Skip to main content

πŸ›‘οΈ AWS GuardDuty is not enabled in all regions🟒

  • Contextual name: πŸ›‘οΈ GuardDuty is not enabled in all regions🟒
  • ID: /ce/ca/aws/guardduty/detector-not-enabled-in-all-regions
  • Tags:
  • Policy Type: COMPLIANCE_POLICY
  • Policy Categories: SECURITY

Logic​

Similar Policies​

Description​

Open File

Description​

This policy identifies whether AWS GuardDuty is enabled in all active AWS regions for an AWS Account.

AWS GuardDuty is a threat detection service that continuously monitors AWS accounts and workloads for malicious or unauthorized activity, providing detailed security findings to support timely remediation.

Rationale​

Enabling GuardDuty in all regions is a security best practice. Adversaries may exploit unused or unmonitored regions to launch resources or conduct malicious activities undetected. Enabling GuardDuty across all regions ensures comprehensive visibility and consistent threat detection, reducing the risk of security blind spots.

Impact​

If GuardDuty is not enabled in all regions, critical security findingsβ€”such as indicators of unauthorized access, compromised instances, or reconnaissance attempts, may be missed in unmonitored regions. This can delay incident response and increase the impact of potential breaches.

Enabling GuardDuty in all regions incurs costs based on the volume of AWS CloudTrail events, VPC Flow Logs, and DNS query logs analyzed.

... see more

Remediation​

Open File

Remediation​

Enable GuardDuty in a Region​

From Command Line​
  1. To enable GuardDuty in a specific region, run the following command, replacing {{region}} with the target region:

    aws guardduty create-detector --enable --region {{region}}
  2. To enable GuardDuty in all available AWS regions, you can use the following shell script:

    #!/bin/bash
    set -e

    REGIONS=$(aws ec2 describe-regions --query "Regions[].RegionName" --output text)

    if [ -z "$REGIONS" ]; then
    echo "Error: Unable to retrieve AWS regions"
    exit 1
    fi

    for region in $REGIONS; do
    echo "Checking GuardDuty in region: $region"

    # Get detector ID for the region
    DETECTOR_ID=$(aws guardduty list-detectors --region "$region" --query "DetectorIds[0]" --output text)

    if [ "$DETECTOR_ID" == "None" ] || [ -z "$DETECTOR_ID" ]; then
    echo "GuardDuty not found in $region. Enabling..."

