Learn Domain 1: Threat Detection and Incident Response (AWS SCS-C02) with Interactive Flashcards

Master key concepts in Domain 1: Threat Detection and Incident Response through our interactive flashcard system. Click on each card to reveal detailed explanations and enhance your understanding.

Amazon GuardDuty

Amazon GuardDuty is a fully managed, intelligent threat detection service provided by AWS that continuously monitors your AWS accounts, workloads, and data for malicious activity and unauthorized behavior. It is a cornerstone service within Domain 1: Threat Detection and Incident Response of the AWS Certified Security – Specialty (SCS-C02) exam.

GuardDuty leverages machine learning, anomaly detection, and integrated threat intelligence feeds (including AWS-curated sources and third-party feeds like CrowdStrike and Proofpoint) to identify potential threats. It analyzes multiple data sources, including AWS CloudTrail event logs (management and data events), Amazon VPC Flow Logs, DNS query logs, Amazon EKS audit logs, Amazon S3 data events, and RDS login activity.

Key features include:

1. **Finding Types**: GuardDuty generates findings categorized into three main threat categories — Reconnaissance (e.g., port scanning), Instance Compromise (e.g., cryptocurrency mining, malware communication), and Account Compromise (e.g., unusual API calls from anomalous locations).

2. **Multi-Account Support**: Through AWS Organizations integration, GuardDuty supports centralized management via a delegated administrator account, enabling organization-wide threat detection.

3. **Automated Response**: Findings can be sent to Amazon EventBridge, enabling automated remediation workflows using AWS Lambda, AWS Step Functions, or integration with AWS Security Hub for centralized security management.

4. **Malware Protection**: GuardDuty offers malware scanning for Amazon EBS volumes attached to EC2 instances and container workloads when suspicious activity is detected.

5. **Severity Levels**: Findings are classified as Low, Medium, or High severity, helping security teams prioritize incident response efforts.

6. **No Infrastructure Management**: GuardDuty requires no agents, sensors, or additional infrastructure — it can be enabled with a single click and operates independently without impacting workload performance.

For the SCS-C02 exam, understanding how GuardDuty integrates with Security Hub, EventBridge, and Lambda for automated incident response pipelines is critical. It is a foundational service for building a robust threat detection and response architecture on AWS.

AWS Security Hub

AWS Security Hub is a comprehensive cloud security posture management (CSPM) service that provides a centralized view of your security state across your AWS environment. It is a critical service covered under Domain 1: Threat Detection and Incident Response of the AWS Certified Security – Specialty (SCS-C02) exam.

**Key Features:**

1. **Centralized Security Dashboard:** Security Hub aggregates, organizes, and prioritizes security findings from multiple AWS services such as Amazon GuardDuty, Amazon Inspector, Amazon Macie, AWS Firewall Manager, and AWS IAM Access Analyzer, as well as third-party partner solutions.

2. **Automated Compliance Checks:** It continuously evaluates your AWS resources against security standards and best practices, including AWS Foundational Security Best Practices (FSBP), CIS AWS Foundations Benchmark, PCI DSS, and NIST 800-53.

3. **AWS Security Finding Format (ASFF):** All findings are normalized into a standardized format called ASFF, enabling consistent analysis and correlation across multiple security tools.

4. **Cross-Account and Cross-Region Aggregation:** Security Hub supports multi-account management through AWS Organizations integration, allowing a delegated administrator to aggregate findings from all member accounts and regions into a single pane of glass.

5. **Automated Response and Remediation:** Security Hub integrates with Amazon EventBridge, enabling automated workflows for incident response. You can create custom actions to trigger Lambda functions, send notifications via SNS, or initiate remediation steps.

6. **Insights:** Security Hub provides managed and custom insights, which are collections of related findings that help identify trends and prioritize security issues requiring attention.

**Exam Relevance:**
For the SCS-C02 exam, understanding how Security Hub centralizes threat detection findings, enables automated incident response through EventBridge integration, and supports compliance monitoring is essential. You should know how it integrates with other AWS security services, how to configure cross-account aggregation, and how to leverage automated remediation pipelines to respond to security events efficiently.

Amazon Macie

Amazon Macie is a fully managed data security and data privacy service provided by AWS that uses machine learning and pattern matching to discover, classify, and protect sensitive data stored in Amazon S3. It is a critical service within the AWS security ecosystem, particularly relevant to Domain 1: Threat Detection and Incident Response of the SCS-C02 exam.

**Key Capabilities:**

1. **Sensitive Data Discovery:** Macie automatically scans S3 buckets to identify sensitive data such as Personally Identifiable Information (PII), financial data (credit card numbers), Protected Health Information (PHI), API keys, and credentials. It uses managed data identifiers and supports custom data identifiers using regex patterns.

