [SAMPLE].
1* https://aws.amazon.com/guardduty/
3* https://docs.aws.amazon.com/guardduty/latest/ug/what-is-guardduty.html
4* https://aws.amazon.com/blogs/aws/amazon-guardduty-now-supports-amazon-eks-runtime-monitoring/
5* Amazon GuardDuty Introduction - Stephane Maarek
6* AWS Guardduty Terraform - OpenWalnut
8* https://docs.aws.amazon.com/guardduty/latest/ug/sample_findings.html