Alert sources
You should consider using the following sources to define alerts:
-
Findings – AWS services such as Amazon GuardDuty
, AWS Security Hub , Amazon Macie , Amazon Inspector , AWS Config , IAM Access Analyzer, and Network Access Analyzer generate findings that can be used to craft alerts. -
Logs – AWS service, infrastructure, and application logs stored in Amazon S3 buckets and CloudWatch log groups can be parsed and correlated to generate alerts.
-
Billing activity – A sudden change in billing activity can indicate a security event. Follow the documentation on Creating a billing alarm to monitor your estimated AWS charges to monitor for this.
-
Cyber threat intelligence – If you subscribe to a third-party cyber threat intelligence feed, you can correlate that information with other logging and monitoring tools to identify potential indicators of events.
-
Partner tools – Partners in the AWS Partner Network (APN) offer top-tier products that can help you meet your security objectives. For incident response, partner products with endpoint detection and response (EDR) or SIEM can help support your incident response objectives. For more information, see Security Partner Solutions
and Security Solutions in the AWS Marketplace . -
AWS trust and safety – Support might contact customers if we identify abusive or malicious activity.
-
One-time contact – Because it can be your customers, developers, or other staff in your organization who notice something unusual, it’s important to have a well-known, well-publicized method of contacting your security team. Popular choices include ticketing systems, contact email addresses, and web forms. If your organization works with the general public, you might also need a public-facing security contact mechanism.
For more information about cloud capabilities that you can use during your investigations, refer to Appendix A: Cloud capability definitions in this document.