Skip to content

Commit baff626

Browse files
committed
Made a few minor formatting tweaks
1 parent e51aa9a commit baff626

File tree

1 file changed

+13
-12
lines changed

1 file changed

+13
-12
lines changed

content/aws/avoiding-detection/modify-guardduty-config.md

+13-12
Original file line numberDiff line numberDiff line change
@@ -4,22 +4,23 @@ title: Modify GuardDuty Configuration
44
description: Modify existing GuardDuty configurations in the target account to hinder alerting and remediation capabilities.
55
---
66

7-
When an account has been successfully compromised, an attacker can modify threat detection services like GuardDuty to reduce the likelihood of their actions triggering an alert. Modifying, as opposed to outright deleting, key attributes of GuardDuty may be less likely to raise alerts, and result in a similar degradation of effectiveness. The actions available to an attacker will largely depend on the compromised permissions available to the attacker, the GuardDuty architecture and the presence of higher level controls like Service Control Policies.
7+
When an account has been successfully compromised, an attacker can modify threat detection services like GuardDuty to reduce the likelihood of their actions triggering an alert. Modifying, as opposed to outright deleting, key attributes of GuardDuty may be less likely to raise alerts, and result in a similar degradation of effectiveness. The actions available to an attacker will largely depend on the compromised permissions available to the attacker, the GuardDuty architecture and the presence of higher level controls like [Service Control Policies](https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_policies_scps.html).
88

99
## GuardDuty
10-
Where GuardDuty uses a delegated admin or invite model, features like detector configurations and IP Trust lists are centrally managed, and so only able to be modified in the GuardDuty administrator account. Where this is not the case, these features can be modified in the account that GuardDuty is running in.
10+
Where GuardDuty uses a delegated admin or invite model, features like detector configurations and IP Trust lists are centrally managed, and so they can only be modified in the GuardDuty administrator account. Where this is not the case, these features can be modified in the account that GuardDuty is running in.
1111

1212
---
1313
### Misconfiguring the Detector
14-
An attacker could modify an existing GuardDuty detector in the account, to remove logs sources or lessen its effectiveness.
14+
An attacker could modify an existing GuardDuty detector in the account, to remove log sources or lessen its effectiveness.
1515

1616
Configuration changes may include a combination of:
17-
- Disabling the detector altogether.
18-
- Removing Kubernetes and s3 as data sources, which removes all [S3 Protection](https://docs.aws.amazon.com/guardduty/latest/ug/guardduty_finding-types-s3.html) and [Kubernetes alerts](https://docs.aws.amazon.com/guardduty/latest/ug/guardduty_finding-types-kubernetes.html).
17+
18+
- Disabling the detector altogether.
19+
- Removing Kubernetes and s3 as data sources, which removes all [S3 Protection](https://docs.aws.amazon.com/guardduty/latest/ug/guardduty_finding-types-s3.html) and [Kubernetes alerts](https://docs.aws.amazon.com/guardduty/latest/ug/guardduty_finding-types-kubernetes.html).
1920
- Increasing the event update frequency to 6 hours, as opposed to as low as 15 minutes.
2021

2122

22-
#### Required Permissions to execute:
23+
#### Required Permissions to execute
2324
- guardduty:ListDetectors
2425
- guardduty:UpdateDetector
2526

@@ -44,16 +45,16 @@ aws guardduty update-detector \
4445
### Modifying Trusted IP Lists
4546
An attacker could create or update GuardDuty's [Trusted IP list](https://docs.aws.amazon.com/guardduty/latest/ug/guardduty_upload-lists.html), including their own IP on the list. Any IPs in a trusted IP list will not have any Cloudtrail or VPC flow log alerts raised against them.
4647

47-
<i> DNS findings are exempt from the Trusted IP list </i>
48+
*DNS findings are exempt from the Trusted IP list.*
4849

49-
#### Required Permissions to execute:
50+
#### Required Permissions to execute
5051
- guardduty:ListDetectors
5152
- guardduty:ListIPSet
5253
- iam:PutRolePolicy
5354
- guardduty:CreateIPSet (To create new list)
5455
- guardduty:UpdateIPSet (To update an existing list)
5556

56-
<i> Depending on the level of stealth required, the file can be uploaded to an s3 bucket in the target account, or an account controlled by the attacker. </i>
57+
*Depending on the level of stealth required, the file can be uploaded to an s3 bucket in the target account, or an account controlled by the attacker.*
5758

5859

5960
Example CLI commands
@@ -67,12 +68,12 @@ aws guardduty update-ip-set \
6768

6869
---
6970
### Modify Cloudwatch events rule
70-
GuardDuty populates its findings to Cloudwatch Events on a 5 minute cadence. Modifying the Event pattern or Targets for an event may reduce GuardDuty's ability to alert and trigger auto-remediation of findings, especially where the remediation is triggered in a member account - as GuardDuty administrator protections do not extend to the Cloudwatch events in the member account.
71+
GuardDuty populates its findings to Cloudwatch Events on a 5 minute cadence. Modifying the Event pattern or Targets for an event may reduce GuardDuty's ability to alert and trigger auto-remediation of findings, especially where the remediation is triggered in a member account as GuardDuty administrator protections do not extend to the Cloudwatch events in the member account.
7172

7273
!!! Note
73-
In a delegated or invitational admin GuardDuty architecture, cloudwatch events will still be created in the admin account.
74+
In a delegated or invitational admin GuardDuty architecture, cloudwatch events will still be created in the admin account.
7475

75-
#### Required Permissions to execute:
76+
#### Required Permissions to execute
7677
- event:ListRules
7778
- event:ListTargetsByRule
7879
- event:PutRule

0 commit comments

Comments
 (0)