2. **S3 Security Posture Assessment:** Macie continuously evaluates your S3 environment to detect buckets that are publicly accessible, unencrypted, or shared with external AWS accounts. It provides a comprehensive inventory and security assessment of your S3 resources.

3. **Automated Alerting:** When sensitive data or security issues are detected, Macie generates findings that can be published to AWS Security Hub, Amazon EventBridge, or viewed directly in the Macie console. This enables automated incident response workflows.

4. **Integration with AWS Services:** Macie integrates with EventBridge to trigger Lambda functions, SNS notifications, or Step Functions for automated remediation. It also feeds findings into Security Hub for centralized security management.

5. **Multi-Account Support:** Through AWS Organizations integration, Macie can be managed centrally across multiple accounts using a delegated administrator model.

**Relevance to Threat Detection:**
Macie plays a vital role in identifying data exposure risks before they become incidents. It helps detect accidental data leaks, misconfigured bucket policies, and unauthorized data access patterns. Security teams can use Macie findings to prioritize remediation efforts and respond to potential data breaches proactively.

**Cost Consideration:** Pricing is based on the number of S3 buckets evaluated and the volume of data inspected for sensitive content, making it important to scope scanning jobs appropriately.

Incident Response in AWS

Incident Response in AWS is a critical component of the AWS Certified Security – Specialty (SCS-C02) exam, falling under Domain 1: Threat Detection and Incident Response. It refers to the structured approach for identifying, containing, eradicating, and recovering from security events within AWS environments.

AWS Incident Response follows a lifecycle model that includes: **Preparation**, **Detection and Analysis**, **Containment**, **Eradication and Recovery**, and **Post-Incident Activity**.

**Preparation** involves setting up the right tools and access controls beforehand. This includes configuring AWS CloudTrail for API logging, enabling Amazon GuardDuty for threat detection, setting up AWS Config for resource tracking, and creating IAM roles specifically for incident responders.

**Detection and Analysis** leverages services like Amazon GuardDuty, AWS Security Hub, Amazon Detective, and CloudWatch Alarms to identify anomalies and potential threats. These services aggregate findings and provide actionable intelligence.

**Containment** strategies in AWS include isolating compromised EC2 instances by modifying security groups, revoking IAM credentials, restricting S3 bucket access, and using VPC Network ACLs to block malicious traffic. AWS enables automated containment through Lambda functions triggered by EventBridge rules.

**Eradication and Recovery** involves removing threats by terminating compromised resources, rotating credentials, patching vulnerabilities, and restoring from clean backups or snapshots. AWS CloudFormation helps rebuild infrastructure from known-good templates.

**Post-Incident Activity** includes conducting root cause analysis, updating runbooks, and improving detection capabilities based on lessons learned.

Key AWS services for incident response include AWS Organizations for account isolation, AWS Step Functions for orchestrating automated response workflows, and Amazon S3 with object lock for preserving forensic evidence. The concept of automation is central—AWS encourages building automated playbooks using services like Systems Manager Automation and Lambda to reduce response times.

A best practice is maintaining a dedicated forensics account where compromised resources can be analyzed in isolation, ensuring evidence integrity while minimizing impact on production environments.

Compromised EC2 Instances

Compromised EC2 Instances represent a critical security concern in AWS environments and are a key topic in the SCS-C02 exam under Threat Detection and Incident Response. A compromised EC2 instance occurs when an unauthorized party gains access to or control over an instance, typically through vulnerabilities, misconfigurations, stolen credentials, or malware.

**Detection Methods:**
AWS provides several services to detect compromised instances. **Amazon GuardDuty** is the primary tool, generating findings such as unusual API calls, cryptocurrency mining activity, communication with known command-and-control servers, DNS exfiltration, or unauthorized port probing. **AWS CloudTrail** logs API activity that may reveal suspicious behavior, while **VPC Flow Logs** can identify abnormal network traffic patterns. **AWS Security Hub** aggregates findings across services for centralized visibility.

**Common Indicators of Compromise:**
- Unusual outbound network traffic (data exfiltration)
- Spikes in CPU utilization (cryptomining)
- Communication with malicious IP addresses
- Unexpected IAM credential usage from the instance
- Unauthorized changes to security groups or configurations

**Incident Response Steps:**
1. **Capture metadata and evidence** — Take snapshots of EBS volumes, capture memory dumps, and record instance metadata for forensic analysis.
2. **Isolate the instance** — Replace the security group with a restrictive forensic security group that blocks all inbound/outbound traffic (except forensic access), but do NOT terminate the instance immediately to preserve evidence.
3. **Protect related resources** — Invalidate and rotate any IAM temporary credentials associated with the instance role using the IAM console to revoke active sessions.
4. **Investigate** — Analyze CloudTrail logs, VPC Flow Logs, and GuardDuty findings. Perform offline forensic analysis on EBS snapshots.
5. **Eradicate and recover** — Terminate the compromised instance, deploy a clean replacement from a trusted AMI, patch vulnerabilities, and strengthen security controls.
6. **Post-incident review** — Document lessons learned and update security policies.

