Security Hub Findings don't match Guard Duty findings

0

Per the recommendations from the Security pillar of a Well Architected Review conducted on our accounts, our company enabled Security Hub for a centralized view of security findings and Guard Duty for specific threat detection to our workloads that are dependent on EC2 and S3. We enabled both services at the AWS Organizations level. For Security Hub, we decided to start off with the AWS Foundation Security Best Practices v1 and CISD AWS Foundations Benchmark v1.2 controls enabled. For Guard Duty, we decided to start off with the default offerings plus the S3 Protection plan.

We allowed any potential findings to aggregate from all our accounts and post to both Security Hub and Guard Duty for our review. We noticed findings that appeared in Security Hub did not appear in Guard Duty. I'm trying to understand why there would be a discrepancy in what is reflected in the Security Hub vs Guard Duty. 

For reference:

  • In the Security Hub findings, we see a medium severity mark stating S3 bucket server access logging should be enabled, however, in Guard Duty there is no mention of this even with the S3 protection plan on.

Why is this?

已提問 8 個月前檢視次數 276 次
2 個答案
0
已接受的答案

Hello,

First, I think it’s worth noting the features and intended use between AWS Security Hub and Amazon GuardDuty:

  • AWS Security Hub is a cloud security posture management (CSPM) service that performs security best practice checks, aggregates alerts, and enables automated remediation.
  • Amazon GuardDuty is a threat detection service that continuously monitors your AWS accounts and workloads for malicious activity and delivers detailed security findings for visibility and remediation

GuardDuty can be integrated into Security Hub so that findings generated by GuardDuty can be aggregated into Security Hub for centralized viewing (along with any other enabled security services). Please reference Product integrations in AWS Security Hub and you can take further action.

With regard to the S3 finding you referenced, please see the Amazon S3 Controls for Security Hub, specifically S3.9 - S3 bucket server access logging should be enabled.

Also, please note this is an S3 control you are being notified to action on, per the AWS Foundational Security Best Practices v1 standard you enabled in Security Hub.

For GuardDuty, expect to see any of the following should GuardDuty detect suspicious behavior for your S3 buckets - GuardDuty S3 finding types.

If you are unsure of which source a finding originated from in Security Hub, you can do the following:

  1. Log into your AWS account that is serving as the delegated security administrator for Security Hub
  2. Navigate to the Security Hub console
  3. Select the Findings link on the far left
  4. Look for the Product filter and you will see the source/service of where a finding originated from

Hope this helps!

AWS
已回答 8 個月前
profile picture
專家
已審閱 7 個月前
0

Guard duty is an intelligent threat detection service where it monitors things such as DNS request logs, VPC Flow logs, CloudTrail event logs etc.

The S3 bucket findings is NOT part of Guard duty. That will be coming from AWS Config rules.

S3 protection in guard duty will be monitoring API calls and not how buckets are configured.

Security hub aggregates findings from multiple sources such as GuardDuty, Config, Macie, Inspector

profile picture
專家
已回答 8 個月前

您尚未登入。 登入 去張貼答案。

一個好的回答可以清楚地回答問題並提供建設性的意見回饋,同時有助於提問者的專業成長。

回答問題指南