<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Thomas Haggath</title>
    <description>The latest articles on DEV Community by Thomas Haggath (@haggath).</description>
    <link>https://dev.to/haggath</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3922027%2Fe19ab041-060e-4d52-900a-710e9f2ec652.png</url>
      <title>DEV Community: Thomas Haggath</title>
      <link>https://dev.to/haggath</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/haggath"/>
    <language>en</language>
    <item>
      <title>Leveraging Amazon GuardDuty suppression rules to eliminate noise</title>
      <dc:creator>Thomas Haggath</dc:creator>
      <pubDate>Sun, 10 May 2026 05:52:48 +0000</pubDate>
      <link>https://dev.to/haggath/leveraging-amazon-guardduty-suppression-rules-to-eliminate-noise-590o</link>
      <guid>https://dev.to/haggath/leveraging-amazon-guardduty-suppression-rules-to-eliminate-noise-590o</guid>
      <description>&lt;h1&gt;
  
  
  What is GuardDuty?
&lt;/h1&gt;

&lt;p&gt;Amazon GuardDuty is a continuous threat detection service that monitors, analyses, and processes data sources and logs across your AWS environment. It uses threat intelligence feeds (such as lists of malicious IP addresses, domains, and file hashes) combined with machine learning models to identify suspicious and potentially malicious activity without requiring you to deploy or manage any additional security software.&lt;/p&gt;

&lt;p&gt;When enabled, GuardDuty automatically begins ingesting foundational data sources including AWS CloudTrail management events, VPC Flow Logs, and DNS query logs. Beyond these defaults, GuardDuty offers dedicated protection plans that extend coverage to additional services:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;EKS Protection&lt;/strong&gt;: audits Kubernetes API server logs for your EKS clusters&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;RDS Protection&lt;/strong&gt;: monitors login activity for Amazon Aurora databases&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;S3 Protection&lt;/strong&gt;: analyses CloudTrail data events for S3 object-level activity&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Malware Protection&lt;/strong&gt;: scans EBS volumes or S3 objects for malicious files&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Lambda Protection&lt;/strong&gt;: inspects network activity from Lambda function invocations&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Runtime Monitoring&lt;/strong&gt;: captures OS-level, network, and file events from EC2, ECS, and EKS workloads&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;When a potential threat is identified, GuardDuty generates a &lt;em&gt;finding&lt;/em&gt;: a detailed security alert containing information about the affected resource, the threat actor, and the severity of the activity.&lt;/p&gt;

&lt;h1&gt;
  
  
  Example GuardDuty Finding Types
&lt;/h1&gt;

&lt;p&gt;Finding types follow the format &lt;code&gt;ThreatPurpose:ResourceType/ThreatFamilyName&lt;/code&gt;. The resource type in the name tells you which AWS service was targeted. Below are representative examples across the main categories.&lt;/p&gt;

&lt;h2&gt;
  
  
  EC2
&lt;/h2&gt;

&lt;p&gt;EC2 findings typically relate to network-level threats observed via VPC Flow Logs and DNS logs.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;code&gt;CryptoCurrency:EC2/BitcoinTool.B!DNS&lt;/code&gt;: an EC2 instance is querying a domain associated with cryptocurrency mining pools&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;Trojan:EC2/BlackholeTraffic&lt;/code&gt;: an instance is communicating with an IP address known to be a black-hole used by malware command-and-control infrastructure&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;UnauthorizedAccess:EC2/TorIPCaller&lt;/code&gt;: an EC2 instance is being accessed from a Tor exit node&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  IAM
&lt;/h2&gt;

&lt;p&gt;IAM findings use GuardDuty's anomaly detection model to flag unusual API call patterns across CloudTrail management events.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;code&gt;UnauthorizedAccess:IAMUser/ConsoleLoginSuccess.B&lt;/code&gt;: a successful console login from an unusual geographic location&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;CredentialAccess:IAMUser/AnomalousBehavior&lt;/code&gt;: an IAM principal is making API calls in a pattern inconsistent with its historical baseline&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;Persistence:IAMUser/UserPermissions&lt;/code&gt;: an IAM entity is modifying policies or creating new users in a manner consistent with persistence techniques&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  S3
&lt;/h2&gt;

