Category
Security, identity, and compliance
1. Introduction
Amazon GuardDuty is an AWS-managed threat detection service that continuously monitors your AWS accounts and workloads for suspicious or malicious activity, then generates prioritized security findings you can investigate and automate responses for.
In simple terms: you turn it on, it watches key AWS telemetry (like CloudTrail events, VPC traffic metadata, and DNS activity), and it alerts you when something looks like compromised credentials, unusual API calls, port scanning, crypto-mining, or data access anomalies.
Technically, Amazon GuardDuty analyzes multiple AWS-native data sources and threat intelligence signals to detect threats across accounts and regions. It produces structured findings with severity, context, and recommended remediation, and integrates with AWS services such as Amazon EventBridge, AWS Organizations, AWS Security Hub, Amazon Detective, AWS Lambda, and SIEM tooling for investigation and response workflows.
The problem it solves is common in cloud environments: you have a lot of security-relevant signals, but collecting, correlating, and continuously analyzing them at scale is difficult. GuardDuty provides a managed, scalable detection layer so security and operations teams can detect threats earlier and respond consistently—without running their own always-on detection infrastructure.
2. What is Amazon GuardDuty?
Official purpose (as defined by AWS): Amazon GuardDuty helps protect AWS accounts, workloads, and data by monitoring for malicious activity and unauthorized behavior and producing actionable security findings. (Verify the latest scope and supported data sources in the official user guide: https://docs.aws.amazon.com/guardduty/latest/ug/what-is-guardduty.html)
Core capabilities
Amazon GuardDuty’s core capabilities include:
- Managed threat detection across AWS accounts using AWS telemetry and threat intel
- Security findings generation with severity scoring and investigation context
- Multi-account management (especially via AWS Organizations)
- Automation hooks for alerting and remediation (EventBridge, SNS, Lambda, SOAR/SIEM integrations)
- Optional protection features that extend detection coverage (availability varies by region and feature—verify in official docs)
Major components
- Detector: The GuardDuty resource created per account per AWS Region. It represents that GuardDuty is enabled and configured in that region.
- Findings: Structured detection results (type, severity, resource details, timestamps, evidence).
- Publishing destinations (optional): Export findings (for example, to Amazon S3) for archiving or downstream analytics. Verify current options in docs.
- Multi-account constructs:
- Administrator / delegated administrator account: Central management account for GuardDuty across an AWS Organization.
- Member accounts: Accounts monitored under the administrator.
Service type
- Fully managed security service (SaaS-like within AWS).
- You do not deploy agents for the baseline threat detection; some optional features may involve additional setup (verify per feature).
Scope: regional vs global
- Regional: GuardDuty is enabled and operates per AWS Region within an account (via a detector in each region).
- Multi-account: You can centrally manage many accounts using AWS Organizations and delegated admin.
- Many organizations enable it in all supported regions to avoid blind spots.
How it fits into the AWS ecosystem
Amazon GuardDuty is commonly used as a detection signal source in the broader AWS Security, identity, and compliance toolchain:
- CloudTrail: API activity visibility; GuardDuty analyzes relevant events.
- VPC networking: Network flow metadata and DNS signals (details vary; verify sources in docs).
- AWS Security Hub: Central security posture and findings aggregation; GuardDuty findings can be sent to Security Hub.
- Amazon Detective: Investigation and correlation of findings and related events.
- Amazon EventBridge + AWS Lambda: Automation and remediation.
- SIEM: Splunk, OpenSearch, Sentinel, etc., via exports/streams and connectors.
3. Why use Amazon GuardDuty?
Business reasons
- Reduce breach impact: Faster detection of compromised credentials, suspicious access, and reconnaissance.
- Lower operational burden: AWS manages detection logic and scaling; you focus on triage and response.
- Improve audit readiness: Provides continuous monitoring signals and evidence for incident response processes.
Technical reasons
- Native telemetry analysis: Uses AWS account-level signals rather than relying solely on host agents.
- Actionable context: Findings include resource identifiers, observed behavior, and severity.
- Integrates with response tooling: EventBridge rules, Security Hub, ticketing, and SOAR.
Operational reasons
- Centralized management via AWS Organizations and delegated administration.
- Standardized playbooks: Same types of detections and response patterns across accounts and regions.
- Prioritization: Severity helps teams focus on the highest-risk items first (still validate severity against your environment).
Security/compliance reasons
- Helps implement continuous monitoring and detection controls (common requirements across frameworks like CIS, ISO 27001 operational controls, SOC 2 security monitoring expectations). Map findings and response procedures to your compliance requirements; GuardDuty alone is not “compliance”.
Scalability/performance reasons
- Designed to work across many accounts and high event volumes without you managing collectors and analyzers.
When teams should choose it
Choose Amazon GuardDuty when: – You want a managed detection baseline across AWS accounts quickly. – You operate multi-account AWS environments and need central visibility. – You want detection integrated with AWS-native automation.
When teams should not choose it (or not rely on it alone)
Do not treat GuardDuty as a complete security program. Consider additional controls when: – You need endpoint EDR across non-AWS devices or deep host forensics across all OS activity. – You need inline prevention (GuardDuty detects and alerts; prevention is typically done via IAM controls, SCPs, WAF, network controls, etc.). – You require detections for non-AWS environments without separate tooling. – You need full packet capture or custom IDS at the network layer (GuardDuty analyzes managed signals; it is not a full NIDS you tune with signatures).
4. Where is Amazon GuardDuty used?
Industries
- SaaS and tech companies running production workloads on AWS
- Financial services and fintech (regulated monitoring and incident response)
- Healthcare and life sciences (sensitive data access monitoring)
- E-commerce (fraud and credential compromise detection)
- Media/gaming (bot and abuse activity detection, account compromise)
- Public sector (security operations, centralized governance)
Team types
- Security Operations (SOC)
- Cloud Platform / SRE teams (shared responsibility for response automation)
- DevSecOps teams (security guardrails in pipelines + runtime monitoring)
- Incident response and forensics teams
- Compliance and risk teams (evidence and control mapping)
Workloads and architectures
- Internet-facing applications in VPCs (ALB/NLB, EC2, ECS/EKS, RDS)
- Serverless architectures (APIs, event-driven workloads) where API behavior anomalies are relevant
- Data platforms (S3 data access visibility; verify your exact S3-related coverage in docs)
- Multi-account landing zones using AWS Organizations / Control Tower
Real-world deployment contexts
- Central security account manages GuardDuty for all accounts, forwards findings to SIEM and ticketing.