    if aws guardduty create-detector --enable --region "$region"; then

... see more

policy.yaml​

Open File

Linked Framework Sections​

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [GuardDuty.1] GuardDuty should be enabled1no data
πŸ’Ό AWS Well-Architected β†’ πŸ’Ό SEC04-BP03 Correlate and enrich security alerts2no data
πŸ’Ό AWS Well-Architected β†’ πŸ’Ό SEC04-BP04 Initiate remediation for non-compliant resources2no data
πŸ’Ό AWS Well-Architected β†’ πŸ’Ό SEC05-BP03 Implement inspection-based protection3no data
πŸ’Ό AWS Well-Architected β†’ πŸ’Ό SEC05-BP04 Automate network protection1no data
πŸ’Ό Cloudaware Framework β†’ πŸ’Ό Threat Protection36no data
πŸ’Ό FedRAMP High Security Controls β†’ πŸ’Ό AC-2(12) Account Monitoring for Atypical Usage (M)(H)12no data
πŸ’Ό FedRAMP High Security Controls β†’ πŸ’Ό AU-6(1) Automated Process Integration (M)(H)3no data
πŸ’Ό FedRAMP High Security Controls β†’ πŸ’Ό AU-6(5) Integrated Analysis of Audit Records (H)2no data
πŸ’Ό FedRAMP High Security Controls β†’ πŸ’Ό CA-7 Continuous Monitoring (L)(M)(H)213no data
πŸ’Ό FedRAMP High Security Controls β†’ πŸ’Ό CM-8(3) Automated Unauthorized Component Detection (M)(H)1no data
πŸ’Ό FedRAMP High Security Controls β†’ πŸ’Ό SA-11(1) Static Code Analysis (M)(H)1no data
πŸ’Ό FedRAMP High Security Controls β†’ πŸ’Ό SC-5 Denial-of-service Protection (L)(M)(H)1no data
πŸ’Ό FedRAMP High Security Controls β†’ πŸ’Ό SI-4 System Monitoring (L)(M)(H)145056no data
πŸ’Ό FedRAMP High Security Controls β†’ πŸ’Ό SI-4(1) System-wide Intrusion Detection System (M)(H)12no data
πŸ’Ό FedRAMP High Security Controls β†’ πŸ’Ό SI-4(2) Automated Tools and Mechanisms for Real-time Analysis (M)(H)1no data
πŸ’Ό FedRAMP High Security Controls β†’ πŸ’Ό SI-4(4) Inbound and Outbound Communications Traffic (M)(H)68no data
πŸ’Ό FedRAMP High Security Controls β†’ πŸ’Ό SI-4(5) System-generated Alerts (M)(H)2no data
πŸ’Ό FedRAMP High Security Controls β†’ πŸ’Ό SI-4(22) Unauthorized Network Services (H)1no data
πŸ’Ό FedRAMP Low Security Controls β†’ πŸ’Ό CA-7 Continuous Monitoring (L)(M)(H)113no data
πŸ’Ό FedRAMP Low Security Controls β†’ πŸ’Ό SC-5 Denial-of-service Protection (L)(M)(H)1no data
πŸ’Ό FedRAMP Low Security Controls β†’ πŸ’Ό SI-4 System Monitoring (L)(M)(H)8no data
πŸ’Ό FedRAMP Moderate Security Controls β†’ πŸ’Ό AC-2(12) Account Monitoring for Atypical Usage (M)(H)2no data
πŸ’Ό FedRAMP Moderate Security Controls β†’ πŸ’Ό AU-6(1) Automated Process Integration (M)(H)3no data
πŸ’Ό FedRAMP Moderate Security Controls β†’ πŸ’Ό CA-7 Continuous Monitoring (L)(M)(H)213no data
πŸ’Ό FedRAMP Moderate Security Controls β†’ πŸ’Ό CM-8(3) Automated Unauthorized Component Detection (M)(H)1no data
πŸ’Ό FedRAMP Moderate Security Controls β†’ πŸ’Ό SA-11(1) Static Code Analysis (M)(H)1no data
πŸ’Ό FedRAMP Moderate Security Controls β†’ πŸ’Ό SC-5 Denial-of-service Protection (L)(M)(H)1no data
πŸ’Ό FedRAMP Moderate Security Controls β†’ πŸ’Ό SI-4 System Monitoring (L)(M)(H)710no data
πŸ’Ό FedRAMP Moderate Security Controls β†’ πŸ’Ό SI-4(1) System-wide Intrusion Detection System (M)(H)2no data
πŸ’Ό FedRAMP Moderate Security Controls β†’ πŸ’Ό SI-4(2) Automated Tools and Mechanisms for Real-time Analysis (M)(H)1no data
πŸ’Ό FedRAMP Moderate Security Controls β†’ πŸ’Ό SI-4(4) Inbound and Outbound Communications Traffic (M)(H)8no data
πŸ’Ό FedRAMP Moderate Security Controls β†’ πŸ’Ό SI-4(5) System-generated Alerts (M)(H)2no data
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό DE.AE-02: Potentially adverse events are analyzed to better understand associated activities35no data
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό DE.AE-03: Information is correlated from multiple sources50no data
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό DE.CM-01: Networks and network services are monitored to find potentially adverse events150no data
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό DE.CM-02: The physical environment is monitored to find potentially adverse events13no data
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό DE.CM-03: Personnel activity and technology usage are monitored to find potentially adverse events85no data
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό DE.CM-06: External service provider activities and services are monitored to find potentially adverse events35no data
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό DE.CM-09: Computing hardware and software, runtime environments, and their data are monitored to find potentially adverse events149no data
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό ID.IM-01: Improvements are identified from evaluations26no data
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό ID.IM-02: Improvements are identified from security tests and exercises, including those done in coordination with suppliers and relevant third parties40no data
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό ID.IM-03: Improvements are identified from execution of operational processes, procedures, and activities41no data
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό ID.RA-01: Vulnerabilities in assets are identified, validated, and recorded31no data
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό ID.RA-07: Changes and exceptions are managed, assessed for risk impact, recorded, and tracked31no data
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό PR.DS-01: The confidentiality, integrity, and availability of data-at-rest are protected164no data
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό PR.DS-02: The confidentiality, integrity, and availability of data-in-transit are protected140no data
