aws guardduty

Amazon GuardDuty is a continuous security monitoring service that analyzes and processes the following data sources: VPC Flow Logs, AWS CloudTrail event logs, and DNS logs. It uses threat intelligence feeds (such as lists of malicious IPs and domains) and machine learning to identify unexpected, potentially unauthorized, and malicious activity within your AWS environment. This can include issues like escalations of privileges, uses of exposed credentials, or communication with malicious IPs, URLs, or domains. For example, GuardDuty can detect compromised EC2 instances that serve malware or mine bitcoin. GuardDuty also monitors AWS account access behavior for signs of compromise. Some examples of this are unauthorized infrastructure deployments such as EC2 instances deployed in a Region that has never been used, or unusual API calls like a password policy change to reduce password strength. GuardDuty informs you of the status of your AWS environment by producing security findings that you can view in the GuardDuty console or through Amazon CloudWatch events. For more information, see the Amazon GuardDuty User Guide

Subcommands

NameDescription
accept-invitationAccepts the invitation to be monitored by a GuardDuty administrator account
archive-findingsArchives GuardDuty findings that are specified by the list of finding IDs. Only the administrator account can archive findings. Member accounts don't have permission to archive findings from their accounts
create-detectorCreates a single Amazon GuardDuty detector. A detector is a resource that represents the GuardDuty service. To start using GuardDuty, you must create a detector in each Region where you enable the service. You can have only one detector per account per Region. All data sources are enabled in a new detector by default
create-filterCreates a filter using the specified finding criteria
create-ip-setCreates a new IPSet, which is called a trusted IP list in the console user interface. An IPSet is a list of IP addresses that are trusted for secure communication with AWS infrastructure and applications. GuardDuty doesn't generate findings for IP addresses that are included in IPSets. Only users from the administrator account can use this operation
create-membersCreates member accounts of the current AWS account by specifying a list of AWS account IDs. This step is a prerequisite for managing the associated member accounts either by invitation or through an organization. When using Create Members as an organizations delegated administrator this action will enable GuardDuty in the added member accounts, with the exception of the organization delegated administrator account, which must enable GuardDuty prior to being added as a member. If you are adding accounts by invitation use this action after GuardDuty has been enabled in potential member accounts and before using Invite Members
create-publishing-destinationCreates a publishing destination to export findings to. The resource to export findings to must exist before you use this operation
create-sample-findingsGenerates example findings of types specified by the list of finding types. If 'NULL' is specified for findingTypes, the API generates example findings of all supported finding types
create-threat-intel-setCreates a new ThreatIntelSet. ThreatIntelSets consist of known malicious IP addresses. GuardDuty generates findings based on ThreatIntelSets. Only users of the administrator account can use this operation
decline-invitationsDeclines invitations sent to the current member account by AWS accounts specified by their account IDs
delete-detectorDeletes an Amazon GuardDuty detector that is specified by the detector ID
delete-filterDeletes the filter specified by the filter name
delete-ip-setDeletes the IPSet specified by the ipSetId. IPSets are called trusted IP lists in the console user interface
delete-invitationsDeletes invitations sent to the current member account by AWS accounts specified by their account IDs
delete-membersDeletes GuardDuty member accounts (to the current GuardDuty administrator account) specified by the account IDs
delete-publishing-destinationDeletes the publishing definition with the specified destinationId
delete-threat-intel-setDeletes the ThreatIntelSet specified by the ThreatIntelSet ID
describe-organization-configurationReturns information about the account selected as the delegated administrator for GuardDuty
describe-publishing-destinationReturns information about the publishing destination specified by the provided destinationId
disable-organization-admin-accountDisables an AWS account within the Organization as the GuardDuty delegated administrator
disassociate-from-master-accountDisassociates the current GuardDuty member account from its administrator account
disassociate-membersDisassociates GuardDuty member accounts (to the current GuardDuty administrator account) specified by the account IDs
enable-organization-admin-accountEnables an AWS account within the organization as the GuardDuty delegated administrator
get-detectorRetrieves an Amazon GuardDuty detector specified by the detectorId
get-filterReturns the details of the filter specified by the filter name
get-findingsDescribes Amazon GuardDuty findings specified by finding IDs
get-findings-statisticsLists Amazon GuardDuty findings statistics for the specified detector ID
get-ip-setRetrieves the IPSet specified by the ipSetId
get-invitations-countReturns the count of all GuardDuty membership invitations that were sent to the current member account except the currently accepted invitation
get-master-accountProvides the details for the GuardDuty administrator account associated with the current GuardDuty member account
get-member-detectorsDescribes which data sources are enabled for the member account's detector
get-membersRetrieves GuardDuty member accounts (of the current GuardDuty administrator account) specified by the account IDs
get-threat-intel-setRetrieves the ThreatIntelSet that is specified by the ThreatIntelSet ID
get-usage-statisticsLists Amazon GuardDuty usage statistics over the last 30 days for the specified detector ID. For newly enabled detectors or data sources the cost returned will include only the usage so far under 30 days, this may differ from the cost metrics in the console, which projects usage over 30 days to provide a monthly cost estimate. For more information see Understanding How Usage Costs are Calculated
invite-membersInvites other AWS accounts (created as members of the current AWS account by CreateMembers) to enable GuardDuty, and allow the current AWS account to view and manage these accounts' findings on their behalf as the GuardDuty administrator account
list-detectorsLists detectorIds of all the existing Amazon GuardDuty detector resources
list-filtersReturns a paginated list of the current filters
list-findingsLists Amazon GuardDuty findings for the specified detector ID
list-ip-setsLists the IPSets of the GuardDuty service specified by the detector ID. If you use this operation from a member account, the IPSets returned are the IPSets from the associated administrator account
list-invitationsLists all GuardDuty membership invitations that were sent to the current AWS account
list-membersLists details about all member accounts for the current GuardDuty administrator account
list-organization-admin-accountsLists the accounts configured as GuardDuty delegated administrators
list-publishing-destinationsReturns a list of publishing destinations associated with the specified detectorId
list-tags-for-resourceLists tags for a resource. Tagging is currently supported for detectors, finding filters, IP sets, and threat intel sets, with a limit of 50 tags per resource. When invoked, this operation returns all assigned tags for a given resource
list-threat-intel-setsLists the ThreatIntelSets of the GuardDuty service specified by the detector ID. If you use this operation from a member account, the ThreatIntelSets associated with the administrator account are returned
start-monitoring-membersTurns on GuardDuty monitoring of the specified member accounts. Use this operation to restart monitoring of accounts that you stopped monitoring with the StopMonitoringMembers operation
stop-monitoring-membersStops GuardDuty monitoring for the specified member accounts. Use the StartMonitoringMembers operation to restart monitoring for those accounts
tag-resourceAdds tags to a resource
unarchive-findingsUnarchives GuardDuty findings specified by the findingIds
untag-resourceRemoves tags from a resource
update-detectorUpdates the Amazon GuardDuty detector specified by the detectorId
update-filterUpdates the filter specified by the filter name
update-findings-feedbackMarks the specified GuardDuty findings as useful or not useful
update-ip-setUpdates the IPSet specified by the IPSet ID
update-member-detectorsContains information on member accounts to be updated
update-organization-configurationUpdates the delegated administrator account with the values provided
update-publishing-destinationUpdates information about the publishing destination specified by the destinationId
update-threat-intel-setUpdates the ThreatIntelSet specified by the ThreatIntelSet ID