- Region-wide enablement for consistent coverage.
- Automation for a subset of high-confidence findings (e.g., suspicious IAM activity triggers credential rotation workflow).
Production vs dev/test usage
- Production: Always enable; integrate with response workflows and SIEM.
- Dev/test: Still useful—dev accounts are often less controlled and frequently targeted. However, manage noise and cost with careful scoping and retention/exports. You can also use dev/test for playbook testing using sample findings.
5. Top Use Cases and Scenarios
Below are realistic scenarios where Amazon GuardDuty is commonly applied.
1) Detect compromised IAM credentials
- Problem: An access key is stolen and used from an unusual location/IP or to perform suspicious API activity.
- Why GuardDuty fits: It analyzes API activity patterns and threat intel to identify anomalous and known-bad behaviors.
- Example: A developer’s key is used to enumerate IAM users and create new access keys outside business hours.
2) Identify reconnaissance and port scanning against VPC workloads
- Problem: Attackers scan public IPs to find exposed services and weaknesses.
- Why GuardDuty fits: It detects suspicious network patterns indicative of scanning and probing (based on supported signals).
- Example: An EC2 instance behind a public subnet receives repeated connection attempts across many ports.
3) Detect crypto-mining behavior and related compromise indicators
- Problem: Compromised compute resources are used for unauthorized mining, increasing cost and risk.
- Why GuardDuty fits: It can produce findings associated with known mining pools or patterns (coverage depends on signals; verify in docs).
- Example: Outbound traffic from EC2 repeatedly connects to known mining endpoints.
4) Monitor S3 for suspicious access patterns
- Problem: Sensitive objects are accessed in unexpected ways (e.g., unusual geolocation, large enumeration, known malicious IPs).
- Why GuardDuty fits: GuardDuty can analyze S3-related signals (for example, S3 data event visibility where configured/supported).
- Example: A private bucket’s objects are accessed via a role that normally never touches that dataset.
5) Alert on unusual API activity in a CI/CD pipeline account
- Problem: Build system credentials are abused to modify IAM roles or deployment pipelines.
- Why GuardDuty fits: CloudTrail-driven detections can identify suspicious sequences of API calls.
- Example: The pipeline role suddenly changes an IAM trust policy to allow an external account.
6) Multi-account centralized threat detection for an AWS Organization
- Problem: Security team lacks visibility across many accounts and regions.
- Why GuardDuty fits: Delegated admin model centralizes enablement and monitoring.
- Example: A security account monitors 200+ AWS accounts, auto-enables GuardDuty for new accounts.
7) Automated incident response for high-severity findings
- Problem: Manual triage is too slow; incidents require rapid containment.
- Why GuardDuty fits: Findings can trigger EventBridge rules for automated actions.
- Example: A high-severity finding triggers a Lambda that disables the compromised access key and opens a ticket.
8) Feed GuardDuty findings into a SIEM for correlation
- Problem: SOC wants a single console to correlate AWS detections with endpoint/network logs.
- Why GuardDuty fits: Findings are structured and can be routed to Security Hub or exported for SIEM ingestion.
- Example: Correlate GuardDuty credential compromise findings with IdP sign-in logs.
9) Enhance detection for containerized workloads (EKS)
- Problem: Kubernetes clusters face risks like compromised nodes, exposed services, and suspicious API activity.
- Why GuardDuty fits: GuardDuty supports EKS-related detections (for example, EKS audit log analysis where supported).
- Example: Cluster role starts listing secrets and modifying RBAC bindings unexpectedly.
10) Baseline security monitoring for new AWS accounts and projects
- Problem: New projects need consistent baseline monitoring without building tooling first.
- Why GuardDuty fits: Easy enablement and standardized findings taxonomy.
- Example: A new app account is added to the organization; GuardDuty is auto-enabled and findings flow to Security Hub.
11) Detect suspicious DNS activity (domain generation / known bad domains)
- Problem: Malware often uses DNS to reach command-and-control infrastructure.
- Why GuardDuty fits: It can analyze DNS-related signals and threat intel (verify exact DNS signal scope in docs).
- Example: Instances start resolving a domain associated with malware campaigns.
12) Support incident investigation workflows with Amazon Detective
- Problem: Findings need rapid investigation context (related IPs, API calls, timelines).
- Why GuardDuty fits: Integrates with Amazon Detective for deeper analysis.
- Example: Analyst pivots from a finding to investigate related activity across the account.
6. Core Features
Amazon GuardDuty capabilities evolve over time. Always verify feature availability, regions, and prerequisites in the official documentation: https://docs.aws.amazon.com/guardduty/latest/ug/what-is-guardduty.html
1) Continuous threat detection (managed)
- What it does: Continuously analyzes supported AWS telemetry sources and threat intel to detect suspicious activity.
- Why it matters: You get detection coverage without operating your own log ingestion and analytics pipeline for baseline threats.
- Practical benefit: Faster time-to-detection and standardized findings across accounts.
- Limitations/caveats: It does not replace preventive controls; detection depends on supported signals and correct enablement per region/account.
2) Findings with severity and context
- What it does: Produces findings that include type, severity, affected resources, timestamps, and evidence.
- Why it matters: Prioritization and investigation are much easier than raw logs.
- Practical benefit: Supports triage queues, SOC playbooks, and automation.
- Caveats: Severity is a guide; you still need environment context (e.g., expected pentest activity may trigger findings).
3) Multi-account management (AWS Organizations)
- What it does: Centralizes GuardDuty administration and enrollment of member accounts.
- Why it matters: Large AWS environments need consistent baseline monitoring.
- Practical benefit: Easier onboarding and consistent configuration.
- Caveats: Requires Organizations setup and proper delegated admin permissions; cross-region enablement still needs to be managed.
4) Integration with Amazon EventBridge for automation
- What it does: Emits events for findings so you can route and automate responses.
- Why it matters: Detection without response is incomplete.
- Practical benefit: Auto-ticketing, notifications, containment actions (with careful guardrails).
- Caveats: Poorly designed automation can disrupt workloads (e.g., overly aggressive key disablement).
5) Integration with AWS Security Hub
- What it does: Sends GuardDuty findings into Security Hub for centralized view with other security signals.
- Why it matters: Security teams often want a single pane of glass for findings.
- Practical benefit: Unified dashboards, cross-product correlation, and workflow tooling.
- Caveats: Security Hub has its own pricing and regional behavior; plan for multi-region aggregation.
