Ends in
00
days
00
hrs
00
mins
00
secs
ENROLL NOW

💪 25% OFF on ALL Reviewers to Start Your 2026 Strong with our New Year, New Skills Sale!

Amazon GuardDuty

Amazon GuardDuty

Last updated on December 26, 2025

Amazon GuardDuty Cheat Sheet

  • Amazon GuardDuty is an intelligent threat detection service that analyzes billions of events across your AWS accounts from:
    • AWS CloudTrail (user and API activity)
    • Amazon VPC Flow Logs (network traffic)
    • DNS Logs (name query patterns)

Features

  • UnauthorizedAccess: Detects API calls from external hosts using Lambda-created temporary credentials.
  • Extended Threat Detection: Detects multi-stage attacks (EC2/ECS/EKS sequences).
  • Runtime Monitoring Updates: Monitors latest agent versions for EC2, ECS, EKS-Fargate.
  • Malware Protection for Backup: Scans EBS snapshots, EC2 AMIs, and Recovery Points.
  • S3 Malware Protection: Scans objects up to 100 GB; on-demand scanning via API.
  • Suppression Rules Enhancement: Supports wildcards (*, ?).
  • CloudWatch Usage Metrics: Monitor GuardDuty usage by protection plan.
  • AI Workloads Protection: Detects threats in AI workloads via Lambda.
  • Regional Expansion: Supports multiple Asia Pacific, Canada, Middle East, and Mexico regions.
  • Tutorials dojo strip
  • EC2/ECS attack sequence finding types (Expanded Extended Threat Detection)
  • Default automatic enablement of Extended Threat Detection
  • Integrations with AWS services (Detective, Security Hub, EventBridge)

How It Works

Amazon GuardDuty

  • Backdoor: Compromised resource contacting a C&C server.
  • Cryptocurrency: Mining software detected.
  • Trojan: Silent malicious activity.
  • Stealth: Attempting to hide actions/tracks.
  • PenTest: Intentional testing tools or vulnerability scanners.

Service-specific Protection:

  • EKS Protection: Monitors Kubernetes audit logs and runtime events inside pods/nodes.
  • Lambda Protection: Monitors network logs to detect malicious code or crypto-mining.
  • RDS Protection: Analyzes Amazon Aurora login attempts for credential compromise or brute-force attacks.
  • S3 Protection: Monitors S3 data events for anomalous access patterns or exfiltration.

Malware Protection:

  • EC2: Scans EBS volumes when suspicious activity is detected.
  • S3: Scans new objects in specific buckets.
  • Zero Performance Impact: Scans occur on snapshots or separate environments.

Other Threat Categories:

  • Persistence: Unusual permission/configuration changes.
  • Reconnaissance: Attacker scoping activity.
  • Instance Compromise: Signs of compromised EC2 instances.
  • Account Compromise: Indicators of IAM credential compromise.
  • Bucket Compromise: Suspicious S3 activity.
  • Runtime Security: Threats inside OS or containers.

Data Sources & Event Analysis

  • AWS CloudTrail Management Events – API calls and user activity.
  • Amazon VPC Flow Logs – IP traffic data.
  • DNS Logs – Query patterns.
  • CloudTrail Data Events (S3) – Object-level activity.
  • Kubernetes Audit Logs – Control plane activity.
  • RDS Login Activity – Aurora login attempts.
  • Runtime Monitoring – OS-level events via lightweight agent.

Threat Detection Categories

  • Reconnaissance: Scoping out environment.
  • Instance Compromise: EC2 compromised indicators.
  • Account Compromise: IAM credential compromise indicators.
  • Bucket Compromise: Suspicious S3 access or exfiltration.
  • Malware: Malware on EBS or S3.
  • Runtime Security: OS/container threats.

GuardDuty Findings

GuardDuty generates findings when it detects unexpected and potentially malicious activity. These are viewable via Console, CLI, or API.

A Finding’s summary includes:

  • Finding type: A concise yet readable description of the potential security issue.

  • Severity: Assigned severity level (High, Medium, or Low).

  • Region: The AWS region where the finding was generated.

  • Count: Number of times this finding was generated.

  • Account ID / Resource ID: Identifiers for the affected account and resource.

  • Threat list name: Name of the threat list (if applicable).

  • Last seen: Time the activity took place.

Detailed Finding Sections:

  • Resource Affected: Includes Resource role (Target), Resource type (AccessKey, Instance, S3Bucket, etc.), Instance ID, Port, Access Key ID, Principal ID, User type/name.

