Working with active threat defense indicators in Amazon GuardDuty - AWS Network Firewall

Working with active threat defense indicators in Amazon GuardDuty

If you use Amazon GuardDuty, you can strengthen your security by using active threat defense managed rule group to automatically block the threats that Amazon GuardDuty detects. Amazon GuardDuty can generate findings with the threat list name Amazon Active Threat Defense. You can block these threats by implementing the AttackInfrastructure active threat defense rule group in your Network Firewall firewall policy.

Note

The active threat defense managed rule group can block threats regardless of whether you use Amazon GuardDuty. This information is relevant only if you already use Amazon GuardDuty for threat detection.

The following Amazon GuardDuty finding types may indicate threats that active threat defense managed rule group can block:

Command and control related findings
  • Backdoor:EC2/C&CActivity.B

  • Backdoor:EC2/C&CActivity.B!DNS

  • Backdoor:Lambda/C&CActivity.B

  • Backdoor:Runtime/C&CActivity.B

  • Backdoor:Runtime/C&CActivity.B!DNS

Cryptocurrency related findings
  • CryptoCurrency:EC2/BitcoinTool.B

  • CryptoCurrency:EC2/BitcoinTool.B!DNS

  • CryptoCurrency:Lambda/BitcoinTool.B

  • CryptoCurrency:Runtime/BitcoinTool.B

  • CryptoCurrency:Runtime/BitcoinTool.B!DNS

  • Impact:EC2/BitcoinDomainRequest.Reputation

Other threat findings
  • Trojan:EC2/BlackholeTraffic!DNS

  • Trojan:Runtime/BlackholeTraffic!DNS

  • UnauthorizedAccess:EC2/MaliciousIPCaller.Custom

For more information about Amazon GuardDuty finding types, see Active findings in the Amazon GuardDuty User Guide.