Skip to content

Commit 0edc0cd

Browse files
author
AWS
committed
Amazon GuardDuty Update: Adding support for extended threat detection for EKS Audit Logs and EKS Runtime Monitoring.
1 parent ce5ec47 commit 0edc0cd

File tree

2 files changed

+215
-8
lines changed

2 files changed

+215
-8
lines changed
Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,6 @@
1+
{
2+
"type": "feature",
3+
"category": "Amazon GuardDuty",
4+
"contributor": "",
5+
"description": "Adding support for extended threat detection for EKS Audit Logs and EKS Runtime Monitoring."
6+
}

services/guardduty/src/main/resources/codegen-resources/service-2.json

Lines changed: 209 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -454,7 +454,7 @@
454454
{"shape":"BadRequestException"},
455455
{"shape":"InternalServerErrorException"}
456456
],
457-
"documentation":"<p>Provides the details of the GuardDuty administrator account associated with the current GuardDuty member account.</p> <note> <p>If the organization's management account or a delegated administrator runs this API, it will return success (<code>HTTP 200</code>) but no content.</p> </note>"
457+
"documentation":"<p>Provides the details of the GuardDuty administrator account associated with the current GuardDuty member account.</p> <p>Based on the type of account that runs this API, the following list shows how the API behavior varies:</p> <ul> <li> <p>When the GuardDuty administrator account runs this API, it will return success (<code>HTTP 200</code>) but no content.</p> </li> <li> <p>When a member account runs this API, it will return the details of the GuardDuty administrator account that is associated with this calling member account.</p> </li> <li> <p>When an individual account (not associated with an organization) runs this API, it will return success (<code>HTTP 200</code>) but no content.</p> </li> </ul>"
458458
},
459459
"GetCoverageStatistics":{
460460
"name":"GetCoverageStatistics",
@@ -1318,7 +1318,7 @@
13181318
},
13191319
"Email":{
13201320
"shape":"Email",
1321-
"documentation":"<p>The email address of the member account.</p>",
1321+
"documentation":"<p>The email address of the member account.</p> <p>The rules for a valid email address:</p> <ul> <li> <p>The email address must be a minimum of 6 and a maximum of 64 characters long.</p> </li> <li> <p>All characters must be 7-bit ASCII characters.</p> </li> <li> <p>There must be one and only one @ symbol, which separates the local name from the domain name.</p> </li> <li> <p>The local name can't contain any of the following characters:</p> <p>whitespace, \" ' ( ) &lt; &gt; [ ] : ' , \\ | % &amp;</p> </li> <li> <p>The local name can't begin with a dot (.).</p> </li> <li> <p>The domain name can consist of only the characters [a-z], [A-Z], [0-9], hyphen (-), or dot (.).</p> </li> <li> <p>The domain name can't begin or end with a dot (.) or hyphen (-).</p> </li> <li> <p>The domain name must contain at least one dot. </p> </li> </ul>",
13221322
"locationName":"email"
13231323
}
13241324
},
@@ -1474,6 +1474,11 @@
14741474
"shape":"Session",
14751475
"documentation":"<p>Contains information about the user session where the activity initiated.</p>",
14761476
"locationName":"session"
1477+
},
1478+
"Process":{
1479+
"shape":"ActorProcess",
1480+
"documentation":"<p>Contains information about the process associated with the threat actor. This includes details such as process name, path, execution time, and unique identifiers that help track the actor's activities within the system.</p>",
1481+
"locationName":"process"
14771482
}
14781483
},
14791484
"documentation":"<p>Information about the actors involved in an attack sequence.</p>"
@@ -1483,11 +1488,40 @@
14831488
"member":{"shape":"String"},
14841489
"max":400
14851490
},
1491+
"ActorProcess":{
1492+
"type":"structure",
1493+
"required":[
1494+
"Name",
