aws guardduty
Amazon GuardDuty is a continuous security monitoring service that analyzes and processes the following data sources: VPC Flow Logs, AWS CloudTrail event logs, and DNS logs. It uses threat intelligence feeds (such as lists of malicious IPs and domains) and machine learning to identify unexpected, potentially unauthorized, and malicious activity within your AWS environment. This can include issues like escalations of privileges, uses of exposed credentials, or communication with malicious IPs, URLs, or domains. For example, GuardDuty can detect compromised EC2 instances that serve malware or mine bitcoin. GuardDuty also monitors AWS account access behavior for signs of compromise. Some examples of this are unauthorized infrastructure deployments such as EC2 instances deployed in a Region that has never been used, or unusual API calls like a password policy change to reduce password strength. GuardDuty informs you of the status of your AWS environment by producing security findings that you can view in the GuardDuty console or through Amazon CloudWatch events. For more information, see the Amazon GuardDuty User Guide
Subcommands
Name | Description |
---|---|
accept-invitation | Accepts the invitation to be monitored by a GuardDuty administrator account |
archive-findings | Archives GuardDuty findings that are specified by the list of finding IDs. Only the administrator account can archive findings. Member accounts don't have permission to archive findings from their accounts |
create-detector | Creates a single Amazon GuardDuty detector. A detector is a resource that represents the GuardDuty service. To start using GuardDuty, you must create a detector in each Region where you enable the service. You can have only one detector per account per Region. All data sources are enabled in a new detector by default |
create-filter | Creates a filter using the specified finding criteria |
create-ip-set | Creates a new IPSet, which is called a trusted IP list in the console user interface. An IPSet is a list of IP addresses that are trusted for secure communication with AWS infrastructure and applications. GuardDuty doesn't generate findings for IP addresses that are included in IPSets. Only users from the administrator account can use this operation |
create-members | Creates member accounts of the current AWS account by specifying a list of AWS account IDs. This step is a prerequisite for managing the associated member accounts either by invitation or through an organization. When using Create Members as an organizations delegated administrator this action will enable GuardDuty in the added member accounts, with the exception of the organization delegated administrator account, which must enable GuardDuty prior to being added as a member. If you are adding accounts by invitation use this action after GuardDuty has been enabled in potential member accounts and before using Invite Members |
create-publishing-destination | Creates a publishing destination to export findings to. The resource to export findings to must exist before you use this operation |
create-sample-findings | Generates example findings of types specified by the list of finding types. If 'NULL' is specified for findingTypes, the API generates example findings of all supported finding types |
create-threat-intel-set | Creates a new ThreatIntelSet. ThreatIntelSets consist of known malicious IP addresses. GuardDuty generates findings based on ThreatIntelSets. Only users of the administrator account can use this operation |
decline-invitations | Declines invitations sent to the current member account by AWS accounts specified by their account IDs |
delete-detector | Deletes an Amazon GuardDuty detector that is specified by the detector ID |
delete-filter | Deletes the filter specified by the filter name |
delete-ip-set | Deletes the IPSet specified by the ipSetId. IPSets are called trusted IP lists in the console user interface |
delete-invitations | Deletes invitations sent to the current member account by AWS accounts specified by their account IDs |
delete-members | Deletes GuardDuty member accounts (to the current GuardDuty administrator account) specified by the account IDs |
delete-publishing-destination | Deletes the publishing definition with the specified destinationId |
delete-threat-intel-set | Deletes the ThreatIntelSet specified by the ThreatIntelSet ID |
describe-organization-configuration | Returns information about the account selected as the delegated administrator for GuardDuty |
describe-publishing-destination | Returns information about the publishing destination specified by the provided destinationId |
disable-organization-admin-account | Disables an AWS account within the Organization as the GuardDuty delegated administrator |
disassociate-from-master-account | Disassociates the current GuardDuty member account from its administrator account |
disassociate-members | Disassociates GuardDuty member accounts (to the current GuardDuty administrator account) specified by the account IDs |
enable-organization-admin-account | Enables an AWS account within the organization as the GuardDuty delegated administrator |
get-detector | Retrieves an Amazon GuardDuty detector specified by the detectorId |
get-filter | Returns the details of the filter specified by the filter name |
get-findings | Describes Amazon GuardDuty findings specified by finding IDs |
get-findings-statistics | Lists Amazon GuardDuty findings statistics for the specified detector ID |
get-ip-set | Retrieves the IPSet specified by the ipSetId |
get-invitations-count | Returns the count of all GuardDuty membership invitations that were sent to the current member account except the currently accepted invitation |
get-master-account | Provides the details for the GuardDuty administrator account associated with the current GuardDuty member account |
get-member-detectors | Describes which data sources are enabled for the member account's detector |
get-members | Retrieves GuardDuty member accounts (of the current GuardDuty administrator account) specified by the account IDs |
get-threat-intel-set | Retrieves the ThreatIntelSet that is specified by the ThreatIntelSet ID |
get-usage-statistics | Lists Amazon GuardDuty usage statistics over the last 30 days for the specified detector ID. For newly enabled detectors or data sources the cost returned will include only the usage so far under 30 days, this may differ from the cost metrics in the console, which projects usage over 30 days to provide a monthly cost estimate. For more information see Understanding How Usage Costs are Calculated |
invite-members | Invites other AWS accounts (created as members of the current AWS account by CreateMembers) to enable GuardDuty, and allow the current AWS account to view and manage these accounts' findings on their behalf as the GuardDuty administrator account |
list-detectors | Lists detectorIds of all the existing Amazon GuardDuty detector resources |
list-filters | Returns a paginated list of the current filters |
list-findings | Lists Amazon GuardDuty findings for the specified detector ID |
list-ip-sets | Lists the IPSets of the GuardDuty service specified by the detector ID. If you use this operation from a member account, the IPSets returned are the IPSets from the associated administrator account |
list-invitations | Lists all GuardDuty membership invitations that were sent to the current AWS account |
list-members | Lists details about all member accounts for the current GuardDuty administrator account |
list-organization-admin-accounts | Lists the accounts configured as GuardDuty delegated administrators |
list-publishing-destinations | Returns a list of publishing destinations associated with the specified detectorId |
list-tags-for-resource | Lists tags for a resource. Tagging is currently supported for detectors, finding filters, IP sets, and threat intel sets, with a limit of 50 tags per resource. When invoked, this operation returns all assigned tags for a given resource |
list-threat-intel-sets | Lists the ThreatIntelSets of the GuardDuty service specified by the detector ID. If you use this operation from a member account, the ThreatIntelSets associated with the administrator account are returned |
start-monitoring-members | Turns on GuardDuty monitoring of the specified member accounts. Use this operation to restart monitoring of accounts that you stopped monitoring with the StopMonitoringMembers operation |
stop-monitoring-members | Stops GuardDuty monitoring for the specified member accounts. Use the StartMonitoringMembers operation to restart monitoring for those accounts |
tag-resource | Adds tags to a resource |
unarchive-findings | Unarchives GuardDuty findings specified by the findingIds |
untag-resource | Removes tags from a resource |
update-detector | Updates the Amazon GuardDuty detector specified by the detectorId |
update-filter | Updates the filter specified by the filter name |
update-findings-feedback | Marks the specified GuardDuty findings as useful or not useful |
update-ip-set | Updates the IPSet specified by the IPSet ID |
update-member-detectors | Contains information on member accounts to be updated |
update-organization-configuration | Updates the delegated administrator account with the values provided |
update-publishing-destination | Updates information about the publishing destination specified by the destinationId |
update-threat-intel-set | Updates the ThreatIntelSet specified by the ThreatIntelSet ID |