A hard look at AWS GuardDuty shortcomings
AWS GuardDuty has limitations in coverage, cost, and efficacy, leading to missed threats and high noise levels. Canary Infrastructure is suggested as a complementary, cost-effective solution for enhanced threat detection.
Read original articleThe article discusses the shortcomings of AWS GuardDuty in threat detection and the potential benefits of using Canary Infrastructure as a complementary control. GuardDuty, while a cornerstone in AWS security, has limitations in coverage, cost, and efficacy. The coverage is limited to fewer services compared to AWS's extensive offerings, leading to optional add-ons with additional costs and patchy regional coverage. The cost of GuardDuty can escalate unexpectedly due to factors like data volume and new SKUs. In terms of efficacy, GuardDuty can miss contextual information, generate high noise levels, and struggle with certain types of attacks. The article presents experiments showing GuardDuty's latency in detecting threats, highlighting its limitations in scenarios like S3 ransomware attacks. Canary Infrastructure is proposed as a solution to enhance threat detection beyond GuardDuty's capabilities, offering flexibility, cost-effectiveness, and faster alerting. The article emphasizes the importance of considering additional security measures like Canary Infrastructure to bolster overall threat detection capabilities in AWS environments.
Related
WikiLeaks – Amazon Atlas (2018)
WikiLeaks leaked Amazon's 2018 document detailing global data centers, including CIA ties and AWS Secret Region. Amazon leads cloud market, vies for $10B Pentagon contract. WikiLeaks turns data leak into awareness game.
The Growing Threat of Malware Concealed Behind Cloud Services
Cybersecurity threats evolve with malware operators using cloud services like UNSTABLE and Condi botnets. FortiGuard Labs advises enhancing cloud security defenses to combat growing cybercriminal activities effectively.
Bad habits that stop engineering teams from high-performance
Engineering teams face hindering bad habits affecting performance. Importance of observability in software development stressed, including Elastic's OpenTelemetry role. CI/CD practices, cloud-native tech updates, data management solutions, mobile testing advancements, API tools, DevSecOps, and team culture discussed.
Well, it's just an AWS Account ID
AWS Account IDs are crucial for cloud security, aiding in resource sharing and reconnaissance. They facilitate IAM entity enumeration, service discovery, and security testing, highlighting AWS footprint insights for potential attacks. An upcoming course on securing AWS environments is recommended.
Dear AWS, please let me be a cloud engineer again
The author, an AWS Serverless Hero and principal engineer, criticizes AWS's heavy emphasis on Generative AI over core infrastructure services. They advocate for a balanced approach that values traditional offerings and diverse user needs, urging AWS to prioritize developers' support.
It just needs to plausibly allow you to state to your auditor that "all hosts have anti-malware protection". Auditors almost always look at this closely. It's like TLS settings (who ever got hacked coz they were on TLS 1.1 and not 1.2???) - one of the brown M&Ms clauses of audits.
The alternatives are generally worse for reasons such as a) they interfere with your kernel b) have a console you have to deploy somewhere and requires babysitting c) they introduce their own attack surface on hosts d) they are not particularly effective in any case, etc etc (I have a long litany of complaints about this class of security product which probably doesn't need to be repeated here).
The control plane monitoring is "just OK" (as usual for an AWS add-on service), you can't customise it, you can't define your own rules, you just plumb it to monitoring and that's it.
Which is optimal if you barely care but have to do something. There is generally no hard requirement for effective control plane monitoring because it's too nuanced for auditors to verify.
GuardDuty does what AWS says it will do. This article moves the goal posts in order to judge it as inadequate.
This isn't true and the link to the source is a 404 page. It was already too much content marketing, no need to read beyond that line.
Took a while to figure that one out, not least of which because ECS has absurdly shitty UX, with little to no observability.
1. yes, ALL AWS security products have hilariously bad performance and shortcomings, and aren't fit for purpose.
2. this article is too short and doesn't do it justice, and 1/8th of it is dedicated to pitching their alternative (canary infra)
3. Tracebit, the company, doesn't do a good job for pitching canary infra.
conclusion: yeah, seems on brand for Tracebit. This is what I'll remember about your company. half built, accusing AWS of being half built.
Related
WikiLeaks – Amazon Atlas (2018)
WikiLeaks leaked Amazon's 2018 document detailing global data centers, including CIA ties and AWS Secret Region. Amazon leads cloud market, vies for $10B Pentagon contract. WikiLeaks turns data leak into awareness game.
The Growing Threat of Malware Concealed Behind Cloud Services
Cybersecurity threats evolve with malware operators using cloud services like UNSTABLE and Condi botnets. FortiGuard Labs advises enhancing cloud security defenses to combat growing cybercriminal activities effectively.
Bad habits that stop engineering teams from high-performance
Engineering teams face hindering bad habits affecting performance. Importance of observability in software development stressed, including Elastic's OpenTelemetry role. CI/CD practices, cloud-native tech updates, data management solutions, mobile testing advancements, API tools, DevSecOps, and team culture discussed.
Well, it's just an AWS Account ID
AWS Account IDs are crucial for cloud security, aiding in resource sharing and reconnaissance. They facilitate IAM entity enumeration, service discovery, and security testing, highlighting AWS footprint insights for potential attacks. An upcoming course on securing AWS environments is recommended.
Dear AWS, please let me be a cloud engineer again
The author, an AWS Serverless Hero and principal engineer, criticizes AWS's heavy emphasis on Generative AI over core infrastructure services. They advocate for a balanced approach that values traditional offerings and diverse user needs, urging AWS to prioritize developers' support.