AWS GuardDuty analyzes data from various sources to detect threats. Which data source is NOT used by GuardDuty for threat detection?
Think about what GuardDuty monitors automatically without needing to scan stored files.
GuardDuty uses network flow logs, CloudTrail logs, and DNS logs to detect suspicious activity. It does not scan the contents of S3 buckets directly.
Which GuardDuty finding type would most likely indicate that an EC2 instance is compromised and communicating with a known malicious IP?
Look for findings that indicate command and control activity.
Backdoor:EC2/C&CActivity indicates that an EC2 instance is communicating with a command and control server, which is a strong sign of compromise.
You want to enable GuardDuty across multiple AWS accounts in your organization. What is the recommended architecture to centralize threat findings?
Think about how AWS Organizations integrates with GuardDuty for centralized management.
GuardDuty supports a master-member model using AWS Organizations, allowing centralized management and viewing of findings across accounts.
You receive frequent GuardDuty findings for a known benign IP address communicating with your environment. What is the best security practice to handle these findings?
Consider how to reduce noise without disabling threat detection.
GuardDuty allows suppression rules to ignore specific findings temporarily or permanently, reducing noise while maintaining overall security monitoring.
Given this GuardDuty finding snippet, what is the value of service.action.actionType?
{
"service": {
"action": {
"actionType": "NETWORK_CONNECTION",
"networkConnectionAction": {
"remoteIpDetails": {
"ipAddressV4": "203.0.113.25",
"organization": {
"asn": 12345,
"asnOrg": "ExampleOrg"
}
},
"protocol": "TCP",
"localPortDetails": {
"port": 443
},
"remotePortDetails": {
"port": 8080
}
}
}
}
}Look carefully at the JSON key actionType inside service.action.
The JSON shows "actionType": "NETWORK_CONNECTION", indicating the type of action detected by GuardDuty.