π‘οΈ AWS GuardDuty Detector Runtime Monitoring is not enabledπ’
- Contextual name: π‘οΈ Detector Runtime Monitoring is not enabledπ’
- ID:
/ce/ca/aws/guardduty/detector-runtime-monitoring - Tags:
- π’ Policy with categories
- π’ Policy with type
- π’ Production policy
- Policy Type:
COMPLIANCE_POLICY - Policy Categories:
SECURITY
Logicβ
- π§ prod.logic.yamlπ’
Similar Policiesβ
- AWS Security Hub: [GuardDuty.7] GuardDuty EKS Runtime Monitoring should be enabled
- AWS Security Hub: [GuardDuty.11] GuardDuty Runtime Monitoring should be enabled
- AWS Security Hub: [GuardDuty.12] GuardDuty ECS Runtime Monitoring should be enabled
- AWS Security Hub: [GuardDuty.13] GuardDuty EC2 Runtime Monitoring should be enabled
Descriptionβ
Descriptionβ
This policy identifies AWS GuardDuty Detectors that do not have Runtime Monitoring enabled.
Runtime Monitoring observes and analyzes operating systemβlevel, networking, and file events to help detect potential security threats within your AWS workloads.
Rationaleβ
GuardDuty Runtime Monitoring provides visibility into the runtime behavior of your Amazon EC2, Amazon ECS, and Amazon EKS workloads. By analyzing host-level activity, GuardDuty can detect threats such as malware, credential compromise, and other malicious actions that may not be visible through network-based analysis alone.
Impactβ
GuardDuty Runtime Monitoring pricing is based on the number and size of protected workloads, measured in virtual CPUs (vCPUs).
Auditβ
This policy flags an AWS GuardDuty Detector as
INCOMPLIANTif the RUNTIME_MONITORINGFeatureis set to DISABLED or EKS_RUNTIME_MONITORING is set to ENABLED.GuardDuty recommends migrating from EKS Runtime Monitoring to Runtime Monitoring and using it to monitor your Amazon EKS clusters for improved threat detection and unified coverage.
Remediationβ
Remediationβ
Enable Runtime Monitoringβ
For Multi-Account Environmentsβ
In a multi-account environment, only the delegated GuardDuty administrator account can enable or disable Runtime Monitoring for member accounts. Member accounts cannot modify this configuration directly.
From Command Lineβ
aws guardduty update-member-detectors \
--detector-id {{detector-id}} \
--account-ids {{account-id1}} {{account-id2}} ...
--region {{region}} \
--features 'Name=RUNTIME_MONITORING,Status=ENABLED,AdditionalConfiguration=[{Name={{EKS_ADDON_MANAGEMENT|ECS_FARGATE_AGENT_MANAGEMENT|EC2_AGENT_MANAGEMENT}},Status=ENABLED}]' 'Name=EKS_RUNTIME_MONITORING,Status=DISABLED'The delegated administrator account can also automatically enable Runtime Monitoring for all accounts.
aws guardduty update-organization-configuration \
--detector-id {{detector-id}} \
--features 'Name=RUNTIME_MONITORING,AutoEnable={{NEW | ALL}},AdditionalConfiguration=[{ Name={{EKS_ADDON_MANAGEMENT|ECS_FARGATE_AGENT_MANAGEMENT|EC2_AGENT_MANAGEMENT}},AutoEnable={{NEW | ALL}} }]' 'Name=EKS_RUNTIME_MONITORING,AutoEnable=NONE'
... [see more](remediation.md)