  • Action: Describes the activity type (NETWORK_CONNECTION, AWS_API_CALL, PORT_PROBE, DNS_REQUEST), API name, Connection direction (INBOUND, OUTBOUND), and Protocol.

  • Actor: Location (IP geolocation), Organization (ISP/ASN), IP address, Port, and Domain.

Threat Purpose Definitions (The “Why”):

  • Backdoor: Compromised resource contacting a C&C server.

  • Behavior: Activity patterns differing from the established baseline.

  • Free AWS Courses
  • Cryptocurrency: Mining software detected.

  • PenTest: Intentional testing tools (vulnerability scanners) detected.

  • Persistence: Unusual changes to permissions/network configs to maintain access.

  • Policy: Behavior violating security best practices.

  • PrivilegeEscalation: Principal trying to gain higher privileges indicatively.

  • Recon: Scoping out vulnerabilities (port probing, listing users).

  • ResourceConsumption: Unusual launch of resources (e.g., launching many EC2 instances).

  • Stealth: Attempting to hide actions/tracks (e.g., disabling logs).

  • Trojan: Silent malicious software carrying out attacks.

  • UnauthorizedAccess: Suspicious activity by an unauthorized individual.

Managing Findings

  • Filters: View specific findings.
  • Suppression Rules: Automatically archive matching findings.
  • Trusted IP Lists: Whitelist secure IPs (1 per region).
  • Threat Lists: Custom malicious IP lists (6 per region).
  • Exporting: Findings automatically exported to EventBridge or S3 within 5 minutes.

Amazon GuardDuty Pricing

  • Foundational: Charged based on the volume of CloudTrail events, VPC Flow Logs, and DNS Logs analyzed.
  • EKS Protection: Charged per vCPU per hour for Runtime Monitoring and per million audit logs.
  • Lambda Protection: Charged per GB of network activity logs scanned.
  • Malware Protection: Charged per GB of data scanned (EBS volumes or S3 objects).
  • RDS Protection: Charged per million login events analyzed.
  • Free Trial: New accounts (and new features enabled on existing accounts) typically receive a 30-day free trial.
  • Note: If you are studying for the AWS Certified Security Specialty exam, we highly recommend that you take our AWS Certified Security – Specialty Practice Exams and read our Security Specialty exam study guide.
  • AWS Certified Security - Specialty Exam Study Path
  • Validate Your Knowledge
  • Question 1
  • A company is using Amazon GuardDuty to continuously monitor its AWS resources for malicious activity, unauthorized port scanning, and other security vulnerabilities. Whenever there are pre-approved port scanning activities from specific Amazon EC2 instances owned by the IT Security team, the Operations team still receives GuardDuty events via Amazon EventBridge. There is a new requirement to suppress alerts on these authorized security tests to prevent false positives. The Security team must ensure that the alerts are still sent for any unauthorized activity in AWS.
  • Which of the following is the MOST suitable solution for this scenario?
  1. Exclude and filter out the IP addresses of the pre-approved EC2 instances owned by the Security team in AWS CloudTrail.
  2. Attach Elastic IP addresses to the EC2 instances and then add these addresses to the Trusted IP list in GuardDuty.
  3. Install the Amazon Inspector agent on the EC2 instances that execute the pre-approved port scanning activities. Configure Inspector to exclude the pre-approved port scanning activities from these instances.
  4. Use the GuardDutyExcluded tag to prevent GuardDuty from generating alerts for pre-approved port scanning activities.
  • Correct Answer: 2
  • Amazon GuardDuty monitors the security of your AWS environment by analyzing and processing VPC Flow Logs, AWS CloudTrail event logs, and DNS logs. You can customize this monitoring scope by configuring GuardDuty to also use your own trusted IP lists and threat lists. The IP lists described below will apply to all VPC Flow Log and CloudTrail findings but do not apply to DNS findings
  • Trusted IP lists consist of IP addresses that you have whitelisted for secure communication with your AWS infrastructure and applications. GuardDuty does not generate VPC Flow Log or CloudTrail findings for IP addresses on trusted IP lists. At any given time, you can have only one uploaded trusted IP list per AWS account per Region.
  • Threat lists consist of known malicious IP addresses. GuardDuty generates findings based on threat lists. At any given time, you can have up to six uploaded threat lists per AWS account per Region.
  • AWS GuardDuty
  • GuardDuty can send notifications based on Amazon EventBridge when any changes in the findings take place. These changes include newly generated findings or subsequent occurrences of existing findings.
  • Every GuardDuty finding is assigned a finding ID. GuardDuty creates an event for every finding with a unique finding ID. All subsequent occurrences of an existing finding are always assigned a finding ID that is identical to the ID of the original finding.
  • In order to receive notifications about GuardDuty findings based on EventBridge, you must create an EventBridge rule and a target for GuardDuty. This rule enables CloudWatch to send events for all findings that GuardDuty generates to the target that is specified in the rule.
  • Hence, the correct answer is: Attach Elastic IP addresses to the EC2 instances and then add these addresses to the Trusted IP list in GuardDuty.
  • The option that says: Exclude and filter out the IP addresses of the pre-approved EC2 instances owned by the Security team in AWS CloudTrail is incorrect because you neither exclude nor filter out the API logs based on the IP address of an EC2 instance in AWS CloudTrail. A better solution here is to use a trusted IP list in Amazon GuardDuty instead.
  • The option that says: Install the Amazon Inspector agent on the EC2 instances that execute the pre-approved port scanning activities. Configure Inspector to exclude the pre-approved port scanning activities from these instances is incorrect because Inspector is simply an automated security assessment service that helps improve the security and compliance of applications deployed on AWS. Instead, you have to add the IP addresses of the EC2 instances that execute the pre-approved port scanning activities to the trusted IP list in Amazon GuardDuty.
  • The option that says: Use the GuardDutyExcluded tag to prevent GuardDuty from generating alerts for pre-approved port scanning activities is incorrect because the GuardDutyExcluded tag is primarily used for malware protection exclusions and does not apply to network-based detections like port scanning.
  •  
  • References:
  • https://docs.aws.amazon.com/guardduty/latest/ug/guardduty_upload_lists.html
    https://docs.aws.amazon.com/guardduty/latest/ug/guardduty_findings_cloudwatch.html
  • Note: This question was extracted from our AWS Certified Security Specialty Practice Exams.
  • For more AWS practice exam questions with detailed explanations, visit the Tutorials Dojo Portal:
  • Tutorials Dojo AWS Practice Tests
  • Amazon GuardDuty Cheat Sheet References:
  • https://aws.amazon.com/guardduty/
    https://aws.amazon.com/guardduty/faqs/
    https://docs.aws.amazon.com/guardduty/latest/ug/what-is-guardduty.html
    https://www.youtube.com/watch?time_continue=7&v=o2YaIsps5LY
  • Learn AWS with our PlayCloud Hands-On Labs

