docs.aws.amazon.com Open in urlscan Pro
3.171.139.128  Public Scan

Submitted URL: https://docs.aws.amazon.com/guardduty/latest/ug/guardduty_remediate.html#compromised-s3
Effective URL: https://docs.aws.amazon.com/guardduty/latest/ug/guardduty_remediate.html
Submission: On September 24 via api from US — Scanned from CA

Form analysis 0 forms found in the DOM

Text Content

SELECT YOUR COOKIE PREFERENCES

We use essential cookies and similar tools that are necessary to provide our
site and services. We use performance cookies to collect anonymous statistics so
we can understand how customers use our site and make improvements. Essential
cookies cannot be deactivated, but you can click “Customize cookies” to decline
performance cookies.

If you agree, AWS and approved third parties will also use cookies to provide
useful site features, remember your preferences, and display relevant content,
including relevant advertising. To continue without accepting these cookies,
click “Continue without accepting.” To make more detailed choices or learn more,
click “Customize cookies.”

Accept all cookiesContinue without acceptingCustomize cookies


CUSTOMIZE COOKIE PREFERENCES

We use cookies and similar tools (collectively, "cookies") for the following
purposes.


ESSENTIAL

Essential cookies are necessary to provide our site and services and cannot be
deactivated. They are usually set in response to your actions on the site, such
as setting your privacy preferences, signing in, or filling in forms.




PERFORMANCE

Performance cookies provide anonymous statistics about how customers navigate
our site so we can improve site experience and performance. Approved third
parties may perform analytics on our behalf, but they cannot use the data for
their own purposes.

Allow performance category
Allowed


FUNCTIONAL

Functional cookies help us provide useful site features, remember your
preferences, and display relevant content. Approved third parties may set these
cookies to provide certain site features. If you do not allow these cookies,
then some or all of these services may not function properly.

Allow functional category
Allowed


ADVERTISING

Advertising cookies may be set through our site by us or our advertising
partners and help us deliver relevant marketing content. If you do not allow
these cookies, you will experience less relevant advertising.

Allow advertising category
Allowed

Blocking some types of cookies may impact your experience of our sites. You may
review and change your choices at any time by clicking Cookie preferences in the
footer of this site. We and selected third-parties use cookies or similar
technologies as specified in the AWS Cookie Notice.

CancelSave preferences




UNABLE TO SAVE COOKIE PREFERENCES

We will only store essential cookies at this time, because we were unable to
save your cookie preferences.

If you want to change your cookie preferences, try again later using the link in
the AWS console footer, or contact support if the problem persists.

Dismiss


Contact Us
English



Create an AWS Account
 1. AWS
 2. ...
    
    
 3. Documentation
 4. Amazon GuardDuty
 5. Amazon GuardDuty User Guide

Feedback
Preferences


AMAZON GUARDDUTY


AMAZON GUARDDUTY USER GUIDE

 * What is GuardDuty?
    * Pricing in GuardDuty
    * Accessing GuardDuty

 * Concepts and terminology
 * Getting started
 * Foundational data sources
 * GuardDuty features activation
    * GuardDuty API changes

 * S3 Protection
    * Enabling S3 Protection for a standalone account
    * Enabling S3 Protection in multiple-account environments

 * EKS Protection
    * Features
    * EKS Audit Log Monitoring

 * Runtime Monitoring
    * How it works
       * With Amazon EC2 instances
       * With Fargate (Amazon ECS only)
       * With Amazon EKS clusters
       * After Runtime Monitoring configuration
   
    * 30-day free trial
       * I enabled EKS Runtime Monitoring prior to the launch of Runtime
         Monitoring
   
    * Key concepts - Approaches to manage GuardDuty security agent
       * Fargate (Amazon ECS only) resource - Approaches to manage GuardDuty
         security agent
       * Amazon EKS clusters - Approaches to manage GuardDuty security agent
   
    * Enabling Runtime Monitoring
       * Prerequisites
          * For EC2 instance
          * For Fargate (ECS only) cluster
          * For EKS cluster
          * Using IaC with automated agents
      
       * Steps for standalone account
       * Steps for multiple-account environment
       * Managing GuardDuty security agents
          * Using shared VPC with automated security agents
             * How it works
             * Prerequisites
             * Frequently asked questions (FAQs)
         