6) Integration with Amazon Detective (investigation)
- What it does: Enables investigation pivots and timelines for security events.
- Why it matters: Analysts need fast context for triage.
- Practical benefit: Reduced investigation time.
- Caveats: Detective is a separate service with separate costs; availability varies.
7) Findings export / retention patterns
- What it does: GuardDuty retains findings for a limited period and supports exporting to long-term storage destinations (options vary).
- Why it matters: Forensics and compliance may require longer retention than the default.
- Practical benefit: Central archive in S3 or SIEM, searchability, and retention controls.
- Caveats: Export destinations can add storage, processing, and access costs. Verify current retention duration in docs.
8) Sample findings generation (testing)
- What it does: Lets you generate sample findings to test alerting and automation pipelines.
- Why it matters: You should validate detection-to-response workflows safely.
- Practical benefit: Low-cost, low-risk testing without simulating real attacks.
- Caveats: Sample findings are not real detections; do not treat them as operational metrics.
9) Suppression / filtering (noise reduction)
- What it does: Supports ways to reduce noise (for example, through filtering in consoles/exports/consumers or suppression features if available).
- Why it matters: High alert volume can cause fatigue.
- Practical benefit: Focus on actionable detections.
- Caveats: Over-filtering can hide real threats. Implement change control and periodic review.
10) Coverage extensions (optional protections)
GuardDuty has introduced additional capabilities beyond baseline telemetry analysis (for example, malware scanning options and workload-specific monitoring). Availability and prerequisites are feature-specific and change over time. Use the GuardDuty console “Protection plans”/settings and official docs to confirm what is available in your region and account.
- What they do: Extend detection to additional surfaces (for example, certain storage or compute malware scanning workflows).
- Why they matter: Broader detection coverage reduces blind spots.
- Practical benefit: Earlier detection of compromise indicators.
- Caveats: These features often have separate pricing dimensions and may require additional permissions, encryption considerations, or service-linked roles.
7. Architecture and How It Works
High-level architecture
At a high level, Amazon GuardDuty works like this:
- You enable GuardDuty in an AWS account and region (create a detector).
- GuardDuty analyzes supported AWS telemetry and threat intel to identify suspicious activity.
- It generates findings stored in the service.
- Findings are consumed by: – The GuardDuty console (human triage) – Amazon EventBridge (automation) – AWS Security Hub (central aggregation) – Exports to S3 / SIEM pipelines (long-term storage, correlation)
Data flow vs control flow
- Control plane: Enabling/configuring detectors, inviting member accounts, setting administrator, configuring integrations.
- Data plane: Telemetry is analyzed by the managed service; you typically do not “send logs” manually for baseline detection (details vary by data source and feature—verify in docs).
- Output: Findings and events.
Integrations with related AWS services
Common integrations include:
- AWS Organizations: multi-account enablement and centralized admin.
- Amazon EventBridge: route findings to SNS, Lambda, SQS, Step Functions, third-party targets.
- Amazon SNS: notifications (email, SMS, HTTP endpoints).
- AWS Lambda: automated remediation and enrichment.
- AWS Security Hub: central findings and security posture view.
- Amazon Detective: investigation and correlations.
- AWS IAM: access control for who can view/configure GuardDuty.
- Amazon S3: optional export destination / archive.
- AWS KMS: encryption for exported data, and for other dependent services.
Dependency services
GuardDuty depends on AWS account telemetry sources (such as CloudTrail events and other AWS-native signals) and the GuardDuty managed detection backend. You should still configure foundational services like:
- AWS CloudTrail (organization trails where appropriate)
- Central logging (S3 with immutability controls where required)
- Security Hub and/or SIEM for centralized triage
Security/authentication model
- GuardDuty is controlled by IAM permissions.
- Multi-account delegation uses AWS Organizations and a delegated administrator pattern.
- Integrations (EventBridge, SNS, Lambda) require appropriate IAM policies and resource policies.
Networking model
- GuardDuty is a managed service; you access it via:
- AWS Management Console (HTTPS)
- AWS CLI/SDK (API calls to the regional endpoint)
- No inbound VPC networking is required to “run GuardDuty”.
- If you export findings or trigger automation, those services’ networking (for example, VPC-attached Lambda functions, VPC endpoints, NAT gateways) may affect your design.
Monitoring/logging/governance considerations
- Use AWS CloudTrail to audit GuardDuty configuration changes (CreateDetector/UpdateDetector/DeleteDetector, membership changes, publishing destination changes).
- Consider AWS Config rules or custom Config rules to ensure GuardDuty is enabled in required accounts/regions.
- Use tagging and naming conventions for SNS topics, EventBridge rules, Lambda functions, and S3 buckets tied to GuardDuty workflows.
Simple architecture diagram (Mermaid)
flowchart LR
A[AWS Account / Region] --> B[Amazon GuardDuty Detector]
B --> C[Findings]
C --> D[GuardDuty Console]
C --> E[Amazon EventBridge]
E --> F[Amazon SNS Email Alert]
E --> G[AWS Lambda Remediation]
Production-style architecture diagram (Mermaid)
flowchart TB
subgraph Org[AWS Organization]
subgraph SecAcct[Security Account (Delegated Admin)]
GDAdmin[GuardDuty Admin (multi-region)]
SH[Security Hub]
Det[Amazon Detective]
SIEM[External SIEM / SOC Tools]
Archive[(S3 Findings Archive)]
end
subgraph AppAccts[Workload Accounts (Members)]
A1[App Account A - Regions]
A2[App Account B - Regions]
A3[Shared Services Account - Regions]
end
end
A1 --> GDAdmin
A2 --> GDAdmin
A3 --> GDAdmin
GDAdmin --> SH
GDAdmin --> Det
GDAdmin --> EB[Amazon EventBridge]
EB --> SNS[Amazon SNS / ChatOps]
EB --> IR[Lambda / Step Functions IR Playbooks]
GDAdmin --> Archive
Archive --> SIEM
SH --> SIEM
Det --> SIEM
8. Prerequisites
Before you start, confirm the following.
Account and billing
- An AWS account with billing enabled.
- If doing multi-account: an AWS Organization (recommended) and access to the management account or delegated admin permissions.
IAM permissions
For a single-account lab, you need permissions to: – Enable/configure GuardDuty (detector) – Generate sample findings – Create EventBridge rules – Create SNS topic and subscription
A broad policy for lab purposes could include:
– guardduty:*
– events:*
– sns:*
– iam:PassRole (only if your automation uses roles)
For production, use least privilege (recommended).
