paws.security.identity (version 0.5.0)

guardduty: Amazon GuardDuty

Description

Amazon GuardDuty is a continuous security monitoring service that analyzes and processes the following foundational data sources - VPC flow logs, Amazon Web Services CloudTrail management event logs, CloudTrail S3 data event logs, EKS audit logs, DNS logs, Amazon EBS volume data, runtime activity belonging to container workloads, such as Amazon EKS, Amazon ECS (including Amazon Web Services Fargate), and Amazon EC2 instances. It uses threat intelligence feeds, such as lists of malicious IPs and domains, and machine learning to identify unexpected, potentially unauthorized, and malicious activity within your Amazon Web Services environment. This can include issues like escalations of privileges, uses of exposed credentials, or communication with malicious IPs, domains, or presence of malware on your Amazon EC2 instances and container workloads. For example, GuardDuty can detect compromised EC2 instances and container workloads serving malware, or mining bitcoin.

GuardDuty also monitors Amazon Web Services account access behavior for signs of compromise, such as unauthorized infrastructure deployments like EC2 instances deployed in a Region that has never been used, or unusual API calls like a password policy change to reduce password strength.

GuardDuty informs you about the status of your Amazon Web Services environment by producing security findings that you can view in the GuardDuty console or through Amazon EventBridge. For more information, see the Amazon GuardDuty User Guide .

Usage

guardduty(
  config = list(),
  credentials = list(),
  endpoint = NULL,
  region = NULL
)

Value

A client for the service. You can call the service's operations using syntax like svc$operation(...), where svc is the name you've assigned to the client. The available operations are listed in the Operations section.

Arguments

config

Optional configuration of credentials, endpoint, and/or region.

  • credentials:

    • creds:

      • access_key_id: AWS access key ID

      • secret_access_key: AWS secret access key

      • session_token: AWS temporary session token

    • profile: The name of a profile to use. If not given, then the default profile is used.

    • anonymous: Set anonymous credentials.

  • endpoint: The complete URL to use for the constructed client.

  • region: The AWS Region used in instantiating the client.

  • close_connection: Immediately close all HTTP connections.

  • timeout: The time in seconds till a timeout exception is thrown when attempting to make a connection. The default is 60 seconds.

  • s3_force_path_style: Set this to true to force the request to use path-style addressing, i.e. http://s3.amazonaws.com/BUCKET/KEY.

  • sts_regional_endpoint: Set sts regional endpoint resolver to regional or legacy https://docs.aws.amazon.com/sdkref/latest/guide/feature-sts-regionalized-endpoints.html

credentials

Optional credentials shorthand for the config parameter

  • creds:

    • access_key_id: AWS access key ID

    • secret_access_key: AWS secret access key

    • session_token: AWS temporary session token

  • profile: The name of a profile to use. If not given, then the default profile is used.

  • anonymous: Set anonymous credentials.

endpoint

Optional shorthand for complete URL to use for the constructed client.

region

Optional shorthand for AWS Region used in instantiating the client.

Service syntax

svc <- guardduty(
  config = list(
    credentials = list(
      creds = list(
        access_key_id = "string",
        secret_access_key = "string",
        session_token = "string"
      ),
      profile = "string",
      anonymous = "logical"
    ),
    endpoint = "string",
    region = "string",
    close_connection = "logical",
    timeout = "numeric",
    s3_force_path_style = "logical",
    sts_regional_endpoint = "string"
  ),
  credentials = list(
    creds = list(
      access_key_id = "string",
      secret_access_key = "string",
      session_token = "string"
    ),
    profile = "string",
    anonymous = "logical"
  ),
  endpoint = "string",
  region = "string"
)