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό PR.DS-10: The confidentiality, integrity, and availability of data-in-use are protected156no data
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό PR.IR-01: Networks and environments are protected from unauthorized logical access and usage103no data
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό AC-2(12) Account Management _ Account Monitoring for Atypical Usage1no data
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό AU-6(1) Audit Record Review, Analysis, and Reporting _ Automated Process Integration13no data
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό AU-6(5) Audit Record Review, Analysis, and Reporting _ Integrated Analysis of Audit Records2no data
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό CA-7 Continuous Monitoring613no data
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό CM-8(3) System Component Inventory _ Automated Unauthorized Component Detection1no data
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό RA-3(4) Risk Assessment _ Predictive Cyber Analytics1no data
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό SA-8(19) Security and Privacy Engineering Principles _ Continuous Protection1no data
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό SA-8(21) Security and Privacy Engineering Principles _ Self-analysis1no data
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό SA-8(25) Security and Privacy Engineering Principles _ Economic Security1no data
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό SA-11(1) Developer Testing and Evaluation _ Static Code Analysis1no data
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό SA-11(6) Developer Testing and Evaluation _ Attack Surface Reviews1no data
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό SA-15(2) Development Process, Standards, and Tools _ Security and Privacy Tracking Tools1no data
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό SA-15(8) Development Process, Standards, and Tools _ Reuse of Threat and Vulnerability Information1no data
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό SC-5 Denial-of-service Protection312no data
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό SC-5(1) Denial-of-service Protection _ Restrict Ability to Attack Other Systems1no data
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό SC-5(3) Denial-of-service Protection _ Detection and Monitoring1no data
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό SI-3(8) Malicious Code Protection _ Detect Unauthorized Commands6no data
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό SI-4 System Monitoring25110no data
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό SI-4(1) System Monitoring _ System-wide Intrusion Detection System1no data
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό SI-4(2) System Monitoring _ Automated Tools and Mechanisms for Real-time Analysis1no data
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό SI-4(4) System Monitoring _ Inbound and Outbound Communications Traffic12no data
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό SI-4(5) System Monitoring _ System-generated Alerts2no data
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό SI-4(13) System Monitoring _ Analyze Traffic and Event Patterns1no data
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό SI-4(22) System Monitoring _ Unauthorized Network Services1no data
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό SI-4(25) System Monitoring _ Optimize Network Traffic Analysis1no data
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό SI-20 Tainting2no data
πŸ’Ό PCI DSS v3.2.1 β†’ πŸ’Ό 11.1.2 Implement incident response procedures in the event unauthorized wireless access points are detected.1no data
πŸ’Ό PCI DSS v3.2.1 β†’ πŸ’Ό 11.4 Use intrusion-detection and/or intrusion-prevention techniques to detect and/or prevent intrusions into the network.113no data
πŸ’Ό PCI DSS v3.2.1 β†’ πŸ’Ό 11.5.1 Implement a process to respond to any alerts generated by the change detection solution.1no data
πŸ’Ό PCI DSS v3.2.1 β†’ πŸ’Ό 12.10.5 Include alerts from security monitoring systems, including but not limited to intrusion-detection, intrusion-prevention, firewalls, and file-integrity monitoring systems.1no data
πŸ’Ό PCI DSS v4.0.1 β†’ πŸ’Ό 11.5.1 Intrusion-detection and/or intrusion-prevention techniques are used to detect and/or prevent intrusions into the network.113no data
πŸ’Ό PCI DSS v4.0.1 β†’ πŸ’Ό 11.5.1.1 Intrusion-detection and/or intrusion-prevention techniques detect, alert on/prevent, and address covert malware communication channels.13no data
πŸ’Ό PCI DSS v4.0.1 β†’ πŸ’Ό 11.6.1 A change- and tamper-detection mechanism is deployed.13no data
πŸ’Ό PCI DSS v4.0.1 β†’ πŸ’Ό 12.10.5 The security incident response plan includes monitoring and responding to alerts from security monitoring systems.1no data
πŸ’Ό PCI DSS v4.0 β†’ πŸ’Ό 11.5.1 Intrusion-detection and/or intrusion-prevention techniques are used to detect and/or prevent intrusions into the network.1813no data
πŸ’Ό PCI DSS v4.0 β†’ πŸ’Ό 11.5.1.1 Intrusion-detection and/or intrusion-prevention techniques detect, alert on/prevent, and address covert malware communication channels.813no data
πŸ’Ό PCI DSS v4.0 β†’ πŸ’Ό 11.6.1 A change- and tamper-detection mechanism is deployed.13no data
πŸ’Ό PCI DSS v4.0 β†’ πŸ’Ό 12.10.5 The security incident response plan includes monitoring and responding to alerts from security monitoring systems.1no data