Tools
- AWS Management Console access and/or
- AWS CLI v2 configured (
aws configure) with credentials and default region - AWS CLI install docs: https://docs.aws.amazon.com/cli/latest/userguide/install-cliv2.html
Region availability
- GuardDuty is regional. Choose a region where GuardDuty is supported.
- Some advanced features may be region-limited. Verify in official docs for your selected region.
Quotas/limits
- GuardDuty has service quotas (for example, around members, invitations, exports). These can change.
- Check current quotas in the Service Quotas console and GuardDuty docs. Verify: https://docs.aws.amazon.com/guardduty/latest/ug/guardduty_service_limits.html (URL may vary; search in official docs if it changes).
Prerequisite services (for this lab)
- Amazon SNS
- Amazon EventBridge
- Email address you can access (for SNS email subscription confirmation)
9. Pricing / Cost
Amazon GuardDuty pricing is usage-based and varies by region. Do not hardcode numbers—use the official pricing page for your region:
- Official pricing: https://aws.amazon.com/guardduty/pricing/
- AWS Pricing Calculator: https://calculator.aws/#/
Pricing dimensions (typical model)
GuardDuty charges based on analyzed data/event volume. Common pricing dimensions include (verify exact current dimensions and names on the pricing page):
- Analysis of AWS activity signals (for example, events/bytes associated with supported telemetry sources)
- Optional protection features may have separate pricing (for example, malware scanning volume, additional data sources, or workload monitoring). The pricing page lists each feature and measurement unit.
Free tier / free trial
Amazon GuardDuty historically offered a free trial for new accounts (often 30 days). Free trial scope can change and may not cover all optional features. Verify current free trial terms on the pricing page.
Primary cost drivers
- Number of accounts and regions enabled
- Volume of analyzed activity (busy accounts generate more telemetry)
- Enabling optional coverage features that add per-GB or per-object/event charges
- Exporting findings to S3 and then processing them (Athena, Glue, SIEM ingestion)
- Downstream automation costs (Lambda invocations, Step Functions state transitions, SNS deliveries)
Hidden/indirect costs to plan for
- Security Hub ingestion and normalization costs (if you enable integration)
- Detective analysis costs (if enabled)
- CloudTrail and log storage costs (not “GuardDuty cost”, but commonly part of the same program)
- SIEM licensing and ingestion costs
- Staff time for triage and incident response (often the biggest cost)
Network/data transfer implications
- GuardDuty itself is managed; you generally pay for analysis, not for data transfer into GuardDuty.
- If you export findings to S3 across accounts/regions or ingest into third-party SIEM, data transfer and egress can apply depending on architecture.
How to optimize cost
- Enable GuardDuty broadly, but be deliberate about:
- Regions you truly operate in (avoid enabling in unused regions unless policy requires it)
- Optional features—enable where risk justifies cost (production first)
- Centralize triage to reduce duplicated effort:
- Use delegated admin and Security Hub aggregation (if adopted)
- Use suppression/filtering thoughtfully:
- Reduce noise without hiding real threats
- Archive findings efficiently:
- Partition S3 data by account/region/date; apply lifecycle policies (S3 Intelligent-Tiering or Glacier as appropriate)
Example low-cost starter estimate (how to think about it)
A low-cost starter approach typically looks like: – 1 account, 1 region – Enable GuardDuty – Use sample findings for testing (no real incident traffic) – Minimal automation (EventBridge → SNS email) Your cost will depend on the analyzed event volume in that account/region and any optional features you enable. Use the Pricing Calculator to input your region and estimated event volumes.
Example production cost considerations
For a production environment: – N accounts × M regions – High CloudTrail/VPC activity volume – Integrations (Security Hub, Detective, SIEM) – Optional features enabled for critical accounts (prod) and selectively for lower environments A realistic cost model includes: – GuardDuty analysis costs per account/region – Central findings pipeline (S3, KMS, Glue/Athena/OpenSearch) – SIEM ingestion and retention costs – Operational headcount for triage and on-call
10. Step-by-Step Hands-On Tutorial
This lab enables Amazon GuardDuty in one AWS region, sets up an alert pipeline, and generates sample findings to verify end-to-end notifications.
Objective
- Enable Amazon GuardDuty in a chosen AWS region
- Route findings to Amazon EventBridge
- Send alerts to an Amazon SNS email subscription
- Validate by generating sample findings
- Clean up resources to keep costs low
Lab Overview
You will create: – GuardDuty detector (enabled) – SNS topic + email subscription – EventBridge rule that matches GuardDuty findings and publishes to SNS – Sample findings to test the pipeline
Expected outcome: You receive an email notification (via SNS) when GuardDuty publishes sample findings.
Step 1: Choose a region and verify CLI identity
Pick a region you actively use (example: us-east-1). Set it in your terminal session:
export AWS_REGION="us-east-1"
aws configure set region "$AWS_REGION"
Verify your caller identity:
aws sts get-caller-identity
Expected outcome: Output shows your AWS Account ID and ARN.
Step 2: Enable Amazon GuardDuty (create a detector)
Option A: AWS Console
- Open GuardDuty console: https://console.aws.amazon.com/guardduty/
- Ensure you’re in the correct region (top-right region selector).
- Choose Get Started / Enable GuardDuty (wording may vary).
- Confirm the detector is enabled.
Option B: AWS CLI
Create a detector:
aws guardduty create-detector --enable
Save the returned detector ID:
export GD_DETECTOR_ID="$(aws guardduty list-detectors --query 'DetectorIds[0]' --output text)"
echo "$GD_DETECTOR_ID"
Expected outcome: You have a detector ID, and GuardDuty is enabled for this account/region.
Verification:
aws guardduty get-detector --detector-id "$GD_DETECTOR_ID"
Look for "Status": "ENABLED" (field names may differ; verify output).
Step 3: Create an SNS topic and email subscription
Create an SNS topic:
export SNS_TOPIC_ARN="$(aws sns create-topic --name guardduty-findings-topic --query 'TopicArn' --output text)"
echo "$SNS_TOPIC_ARN"
Subscribe your email address (replace with your real email):
aws sns subscribe \
--topic-arn "$SNS_TOPIC_ARN" \
--protocol email \
--notification-endpoint "you@example.com"
Expected outcome: SNS sends a confirmation email to the address.
Verification: – Open your inbox and click Confirm subscription. – In SNS console, confirm subscription is “Confirmed”.
