Lockdown Lab #30 HIGH AWS

Enable GuardDuty

Enable GuardDuty

Think about the last time you saw a breach report where an attacker lingered in an AWS account for weeks, undetected. This isn’t theoretical. It’s happening because too many organizations treat cloud security like a checkbox, not an active fight.

GuardDuty isn’t just another service; it’s your primary early warning system for AWS. It uses ML to sniff out suspicious activity – compromised EC2 instances, unusual API calls, unauthorized access to S3 buckets. If you’re running AWS and not using GuardDuty, you’re flying blind, plain and simple.

It’s basic, it’s effective, and it’s a non-negotiable. Enabling it takes minutes, not days. Don’t wait for the incident to realize you needed it.

Here’s the command to get started: aws guardduty create-detector –enable To confirm it’s running: aws guardduty list-detectors

Stop leaving the door open. Enable GuardDuty today.

The fix

# Enable GuardDuty

aws guardduty create-detector --enable

# Check status

aws guardduty list-detectors

Reference: CIS AWS Foundations Benchmark 4.15

Mark this as done

Open the interactive hardening checklist and tick this off in your environment.

Open interactive checklist →

Related Posts

Enable CloudTrail in all regions

Let's talk about the first thing sophisticated attackers go after: your audit trail. If they can blind you, they own you. CloudTrail is that trail...

lockdown-labhardeningawslogging
/Shimi Cohen

Remove 0.0.0.0/0 from security groups

The Capital One breach in 2019? A misconfigured security group allowing SSRF to the metadata service. This isn't theoretical; unrestricted inbound access is a primary...

lockdown-labhardeningawsnetwork
/Shimi Cohen

Enforce least privilege IAM policies

You know what gets me? Seeing environments where a single compromised credential can bring down a whole AWS account. Nine times out of ten, it’s...

lockdown-labhardeningawsidentity
/Shimi Cohen