Monitoring your infrastructure and safeguarding it against threats is not easy. Setting up the infrastructure, monitoring, collecting and analyzing information for threat detection, is indeed a cumbersome process. This is where a security monitoring service like Amazon GuardDuty can help. In this blog, we will explore Amazon GuardDuty service and discuss how integrating it with Squadcast, a Reliability Workflow Platform, can help you route alerts to the right users for quick and efficient incident response.
Amazon GuardDuty is a threat detection service used to monitor AWS accounts and workloads for malicious activity (threat detection) and to deliver detailed security findings, for quick remediation or response. It helps you in
It is a managed service offering message delivery from publishers to subscribers. Publishers use this service to communicate asynchronously with subscribers by sending messages to a 'topic'. A topic is a logical access point and communication channel. To receive published messages, users/consumers can subscribe to an SNS topic, using a supported endpoint type.
This service can fan out alerts to millions of subscribers, and it offers capabilities like,
Let us now go ahead and see how we can integrate Amazon GuardDuty with Squadcast to route alerts via an SNS endpoint.
Step1: Navigate to Services, then to Service Overview. Select or search for your Service. Expand the accordion and in the Alert Sources section, click Add.
Step2: Select Amazon GuardDuty. Copy the displayed Webhook URL to configure it within Amazon GuardDuty. Finish by clicking Add Alert Source and then Done.
Important: When an alert source turns Active, it’ll show up under Configured Alert Sources, you can either generate a test alert from the integration or wait for a real-time alert to be generated by the Alert Source. An Alert Source is active if there is a recorded incident via that Alert Source for the Service.
Step1: Login to your AWS account and proceed to SNS.
Step2: Click on Create topic.
Step3: Within the dialog box, fill in the details as per your requirements and then click on Create topic.
Step4: Inside the topic, click on Create Subscription.
Step5: Select the protocol as HTTPS and in the endpoint enter the URL you obtained from the previous step.
Step6: Finally, click on Create subscription to create the subscription.
The Subscription ID for the subscription should immediately change to Confirmed from PendingConfirmation. Click on the refresh button to verify the same.
Step1: If you have not enabled GuardDuty, please follow Amazon’s documentation (If you have already enabled GuardDuty, skip to Step2).
Step2: Once you have enabled GuardDuty, you can begin building EventBridge Rules to send alerts to Squadcast. Search and select EventBridge from the Services search bar.
Step3: Select Rules from the left menu, then click Create Rule. One or more rules can be created to send specific events to Squadcast when a GuardDuty finding is opened.
Step4: On the next page, perform the following:
Click Next to continue
Step5: On the next page, perform the following:
Step6: On the next page, perform the following:
Click Next to continue
Step7: On the next page, optionally add tags to your preference. Click Next to continue.
Step8: On the final page, review your settings and click Create Rule. If you would like to create more rules, repeat steps 3-7.
That's it, you are good to go! Your Amazon GuardDuty integration is complete. Now, whenever an event is triggered that matches your Event Rules, an incident will be created in Squadcast for it.
Amazon GuardDuty is a highly popular threat detection & continuous monitoring service, and integrating it with Squadcast can help you leverage various incident response and SRE features of Squadcast to keep your systems reliable. Do read this blog in case you wish to set up CloudTrail alerts via an SNS endpoint. Do check out other integrations that Squadcast supports.
Squadcast is an incident management tool that’s purpose-built for SRE. Get rid of unwanted alerts, receive relevant notifications and integrate with popular ChatOps tools. Work in collaboration using virtual incident war rooms and use automation to eliminate toil.