SNS console: https://console.aws.amazon.com/sns/v3/home
Step 4: Create an EventBridge rule to match GuardDuty findings
GuardDuty findings are delivered to EventBridge. Create a rule that matches the GuardDuty finding event pattern.
Create the rule:
aws events put-rule \
--name "guardduty-to-sns" \
--event-pattern '{
"source": ["aws.guardduty"],
"detail-type": ["GuardDuty Finding"]
}' \
--state ENABLED
Attach the SNS topic as a target:
aws events put-targets \
--rule "guardduty-to-sns" \
--targets "Id"="1","Arn"="$SNS_TOPIC_ARN"
Expected outcome: Any GuardDuty finding in this region will trigger the rule and publish to SNS.
Verification: List targets:
aws events list-targets-by-rule --rule "guardduty-to-sns"
Step 5: (Optional but recommended) Add an SNS topic policy for EventBridge
In many accounts, EventBridge can publish to SNS without extra policy configuration, but in some environments you must explicitly allow it.
If you do not receive notifications later, add a topic policy to allow EventBridge (events.amazonaws.com) to publish. Policies are sensitive—apply least privilege.
Important: The exact policy requirements can vary. If needed, consult SNS + EventBridge docs and your security policy. Verify in official docs: – SNS access policies: https://docs.aws.amazon.com/sns/latest/dg/sns-access-policy-use-cases.html – EventBridge targets: https://docs.aws.amazon.com/eventbridge/latest/userguide/eb-targets.html
(If you prefer, do this step only if troubleshooting indicates AccessDenied.)
Step 6: Generate GuardDuty sample findings
Generate sample findings using the GuardDuty API:
aws guardduty generate-sample-findings \
--detector-id "$GD_DETECTOR_ID"
Expected outcome: GuardDuty creates sample findings in the service and emits events to EventBridge, which publishes to SNS.
Verification (GuardDuty console): 1. Open GuardDuty findings page: https://console.aws.amazon.com/guardduty/ 2. Look for new findings marked as sample (labeling may vary).
Verification (CLI): List findings:
aws guardduty list-findings --detector-id "$GD_DETECTOR_ID" --max-results 10
Fetch details for one finding:
export FINDING_ID="$(aws guardduty list-findings --detector-id "$GD_DETECTOR_ID" --query 'FindingIds[0]' --output text)"
aws guardduty get-findings --detector-id "$GD_DETECTOR_ID" --finding-ids "$FINDING_ID"
Validation
Confirm end-to-end behavior:
- GuardDuty has findings in the console.
- EventBridge rule exists and has SNS target.
- SNS subscription is confirmed.
- You received an email containing the finding JSON payload (or a summary).
If you did not receive email, see Troubleshooting.
Troubleshooting
Common issues and fixes:
-
No email received – Confirm SNS subscription is Confirmed. – Check spam/junk folder. – Ensure the EventBridge rule is in the same region as GuardDuty detector and SNS topic. – Verify the rule is ENABLED:
bash aws events describe-rule --name "guardduty-to-sns"– If needed, add an SNS topic policy allowing EventBridge to publish (see Step 5). -
No findings generated – Confirm GuardDuty detector status is enabled:
bash aws guardduty get-detector --detector-id "$GD_DETECTOR_ID"– Ensure you rangenerate-sample-findingsin the same region. -
AccessDenied errors – Your IAM principal may lack permissions for GuardDuty, EventBridge, or SNS. – For lab testing, attach a temporary managed policy with necessary permissions, then remove it. – Check CloudTrail for failed API calls to identify missing actions.
-
EventBridge target errors – If EventBridge cannot publish to SNS, you may see errors in EventBridge metrics/logs. Verify the SNS topic policy and ensure the correct ARN.
Cleanup
To avoid ongoing costs and reduce clutter, remove the lab resources.
1) Remove EventBridge targets and rule:
aws events remove-targets --rule "guardduty-to-sns" --ids "1"
aws events delete-rule --name "guardduty-to-sns"
2) Delete SNS topic (this also removes subscriptions):
aws sns delete-topic --topic-arn "$SNS_TOPIC_ARN"
3) Optionally disable/delete the GuardDuty detector (note: disabling reduces detection coverage; in real environments you typically keep it enabled):
aws guardduty delete-detector --detector-id "$GD_DETECTOR_ID"
Expected outcome: EventBridge rule and SNS topic are deleted; GuardDuty is disabled for that region/account if you deleted the detector.
11. Best Practices
Architecture best practices
- Enable GuardDuty in all active regions where you run workloads to reduce blind spots.
- Use a central security account as the delegated administrator (AWS Organizations) for consistent governance.
- Integrate GuardDuty with:
- Security Hub for centralized findings (if you use Security Hub)
- EventBridge for automation
- Detective for investigation (where it adds value)
IAM/security best practices
- Follow least privilege:
- Separate “view findings” permissions from “administer detectors” permissions.
- Use break-glass workflows for disabling GuardDuty; log and alert on detector changes.
- Use SCPs (Service Control Policies) to prevent member accounts from disabling GuardDuty (design carefully; test in non-prod first).
Cost best practices
- Start with organization-wide enablement but phase in optional features based on risk.
- Reduce downstream costs:
- If exporting to S3, apply lifecycle policies and partitioning.
- Avoid duplicating the same findings into multiple expensive pipelines unless required.
Performance best practices (operational scalability)
- Automate triage routing:
- High severity → pager/ticket
- Medium/low severity → queue/daily digest
- Create runbooks per high-confidence finding types.
- Enrich findings with context (owner tags, account metadata) in your SOC tooling rather than manually.
Reliability best practices
- Enable GuardDuty in multiple regions and centralize monitoring so a regional misconfiguration doesn’t hide issues.
- Build automation with retries and dead-letter queues (DLQs) where applicable (SQS/Lambda patterns).
Operations best practices
- Track KPIs:
- Findings by severity over time
- Mean time to acknowledge (MTTA) and mean time to remediate (MTTR)
- False positive rate for automated actions
- Use change management:
- Any suppression/filtering updates should be reviewed and time-bounded.
- Audit:
- Use CloudTrail to detect changes to detectors, publishing destinations, member accounts.
Governance/tagging/naming best practices
- Standard naming:
sec-guardduty-findings-topicsec-guardduty-eventbridge-rule- Tag response resources (SNS/Lambda/S3) with:
Owner,CostCenter,Environment,DataClassification,ManagedBy
12. Security Considerations
Identity and access model
- GuardDuty is governed by IAM:
- Admin actions: create/update/delete detector, manage members, configure exports.
