Understand the threat landscape
Develop threat models
By developing threat models, organizations can identify threats and mitigations
before an unauthorized user can. There are a number of strategies and approaches to threat
modeling; refer to the How to
approach threat modeling
Integrate and use cyber
threat intelligence
Cyber threat intelligence is the data and analysis of a threat actor’s intent, opportunity, and capability. Obtaining and using threat intelligence is helpful to detect an incident early and to better understand threat actor behavior. Cyber threat intelligence includes static indicators like IP addresses or file hashes of malware. It also includes high-level information, like behavioral patterns and intent. You can collect threat intelligence from a number of cyber security vendors and from open-source repositories.
To integrate and maximize threat intelligence for your AWS environment, you can use
some out-of-the-box capabilities and integrate your own threat intelligence lists.
Amazon GuardDuty uses AWS internal and third-party threat intelligence sources. Other AWS
services, such as a DNS firewall and AWS WAF rules, also take inputs from AWS' advanced
threat intelligence group. Some GuardDuty findings are mapped to the MITRE ATT&CK Framework