Automation through **AWS Lambda**, **Step Functions**, and **EventBridge** can streamline response workflows, enabling rapid containment when GuardDuty detects threats.

Compromised IAM Credentials

Compromised IAM Credentials represent a critical security threat in AWS environments where an unauthorized party gains access to IAM user access keys, secret keys, session tokens, or console passwords. This is a key topic under Domain 1 of the SCS-C02 exam.

**Detection Methods:**
AWS provides several services to detect compromised credentials:
- **AWS GuardDuty** identifies unusual API calls, unauthorized access patterns, and flags findings like `UnauthorizedAccess:IAMUser/InstanceCredentialExfiltration` when credentials are used from external IP addresses.
- **AWS CloudTrail** logs all API activity, enabling detection of suspicious actions such as API calls from unusual geographic locations or unfamiliar IP addresses.
- **AWS Access Analyzer** helps identify resources shared with external entities and validates IAM policies.
- **Amazon Detective** assists in investigating the root cause and scope of credential compromise.

**Common Indicators of Compromise:**
- API calls from unrecognized IP addresses or regions
- Unusual resource provisioning (e.g., launching crypto-mining instances)
- Changes to IAM policies or security configurations
- Access patterns outside normal business hours
- Credentials exposed in public repositories (detected by AWS Health events or GuardDuty)

**Incident Response Steps:**
1. **Identify** the compromised credentials using GuardDuty findings or CloudTrail analysis.
2. **Disable/Rotate** the compromised credentials immediately — deactivate access keys, revoke temporary session credentials by adding a deny-all inline policy or revoking sessions.
3. **Assess Impact** by reviewing CloudTrail logs to determine what actions were performed with the compromised credentials.
4. **Remediate** any unauthorized changes such as rogue resources, modified policies, or backdoor accounts created by the attacker.
5. **Prevent Recurrence** by enforcing MFA, implementing least-privilege policies, using AWS Organizations SCPs, enabling credential rotation, and setting up automated alerting through EventBridge rules triggered by GuardDuty findings.

For temporary credentials (STS tokens), you must revoke active sessions since simply rotating keys won't invalidate them. Understanding these response procedures is essential for the SCS-C02 exam.

AWS WAF and Shield

AWS WAF (Web Application Firewall) and AWS Shield are critical security services designed to protect applications from web-based threats and DDoS (Distributed Denial of Service) attacks, both essential topics under Domain 1: Threat Detection and Incident Response of the SCS-C02 exam.

**AWS WAF** is a web application firewall that allows you to monitor and control HTTP/HTTPS requests forwarded to protected resources such as Amazon CloudFront, Application Load Balancer (ALB), Amazon API Gateway, and AWS AppSync. It works by defining Web ACLs (Access Control Lists) containing rules that inspect incoming traffic based on conditions like IP addresses, HTTP headers, URI strings, SQL injection patterns, and cross-site scripting (XSS). Rules can be custom-built or sourced from AWS Managed Rule Groups and AWS Marketplace. WAF supports rate-based rules to detect and mitigate request flooding. It integrates with AWS Firewall Manager for centralized management across multiple accounts.

**AWS Shield** provides DDoS protection at two tiers:

1. **Shield Standard** – Automatically included at no extra cost for all AWS customers. It protects against common Layer 3 and Layer 4 DDoS attacks such as SYN floods, UDP reflection attacks, and DNS query floods.

2. **Shield Advanced** – A paid service offering enhanced protection for Amazon EC2, Elastic Load Balancing, CloudFront, Global Accelerator, and Route 53. It provides real-time attack visibility, advanced attack mitigation, 24/7 access to the AWS DDoS Response Team (DRT), cost protection against DDoS-related scaling charges, and detailed attack diagnostics via AWS Shield Advanced dashboards.

For incident response, both services integrate with Amazon CloudWatch for monitoring, AWS CloudTrail for audit logging, and Amazon SNS for alerting. WAF logs can be sent to Amazon S3, CloudWatch Logs, or Amazon Kinesis Data Firehose for analysis. Together, AWS WAF and Shield form a layered defense strategy, enabling proactive threat detection, automated mitigation, and rapid incident response against web-layer and volumetric attacks.

More Domain 1: Threat Detection and Incident Response questions
420 questions (total)