[ad_1]
Today, I’m joyful to announce Amazon GuardDuty Extended Threat Detection with expanded protection for Amazon Elastic Kubernetes Service (Amazon EKS), constructing upon the capabilities we launched in our AWS re:Invent 2024 announcement of Amazon GuardDuty Extended Threat Detection: AI/ML assault sequence identification for enhanced cloud safety.
Security groups managing Kubernetes workloads usually battle to detect refined multistage assaults that focus on containerized functions. These assaults can contain container exploitation, privilege escalation, and unauthorized motion inside Amazon EKS clusters. Traditional monitoring approaches would possibly detect particular person suspicious occasions, however usually miss the broader assault sample that spans throughout these totally different information sources and time intervals.
GuardDuty Extended Threat Detection introduces a brand new vital severity discovering kind, which mechanically correlates safety indicators throughout Amazon EKS audit logs, runtime behaviors of processes related to EKS clusters, malware execution in EKS clusters, and AWS API exercise to establish refined assault patterns that may in any other case go unnoticed. For instance, GuardDuty can now detect assault sequences through which a menace actor exploits a container utility, obtains privileged service account tokens, after which makes use of these elevated privileges to entry delicate Kubernetes secrets and techniques or AWS sources.
This new functionality makes use of GuardDuty correlation algorithms to watch and establish sequences of actions that point out potential compromise. It evaluates findings throughout protection plans and different sign sources to establish frequent and rising assault patterns. For every assault sequence detected, GuardDuty gives complete particulars, together with probably impacted sources, timeline of occasions, actors concerned, and indicators used to detect the sequence. The findings additionally map noticed actions to MITRE ATT&CK® ways and methods and remediation suggestions based mostly on AWS finest practices, serving to safety groups perceive the character of the menace.
To allow Extended Threat Detection for EKS, you want at the least one in every of these options enabled: EKS Protection or Runtime Monitoring. For most detection protection, we advocate enabling each to reinforce detection capabilities. EKS Protection displays management aircraft actions by means of audit logs, and Runtime Monitoring observes behaviors inside containers. Together, they create a whole view of your EKS clusters, enabling GuardDuty to detect complicated assault patterns.
How it really works
To use the brand new Amazon GuardDuty Extended Threat Detection for EKS clusters, go to the GuardDuty console to allow EKS Protection in your account. From the Region selector within the upper-right nook, choose the Region the place you need to allow EKS Protection. In the navigation pane, select EKS Protection. On the EKS Protection web page, evaluate the present standing and select Enable. Select Confirm to avoid wasting your choice.
After it’s enabled, GuardDuty instantly begins monitoring EKS audit logs out of your EKS clusters with out requiring any extra configuration. GuardDuty consumes these audit logs straight from the EKS management aircraft by means of an unbiased stream, which doesn’t have an effect on any current logging configurations. For multi-account environments, solely the delegated GuardDuty administrator account can allow or disable EKS Protection for member accounts and configure auto-enable settings for brand spanking new accounts becoming a member of the group.
To allow Runtime Monitoring, select Runtime Monitoring within the navigation pane. Under the Configuration tab, select Enable to allow Runtime Monitoring on your account.
Now, you may view from the Summary dashboard the assault sequences and important findings particularly associated to Kubernetes cluster compromise. You can observe that GuardDuty identifies complicated assault patterns in Kubernetes environments, reminiscent of credential compromise occasions and suspicious actions inside EKS clusters. The visible illustration of findings by severity, useful resource impression, and assault sorts provides you a holistic view of your Amazon EKS safety posture. This means you may prioritize essentially the most vital threats to your containerized workloads.
The Finding particulars web page gives visibility into complicated assault sequences focusing on EKS clusters, serving to you perceive the total scope of potential compromises. GuardDuty correlates indicators right into a timeline, mapping noticed behaviors to MITRE ATT&CK® ways and methods reminiscent of account manipulation, useful resource hijacking, and privilege escalation. This granular stage of perception reveals precisely how attackers progress by means of your Amazon EKS atmosphere. It identifies affected sources like EKS workloads and repair accounts. The detailed breakdown of indicators, actors, and endpoints gives you with actionable context to grasp assault patterns, decide impression, and prioritize remediation efforts. By consolidating these safety insights right into a cohesive view, you may shortly assess the severity of Amazon EKS safety incidents, scale back investigation time, and implement focused countermeasures to guard your containerized functions.
The Resources part of the Finding particulars web page reveals context in regards to the particular belongings affected throughout an assault sequence. This unified useful resource listing gives you with visibility into the precise scope of the compromise—from the preliminary entry to the focused Kubernetes elements. Because GuardDuty consists of detailed attributes reminiscent of useful resource sorts, identifiers, creation dates, and namespace data, you may quickly assess which elements of your containerized infrastructure require quick consideration. This centered method eliminates guesswork throughout incident response, so you may prioritize remediation efforts on essentially the most vital affected sources and reduce the potential blast radius of Amazon EKS focused assaults.
Now accessible
Amazon GuardDuty Extended Threat Detection with expanded protection for Amazon EKS clusters gives complete safety monitoring throughout your Kubernetes atmosphere. You can use this functionality to detect refined multistage assaults by correlating occasions throughout totally different information sources, figuring out assault sequences that conventional monitoring would possibly miss.
To begin utilizing this expanded protection, allow EKS Protection in your GuardDuty settings and think about including Runtime Monitoring for enhanced detection capabilities.
For extra details about this new functionality, consult with the Amazon GuardDuty Documentation.