- Read-only actions: list/get findings, list detectors.
- For multi-account, use delegated administrator with AWS Organizations.
- Log all GuardDuty admin actions in CloudTrail and alert on them.
Encryption
- GuardDuty findings in the service are managed by AWS (service-side). For exports:
- Use S3 bucket encryption (SSE-KMS recommended for sensitive environments).
- Control KMS key policies carefully (least privilege, separation of duties).
- If you forward to SIEM, encrypt in transit (TLS) and control access.
Network exposure
- GuardDuty is accessed via AWS APIs. Primary risk is over-permissive IAM access, not network exposure.
- If automation uses Lambda in VPC, ensure outbound controls (NAT, VPC endpoints) are consistent with security policies.
Secrets handling
- Avoid embedding secrets in Lambda environment variables for remediation.
- Use AWS Secrets Manager or SSM Parameter Store (with KMS) for secrets used in automation.
- Rotate credentials and use IAM roles rather than long-lived access keys.
Audit/logging
- Ensure:
- CloudTrail is enabled and protected (organization trail recommended).
- GuardDuty findings are retained long enough for your IR/compliance requirements (export if needed).
- Consider immutable S3 storage patterns (Object Lock) for compliance—this is separate from GuardDuty but often part of the same solution.
Compliance considerations
- GuardDuty supports detection and monitoring controls but is not a compliance certification by itself.
- Map:
- Findings → incident categories
- Response playbooks → control activities
- Retention/export → audit evidence
Common security mistakes
- Enabling GuardDuty in only one region and assuming full coverage.
- Letting application teams disable GuardDuty in their accounts without centralized control.
- Over-automating remediation (e.g., disabling keys) without human verification and rollback strategy.
- Ignoring medium/low findings completely—some attacks start as low-signal anomalies.
Secure deployment recommendations
- Centralize ownership in a security/platform team.
- Use Organizations delegated admin and restrict disabling via SCP (where appropriate).
- Integrate with ticketing and on-call workflows.
- Test playbooks using sample findings before enabling real automated actions.
13. Limitations and Gotchas
-
Regional enablement required – GuardDuty is regional. If you don’t enable it in a region where workloads run, you have a blind spot.
-
Not a prevention tool – GuardDuty detects and alerts; prevention typically comes from IAM, network controls, patching, WAF/Shield, and secure configuration.
-
Feature availability varies – Optional protections and data sources can be region-specific and can change. Verify in official docs.
-
Noise and false positives – Some environments (pentests, scanners, shared NAT IPs, CI/CD role behaviors) can generate frequent findings. – Build suppression/triage processes carefully.
-
Multi-account complexity – Delegated administration and auto-enrollment must be designed so new accounts are covered. – Be clear on who owns response actions (security vs app teams).
-
Retention limitations – Findings are retained for a limited time in-service. If you need longer retention, export findings. Verify current retention in docs.
-
Automation risks – Automated containment can break production if mis-triggered. Use staged rollout: notify-only → approve-then-act → auto-act for specific high-confidence cases.
-
Cost surprises – Enabling GuardDuty across many accounts/regions plus optional features can increase costs. – SIEM ingestion and long-term retention are often larger cost drivers than GuardDuty itself.
-
Permissions and policies – EventBridge → SNS permissions can be tricky depending on account security posture; topic policies may be required.
-
Shared responsibility – GuardDuty improves detection, but you still must manage:
- Incident response processes
- IAM hygiene
- Patching and secure baselines
- Logging strategy and retention
14. Comparison with Alternatives
Amazon GuardDuty is best understood as AWS-native threat detection. It complements (not replaces) posture management, vulnerability scanning, and investigation tools.
Alternatives within AWS
- AWS Security Hub: Findings aggregation and security posture management (consumes GuardDuty findings; doesn’t replace it).
- Amazon Inspector: Vulnerability management for compute and container images (different problem space).
- Amazon Detective: Investigation and correlation (consumes GuardDuty signals).
- Amazon Macie: Sensitive data discovery for S3 (data security posture, not general threat detection).
- AWS WAF / AWS Shield: Web and DDoS protections (prevention/mitigation).
Similar services in other clouds
- Microsoft Defender for Cloud (Azure): Threat protection and posture management across Azure and multi-cloud components.
- Google Cloud Security Command Center (GCP): Security posture and threat detection (capabilities vary by edition).
Open-source / self-managed alternatives
- Wazuh, OSSEC: Host-based detection and monitoring
- Falco: Runtime security for containers (Kubernetes)
- Zeek/Suricata: Network monitoring/IDS (requires deployment/ops)
- SIEM correlation (Elastic/OpenSearch/Splunk): Powerful but requires ingestion pipelines and detection engineering
Comparison table
| Option | Best For | Strengths | Weaknesses | When to Choose |
|---|---|---|---|---|
| Amazon GuardDuty | AWS-native threat detection | Managed detections, quick enablement, multi-account support, EventBridge automation | Regional setup, not prevention, limited to supported signals/features | You want fast, managed detection across AWS accounts |
| AWS Security Hub | Central findings + posture | Aggregates findings, standards checks, central dashboards | Depends on integrated products for detections; extra cost | You want centralized security reporting and workflow |
| Amazon Inspector | Vulnerability management | Finds CVEs/misconfig on supported targets; prioritization | Not a behavioral threat detector | You need vulnerability scanning and risk reduction |
| Amazon Detective | Investigation | Helps analyze and correlate activity tied to findings | Separate cost and setup; not a detector | You need faster investigations after detections |
| Microsoft Defender for Cloud | Azure-centric security | Broad platform security tooling | Not AWS-native; integration complexity | You’re primarily on Azure or standardizing on Microsoft security suite |
| GCP Security Command Center | GCP security program | GCP-native integration | Not AWS-native; scope differs by edition | You’re primarily on GCP |
| Self-managed SIEM + IDS tools | Custom detections | Full control, deep customization | High operational overhead | You have mature detection engineering and need custom analytics beyond managed services |
15. Real-World Example
Enterprise example (multi-account regulated environment)
Problem A financial services company runs hundreds of AWS accounts across multiple regions. They need consistent threat detection, centralized security operations, audit evidence, and controlled response actions.
