AWS Security Specialty

GuardDuty Extended Threat Detection

15 questions to test your knowledge

Reveal answers one at a time as you go

⏱️ Time Remaining
37:30
2.5 minutes per question
Quiz Progress 0 / 15 answered
1
What is GuardDuty Extended Threat Detection primarily designed to detect?
Correct Answer: B

GuardDuty Extended Threat Detection automatically detects multi-stage attacks that span data sources, multiple types of AWS resources, and time within an AWS account. It correlates multiple events including API activities and GuardDuty findings (called "signals") to identify scenarios that present a potential threat.

Extended Threat Detection Overview
2
What severity level does GuardDuty assign to all attack sequence finding types?
Correct Answer: C

Because of the nature of the associated threat scenarios, GuardDuty considers ALL attack sequence finding types as Critical. This reflects the serious nature of multi-stage attacks that typically indicate active compromise.

Critical Severity Level Definition
3
When you enable GuardDuty in a Region, what happens with Extended Threat Detection?
Correct Answer: A

When you enable Amazon GuardDuty in your account in a specific AWS Region, Extended Threat Detection is also enabled by default. There is no additional cost associated with the usage of Extended Threat Detection.

How Extended Threat Detection Works
4
What does GuardDuty call the individual events it correlates to detect attack sequences?
Correct Answer: D

GuardDuty correlates multiple events, including API activities and GuardDuty findings. These events are called "Signals". Some events are termed "weak signals" because, on their own, they don't present a clear potential threat but become significant when correlated with other activities.

How Signals Work in Extended Threat Detection
5
Which of the following is NOT one of the attack sequence finding types in GuardDuty?
Correct Answer: B

The five attack sequence finding types are: AttackSequence:EKS/CompromisedCluster, AttackSequence:ECS/CompromisedCluster, AttackSequence:EC2/CompromisedInstanceGroup, AttackSequence:IAM/CompromisedCredentials, and AttackSequence:S3/CompromisedData. There is no Lambda-specific attack sequence finding type.

Complete List of Attack Sequence Finding Types
6
What is the rolling time window that GuardDuty uses to identify potential in-progress or recent attack behaviors?
Correct Answer: C

GuardDuty is designed to identify potential in-progress or recent attack behaviors within a 24-hour rolling time window in your account. This allows detection of attack sequences where different stages may occur over several hours.

24-Hour Rolling Time Window
7
How does Extended Threat Detection handle archived findings (including those from suppression rules)?
Correct Answer: A

When correlating events for attack sequences, Extended Threat Detection doesn't consider archived findings, including those that are automatically archived because of suppression rules. This ensures only active, relevant signals contribute to attack sequence detection. You should review existing suppression rules to ensure you're not impacted.

Suppression Rules with Extended Threat Detection
8
Which THREE foundational data sources does GuardDuty use for threat detection?
Correct Answer: D

GuardDuty's three foundational data sources are: AWS CloudTrail management events (control plane operations), VPC Flow Logs (network traffic metadata), and Route53 Resolver DNS query logs (DNS queries). These are automatically analyzed when GuardDuty is enabled at no additional cost for the data source access.

GuardDuty Foundational Data Sources
9
To maximize attack sequence detection for Amazon EKS clusters, which protection plans does AWS recommend enabling?
Correct Answer: B

For maximum coverage and comprehensive threat detection in EKS, GuardDuty recommends enabling both EKS Protection and Runtime Monitoring. EKS Protection monitors control plane activities through audit logs, while Runtime Monitoring observes behaviors within containers. Together, they create a complete view enabling detection of complex attack patterns.

Detecting Attack Sequences in EKS Clusters
10
What is a "weak signal" in GuardDuty Extended Threat Detection?
Correct Answer: C

Weak signals are events in your environment that, on their own, don't present themselves as a clear potential threat. GuardDuty terms individual API activities as weak signals because they don't present themselves as potential threats in isolation. Extended Threat Detection identifies when a sequence of multiple actions (including weak signals) align to potentially suspicious activity.

Weak Signals Concept Definition
11
In a typical attack scenario detected by Extended Threat Detection, what might be the sequence involving S3 data compromise?
Correct Answer: A

A typical attack sequence involving S3 data compromise would include: a threat actor gaining unauthorized access to a compute workload, then performing actions such as privilege escalation and establishing persistence, and finally exfiltrating data from an Amazon S3 resource. This represents the multi-stage nature of attacks that Extended Threat Detection identifies.

Attack Sequence Threat Scenario Examples
12
Which data sources does the AttackSequence:ECS/CompromisedCluster finding type use?
Correct Answer: D

The AttackSequence:ECS/CompromisedCluster finding uses: Runtime Monitoring for Amazon ECS Fargate, Runtime Monitoring for EC2 Instances in Amazon ECS, and GuardDuty Malware Protection for Amazon EC2. These sources detect malicious processes, communications with malicious endpoints, or cryptocurrency mining behaviors in ECS clusters.

AttackSequence:ECS/CompromisedCluster Finding
13
How does GuardDuty handle CloudTrail Global Service Events (GSE) like IAM and STS?
Correct Answer: B

When GuardDuty consumes CloudTrail Global Service Events (like IAM, STS, S3, CloudFront, Route 53) with security value, it replicates those events and processes them in each Region where you have enabled GuardDuty. This helps maintain user and role profiles in each Region, vital for detecting anomalous events.

CloudTrail Management Events & Global Service Events
14
What does the AttackSequence:EC2/CompromisedInstanceGroup finding typically indicate about the affected resources?
Correct Answer: C

Instance groups typically represent applications managed through infrastructure-as-code, sharing similar configurations such as Auto-scaling group, IAM instance profile role, AWS CloudFormation stack, Amazon EC2 launch template, AMI or VPC ID. The finding indicates potential compromise across this group of related instances.

AttackSequence:EC2/CompromisedInstanceGroup Finding
15
When EKS Protection detects an attack sequence, which threat scenario can it identify through EKS audit logs?
Correct Answer: A

EKS Protection through audit logs allows GuardDuty to correlate EKS audit logs and AWS API activity. It can detect attack sequences where an actor attempts unauthorized access to cluster secrets, modifies Kubernetes role-based access control (RBAC) permissions, and creates privileged pods. Container-level behaviors like cryptomining are detected by Runtime Monitoring instead.

EKS Protection Audit Log Detection

⚠️ You have 0 unanswered questions

0%
Quiz Complete!
PASS
Pass threshold: 80%
0
Correct
0
Incorrect