&lt;p&gt;S3 findings surface data-access threats against your buckets.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;code&gt;Policy:S3/BucketPublicAccessGranted&lt;/code&gt;: an IAM principal has disabled block-public-access settings on a bucket&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;Exfiltration:S3/MaliciousIPCaller&lt;/code&gt;: S3 API calls are being made from a known malicious IP address&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;Discovery:S3/MaliciousIPCaller.Custom&lt;/code&gt;: a source IP on your custom threat list is enumerating S3 buckets&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  EKS
&lt;/h2&gt;

&lt;p&gt;EKS Protection findings come from Kubernetes audit log analysis.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;code&gt;CredentialAccess:Kubernetes/MaliciousIPCaller&lt;/code&gt;: a Kubernetes API call to retrieve secrets was made from a known malicious IP&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;Execution:Kubernetes/ExecInKubernetes&lt;/code&gt;: a command was executed inside a running container via &lt;code&gt;kubectl exec&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;PrivilegeEscalation:Kubernetes/PrivilegedContainer&lt;/code&gt;: a privileged container was launched, which could allow a breakout to the underlying host&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  RDS
&lt;/h2&gt;

&lt;p&gt;RDS Protection findings are generated from login activity to Amazon Aurora clusters.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;code&gt;CredentialAccess:RDS/AnomalousBehavior.SuccessfulLogin&lt;/code&gt;: a successful database login from an unusual user or location&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;CredentialAccess:RDS/MaliciousIPCaller.FailedLogin&lt;/code&gt;: failed login attempts originating from a known malicious IP address&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Attack Sequences (Extended Threat Detection)
&lt;/h2&gt;

&lt;p&gt;GuardDuty's Extended Threat Detection correlates findings across multiple services and time windows to surface multi-stage attacks as a single high-severity finding.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;code&gt;AttackSequence:IAM/CompromisedCredentials&lt;/code&gt;: a sequence of IAM events indicating credential compromise and subsequent lateral movement&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;AttackSequence:S3/CompromisedData&lt;/code&gt;: a chain of events suggesting S3 data was discovered and then exfiltrated&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;AttackSequence:EKS/CompromisedCluster&lt;/code&gt;: correlated signals pointing to a compromised Kubernetes cluster&lt;/li&gt;
&lt;/ul&gt;

&lt;h1&gt;
  
  
  What are Suppression Rules?
&lt;/h1&gt;

&lt;p&gt;A suppression rule is a filter you define in GuardDuty that automatically &lt;strong&gt;archives&lt;/strong&gt; any new finding that matches its criteria. Suppressed findings are never deleted. GuardDuty still generates them and stores them for 90 days, but they are immediately moved to the archived state and do not appear in your active findings queue.&lt;/p&gt;

&lt;h2&gt;
  
  
  How they work
&lt;/h2&gt;

&lt;p&gt;You define a suppression rule using one or more filter attributes (finding type, severity, resource tags, EC2 instance ID, S3 bucket name, etc.) combined with match operators:&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Operator&lt;/th&gt;
&lt;th&gt;Behaviour&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;code&gt;Equals&lt;/code&gt; / &lt;code&gt;NotEquals&lt;/code&gt;
&lt;/td&gt;
&lt;td&gt;Exact match or exclusion&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;code&gt;Matches&lt;/code&gt; / &lt;code&gt;NotMatches&lt;/code&gt;
&lt;/td&gt;
&lt;td&gt;Wildcard pattern match&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;code&gt;GreaterThan&lt;/code&gt; / &lt;code&gt;LessThan&lt;/code&gt;
&lt;/td&gt;
&lt;td&gt;Numeric comparison (e.g. severity score)&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;Rules can be as broad as suppressing an entire finding type (e.g. all &lt;code&gt;CryptoCurrency:EC2/*&lt;/code&gt; findings) or as granular as suppressing a specific finding type only when it fires against a resource tagged &lt;code&gt;Environment: dev&lt;/code&gt;.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why use them?
&lt;/h2&gt;

&lt;p&gt;In a mature AWS environment, certain findings will reliably represent known-good activity: a penetration testing EC2 instance that legitimately communicates over unusual ports, a NAT gateway that generates high-volume DNS findings, or a deployment pipeline that makes bulk S3 API calls. Without suppression rules, these recurring false positives dilute your signal-to-noise ratio and increase alert fatigue.&lt;/p&gt;

