GuardDuty finding types
For information about important changes to the GuardDuty finding types, including newly added or retired finding types, see Document history for Amazon GuardDuty.
For information about finding types which are now retired, see Retired finding types.
GuardDuty finding types by potentially impacted resources
The following pages are categorized by the potentially impacted resource type associated to a GuardDuty finding:
GuardDuty active findings
The following table shows all of the active finding types sorted by the foundational data source or feature, as applicable. Some of the following finding types may have a variable severity, indicated by an asterisk (*). For information about the variable severity of a finding type, view the detailed description of that finding type.
Finding type |
Resource type |
Foundational data source/Feature |
Finding severity |
---|---|---|---|
Amazon S3 |
CloudTrail data events for S3 |
Low |
|
Amazon S3 |
CloudTrail data events for S3 |
High |
|
Amazon S3 |
CloudTrail data events for S3 |
High |
|
Amazon S3 |
CloudTrail data events for S3 |
Medium |
|
Amazon S3 |
CloudTrail data events for S3 |
High |
|
Amazon S3 |
CloudTrail data events for S3 |
High |
|
Amazon S3 |
CloudTrail data events for S3 |
High |
|
Amazon S3 |
CloudTrail data events for S3 |
High |
|
Amazon S3 |
CloudTrail data events for S3 |
Medium |
|
Amazon S3 |
CloudTrail data events for S3 |
High |
|
Amazon S3 |
CloudTrail data events for S3 |
Medium |
|
Amazon S3 |
CloudTrail data events for S3 |
Medium |
|
Amazon S3 |
CloudTrail data events for S3 |
Medium |
|
Amazon S3 |
CloudTrail data events for S3 |
High |
|
Amazon S3 |
CloudTrail data events for S3 |
High |
|
IAM |
CloudTrail management event |
Medium |
|
IAM |
CloudTrail management event |
Medium |
|
IAM |
CloudTrail management event |
Low |
|
IAM |
CloudTrail management event |
High |
|
IAM |
CloudTrail management event |
High |
|
IAM |
CloudTrail management event |
Medium |
|
IAM |
CloudTrail management event |
Medium |
|
IAM |
CloudTrail management event |
Medium |
|
IAM |
CloudTrail management event |
Medium |
|
IAM |
CloudTrail management event |
Medium |
|
IAM |
CloudTrail management event |
Low* |
|
UnauthorizedAccess:IAMUser/InstanceCredentialExfiltration.InsideAWS |
IAM |
CloudTrail management event |
High* |
Amazon S3 |
CloudTrail management event |
Low |
|
Amazon S3 |
CloudTrail management event |
High |
|
Amazon S3 |
CloudTrail management event |
Low |
|
Amazon S3 |
CloudTrail management event |
High |
|
IAM |
CloudTrail management event |
Medium |
|
IAM |
CloudTrail management event |
Medium |
|
IAM |
CloudTrail management event |
Medium |
|
IAM |
CloudTrail management event |
Medium |
|
IAM |
CloudTrail management event |
Low |
|
Amazon S3 |
CloudTrail management event |
Low |
|
IAM |
CloudTrail management event |
Medium |
|
IAM |
CloudTrail management event |
Medium |
|
IAM |
CloudTrail management event |
Medium |
|
IAM |
CloudTrail management event |
Medium |
|
IAM |
CloudTrail management events or CloudTrail data events for S3 |
Low |
|
UnauthorizedAccess:IAMUser/InstanceCredentialExfiltration.OutsideAWS |
IAM |
CloudTrail management events or CloudTrail data events for S3 |
High |
Amazon EC2 |
DNS logs |
High |
|
Amazon EC2 |
DNS logs |
High |
|
Amazon EC2 |
DNS logs |
Medium |
|
Amazon EC2 |
DNS logs |
High |
|
Amazon EC2 |
DNS logs |
High |
|
Amazon EC2 |
DNS logs |
Low |
|
Amazon EC2 |
DNS logs |
Medium |
|
Amazon EC2 |
DNS logs |
High |
|
Amazon EC2 |
DNS logs |
High |
|
Amazon EC2 |
DNS logs |
High |
|
Amazon EC2 |
DNS logs |
High |
|
Amazon EC2 |
DNS logs |
Medium |
|
Amazon EC2 |
DNS logs |
High |
|
Amazon EC2 |
DNS logs |
High |
|
Container |
EBS Malware Protection |
Varies depending on the detected threat |
|
Container |
EBS Malware Protection |
Varies depending on the detected threat |
|
EC2 |
EBS Malware Protection |
