π‘οΈ AWS GuardDuty Detector Lambda Protection is not enabledπ’
- Contextual name: π‘οΈ Detector Lambda Protection is not enabledπ’
- ID:
/ce/ca/aws/guardduty/detector-lambda-protection - Tags:
- π’ Policy with categories
- π’ Policy with type
- π’ Production policy
- Policy Type:
COMPLIANCE_POLICY - Policy Categories:
SECURITY
Logicβ
- π§ prod.logic.yamlπ’
Similar Policiesβ
- AWS Security Hub: [GuardDuty.6] GuardDuty Lambda Protection should be enabled
Descriptionβ
Descriptionβ
This policy identifies AWS GuardDuty Detectors that do not have Lambda Protection enabled.
GuardDuty monitors Lambda network activity logs generated when a Lambda function in your account is invoked. Enabling this feature allows you to detect potential security threats targeting your Lambda functions.
Rationaleβ
Enabling GuardDuty Lambda Protection ensures continuous monitoring of network activity logs from your Lambda functions. This helps identify malicious or anomalous behavior, such as a function communicating with known malicious IP addresses or other suspicious network activity.
Impactβ
GuardDuty incurs charges based on the volume of Lambda network activity log data (in GB) processed to generate findings. To optimize costs, GuardDuty applies intelligent filtering and analyzes only a relevant subset of logs necessary for effective threat detection.
Auditβ
This policy flags an AWS GuardDuty Detector as
INCOMPLIANTif the LAMBDA_NETWORK_LOGSFeatureis set to DISABLED.
Remediationβ
Remediationβ
Enable Lambda Protectionβ
For Multi-Account Environmentsβ
In a multi-account environment, only the delegated GuardDuty administrator account can enable or disable Lambda Protection for member accounts within the organization. Member accounts cannot modify this configuration directly.
From Command Lineβ
aws guardduty update-member-detectors \
--detector-id {{detector-id}} \
--account-ids {{account-id1}} {{account-id2}} \
--region {{region}} \
--features 'Name=LAMBDA_NETWORK_LOGS,Status=ENABLED'The delegated administrator account manages member accounts using AWS Organizations and can choose to automatically enable Lambda network activity monitoring for all accounts as they join the organization.
aws guardduty update-organization-configuration \
--detector-id {{detector-id}} \
--region {{region}} \
--features 'Name=LAMBDA_NETWORK_LOGS,AutoEnable={{NEW | ALL}}'
For a Standalone Accountβ
If your account is not associated with a delegated GuardDuty administrator account through AWS Organizations, enable Lambda Protection directly from your account.
... see more