Ends in
00
days
00
hrs
00
mins
00
secs
ENROLL NOW

🚀 Extended! 25% OFF All Practice Exams & Video Courses, $2.99 eBooks, Savings on PlayCloud and CodeQuest!

Amazon Detective

Amazon Detective

Last updated on November 30, 2025

Amazon Detective Cheat Sheet

  • The service automatically collects log data from your AWS resources and uses machine learning, statistical analysis, and graph theory to build a linked set of data that enables you to easily conduct faster and more efficient security investigations.

  • It can be integrated with AWS security services like Amazon GuardDuty, Amazon Macie, and AWS Security Hub, as well as partner security products to identify potential security issues or findings.

  • Overview & Data Sources

    • Automatic Data Ingestion: Detective analyzes trillions of events from multiple data sources:

      • VPC Flow Logs

      • AWS CloudTrail (Management and Data Events)

      • Amazon GuardDuty findings

      • Amazon EKS Audit Logs (New)

      • AWS Security Hub findings (ASFF)

    • Unified View: Automatically creates a unified, interactive view of your resources, users, and the interactions between them over time.

    • EKS Investigations: Supports security investigations for Kubernetes workloads and container-based applications on Amazon EKS, allowing you to trace malicious activity down to specific pods, container images, and Kubernetes API calls.

How It Works

Amazon Detective

Concepts

    • Behavior Graph: A linked set of data generated from incoming source data associated with one or more AWS accounts. It uses the same structure of findings, entities, and relationships.

    • Delegated Administrator: The AWS account designated to manage the behavior graph for the organization. This account invites member accounts to contribute data and uses the graph for investigations. (Replaces the legacy use of the Organization Management Account for this role).

    • Member Account: An AWS account that contributes data to a behavior graph. Member accounts do not have access to view the graph or conduct investigations; only the Administrator can.

    • Entity: An item extracted from the incoming data (e.g., IP addresses, EC2 instances, AWS users, Kubernetes pods).

    • Relationship: Activity that occurs between individual entities (e.g., an IP address connecting to an EC2 instance).

    • Scope Time: The time window used to scope the data displayed on profiles.

      • Finding Profile: Default scope is the first and last time the activity was observed.

      • Entity Profile: Default scope is the previous 24 hours.

    • Finding Groups (Key Feature)

      • Definition: A collection of related findings that Detective has correlated using graph analysis.

      • Purpose: Instead of investigating one alert at a time, Finding Groups allow you to examine multiple related activities (e.g., a brute force attack followed by an IAM role assumption) as a single security incident.

      Generative AI Support

      • Finding Group Summaries: Detective uses generative AI to analyze finding groups and automatically generate a natural language summary. This helps analysts quickly understand the “story” behind a security event, including the chain of activity and impacted resources.

    • Entity – An item extracted from the incoming data. Each entity has a type, which identifies the type of object it represents. Examples include IP addresses, Amazon EC2 instances, and AWS users.
      • For each entity, the source data is also used to populate entity properties. Property values can be extracted directly from source records or aggregated across multiple records.
    • Relationship – Activity that occurs between individual entities. Relationships are also extracted from the incoming source data.
      • Similar to an entity, a relationship has a type, which identifies the types of entities involved and the direction of the connection. An example of a relationship type is an IP address connecting to an Amazon EC2 instance.
    • Profile – For a finding or an entity, a single page that provides a collection of data visualizations plus supporting guidance.
      • For findings, profiles help analysts to determine whether the finding is of genuine concern or a false positive.
      • For entities, profiles provide supporting details for an investigation into a finding or for a general hunt for suspicious activity.

 

  • Service Features & Configuration
    • Regional Service: Amazon Detective needs to be enabled on a per-region basis and enables you to quickly analyze activity across all your accounts within each region.

    • Multi-Account: It is a multi-account service that aggregates data from monitored member accounts under a single management account within the same region. You can configure multi-account monitoring deployments in the same way that you configure Amazon GuardDuty and AWS Security Hub.