1495+
"Path"
1496+
],
1497+
"members":{
1498+
"Name":{
1499+
"shape":"ProcessName",
1500+
"documentation":"<p>The name of the process as it appears in the system.</p>",
1501+
"locationName":"name"
1502+
},
1503+
"Path":{
1504+
"shape":"ProcessPath",
1505+
"documentation":"<p>The full file path to the process executable on the system.</p>",
1506+
"locationName":"path"
1507+
},
1508+
"Sha256":{
1509+
"shape":"ProcessSha256",
1510+
"documentation":"<p>The SHA256 hash of the process executable file, which can be used for identification and verification purposes.</p>",
1511+
"locationName":"sha256"
1512+
}
1513+
},
1514+
"documentation":"<p>Contains information about a process involved in a GuardDuty finding, including process identification, execution details, and file information.</p>"
1515+
},
14861516
"Actors":{
14871517
"type":"list",
14881518
"member":{"shape":"Actor"},
14891519
"max":400
14901520
},
1521+
"AdditionalSequenceTypes":{
1522+
"type":"list",
1523+
"member":{"shape":"FindingType"}
1524+
},
14911525
"AddonDetails":{
14921526
"type":"structure",
14931527
"members":{
@@ -1862,6 +1896,17 @@
18621896
},
18631897
"documentation":"<p>Contains information on the status of CloudTrail as a data source for the detector.</p>"
18641898
},
1899+
"ClusterStatus":{
1900+
"type":"string",
1901+
"enum":[
1902+
"CREATING",
1903+
"ACTIVE",
1904+
"DELETING",
1905+
"FAILED",
1906+
"UPDATING",
1907+
"PENDING"
1908+
]
1909+
},
18651910
"Condition":{
18661911
"type":"structure",
18671912
"members":{
@@ -1993,6 +2038,28 @@
19932038
},
19942039
"documentation":"<p>Details of a container.</p>"
19952040
},
2041+
"ContainerFindingResource":{
2042+
"type":"structure",
2043+
"required":["Image"],
2044+
"members":{
2045+
"Image":{
2046+
"shape":"String",
2047+
"documentation":"<p>The container image information, including the image name and tag used to run the container that was involved in the finding.</p>",
2048+
"locationName":"image"
2049+
},
2050+
"ImageUid":{
2051+
"shape":"ContainerImageUid",
2052+
"documentation":"<p>The unique ID associated with the container image.</p>",
2053+
"locationName":"imageUid"
2054+
}
2055+
},
2056+
"documentation":"<p>Contains information about container resources involved in a GuardDuty finding. This structure provides details about containers that were identified as part of suspicious or malicious activity.</p>"
2057+
},
2058+
"ContainerImageUid":{
2059+
"type":"string",
2060+
"max":1024,
2061+
"min":1
2062+
},
19962063
"ContainerInstanceDetails":{
19972064
"type":"structure",
19982065
"members":{
@@ -2009,6 +2076,15 @@
20092076
},
20102077
"documentation":"<p>Contains information about the Amazon EC2 instance that is running the Amazon ECS container.</p>"
20112078
},
2079+
"ContainerUid":{
2080+
"type":"string",
2081+
"max":256,
2082+
"min":0
2083+
},
2084+
"ContainerUids":{
2085+
"type":"list",
2086+
"member":{"shape":"ContainerUid"}
2087+
},
20122088
"Containers":{
20132089
"type":"list",
20142090
"member":{"shape":"Container"}
@@ -3771,6 +3847,17 @@
37713847
},
37723848
"documentation":"<p>Details about the potentially impacted Amazon EC2 instance resource.</p>"
37733849
},
3850+
"Ec2InstanceUid":{
3851+
"type":"string",
3852+
"max":256,
3853+
"min":0
3854+
},
3855+
"Ec2InstanceUids":{
3856+
"type":"list",
3857+
"member":{"shape":"Ec2InstanceUid"},
3858+
"max":25,
3859+
"min":0
3860+
},
37743861
"Ec2NetworkInterface":{
37753862
"type":"structure",
37763863
"members":{
@@ -3918,6 +4005,37 @@
39184005
},
39194006
"documentation":"<p>Contains information about the task in an ECS cluster.</p>"
39204007
},
4008+
"EksCluster":{
4009+
"type":"structure",
4010+
"members":{
4011+
"Arn":{
4012+
"shape":"String",
4013+
"documentation":"<p>The Amazon Resource Name (ARN) that uniquely identifies the Amazon EKS cluster involved in the finding.</p>",
4014+
"locationName":"arn"
