Create an AWS supported case
You can create an AWS supported case for AWS Security Incident Response through the Console, the API, or the AWS Command Line Interface. AWS supported cases allow you to receive support from Security Incident Response engineers.
Important
Demo/simulation-cases are closing after a period of 90 days.
Note
AWS Security Incident Response engineers will respond to your case within 15 minutes. Response time is for a first response from AWS Security Incident Response engineers. We will make every reasonable effort to respond to your initial request within this time frame. This response time does not apply to subsequent responses.
Note
You can create AWS supported cases not only for active security incidents and investigations, but also for inquiries about AWS Security Incident Response capabilities. This includes questions about GuardDuty suppression rules, alert triaging configurations, proactive response workflows, and general guidance on security posture. Select the Investigations and Inquiries case type for these purposes.
The following example covers use of the console.
-
Sign into AWS Security Incident Response via the AWS Management Console.
-
Choose Create Case
-
Choose Resolve case with AWS
-
Select the type of request
-
Active Security Incident: This type is for urgent incident response support and services.
-
Investigations and Inquiries: Use this type for perceived security incidents where AWS Security Incident Response engineers can support in log analysis and secondary confirmation of incident response investigation. You can also use this type for inquiries about GuardDuty findings, suppression rules, alert triaging configurations, proactive response workflows, and general security posture questions related to AWS Security Incident Response capabilities.
-
-
Set the start date estimate to the date of your earliest indicator of the incident. For example, when you experienced abnormal behavior for the first time or when you received the first related security alert.
-
Define a title for the case
-
Provide a detailed description of the case. Consider the following aspects which can help incident responders with the case resolution:
-
What happened?
-
Who discovered and reported the incident?
-
Who is affected by the case?
-
What is the known impact?
-
What is the urgency for this case?
-
Add one or multiple AWS account IDs that are in scope of the case.
-
-
Add optional case details:
-
Select the main services that are impacted from the drop-down list.
-
Select the main regions that are impacted from the drop-down list.
-
Add one or many threat actor IP addresses that you identified as part of this case.
-
-
Add optional additional incident responders to the case that will receive notifications. To add an individual, do the following:
-
Add an email address.
-
Add an optional first and last name.
-
Choose Add new to add another individual.
-
To remove an individual, choose the Remove option for an individual.
-
Choose Add to add all listed individuals to the case.
-
You can select multiple individuals and choose Remove to delete them from the list.
-
-
-
Add optional tags to the case.
-
To add a tag, do the following:
-
Choose Add new tag.
-
For Key, enter the name of the tag.
-
For Value, enter the value of the tag.
-
To remove a tag, choose the Remove option for that tag.
-
After a AWS supported case has been created, the AWS Security Incident Response engineers and your incident response team are immediately notified.
To create an AWS-supported case with AI investigation
Open the AWS Security Incident Response console at console.aws.amazon.com/
. Choose Cases from the navigation pane.
Choose Create case.
For Case type, select AWS-supported case.
Provide case details including title, incident start date, and affected AWS account ID.
In the Describe the security event section, provide a thorough description of the incident.
Provide additional information about affected AWS services, regions, and other relevant details.
Choose Create case.
After case creation, both the Security Incident Response engineers and AI agent begin working simultaneously.
To respond to AI clarifying questions (optional)
Navigate to the Investigation tab in your case.
Review any clarifying questions presented by the AI agent.
Respond to the questions or choose Skip if you prefer not to answer.
Choose Submit to continue. All fields are optional.
Responsible AI disclosure
Investigation summaries are generated using AWS Generative AI capabilities. You are responsible for evaluating AI-generated recommendations in your specific context, implementing appropriate oversight mechanisms, verifying findings independently, and maintaining human oversight of all security decisions.