      • Note: If you cannot use the same management accounts across all of the services, then after you enable Detective, you can optionally create a cross-account role.

    • Automatic History: If you are using Amazon GuardDuty, Amazon Detective will automatically ingest and process two weeks of historical log data upon activation.

    • Disabling: The management account for a behavior graph can disable Amazon Detective. When you disable Detective, the behavior graph and its associated Detective data are deleted. Deleted behavior graphs cannot be restored.

    • IAM Role Analysis: Amazon Detective is able to analyze IAM role sessions by processing VPC flow records and CloudTrail management events. It collates data about activity performed under an IAM Role into role sessions, visualizing what users and apps performed using the assumed roles.

  • Detective vs. GuardDuty vs. Security Hub
    • Amazon GuardDuty: A threat detection service that continuously monitors for malicious activity and unauthorized behavior to protect your AWS accounts and workloads.

    • AWS Security Hub: A single place that aggregates, organizes, and prioritizes your security alerts (findings) from multiple AWS services (GuardDuty, Inspector, Macie) and partner solutions.

    • Amazon Detective: Simplifies the process of investigating security findings and identifying the root cause by visualizing the data.

    • Amazon Detective Limits
      • Data Retention: Maintains up to one year of aggregated findings and data for analysis.

      • Regional: Detective is a regional service; you must enable it in each region where you want to analyze data.

Common Use Cases

Free AWS Courses
    • Triage Security Findings: Quickly determine if a GuardDuty finding is a false positive or a real threat.

    • Incident Investigation: Drill down into the scope of a breach (e.g., “Which other EC2 instances did this compromised IP talk to?”).

    • Threat Hunting: Proactively search for hidden security threats or anomalous patterns in your logs.

Amazon Detective Pricing

🚀 Extended! 25% OFF All Practice Exams & Video Courses, $2.99 eBooks, Savings on PlayCloud and CodeQuest!

Tutorials Dojo portal

Learn AWS with our PlayCloud Hands-On Labs

🧑‍💻 50% OFF – CodeQuest Coding Labs

$2.99 AWS and Azure Exam Study Guide eBooks

tutorials dojo study guide eBook

New AWS Generative AI Developer Professional Course AIP-C01

AIP-C01 Exam Guide AIP-C01 examtopics AWS Certified Generative AI Developer Professional Exam Domains AIP-C01

Learn GCP By Doing! Try Our GCP PlayCloud

Learn Azure with our Azure PlayCloud

FREE AI and AWS Digital Courses

FREE AWS, Azure, GCP Practice Test Samplers

Subscribe to our YouTube Channel

Tutorials Dojo YouTube Channel

Follow Us On Linkedin

Written by: Jon Bonso

Jon Bonso is the co-founder of Tutorials Dojo, an EdTech startup and an AWS Digital Training Partner that provides high-quality educational materials in the cloud computing space. He graduated from Mapúa Institute of Technology in 2007 with a bachelor's degree in Information Technology. Jon holds 10 AWS Certifications and is also an active AWS Community Builder since 2020.

AWS, Azure, and GCP Certifications are consistently among the top-paying IT certifications in the world, considering that most companies have now shifted to the cloud. Earn over $150,000 per year with an AWS, Azure, or GCP certification!

Follow us on LinkedIn, YouTube, Facebook, or join our Slack study group. More importantly, answer as many practice exams as you can to help increase your chances of passing your certification exams on your first try!

View Our AWS, Azure, and GCP Exam Reviewers Check out our FREE courses

Our Community

~98%
passing rate
Around 95-98% of our students pass the AWS Certification exams after training with our courses.
200k+
students
Over 200k enrollees choose Tutorials Dojo in preparing for their AWS Certification exams.
~4.8
ratings
Our courses are highly rated by our enrollees from all over the world.

What our students say about us?