GuardDuty findings and suppression rules - AWS Security Incident Response User Guide

GuardDuty findings and suppression rules

AWS Security Incident Response proactively ingests, triages, and responds to all GuardDuty findings and Security Hub CSPM findings from CrowdStrike, FortinetCNAPP (Lacework), and Trend Micro. Our auto-triage technology eliminates internal analysis requirements. The service creates suppression and auto-archive rules in GuardDuty and Security Hub CSPM for benign findings. View or modify these rules under "Findings" in the GuardDuty console.

To quickly review enabled GuardDuty Suppression Rules:

  1. Access the GuardDuty console.

  2. Choose Findings.

    AWS services send events to the EventBridge default event bus. If the event matches a rule's event pattern, EventBridge sends the event to the targets specified for that rule.
  3. Select the down arrow and notice the naming convention of the suppression rule.

Note

Organizations using SIEM technology have significantly reduced GuardDuty finding volumes over time, improving both Security Incident Response service and SIEM efficiency.