          * Security agents on same host
          * For Amazon EC2 instance - automated agent
          * For Amazon EC2 instance - manage manually
             * Updating security agent manually
             * Uninstalling security agent manually
         
          * For Fargate (Amazon ECS only) - automated agent
          * For Amazon EKS cluster - automated agent
          * For Amazon EKS cluster - manage manually
             * Updating security agent manually
   
    * Configuring EKS Runtime Monitoring (API only)
    * Migrating from EKS Runtime Monitoring to Runtime Monitoring
       * Checking EKS Runtime Monitoring configuration status
       * Disable EKS Runtime Monitoring
   
    * Assessing runtime coverage
       * Coverage for Amazon EC2 instance
       * Coverage for Amazon ECS clusters
       * Coverage for Amazon EKS clusters
       * Frequently asked questions (FAQs)
   
    * Setting up CPU and memory monitoring
    * Collected runtime event types
    * Amazon ECR repository hosting GuardDuty agent
       * For EKS agent version 1.6.0 and above
       * For EKS agent version 1.5.0 and earlier
       * For AWS Fargate (Amazon ECS only)
   
    * GuardDuty agent release history
    * Impact of disabling

 * Malware Protection for EC2
    * Feature
    * Supported EBS volumes
    * Customizations in Malware Protection for EC2
    * GuardDuty-initiated malware scan
       * 30-day free trial
       * Configuring GuardDuty-initiated malware scan
       * Findings that invoke GuardDuty-initiated malware scan
   
    * On-demand malware scan
       * Getting started
   
    * Monitoring malware scan statuses and results
    * GuardDuty service account
    * Malware Protection for EC2 quotas

 * Malware Protection for S3
    * Pricing and usage cost
       * Reviewing usage cost
   
    * How it works
    * Capabilities of Malware Protection for S3
    * (Optional) Get started with Malware Protection for S3 only (console)
    * Configuring Malware Protection for S3 for your bucket
       * Prerequisite - IAM role permissions
       * Enabling Malware Protection for S3 threat detection for your bucket
   
    * Steps after enabling Malware Protection for S3
    * Malware Protection plan resource status
    * Troubleshooting Malware Protection plan status
    * Monitoring S3 object scans
       * Using Amazon EventBridge
       * S3 object scan status metrics in CloudWatch
       * Using S3 object GuardDuty managed tags
          * Troubleshooting S3 object post-scan tag failures
   
    * Using tag-based access control (TBAC)
    * Editing Malware Protection plan for a protected bucket
    * Disabling Malware Protection for S3 for a protected bucket
    * Supportability of Amazon S3 features
    * Quotas in Malware Protection for S3

 * RDS Protection
    * Feature
    * Configuring RDS Protection for a standalone account
    * Configuring RDS Protection in multiple-account environments

 * Lambda Protection
    * Feature
    * Configuring Lambda Protection

 * Protecting AI workloads
 * Managing multiple accounts
    * Administrator account and member account relationships
    * Managing accounts with AWS Organizations
       * Permissions required to designate a delegated GuardDuty administrator
         account
       * Designating delegated GuardDuty administrator account
       * Setting organization auto-enable preferences
       * Adding members to the organization
       * (Optional) Enable protection plans for existing member accounts
       * Continually managing your member accounts within GuardDuty
       * Suspending GuardDuty for member account
       * Disassociating (removing) member account from administrator account
       * Deleting member accounts from GuardDuty organization
       * Changing the delegated GuardDuty administrator account
   
    * Managing accounts by invitation
       * Adding accounts by invitation
       * Consolidating administrator accounts under single organization

 * Understanding findings
    * GuardDuty finding format
    * GuardDuty malware detection scan engine
    * Sample findings
    * Test GuardDuty findings
    * Reviewing GuardDuty findings
    * Finding details
    * GuardDuty finding aggregation

 * Finding types
    * EC2 finding types
    * IAM finding types
    * S3 Protection finding types
    * EKS audit logs finding types
    * Runtime Monitoring finding types
    * Malware Protection for EC2 finding types
    * Malware Protection for S3 finding type
    * RDS Protection finding types
    * Lambda Protection finding types
    * Retired finding types