Proposed architecture – AWS Organizations with a dedicated Security account as GuardDuty delegated administrator – GuardDuty enabled in all production regions; member accounts auto-enrolled – Findings routed to: – AWS Security Hub for centralized dashboards and standards mapping – Amazon EventBridge to trigger: – SNS/ChatOps notifications – Step Functions incident workflows (approval gates for risky actions) – S3 archive encrypted with KMS and lifecycle policies for retention – Amazon Detective enabled for investigation on prioritized accounts/regions
Why Amazon GuardDuty was chosen – Managed detection reduces operational complexity. – Delegated admin model fits multi-account governance. – Tight integration with EventBridge supports repeatable incident response patterns.
Expected outcomes – Reduced time to detect suspicious credential activity and reconnaissance – Standardized triage process across accounts – Better audit evidence through centralized archiving and documented playbooks
Startup/small-team example (single account, lean ops)
Problem A startup has one AWS account, limited security staff, and needs basic monitoring for compromised credentials and suspicious activity without deploying complex infrastructure.
Proposed architecture – GuardDuty enabled in the primary region (and any region where they deploy) – EventBridge rule routes findings to: – SNS email (security@company) – Optional Slack webhook via Lambda (later) – Minimal suppression; weekly review of findings
Why Amazon GuardDuty was chosen – Fast time-to-value and low operational overhead – Works well without a dedicated SOC – Easy to automate later as the team grows
Expected outcomes – Early warning for compromised credentials and suspicious access – A lightweight security monitoring baseline appropriate for a small team – Foundation for future SOC tooling (Security Hub, SIEM) as they scale
16. FAQ
-
Is Amazon GuardDuty enabled per account or per region?
Per account per region. You create a detector in each region you want monitored. -
Does GuardDuty require installing agents on EC2 instances?
Baseline GuardDuty does not require agents. Some optional features may require additional setup—verify in official docs for the feature you plan to use. -
What data does GuardDuty analyze?
It analyzes supported AWS telemetry signals (commonly including CloudTrail-related activity and network/DNS-related signals). The exact data sources and requirements can change—verify in the GuardDuty documentation. -
How do I centralize GuardDuty for many accounts?
Use AWS Organizations and configure a delegated administrator account for GuardDuty, then enroll member accounts. -
Can GuardDuty automatically remediate threats?
GuardDuty itself produces findings. Remediation is typically automated through EventBridge + Lambda/Step Functions (or third-party SOAR tools). -
How do I test my alerting without causing real attacks?
Use GenerateSampleFindings to create sample findings and validate your pipelines safely. -
How long are GuardDuty findings retained?
Findings are retained for a limited duration in the service. Export to S3/SIEM for longer retention. Verify the current retention period in official docs. -
Can I export GuardDuty findings to S3?
GuardDuty supports exporting findings (options and setup vary). Check the current user guide for supported publishing destinations and formats. -
Does GuardDuty replace CloudTrail?
No. CloudTrail provides audit logs of AWS API calls. GuardDuty uses signals (including CloudTrail-related) to detect threats and generate findings. You should still run CloudTrail for auditing and investigations. -
What’s the difference between GuardDuty and Security Hub?
GuardDuty is primarily a threat detection service. Security Hub is a central aggregator for findings and posture checks and can ingest GuardDuty findings. -
Will GuardDuty generate false positives?
It can. Any detection system can produce noise depending on environment patterns. Use suppression/triage processes and validate against known business activity. -
Should I enable GuardDuty in dev/test accounts?
Often yes—attackers target weaker environments. If cost/noise is a concern, start with production and then roll out with tuning. -
Can I prevent developers from disabling GuardDuty?
Yes, commonly via IAM boundaries and SCPs in AWS Organizations. Test carefully to avoid blocking legitimate admin workflows. -
How do I route findings to Slack, Jira, or PagerDuty?
Use EventBridge targets (SNS, Lambda, SQS) and integrate with your chosen tools. Many SaaS tools provide EventBridge-compatible endpoints or can be reached via Lambda. -
Does GuardDuty work in air-gapped or GovCloud regions?
Availability depends on region and partition. Check the AWS Region table and GuardDuty documentation for the specific region/partition you use (standard, GovCloud, etc.). -
Do I need Security Hub to use GuardDuty?
No. GuardDuty works independently. Security Hub is optional for aggregation and additional posture features. -
What’s the best first automation to implement?
Start with notification-only (SNS/email or ticket creation). Once you understand finding patterns, introduce containment actions with approval gates.
17. Top Online Resources to Learn Amazon GuardDuty
| Resource Type | Name | Why It Is Useful |
|---|---|---|
| Official Documentation | GuardDuty User Guide (What is GuardDuty?) https://docs.aws.amazon.com/guardduty/latest/ug/what-is-guardduty.html | Canonical reference for features, setup, and concepts |
| Official Pricing | GuardDuty Pricing https://aws.amazon.com/guardduty/pricing/ | Current pricing dimensions by region and feature |
| Official Tool | AWS Pricing Calculator https://calculator.aws/#/ | Estimate costs for your accounts/regions and optional features |
| Official Getting Started | Getting started with GuardDuty (in user guide) https://docs.aws.amazon.com/guardduty/latest/ug/guardduty_settingup.html | Step-by-step enablement and configuration guidance |
| Official Integration | Amazon EventBridge documentation https://docs.aws.amazon.com/eventbridge/latest/userguide/what-is-amazon-eventbridge.html | Build automation pipelines from GuardDuty findings |
| Official Integration | AWS Security Hub documentation https://docs.aws.amazon.com/securityhub/latest/userguide/what-is-securityhub.html | Centralize GuardDuty findings with other security signals |
| Official Investigation | Amazon Detective documentation https://docs.aws.amazon.com/detective/latest/adminguide/what-is-detective.html | Investigate GuardDuty findings with timelines and context |
| Official CLI Reference | AWS CLI GuardDuty commands https://docs.aws.amazon.com/cli/latest/reference/guardduty/ | Script and automate setup, findings retrieval, and testing |
| Architecture Guidance | AWS Architecture Center https://aws.amazon.com/architecture/ | Reference architectures and patterns for security monitoring (search GuardDuty/Security Hub) |
| Workshops/Labs (AWS) | AWS Workshops portal https://workshops.aws/ | Hands-on labs; search for GuardDuty/Security Hub content (availability varies) |
| Video (AWS) | AWS Security YouTube channel https://www.youtube.com/c/AWSSecurity | Practical talks and demos from AWS security specialists |
