- CloudTrail logs: Detect unusual API activity.
- VPC flow logs: Monitor for irregular internal traffic and suspicious IP addresses.
- DNS logs: Identify signs of compromised EC2 instances.
- EKS audit logs: Track unusual activity within your EKS cluster.

- Low severity (1-3): The event is unusual but typically does not require immediate action.
- Medium severity (4-6): Suspicious activity deviates from the norm and may indicate a resource compromise.
- High severity (7-10): Indicates a critical issue where a resource is almost certainly compromised and demands immediate attention.
- Trusted IP List (Whitelist): Identifies safe IP addresses within your AWS infrastructure, reducing false positives.
- Threat IP List: Contains known malicious IPs—supplied by third parties or defined internally—to ensure that any interaction with these addresses triggers an alert.
Integrating custom IP lists can significantly enhance the detection accuracy by minimizing false positives and enabling a more targeted security posture.
Detection Categories
GuardDuty classifies detected threats into several categories. The table below provides an overview of each category and its common characteristics:| Detection Category | Description |
|---|---|
| Reconnaissance | Includes unusual API activity, port scanning, atypical login patterns or failures, and unauthorized port probing from known malicious IPs. |
| Instance Compromise | Indicates possible unauthorized cryptocurrency mining, the presence of malware that employs evasion techniques, malicious command and control, outbound denial of service attacks, or erratic network traffic. |
| Account Compromise | Encompasses suspicious activities such as API calls from unusual locations, use of anonymizing proxies, attempts to disable logging, changes that weaken password policies, unexpected resource deployments, region changes, or API calls from malicious IPs. |
| Bucket Compromise | Involves irregular S3 data access patterns, potential credential misuse, abnormal S3 activity from remote locations, or unauthorized access attempts from suspicious IP addresses. |
High severity alerts should be prioritized immediately. Make sure your incident response plan is up-to-date and that your team is prepared to act swiftly in the event of a critical threat.