&lt;p&gt;Suppressed findings are also &lt;strong&gt;excluded from downstream integrations&lt;/strong&gt; and are not forwarded to AWS Security Hub, Amazon EventBridge, Amazon Detective, or Amazon S3 exports. This means your SIEM, ticketing system, or on-call paging tool stays quiet for findings you have already triaged and accepted.&lt;/p&gt;

&lt;h2&gt;
  
  
  Important caveat
&lt;/h2&gt;

&lt;p&gt;GuardDuty's Extended Threat Detection relies on individual findings as signals when building attack sequences. Broadly suppressing finding types can prevent attack sequence findings from being generated, because the archived signals are excluded from correlation. Suppress at the most specific level you can; prefer resource-scoped rules over type-wide ones.&lt;/p&gt;

&lt;h1&gt;
  
  
  GuardDuty IP Sets
&lt;/h1&gt;

&lt;p&gt;GuardDuty lets you upload custom lists of IP addresses (and domains) to fine-tune its detection behaviour. These lists come in two flavours: &lt;strong&gt;Trusted IP lists&lt;/strong&gt; and &lt;strong&gt;Threat Intel lists&lt;/strong&gt; (also called threat lists), described below.&lt;/p&gt;

&lt;p&gt;Both are stored as plain-text files in S3 (one entry per line, supporting CIDR notation for IP ranges) and activated per GuardDuty detector. GuardDuty now recommends using &lt;strong&gt;entity lists&lt;/strong&gt;, which can contain IP addresses, domain names, or both in the same list, over the legacy IP-only format.&lt;/p&gt;

&lt;h2&gt;
  
  
  Trusted IP Lists
&lt;/h2&gt;

&lt;p&gt;A trusted IP list contains IP addresses or CIDR ranges that you consider safe sources of traffic, such as your corporate VPN egress IPs, an office network, or a known third-party security scanner you have authorised. GuardDuty &lt;strong&gt;does not generate findings&lt;/strong&gt; for activity originating from entries on a trusted IP list.&lt;/p&gt;

&lt;p&gt;Trusted lists are useful when you have infrastructure that legitimately behaves in ways that would otherwise trigger findings, and you want to suppress an entire source rather than write individual suppression rules per finding type.&lt;/p&gt;

&lt;h2&gt;
  
  
  Threat Intel Lists
&lt;/h2&gt;

&lt;p&gt;A threat intel list contains IP addresses or domains you have identified as known malicious sources, such as IP ranges from your own incident response investigations or feeds from a commercial threat intelligence provider. When GuardDuty observes activity involving an entry on a threat list, it &lt;strong&gt;generates a finding&lt;/strong&gt; even if that IP would not otherwise have triggered one.&lt;/p&gt;

&lt;p&gt;Threat lists let you operationalise your own threat intelligence and ensure GuardDuty alerts on adversary infrastructure that AWS's built-in feeds may not yet include.&lt;/p&gt;

&lt;h3&gt;
  
  
  Limits
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Up to &lt;strong&gt;6 trusted IP lists&lt;/strong&gt; and &lt;strong&gt;6 threat intel lists&lt;/strong&gt; per GuardDuty detector per region&lt;/li&gt;
&lt;li&gt;Maximum &lt;strong&gt;200,000 entries&lt;/strong&gt; per list (IP addresses or CIDRs)&lt;/li&gt;
&lt;li&gt;Lists must be stored in S3 and the GuardDuty service role must have &lt;code&gt;s3:GetObject&lt;/code&gt; permission on the bucket&lt;/li&gt;
&lt;/ul&gt;

&lt;h1&gt;
  
  
  The Difference Between Trusted Lists and Suppression Rules
&lt;/h1&gt;