| Community (Reputable) | AWS re:Post https://repost.aws/ | Troubleshooting, patterns, and real-world Q&A (validate against docs) |
18. Training and Certification Providers
| Institute | Suitable Audience | Likely Learning Focus | Mode | Website URL |
|---|---|---|---|---|
| DevOpsSchool.com | DevOps engineers, SREs, platform and cloud teams | AWS security operations, automation, DevSecOps practices (verify course outline) | Check website | https://www.devopsschool.com/ |
| ScmGalaxy.com | Beginners to intermediate engineers | DevOps and cloud fundamentals that support AWS security implementations | Check website | https://www.scmgalaxy.com/ |
| CLoudOpsNow.in | Cloud operations teams | CloudOps practices, monitoring/ops foundations applicable to GuardDuty workflows | Check website | https://www.cloudopsnow.in/ |
| SreSchool.com | SREs and reliability teams | Incident response, operational readiness, alerting pipelines, automation | Check website | https://www.sreschool.com/ |
| AiOpsSchool.com | Ops and platform teams exploring AIOps | Automation patterns and operational analytics that can complement security operations | Check website | https://www.aiopsschool.com/ |
19. Top Trainers
| Platform/Site | Likely Specialization | Suitable Audience | Website URL |
|---|---|---|---|
| RajeshKumar.xyz | DevOps/Cloud coaching (verify current offerings) | Engineers seeking guided learning | https://www.rajeshkumar.xyz/ |
| devopstrainer.in | DevOps and cloud training (verify course catalog) | Beginners to intermediate DevOps practitioners | https://www.devopstrainer.in/ |
| devopsfreelancer.com | Freelance DevOps guidance (verify services) | Teams needing short-term mentoring or implementations | https://www.devopsfreelancer.com/ |
| devopssupport.in | DevOps support and training resources (verify scope) | Ops teams needing practical support | https://www.devopssupport.in/ |
20. Top Consulting Companies
| Company | Likely Service Area | Where They May Help | Consulting Use Case Examples | Website URL |
|---|---|---|---|---|
| cotocus.com | Cloud/DevOps consulting (verify offerings) | Security monitoring architecture, AWS best practices | GuardDuty multi-account rollout, EventBridge automation patterns, SIEM integration planning | https://www.cotocus.com/ |
| DevOpsSchool.com | DevOps and cloud consulting/training (verify offerings) | DevSecOps implementation, cloud operations enablement | Landing zone security baselines, GuardDuty + Security Hub enablement, runbook creation | https://www.devopsschool.com/ |
| DEVOPSCONSULTING.IN | DevOps consulting (verify offerings) | Platform automation and operations processes | Alerting/incident workflows, operational dashboards, automation hardening | https://www.devopsconsulting.in/ |
21. Career and Learning Roadmap
What to learn before Amazon GuardDuty
To use GuardDuty effectively, understand: – AWS IAM fundamentals: users, roles, policies, trust relationships, access keys – AWS Organizations basics: OUs, SCPs, delegated admin – Amazon VPC basics: subnets, route tables, security groups, NACLs – AWS CloudTrail basics: management events, data events (conceptually), organization trails – Incident response basics: triage, containment, eradication, recovery, post-incident review
What to learn after Amazon GuardDuty
- AWS Security Hub for centralized findings and standards
- Amazon Detective for investigation
- Amazon Inspector for vulnerability management
- Amazon Macie for S3 sensitive data discovery
- Automation and SOAR patterns:
- EventBridge → Lambda/Step Functions
- Ticketing integration (Jira/ServiceNow)
- Central logging and security analytics:
- S3 + Athena/Glue
- OpenSearch/Splunk/Sentinel ingestion pipelines
Job roles that use it
- Cloud Security Engineer
- SOC Analyst (cloud-focused)
- DevSecOps Engineer
- SRE / Platform Engineer (shared on-call response)
- Security Architect
Certification path (AWS)
GuardDuty is commonly covered as part of broader AWS security skills rather than a standalone certification.
– Consider AWS certifications such as:
– AWS Certified Security – Specialty (if currently available—verify on AWS Training and Certification)
– AWS Certified Solutions Architect (Associate/Professional) for architecture foundations
AWS cert landscape changes; verify current certifications here: https://aws.amazon.com/certification/
Project ideas for practice
- Build a multi-account GuardDuty rollout with Organizations and Infrastructure as Code (CloudFormation/Terraform).
- Implement EventBridge-driven playbooks:
- Notify-only → ticket → human approval → containment
- Create a findings archive in S3 with KMS encryption and lifecycle policies; query with Athena.
- Integrate GuardDuty findings into Security Hub and a SIEM; build dashboards for severity trends and MTTR.
22. Glossary
- Account: An AWS account boundary for billing, resources, and identity.
- Region: A geographic AWS area containing multiple Availability Zones; GuardDuty is enabled per region.
- Detector: The GuardDuty resource representing that GuardDuty is enabled in an account/region.
- Finding: A structured security alert produced by GuardDuty.
- Severity: A numeric/categorical indication of potential risk; use as triage input, not absolute truth.
- AWS Organizations: Service for managing multiple AWS accounts with consolidated billing and governance.
- Delegated administrator: An account assigned to manage a service (like GuardDuty) for the organization.
- Member account: An AWS account monitored/managed by the administrator in GuardDuty.
- Amazon EventBridge: Event bus service used to route GuardDuty findings to targets (SNS, Lambda, etc.).
- Amazon SNS: Messaging/notification service used for email/SMS/HTTP notifications.
- IAM (Identity and Access Management): AWS service controlling permissions and authentication/authorization.
- SCP (Service Control Policy): Organization-level policy that restricts what accounts can do, even if IAM allows.
- SIEM: Security Information and Event Management system for centralized log and alert correlation.
- Triage: Process of reviewing and prioritizing findings for investigation and response.
- Containment: Incident response step to limit attacker movement/impact (e.g., disable keys, isolate instance).
23. Summary
Amazon GuardDuty is an AWS-managed threat detection service in the Security, identity, and compliance category that continuously analyzes supported AWS telemetry and produces prioritized findings for suspicious activity.
It matters because it provides a practical detection baseline across AWS accounts and regions without you building and operating a full detection pipeline. It fits best as a signal source in a larger security operations design—typically integrated with EventBridge automation, Security Hub aggregation, and (optionally) Detective for investigations.
Cost is usage-based and region-dependent, driven by analysis volume and optional protection features. The most common security success pattern is to centralize management with AWS Organizations, control disabling via governance, and implement staged automation (notify first, then controlled remediation).
Next step: enable GuardDuty broadly (starting with production), then build a repeatable alerting + incident response workflow (EventBridge → ticket/ChatOps → runbooks) and validate it using sample findings before expanding automation.