Operations

accept_administrator_invitationAccepts the invitation to be a member account and get monitored by a GuardDuty administrator account that sent the invitation
accept_invitationAccepts the invitation to be monitored by a GuardDuty administrator account
archive_findingsArchives GuardDuty findings that are specified by the list of finding IDs
create_detectorCreates a single Amazon GuardDuty detector
create_filterCreates a filter using the specified finding criteria
create_ip_setCreates a new IPSet, which is called a trusted IP list in the console user interface
create_membersCreates member accounts of the current Amazon Web Services account by specifying a list of Amazon Web Services account IDs
create_publishing_destinationCreates a publishing destination to export findings to
create_sample_findingsGenerates sample findings of types specified by the list of finding types
create_threat_intel_setCreates a new ThreatIntelSet
decline_invitationsDeclines invitations sent to the current member account by Amazon Web Services accounts specified by their account IDs
delete_detectorDeletes an Amazon GuardDuty detector that is specified by the detector ID
delete_filterDeletes the filter specified by the filter name
delete_invitationsDeletes invitations sent to the current member account by Amazon Web Services accounts specified by their account IDs
delete_ip_setDeletes the IPSet specified by the ipSetId
delete_membersDeletes GuardDuty member accounts (to the current GuardDuty administrator account) specified by the account IDs
delete_publishing_destinationDeletes the publishing definition with the specified destinationId
delete_threat_intel_setDeletes the ThreatIntelSet specified by the ThreatIntelSet ID
describe_malware_scansReturns a list of malware scans
describe_organization_configurationReturns information about the account selected as the delegated administrator for GuardDuty
describe_publishing_destinationReturns information about the publishing destination specified by the provided destinationId
disable_organization_admin_accountRemoves the existing GuardDuty delegated administrator of the organization
disassociate_from_administrator_accountDisassociates the current GuardDuty member account from its administrator account
disassociate_from_master_accountDisassociates the current GuardDuty member account from its administrator account
disassociate_membersDisassociates GuardDuty member accounts (from the current administrator account) specified by the account IDs
enable_organization_admin_accountDesignates an Amazon Web Services account within the organization as your GuardDuty delegated administrator
get_administrator_accountProvides the details of the GuardDuty administrator account associated with the current GuardDuty member account
get_coverage_statisticsRetrieves aggregated statistics for your account
get_detectorRetrieves an Amazon GuardDuty detector specified by the detectorId
get_filterReturns the details of the filter specified by the filter name
get_findingsDescribes Amazon GuardDuty findings specified by finding IDs
get_findings_statisticsLists Amazon GuardDuty findings statistics for the specified detector ID
get_invitations_countReturns the count of all GuardDuty membership invitations that were sent to the current member account except the currently accepted invitation
get_ip_setRetrieves the IPSet specified by the ipSetId
get_malware_scan_settingsReturns the details of the malware scan settings
get_master_accountProvides the details for the GuardDuty administrator account associated with the current GuardDuty member account
get_member_detectorsDescribes which data sources are enabled for the member account's detector
get_membersRetrieves GuardDuty member accounts (of the current GuardDuty administrator account) specified by the account IDs
get_organization_statisticsRetrieves how many active member accounts in your Amazon Web Services organization have each feature enabled within GuardDuty
get_remaining_free_trial_daysProvides the number of days left for each data source used in the free trial period
get_threat_intel_setRetrieves the ThreatIntelSet that is specified by the ThreatIntelSet ID
get_usage_statisticsLists Amazon GuardDuty usage statistics over the last 30 days for the specified detector ID
invite_membersInvites Amazon Web Services accounts to become members of an organization administered by the Amazon Web Services account that invokes this API
list_coverageLists coverage details for your GuardDuty account
list_detectorsLists detectorIds of all the existing Amazon GuardDuty detector resources
list_filtersReturns a paginated list of the current filters
list_findingsLists Amazon GuardDuty findings for the specified detector ID
list_invitationsLists all GuardDuty membership invitations that were sent to the current Amazon Web Services account
list_ip_setsLists the IPSets of the GuardDuty service specified by the detector ID
list_membersLists details about all member accounts for the current GuardDuty administrator account
list_organization_admin_accountsLists the accounts designated as GuardDuty delegated administrators
list_publishing_destinationsReturns a list of publishing destinations associated with the specified detectorId
list_tags_for_resourceLists tags for a resource
list_threat_intel_setsLists the ThreatIntelSets of the GuardDuty service specified by the detector ID
start_malware_scanInitiates the malware scan
start_monitoring_membersTurns on GuardDuty monitoring of the specified member accounts
stop_monitoring_membersStops GuardDuty monitoring for the specified member accounts
tag_resourceAdds tags to a resource
unarchive_findingsUnarchives GuardDuty findings specified by the findingIds
untag_resourceRemoves tags from a resource
update_detectorUpdates the Amazon GuardDuty detector specified by the detectorId
update_filterUpdates the filter specified by the filter name
update_findings_feedbackMarks the specified GuardDuty findings as useful or not useful
update_ip_setUpdates the IPSet specified by the IPSet ID
update_malware_scan_settingsUpdates the malware scan settings
update_member_detectorsContains information on member accounts to be updated
update_organization_configurationConfigures the delegated administrator account with the provided values
update_publishing_destinationUpdates information about the publishing destination specified by the destinationId
update_threat_intel_setUpdates the ThreatIntelSet specified by the ThreatIntelSet ID

Examples

Run this code
if (FALSE) {
svc <- guardduty()
svc$accept_administrator_invitation(
  Foo = 123
)
}

Run the code above in your browser using DataLab