At the moment, I’m comfortable to announce Amazon GuardDuty Prolonged Risk Detection with expanded protection for Amazon Elastic Kubernetes Service (Amazon EKS), constructing upon the capabilities we launched in our AWS re:Invent 2024 announcement of Amazon GuardDuty Prolonged Risk Detection: AI/ML assault sequence identification for enhanced cloud safety.
Safety groups managing Kubernetes workloads typically battle to detect refined multistage assaults that concentrate on containerized purposes. These assaults can contain container exploitation, privilege escalation, and unauthorized motion inside Amazon EKS clusters. Conventional monitoring approaches would possibly detect particular person suspicious occasions, however typically miss the broader assault sample that spans throughout these completely different knowledge sources and time intervals.
GuardDuty Prolonged Risk Detection introduces a brand new crucial severity discovering kind, which mechanically correlates safety alerts throughout Amazon EKS audit logs, runtime behaviors of processes related to EKS clusters, malware execution in EKS clusters, and AWS API exercise to establish refined assault patterns which may in any other case go unnoticed. For instance, GuardDuty can now detect assault sequences during which a risk actor exploits a container utility, obtains privileged service account tokens, after which makes use of these elevated privileges to entry delicate Kubernetes secrets and techniques or AWS assets.
This new functionality makes use of GuardDuty correlation algorithms to look at and establish sequences of actions that point out potential compromise. It evaluates findings throughout safety plans and different sign sources to establish widespread and rising assault patterns. For every assault sequence detected, GuardDuty supplies complete particulars, together with doubtlessly impacted assets, timeline of occasions, actors concerned, and indicators used to detect the sequence. The findings additionally map noticed actions to MITRE ATT&CK® ways and methods and remediation suggestions primarily based on AWS greatest practices, serving to safety groups perceive the character of the risk.
To allow Prolonged Risk Detection for EKS, you want at the least certainly one of these options enabled: EKS Safety or Runtime Monitoring. For max detection protection, we advocate enabling each to boost detection capabilities. EKS Safety displays management airplane actions via audit logs, and Runtime Monitoring observes behaviors inside containers. Collectively, they create an entire view of your EKS clusters, enabling GuardDuty to detect complicated assault patterns.
The way it works
To make use of the brand new Amazon GuardDuty Prolonged Risk Detection for EKS clusters, go to the GuardDuty console to allow EKS Safety in your account. From the Area selector within the upper-right nook, choose the Area the place you wish to allow EKS Safety. Within the navigation pane, select EKS Safety. On the EKS Safety web page, evaluation the present standing and select Allow. Choose Verify to save lots of your choice.
After it’s enabled, GuardDuty instantly begins monitoring EKS audit logs out of your EKS clusters with out requiring any further configuration. GuardDuty consumes these audit logs straight from the EKS management airplane via an unbiased stream, which doesn’t have an effect on any present logging configurations. For multi-account environments, solely the delegated GuardDuty administrator account can allow or disable EKS Safety for member accounts and configure auto-enable settings for brand spanking new accounts becoming a member of the group.
To allow Runtime Monitoring, select Runtime Monitoring within the navigation pane. Below the Configuration tab, select Allow to allow Runtime Monitoring in your account.
Now, you may view from the Abstract dashboard the assault sequences and demanding findings particularly associated to Kubernetes cluster compromise. You possibly can observe that GuardDuty identifies complicated assault patterns in Kubernetes environments, similar to credential compromise occasions and suspicious actions inside EKS clusters. The visible illustration of findings by severity, useful resource influence, and assault varieties offers you a holistic view of your Amazon EKS safety posture. This implies you may prioritize probably the most crucial threats to your containerized workloads.
The Discovering particulars web page supplies visibility into complicated assault sequences concentrating on EKS clusters, serving to you perceive the complete scope of potential compromises. GuardDuty correlates alerts right into a timeline, mapping noticed behaviors to MITRE ATT&CK® ways and methods similar to account manipulation, useful resource hijacking, and privilege escalation. This granular stage of perception reveals precisely how attackers progress via your Amazon EKS setting. It identifies affected assets like EKS workloads and repair accounts. The detailed breakdown of indicators, actors, and endpoints supplies you with actionable context to grasp assault patterns, decide influence, and prioritize remediation efforts. By consolidating these safety insights right into a cohesive view, you may shortly assess the severity of Amazon EKS safety incidents, scale back investigation time, and implement focused countermeasures to guard your containerized purposes.
The Assets part of the Discovering particulars web page exhibits context in regards to the particular belongings affected throughout an assault sequence. This unified useful resource listing supplies you with visibility into the precise scope of the compromise—from the preliminary entry to the focused Kubernetes parts. As a result of GuardDuty consists of detailed attributes similar to useful resource varieties, identifiers, creation dates, and namespace info, you may quickly assess which parts of your containerized infrastructure require fast consideration. This centered strategy eliminates guesswork throughout incident response, so you may prioritize remediation efforts on probably the most crucial affected assets and decrease the potential blast radius of Amazon EKS focused assaults.
Now out there
Amazon GuardDuty Prolonged Risk Detection with expanded protection for Amazon EKS clusters supplies complete safety monitoring throughout your Kubernetes setting. You should use this functionality to detect refined multistage assaults by correlating occasions throughout completely different knowledge sources, figuring out assault sequences that conventional monitoring would possibly miss.
To start out utilizing this expanded protection, allow EKS Safety in your GuardDuty settings and think about including Runtime Monitoring for enhanced detection capabilities.
For extra details about this new functionality, consult with the Amazon GuardDuty Documentation.