Monitor the security of your AWS environment with GuardDuty, CloudTrail, and New Relic One
Blog post from New Relic
Cloud computing offers significant advantages such as flexibility and scalability, but it also presents potential security challenges, especially on platforms like Amazon Web Services (AWS). Amazon GuardDuty, a threat detection service, can mitigate these issues by monitoring AWS accounts, workloads, and data for threats. This process involves integrating GuardDuty with AWS CloudTrail and New Relic One, enhancing observability and allowing users to correlate AWS security events with telemetry data, visualize them in dashboards, and alert teams for rapid resolution. To implement this integration, you configure Amazon EventBridge and Amazon Kinesis Firehose to stream GuardDuty findings to New Relic Logs, and set up an API polling integration to capture CloudTrail events. Additionally, dashboard visualizations and NRQL alerts facilitate monitoring of specific threats such as SSH brute force attacks and public access to S3 buckets, improving the speed and efficacy of security event remediation.