4015+
},
4016+
"CreatedAt":{
4017+
"shape":"Timestamp",
4018+
"documentation":"<p>The timestamp indicating when the Amazon EKS cluster was created, in UTC format.</p>",
4019+
"locationName":"createdAt"
4020+
},
4021+
"Status":{
4022+
"shape":"ClusterStatus",
4023+
"documentation":"<p>The current status of the Amazon EKS cluster.</p>",
4024+
"locationName":"status"
4025+
},
4026+
"VpcId":{
4027+
"shape":"String",
4028+
"documentation":"<p>The ID of the Amazon Virtual Private Cloud (Amazon VPC) associated with the Amazon EKS cluster.</p>",
4029+
"locationName":"vpcId"
4030+
},
4031+
"Ec2InstanceUids":{
4032+
"shape":"Ec2InstanceUids",
4033+
"documentation":"<p>A list of unique identifiers for the Amazon EC2 instances that serve as worker nodes in the Amazon EKS cluster.</p>",
4034+
"locationName":"ec2InstanceUids"
4035+
}
4036+
},
4037+
"documentation":"<p>Contains information about the Amazon EKS cluster involved in a GuardDuty finding, including cluster identification, status, and network configuration.</p>"
4038+
},
39214039
"EksClusterDetails":{
39224040
"type":"structure",
39234041
"members":{
@@ -3957,7 +4075,8 @@
39574075
"Email":{
39584076
"type":"string",
39594077
"max":64,
3960-
"min":1,
4078+
"min":6,
4079+
"pattern":"See rules in parameter description",
39614080
"sensitive":true
39624081
},
39634082
"EnableOrganizationAdminAccountRequest":{
@@ -4087,7 +4206,7 @@
40874206
"members":{
40884207
"CriterionKey":{
40894208
"shape":"CriterionKey",
4090-
"documentation":"<p>An enum value representing possible scan properties to match with given scan entries.</p> <note> <p>Replace the enum value <code>CLUSTER_NAME</code> with <code>EKS_CLUSTER_NAME</code>. <code>CLUSTER_NAME</code> has been deprecated.</p> </note>",
4209+
"documentation":"<p>An enum value representing possible scan properties to match with given scan entries.</p>",
40914210
"locationName":"criterionKey"
40924211
},
40934212
"FilterCondition":{
@@ -4177,7 +4296,7 @@
41774296
},
41784297
"Region":{
41794298
"shape":"String",
4180-
"documentation":"<p>The Region where the finding was generated.</p>",
4299+
"documentation":"<p>The Region where the finding was generated. For findings generated from <a href=\"https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-concepts.html#cloudtrail-concepts-global-service-events\">Global Service Events</a>, the Region value in the finding might differ from the Region where GuardDuty identifies the potential threat. For more information, see <a href=\"https://docs.aws.amazon.com/guardduty/latest/ug/guardduty_data-sources.html#cloudtrail_global\">How GuardDuty handles Amazon Web Services CloudTrail global events</a> in the <i>Amazon GuardDuty User Guide</i>.</p>",
41814300
"locationName":"region"
41824301
},
41834302
"Resource":{
@@ -4258,7 +4377,10 @@
42584377
"EC2_NETWORK_INTERFACE",
42594378
"S3_BUCKET",
42604379
"S3_OBJECT",
4261-
"ACCESS_KEY"
4380+
"ACCESS_KEY",
4381+
"EKS_CLUSTER",
4382+
"KUBERNETES_WORKLOAD",
4383+
"CONTAINER"
42624384
]
42634385
},
42644386
"FindingStatisticType":{
@@ -5244,7 +5366,13 @@
52445366
"ATTACK_TECHNIQUE",
52455367
"UNUSUAL_API_FOR_ACCOUNT",
52465368
"UNUSUAL_ASN_FOR_ACCOUNT",
5247-
"UNUSUAL_ASN_FOR_USER"
5369+
"UNUSUAL_ASN_FOR_USER",
5370+
"SUSPICIOUS_PROCESS",
5371+
"MALICIOUS_DOMAIN",
5372+
"MALICIOUS_PROCESS",
5373+
"CRYPTOMINING_IP",
5374+
"CRYPTOMINING_DOMAIN",
5375+
"CRYPTOMINING_PROCESS"
52485376
]
52495377
},
52505378
"IndicatorValueString":{
@@ -5659,6 +5787,19 @@
56595787
},
56605788
"documentation":"<p>Information about the Kubernetes API for which you check if you have permission to call.</p>"
56615789
},
5790+
"KubernetesResourcesTypes":{
5791+
"type":"string",
5792+
"enum":[
5793+
"PODS",
5794+
"JOBS",
5795+
"CRONJOBS",
5796+
"DEPLOYMENTS",
5797+
"DAEMONSETS",
5798+
"STATEFULSETS",
5799+
"REPLICASETS",
5800+
"REPLICATIONCONTROLLERS"
5801+