&lt;p&gt;Both trusted lists and suppression rules can silence GuardDuty findings for known-good activity, but they operate at different layers and have meaningfully different behaviours.&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;&lt;/th&gt;
&lt;th&gt;Trusted IP / Entity Lists&lt;/th&gt;
&lt;th&gt;Suppression Rules&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Scope&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Source IP address or domain&lt;/td&gt;
&lt;td&gt;Any finding attribute (type, severity, resource, tags, account, etc.)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Mechanism&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Prevents the finding from being &lt;strong&gt;generated&lt;/strong&gt;
&lt;/td&gt;
&lt;td&gt;Generates the finding, then immediately &lt;strong&gt;archives&lt;/strong&gt; it&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Finding stored?&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No (the finding is never created)&lt;/td&gt;
&lt;td&gt;Yes - archived for 90 days, fully queryable&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Attack sequence impact&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No signal created, so no correlation possible&lt;/td&gt;
&lt;td&gt;Archived signals are excluded from correlation&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Downstream forwarding&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;N/A (nothing to forward)&lt;/td&gt;
&lt;td&gt;Suppressed findings are not sent to Security Hub, EventBridge, or S3 exports&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Granularity&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;IP/domain only&lt;/td&gt;
&lt;td&gt;Fine-grained: combine multiple attributes with AND logic&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Best used for&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Trusted infrastructure sources you always want to ignore&lt;/td&gt;
&lt;td&gt;Known false positives scoped by resource, tag, region, or finding subtype&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;h3&gt;
  
  
  When to use each
&lt;/h3&gt;

&lt;p&gt;Use a &lt;strong&gt;trusted IP list&lt;/strong&gt; when the noise originates from a specific, stable set of IP addresses you fully control or trust: your VPN, a penetration testing host, or an authorised scanner. It is the bluntest instrument but requires no maintenance as new finding types emerge.&lt;/p&gt;

&lt;p&gt;Use a &lt;strong&gt;suppression rule&lt;/strong&gt; when you need more precision — for example, suppressing &lt;code&gt;CryptoCurrency:EC2/BitcoinTool.B&lt;/code&gt; only for instances tagged &lt;code&gt;Purpose: mining-research&lt;/code&gt;, while keeping the finding active for all other EC2 instances. Suppression rules also give you the audit trail of archived findings, which trusted lists do not.&lt;/p&gt;

&lt;p&gt;In practice, most teams use both: trusted lists for known-good source infrastructure, and suppression rules for finding-type-specific or resource-scoped noise reduction.&lt;/p&gt;

&lt;h1&gt;
  
  
  Example Finding: IAM Credential Use Outside AWS
&lt;/h1&gt;

