Remediating Runtime Monitoring findings
When you enable Runtime Monitoring for your account, Amazon GuardDuty may generate GuardDuty Runtime Monitoring finding types that indicate potential security issues in your AWS environment. The potential security issues indicate either a compromised Amazon EC2 instance, container workload, an Amazon EKS cluster, or a set of compromised credentials in your AWS environment. The security agent monitors runtime events from multiple resource types. To identify the potentially compromised resource, view Resource type in the generated finding details in the GuardDuty console. The following section describes the recommended remediation steps for each resource type.
Remediating compromised container images
When a GuardDuty finding indicates a task compromise, the image used to launch the task could be
malicious or compromised. GuardDuty findings identify the container image within the
resource.ecsClusterDetails.taskDetails.containers.image
field. You can determine
whether or not the image is malicious by scanning it for malware.
To remediate a compromised container image
-
Stop using the image immediately and remove it from your image repository.
-
Identify all of the tasks that are using this image.
-
Stop all of the tasks that are using the compromised image. Update their task definitions so that they stop using the compromised image.