]
5802+
},
56625803
"KubernetesRoleBindingDetails":{
56635804
"type":"structure",
56645805
"members":{
@@ -5742,6 +5883,27 @@
57425883
},
57435884
"documentation":"<p>Details about the Kubernetes user involved in a Kubernetes finding.</p>"
57445885
},
5886+
"KubernetesWorkload":{
5887+
"type":"structure",
5888+
"members":{
5889+
"ContainerUids":{
5890+
"shape":"ContainerUids",
5891+
"documentation":"<p>A list of unique identifiers for the containers that are part of the Kubernetes workload.</p>",
5892+
"locationName":"containerUids"
5893+
},
5894+
"Namespace":{
5895+
"shape":"String",
5896+
"documentation":"<p>The Kubernetes namespace in which the workload is running, providing logical isolation within the cluster.</p>",
5897+
"locationName":"namespace"
5898+
},
5899+
"KubernetesResourcesTypes":{
5900+
"shape":"KubernetesResourcesTypes",
5901+
"documentation":"<p>The types of Kubernetes resources involved in the workload.</p>",
5902+
"locationName":"kubernetesResourcesTypes"
5903+
}
5904+
},
5905+
"documentation":"<p>Contains information about Kubernetes workloads involved in a GuardDuty finding, including pods, deployments, and other Kubernetes resources.</p>"
5906+
},
57455907
"KubernetesWorkloadDetails":{
57465908
"type":"structure",
57475909
"members":{
@@ -7620,6 +7782,21 @@
76207782
},
76217783
"documentation":"<p>Information about the observed process.</p>"
76227784
},
7785+
"ProcessName":{
7786+
"type":"string",
7787+
"max":4096,
7788+
"min":0
7789+
},
7790+
"ProcessPath":{
7791+
"type":"string",
7792+
"max":4096,
7793+
"min":0
7794+
},
7795+
"ProcessSha256":{
7796+
"type":"string",
7797+
"max":1024,
7798+
"min":0
7799+
},
76237800
"ProductCode":{
76247801
"type":"structure",
76257802
"members":{
@@ -8018,6 +8195,21 @@
80188195
"shape":"S3Object",
80198196
"documentation":"<p>Contains information about the Amazon S3 object.</p>",
80208197
"locationName":"s3Object"
8198+
},
8199+
"EksCluster":{
8200+
"shape":"EksCluster",
8201+
"documentation":"<p>Contains detailed information about the Amazon EKS cluster associated with the activity that prompted GuardDuty to generate a finding.</p>",
8202+
"locationName":"eksCluster"
8203+
},
8204+
"KubernetesWorkload":{
8205+
"shape":"KubernetesWorkload",
8206+
"documentation":"<p>Contains detailed information about the Kubernetes workload associated with the activity that prompted GuardDuty to generate a finding.</p>",
8207+
"locationName":"kubernetesWorkload"
8208+
},
8209+
"Container":{
8210+
"shape":"ContainerFindingResource",
8211+
"documentation":"<p>Contains detailed information about the container associated with the activity that prompted GuardDuty to generate a finding.</p>",
8212+
"locationName":"container"
80218213
}
80228214
},
80238215
"documentation":"<p>Contains information about the Amazon Web Services resource that is associated with the activity that prompted GuardDuty to generate a finding.</p>"
@@ -8883,6 +9075,11 @@
88839075
"shape":"Indicators",
88849076
"documentation":"<p>Contains information about the indicators observed in the attack sequence.</p>",
88859077
"locationName":"sequenceIndicators"
9078+
},
9079+
"AdditionalSequenceTypes":{
9080+
"shape":"AdditionalSequenceTypes",
9081+
"documentation":"<p>Additional types of sequences that may be associated with the attack sequence finding, providing further context about the nature of the detected threat.</p>",
9082+
"locationName":"additionalSequenceTypes"
88869083
}
88879084
},
88889085
"documentation":"<p>Contains information about the GuardDuty attack sequence finding.</p>"
@@ -9139,7 +9336,11 @@
91399336
"enum":[
91409337
"FINDING",
91419338
"CLOUD_TRAIL",
9142-
"S3_DATA_EVENTS"
9339+
"S3_DATA_EVENTS",
9340+
"EKS_AUDIT_LOGS",
9341+
"FLOW_LOGS",
9342+
"DNS_LOGS",
9343+
"RUNTIME_MONITORING"
91439344
]
91449345
},
91459346
"Signals":{

0 commit comments

Comments
 (0)