Varies depending on the detected threat |
|
EC2 |
EBS Malware Protection |
Varies depending on the detected threat |
|
ECS |
EBS Malware Protection |
Varies depending on the detected threat |
|
ECS |
EBS Malware Protection |
Varies depending on the detected threat |
|
Kubernetes |
EBS Malware Protection |
Varies depending on the detected threat |
|
Kubernetes |
EBS Malware Protection |
Varies depending on the detected threat |
|
CredentialAccess:Kubernetes/AnomalousBehavior.SecretsAccessed |
Kubernetes |
EKS audit logs |
Medium |
Kubernetes |
EKS audit logs |
High |
|
Kubernetes |
EKS audit logs |
High |
|
Kubernetes |
EKS audit logs |
High |
|
Kubernetes |
EKS audit logs |
High |
|
Kubernetes |
EKS audit logs |
High |
|
Kubernetes |
EKS audit logs |
High |
|
Kubernetes |
EKS audit logs |
High |
|
Kubernetes |
EKS audit logs |
High |
|
Kubernetes |
EKS audit logs |
Low |
|
Kubernetes |
EKS audit logs |
Medium |
|
Kubernetes |
EKS audit logs |
Medium |
|
Kubernetes |
EKS audit logs |
Medium |
|
Kubernetes |
EKS audit logs |
Medium |
|
Kubernetes |
EKS audit logs |
Medium |
|
Kubernetes |
EKS audit logs |
Medium |
|
Kubernetes |
EKS audit logs |
Low |
|
Kubernetes |
EKS audit logs |
High |
|
Kubernetes |
EKS audit logs |
High |
|
Kubernetes |
EKS audit logs |
High |
|
Kubernetes |
EKS audit logs |
High |
|
Kubernetes |
EKS audit logs |
Medium |
|
Kubernetes |
EKS audit logs |
Medium |
|
Kubernetes |
EKS audit logs |
Medium |
|
Kubernetes |
EKS audit logs |
High |
|
Kubernetes |
EKS audit logs |
Medium |
|
Kubernetes |
EKS audit logs |
High |
|
Kubernetes |
EKS audit logs |
High |
|
Kubernetes |
EKS audit logs |
Medium |
|
Kubernetes |
EKS audit logs |
Medium |
|
PrivilegeEscalation:Kubernetes/AnomalousBehavior.RoleBindingCreated |
Kubernetes |
EKS audit logs |
Medium* |
PrivilegeEscalation:Kubernetes/AnomalousBehavior.RoleCreated |
Kubernetes |
EKS audit logs |
Low |
Persistence:Kubernetes/AnomalousBehavior.WorkloadDeployed!ContainerWithSensitiveMount |
Kubernetes |
EKS audit logs |
High |
PrivilegeEscalation:Kubernetes/AnomalousBehavior.WorkloadDeployed!PrivilegedContainer |
Kubernetes |
EKS audit logs |
High |
Kubernetes |
EKS audit logs |
Medium |
|
Lambda |
Lambda Network Activity Monitoring |
High |
|
Lambda |
Lambda Network Activity Monitoring |
High |
|
Lambda |
Lambda Network Activity Monitoring |
Medium |
|
Lambda |
Lambda Network Activity Monitoring |
Medium |
|
Lambda |
Lambda Network Activity Monitoring |
Medium |
|
Lambda |
Lambda Network Activity Monitoring |
High |
|
Lambda |
Lambda Network Activity Monitoring |
High |
|
Supported Amazon Aurora, Amazon RDS, and Aurora Limitless databases |
RDS Login Activity Monitoring |
Low |
|
Supported Amazon Aurora, Amazon RDS, and Aurora Limitless databases |
RDS Login Activity Monitoring |
High |
|
Supported Amazon Aurora, Amazon RDS, and Aurora Limitless databases |
RDS Login Activity Monitoring |
Variable* |
|
Supported Amazon Aurora, Amazon RDS, and Aurora Limitless databases |
RDS Login Activity Monitoring |
Medium |
|
Supported Amazon Aurora, Amazon RDS, and Aurora Limitless databases |
RDS Login Activity Monitoring |
High |
|
Supported Amazon Aurora, Amazon RDS, and Aurora Limitless databases |
RDS Login Activity Monitoring |
Medium |
|
Supported Amazon Aurora, Amazon RDS, and Aurora Limitless databases |
RDS Login Activity Monitoring |
High |
|
Supported Amazon Aurora, Amazon RDS, and Aurora Limitless databases |
RDS Login Activity Monitoring |
Medium |
|
Supported Amazon Aurora, Amazon RDS, and Aurora Limitless databases |
RDS Login Activity Monitoring |
Medium |
|
Instance, EKS cluster, ECS cluster, or container |
Runtime Monitoring |
High |
|
Instance, EKS cluster, ECS cluster, or container |
Runtime Monitoring |
High |
|
Instance, EKS cluster, ECS cluster, or container |
Runtime Monitoring |
High |
|
Instance, EKS cluster, ECS cluster, or container |
