Skip to content

Guardduty integration with reporting tools, dashboards, analytics, etc?

0

I want to know if it's possible to integrate existing services in AWS to report on GuardDuty findings. From what I undertand, OpenSearch can achieve this with dashboards and query tools if I'm not mistaken?

For example, if we have a certain amounts of alerts I would like to categorize that in categories, such as Recon, Malware, etc. Or by severity as well in a dashboard or reporting format.

Also wondering if GuardDuty generates CSV file reports? Are these findings also stored in S3 by default?

I am looking at third party services and as well would like to see the tradeoffs with existing services.

2 Answers
0

Amazon GuardDuty offers several integration options with reporting and analytics tools to help you visualize, analyze, and manage security findings.

For reporting and dashboards within AWS, you have multiple options:

  1. GuardDuty Console: GuardDuty provides a built-in summary dashboard that displays an overview of your security posture, including the number of findings, threats, and data events.

  2. AWS Security Hub: When you enable Security Hub with GuardDuty, findings are automatically ingested into Security Hub, providing a central location to view and analyze security findings across multiple AWS services. This allows for consolidated reporting and dashboarding.

  3. Amazon Athena: You can export GuardDuty findings to Amazon S3 and then use Athena to run SQL queries against those findings. This allows you to create custom reports, categorize findings by type (such as Recon or Malware), filter by severity, and perform detailed analysis.

For third-party integrations, GuardDuty findings can be sent to:

  • Splunk: You can integrate GuardDuty with on-premises Splunk by installing the Splunk Add-on for AWS. This add-on can be configured to pull GuardDuty findings either from S3 buckets or from CloudWatch Logs.

Regarding your specific questions:

  • GuardDuty doesn't generate CSV reports by default, but you can create them using services like Athena by running SQL queries against your findings data and exporting the results.

  • GuardDuty findings are not automatically stored in S3. By default, findings are retained in GuardDuty for 90 days. However, you can configure GuardDuty to export findings to an S3 bucket for longer-term storage and analysis. This is recommended if you need to maintain historical data beyond the 90-day retention period.

  • For categorizing findings by type (Recon, Malware) or severity, you can use filtering capabilities in GuardDuty itself, or leverage Security Hub, Athena, or third-party tools like Splunk to create custom dashboards and reports.

GuardDuty also integrates with Amazon EventBridge, which allows you to set up automatic notifications and automate responses to findings, and with Amazon Detective, which provides visualization tools to help investigate security issues.
Sources
How to Integrate Amazon GuardDuty Findings with On-Premises Splunk | AWS re:Post
Managing Amazon GuardDuty findings - Amazon GuardDuty
Query Amazon GuardDuty findings - Amazon Athena
Visibility and alerting - AWS Security Incident Response User Guide
GuardDuty integrating with AWS security services - Amazon GuardDuty

answered 6 months ago
0

Yes, you can definitely use AWS native services for GuardDuty reporting. OpenSearch is one option like u said, it can categorize findings by type (Recon, Malware, etc.) and severity with nice dashboards. Same way Guardduty natively integrates with Security Hub to give you a centralized dashboard based on which you can build automated workflows using Eventbridge. https://docs.aws.amazon.com/guardduty/latest/ug/securityhub-integration.html

GuardDuty doesn't store findings in S3 by default or generate CSV reports automatically. You'd need to set up EventBridge to send findings to S3, then use a Lambda function to convert them to CSV if needed or use Athena to run SQL queries on the S3 data. Both options work and depend on your use case.

For reporting, I'd recommend:

• "Security Hub + QuickSight" : cost effective and good for basic dashboards

• "OpenSearch" : more advanced analytics and real-time monitoring

• "Direct S3 export" - if you just need raw data and direct query for lambda/athena

The native AWS approach is usually much cheaper than third-party tools, which can run $5-50+ per GB monthly. Eg: Security Hub aggregates everything nicely and gives you a single pane of glass for all security findings

AWS
answered 6 months ago

You are not logged in. Log in to post an answer.

A good answer clearly answers the question and provides constructive feedback and encourages professional growth in the question asker.