&lt;p&gt;The finding type &lt;code&gt;UnauthorizedAccess:IAMUser/InstanceCredentialExfiltration.OutsideAWS&lt;/code&gt; fires when instance profile credentials (issued via the EC2 metadata service) are used from an IP address that does not belong to AWS infrastructure. This is a high-fidelity indicator of credential theft, since legitimate use of instance credentials should never originate outside of AWS.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight json"&gt;&lt;code&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="nl"&gt;"schemaVersion"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"2.0"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="nl"&gt;"accountId"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"123456789012"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="nl"&gt;"region"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"eu-west-1"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="nl"&gt;"partition"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"aws"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="nl"&gt;"id"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"a1b2c3d4e5f6a1b2c3d4e5f6a1b2c3d4"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="nl"&gt;"arn"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"arn:aws:guardduty:eu-west-1:123456789012:detector/abc123def456/finding/a1b2c3d4e5f6a1b2c3d4e5f6a1b2c3d4"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="nl"&gt;"type"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"UnauthorizedAccess:IAMUser/InstanceCredentialExfiltration.OutsideAWS"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="nl"&gt;"title"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"Instance credential used from external IP address not associated with AWS"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="nl"&gt;"description"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"Credentials created exclusively for EC2 instance i-0abc123def456789a (via role WebAppInstanceRole) were used from external IP address 185.220.101.47, which is not associated with AWS infrastructure."&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="nl"&gt;"severity"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="mf"&gt;8.0&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="nl"&gt;"createdAt"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"2026-05-10T09:14:32Z"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="nl"&gt;"updatedAt"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"2026-05-10T09:14:32Z"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="nl"&gt;"service"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt;
    &lt;/span&gt;&lt;span class="nl"&gt;"serviceName"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"guardduty"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
    &lt;/span&gt;&lt;span class="nl"&gt;"detectorId"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"abc123def456"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
    &lt;/span&gt;&lt;span class="nl"&gt;"action"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt;
      &lt;/span&gt;&lt;span class="nl"&gt;"actionType"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"AWS_API_CALL"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
      &lt;/span&gt;&lt;span class="nl"&gt;"awsApiCallAction"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt;
        &lt;/span&gt;&lt;span class="nl"&gt;"api"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"GetSecretValue"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
        &lt;/span&gt;&lt;span class="nl"&gt;"serviceName"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"secretsmanager.amazonaws.com"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
        &lt;/span&gt;&lt;span class="nl"&gt;"callerType"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"Remote IP"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
        &lt;/span&gt;&lt;span class="nl"&gt;"remoteIpDetails"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt;
          &lt;/span&gt;&lt;span class="nl"&gt;"ipAddressV4"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"185.220.101.47"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
          &lt;/span&gt;&lt;span class="nl"&gt;"organization"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt;
            &lt;/span&gt;&lt;span class="nl"&gt;"asn"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"4244"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
            &lt;/span&gt;&lt;span class="nl"&gt;"asnOrg"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"Tor Project Exit Node"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
            &lt;/span&gt;&lt;span class="nl"&gt;"isp"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"Quintex Alliance Consulting"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
            &lt;/span&gt;&lt;span class="nl"&gt;"org"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"Quintex Alliance Consulting"&lt;/span&gt;&lt;span class="w"&gt;
          &lt;/span&gt;&lt;span class="p"&gt;},&lt;/span&gt;&lt;span class="w"&gt;
          &lt;/span&gt;&lt;span class="nl"&gt;"country"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nl"&gt;"countryName"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"United States"&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;},&lt;/span&gt;&lt;span class="w"&gt;
          &lt;/span&gt;&lt;span class="nl"&gt;"city"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nl"&gt;"cityName"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"Atlanta"&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;},&lt;/span&gt;&lt;span class="w"&gt;
          &lt;/span&gt;&lt;span class="nl"&gt;"geoLocation"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nl"&gt;"lat"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="mf"&gt;33.749&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nl"&gt;"lon"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="mf"&gt;-84.388&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;&lt;span class="w"&gt;
        &lt;/span&gt;&lt;span class="p"&gt;},&lt;/span&gt;&lt;span class="w"&gt;
        &lt;/span&gt;&lt;span class="nl"&gt;"affectedResources"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;{}&lt;/span&gt;&lt;span class="w"&gt;
      &lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;&lt;span class="w"&gt;
    &lt;/span&gt;&lt;span class="p"&gt;},&lt;/span&gt;&lt;span class="w"&gt;
    &lt;/span&gt;&lt;span class="nl"&gt;"evidence"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt;
      &lt;/span&gt;&lt;span class="nl"&gt;"threatIntelligenceDetails"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="w"&gt;
        &lt;/span&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt;
          &lt;/span&gt;&lt;span class="nl"&gt;"threatListName"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"ProofPoint ET Intelligence"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
          &lt;/span&gt;&lt;span class="nl"&gt;"threatNames"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="s2"&gt;"TorExitNode"&lt;/span&gt;&lt;span class="p"&gt;]&lt;/span&gt;&lt;span class="w"&gt;
        &lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;&lt;span class="w"&gt;
      &lt;/span&gt;&lt;span class="p"&gt;]&lt;/span&gt;&lt;span class="w"&gt;
    &lt;/span&gt;&lt;span class="p"&gt;},&lt;/span&gt;&lt;span class="w"&gt;
    &lt;/span&gt;&lt;span class="nl"&gt;"archived"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="kc"&gt;false&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
    &lt;/span&gt;&lt;span class="nl"&gt;"count"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="mi"&gt;1&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="p"&gt;},&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="nl"&gt;"resource"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt;
    &lt;/span&gt;&lt;span class="nl"&gt;"resourceType"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"AccessKey"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
    &lt;/span&gt;&lt;span class="nl"&gt;"accessKeyDetails"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt;
      &lt;/span&gt;&lt;span class="nl"&gt;"accessKeyId"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"ASIAQRSTUVWXYZ123456"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
      &lt;/span&gt;&lt;span class="nl"&gt;"principalId"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"AROABC123DEF456GHI789:i-0abc123def456789a"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
      &lt;/span&gt;&lt;span class="nl"&gt;"userType"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"AssumedRole"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
      &lt;/span&gt;&lt;span class="nl"&gt;"userName"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"WebAppInstanceRole"&lt;/span&gt;&lt;span class="w"&gt;
    &lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Key fields to note:&lt;/p&gt;