 * Managing GuardDuty findings
    * Summary
    * Filtering findings
    * Suppression rules
    * Trusted IP and threat lists
    * Exporting findings
    * Automating responses with CloudWatch Events
    * Understanding CloudWatch Logs and reasons for skipping resources
    * Reporting false positive EC2 malware scan result
    * Reporting false positive S3 object scan result

 * Remediating findings
    * Remediating a potentially compromised Amazon EC2 instance
    * Remediating a potentially compromised S3 bucket
    * Remediating a potentially malicious S3 object
    * Remediating a potentially compromised ECS cluster
    * Remediating potentially compromised AWS credentials
    * Remediating a potentially compromised standalone container
    * Remediating EKS Audit Log Monitoring findings
    * Remediating Runtime Monitoring findings
    * Remediating a potentially compromised database
    * Remediating a potentially compromised Lambda function

 * Estimating usage cost
    * Reviewing estimated usage cost

 * Security
    * Data protection
       * Opting out of using your data for service improvement
   
    * Logging with CloudTrail
       * Example: GuardDuty log file entries
   
    * Identity and Access Management
       * How Amazon GuardDuty works with IAM
       * Identity-based policy examples
       * Using service-linked roles
          * Service-linked role permissions for GuardDuty
          * Service-linked role permissions for Malware Protection for EC2
      
       * AWS managed policies
       * Troubleshooting
   
    * Compliance validation
    * Resilience
    * Infrastructure security
    * VPC endpoints (AWS PrivateLink)

 * Integrating with other AWS services
    * AWS Security Hub integration
    * Amazon Detective integration

 * Suspending or disabling
 * GuardDuty announcements
 * GuardDuty quotas
 * Troubleshooting
    * General issues in GuardDuty
    * Malware Protection for EC2 issues
    * Runtime Monitoring issues
    * Managing multiple accounts issues
    * Other troubleshooting issues

 * Regions and endpoints
 * Legacy actions and parameters
 * Document history

Remediating security issues discovered by GuardDuty - Amazon GuardDuty
AWSDocumentationAmazon GuardDutyAmazon GuardDuty User Guide


REMEDIATING SECURITY ISSUES DISCOVERED BY GUARDDUTY

PDFRSS

Amazon GuardDuty generates findings that indicate potential security issues. In
this release of GuardDuty, the potential security issues indicate either a
compromised EC2 instance or container workload, or a set of compromised
credentials in your AWS environment. The following sections describe the
recommended remediation steps for these scenarios. If there are alternative
remediation scenarios they will be described in the entry for that specific
finding type. You can access the full information about a finding type by
selecting it from the Active findings types table.

CONTENTS

 * Remediating a potentially compromised Amazon EC2 instance
 * Remediating a potentially compromised S3 bucket
 * Remediating a potentially malicious S3 object
 * Remediating a potentially compromised ECS cluster
 * Remediating potentially compromised AWS credentials
 * Remediating a potentially compromised standalone container
 * Remediating EKS Audit Log Monitoring findings
 * Remediating Runtime Monitoring findings
 * Remediating a potentially compromised database
 * Remediating a potentially compromised Lambda function

Javascript is disabled or is unavailable in your browser.

To use the Amazon Web Services Documentation, Javascript must be enabled. Please
refer to your browser's Help pages for instructions.

Document Conventions
Reporting false positive S3 object scan result
Remediating a potentially compromised Amazon EC2 instance
Did this page help you? - Yes

Thanks for letting us know we're doing a good job!

If you've got a moment, please tell us what we did right so we can do more of
it.



Did this page help you? - No

Thanks for letting us know this page needs work. We're sorry we let you down.

If you've got a moment, please tell us how we can make the documentation better.





DID THIS PAGE HELP YOU?

Yes
No
Provide feedback

NEXT TOPIC:

Remediating a potentially compromised Amazon EC2 instance

PREVIOUS TOPIC:

Reporting false positive S3 object scan result

NEED HELP?

 * Try AWS re:Post 
 * Connect with an AWS IQ expert 

PrivacySite termsCookie preferences
© 2024, Amazon Web Services, Inc. or its affiliates. All rights reserved.


ON THIS PAGE