    $2.99 AWS and Azure Exam Study Guide eBooks

    tutorials dojo study guide eBook

    New AWS Generative AI Developer Professional Course AIP-C01

    AIP-C01 Exam Guide AIP-C01 examtopics AWS Certified Generative AI Developer Professional Exam Domains AIP-C01

    Learn GCP By Doing! Try Our GCP PlayCloud

    Learn Azure with our Azure PlayCloud

    FREE AI and AWS Digital Courses

    FREE AWS, Azure, GCP Practice Test Samplers

    Subscribe to our YouTube Channel

    Tutorials Dojo YouTube Channel

    Follow Us On Linkedin

    Written by: Jon Bonso

    Jon Bonso is the co-founder of Tutorials Dojo, an EdTech startup and an AWS Digital Training Partner that provides high-quality educational materials in the cloud computing space. He graduated from Mapúa Institute of Technology in 2007 with a bachelor's degree in Information Technology. Jon holds 10 AWS Certifications and is also an active AWS Community Builder since 2020.

    AWS, Azure, and GCP Certifications are consistently among the top-paying IT certifications in the world, considering that most companies have now shifted to the cloud. Earn over $150,000 per year with an AWS, Azure, or GCP certification!

    Follow us on LinkedIn, YouTube, Facebook, or join our Slack study group. More importantly, answer as many practice exams as you can to help increase your chances of passing your certification exams on your first try!

    View Our AWS, Azure, and GCP Exam Reviewers Check out our FREE courses

    Our Community

    ~98%
    passing rate
    Around 95-98% of our students pass the AWS Certification exams after training with our courses.
    200k+
    students
    Over 200k enrollees choose Tutorials Dojo in preparing for their AWS Certification exams.
    ~4.8
    ratings
    Our courses are highly rated by our enrollees from all over the world.

    What our students say about us?