Runtime Monitoring |
High |
|
Instance, EKS cluster, ECS cluster, or container |
Runtime Monitoring |
Medium |
|
Instance, EKS cluster, ECS cluster, or container |
Runtime Monitoring |
High |
|
Instance, EKS cluster, ECS cluster, or container |
Runtime Monitoring |
Medium |
|
Instance, EKS cluster, ECS cluster, or container |
Runtime Monitoring |
High |
|
Instance, EKS cluster, ECS cluster, or container |
Runtime Monitoring |
Low |
|
Instance, EKS cluster, ECS cluster, or container |
Runtime Monitoring |
High |
|
Instance, EKS cluster, ECS cluster, or container |
Runtime Monitoring |
Low |
|
Instance, EKS cluster, ECS cluster, or container |
Runtime Monitoring |
High |
|
Instance, EKS cluster, ECS cluster, or container |
Runtime Monitoring |
Medium |
|
Instance, EKS cluster, ECS cluster, or container |
Runtime Monitoring |
Medium |
|
Instance, EKS cluster, ECS cluster, or container |
Runtime Monitoring |
Variable |
|
Instance, EKS cluster, ECS cluster, or container |
Runtime Monitoring |
Low |
|
Instance, EKS cluster, ECS cluster, or container |
Runtime Monitoring |
Variable |
|
Instance, EKS cluster, ECS cluster, or container |
Runtime Monitoring |
High |
|
Instance, EKS cluster, ECS cluster, or container |
Runtime Monitoring |
Medium |
|
Instance, EKS cluster, ECS cluster, or container |
Runtime Monitoring |
High |
|
Instance, EKS cluster, ECS cluster, or container |
Runtime Monitoring |
High |
|
Instance, EKS cluster, ECS cluster, or container |
Runtime Monitoring |
Medium |
|
Instance, EKS cluster, ECS cluster, or container |
Runtime Monitoring |
Low |
|
Instance, EKS cluster, ECS cluster, or container |
Runtime Monitoring |
Medium |
|
Instance, EKS cluster, ECS cluster, or container |
Runtime Monitoring |
High |
|
Instance, EKS cluster, ECS cluster, or container |
Runtime Monitoring |
Medium |
|
Instance, EKS cluster, ECS cluster, or container |
Runtime Monitoring |
Medium |
|
Instance, EKS cluster, ECS cluster, or container |
Runtime Monitoring |
Medium |
|
Instance, EKS cluster, ECS cluster, or container |
Runtime Monitoring |
High |
|
Instance, EKS cluster, ECS cluster, or container |
Runtime Monitoring |
Medium |
|
Instance, EKS cluster, ECS cluster, or container |
Runtime Monitoring |
Medium |
|
Instance, EKS cluster, ECS cluster, or container |
Runtime Monitoring |
Medium |
|
Instance, EKS cluster, ECS cluster, or container |
Runtime Monitoring |
Medium |
|
Instance, EKS cluster, ECS cluster, or container |
Runtime Monitoring |
Medium |
|
Instance, EKS cluster, ECS cluster, or container |
Runtime Monitoring |
High |
|
Instance, EKS cluster, ECS cluster, or container |
Runtime Monitoring |
High |
|
Instance, EKS cluster, ECS cluster, or container |
Runtime Monitoring |
Medium |
|
Instance, EKS cluster, ECS cluster, or container |
Runtime Monitoring |
High |
|
Instance, EKS cluster, ECS cluster, or container |
Runtime Monitoring |
High |
|
Instance, EKS cluster, ECS cluster, or container |
Runtime Monitoring |
High |
|
Instance, EKS cluster, ECS cluster, or container |
Runtime Monitoring |
High |
|
EC2 |
VPC flow logs |
High |
|
EC2 |
VPC flow logs |
High |
|
EC2 |
VPC flow logs |
High |
|
EC2 |
VPC flow logs |
High |
|
EC2 |
VPC flow logs |
High |
|
EC2 |
VPC flow logs |
High |
|
EC2 |
VPC flow logs |
Medium |
|
EC2 |
VPC flow logs |
Medium |
|
EC2 |
VPC flow logs |
Medium |
|
EC2 |
VPC flow logs |
High |
|
EC2 |
VPC flow logs |
Medium |
|
EC2 |
VPC flow logs |
Medium |
|
EC2 |
VPC flow logs |
Medium |
|
EC2 |
VPC flow logs |
High |
|
EC2 |
VPC flow logs |
Low* |
|
EC2 |
VPC flow logs |
High |
|
EC2 |
VPC flow logs |
Low* |
|
EC2 |
VPC flow logs |
Medium |
|
EC2 |
VPC flow logs |
Medium |
|
EC2 |
VPC flow logs |
Medium |
|
EC2 |
VPC flow logs |
Medium |
|
EC2 |
VPC flow logs |
Low* |
|
EC2 |
VPC flow logs |
Low* |
|
EC2 |
VPC flow logs |
High |
|
EC2 |
VPC flow logs |
High |
|
S3Object |
Malware Protection for S3 |
High |