&lt;p&gt;type: the finding identifier, useful as the primary filter attribute in a suppression rule&lt;br&gt;
severity: scored 8.0 (High) on GuardDuty's 1-10 scale; credentials used outside AWS are rarely false positives&lt;br&gt;
service.action.awsApiCallAction.api: the specific API call made with the stolen credentials (GetSecretValue here indicates the attacker was targeting secrets)&lt;br&gt;
service.action.awsApiCallAction.remoteIpDetails: the external IP and enriched geo/ASN data GuardDuty adds automatically&lt;br&gt;
service.evidence.threatIntelligenceDetails: shows the credential was used from a known Tor exit node, corroborating the alert&lt;br&gt;
resource.accessKeyDetails.principalId: the AROA... prefix confirms this is an assumed-role session tied to an EC2 instance, not a long-term IAM user key&lt;br&gt;
Summary&lt;br&gt;
In this post we covered the core building blocks of GuardDuty and how to use them to manage signal quality in a real AWS environment.&lt;/p&gt;

&lt;p&gt;We started with an overview of what GuardDuty is: a managed threat detection service that ingests foundational data sources (CloudTrail, VPC Flow Logs, DNS logs) and optional protection plans covering EKS, RDS, S3, Lambda, and runtime workloads, generating findings when suspicious activity is detected.&lt;/p&gt;

&lt;p&gt;We then looked at the main finding type categories. Each finding follows the ThreatPurpose:ResourceType/ThreatFamilyName format and targets a specific AWS resource type, whether that is an EC2 instance, an IAM principal, an S3 bucket, a Kubernetes cluster, an RDS database, or a correlated attack sequence spanning multiple services.&lt;/p&gt;

&lt;p&gt;From there we explored suppression rules: filters that automatically archive matching findings without deleting them. They keep your active queue clean while preserving a 90-day audit trail, but broad rules can interfere with Extended Threat Detection's ability to correlate attack sequences, so specificity matters.&lt;/p&gt;

&lt;p&gt;We covered GuardDuty's IP sets and entity lists, explaining the distinction between trusted lists (which prevent findings from being generated for known-good sources) and threat intel lists (which force findings for known-bad sources you supply yourself).&lt;/p&gt;

&lt;p&gt;We then compared trusted lists against suppression rules directly, highlighting that the key difference is not just scope but mechanism: trusted lists suppress at the source level before a finding exists, while suppression rules operate after generation, giving you the archived record.&lt;/p&gt;

&lt;p&gt;Finally, we walked through a realistic example finding for UnauthorizedAccess:IAMUser/InstanceCredentialExfiltration.OutsideAWS to show what GuardDuty's JSON output looks like in practice and which fields matter most when triaging or writing suppression logic.&lt;/p&gt;

&lt;h1&gt;
  
  
  Further Reading
&lt;/h1&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://docs.aws.amazon.com/guardduty/latest/ug/what-is-guardduty.html" rel="noopener noreferrer"&gt;What is Amazon GuardDuty?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://docs.aws.amazon.com/guardduty/latest/ug/guardduty_finding-types-ec2.html" rel="noopener noreferrer"&gt;GuardDuty EC2 finding types&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://docs.aws.amazon.com/guardduty/latest/ug/guardduty_finding-types-iam.html" rel="noopener noreferrer"&gt;GuardDuty IAM finding types&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://docs.aws.amazon.com/guardduty/latest/ug/guardduty_finding-types-s3.html" rel="noopener noreferrer"&gt;GuardDuty S3 finding types&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://docs.aws.amazon.com/guardduty/latest/ug/guardduty-finding-types-eks-audit-logs.html" rel="noopener noreferrer"&gt;GuardDuty EKS finding types&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://docs.aws.amazon.com/guardduty/latest/ug/guardduty-finding-types-rds.html" rel="noopener noreferrer"&gt;GuardDuty RDS finding types&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://docs.aws.amazon.com/guardduty/latest/ug/findings_suppression-rule.html" rel="noopener noreferrer"&gt;Suppression rules in GuardDuty&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://docs.aws.amazon.com/guardduty/latest/ug/guardduty_upload-lists.html" rel="noopener noreferrer"&gt;Customizing threat detection with entity lists and IP address lists&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>aws</category>
      <category>security</category>
      <category>cloud</category>
      <category>devops</category>
    </item>
  </channel>
</rss>
