Investigating Security Incidents with Amazon Detective - Root Cause Identification Through Graph Analysis

Learn about investigating GuardDuty findings with Detective, entity profiles, and leveraging behavior graphs.

Detective Overview

Detective is a service that automatically analyzes security findings and investigates root causes. After GuardDuty notifies you of "suspicious API calls detected," Detective supports the investigation phase of digging into "who did what, when, and from where." It automatically aggregates CloudTrail, VPC Flow Logs, and GuardDuty findings, visualizing anomalous patterns through behavior graphs.

Behavior Graphs and Entity Profiles

Behavior graphs automatically aggregate CloudTrail, VPC Flow Logs, and GuardDuty findings, building relationships between entities (IAM users, roles, EC2 instances, IP addresses) in a graph database. Entity profiles maintain baseline behavioral patterns for specific IAM users or EC2 instances over the past 12 months (API call frequency, communication destination IPs, data transfer volumes), highlighting anomalous activity. When you pivot from a GuardDuty finding to Detective, behavioral timelines for related entities are displayed, enabling you to trace unauthorized access paths.

Investigation Workflow

Detective's investigation workflow starts from GuardDuty findings. Clicking a finding displays entity profiles for related IAM roles, EC2 instances, and IP addresses. Profiles visualize 12 months of API call patterns, network connections, and geographic connection sources in a timeline. You can visually identify anomalous patterns such as "this role suddenly accessed a service it normally doesn't" or "connections from unusual IP addresses increased." The Investigation feature automatically expands the investigation scope, tracing related entities in a chain. For detailed information about security investigation, you can also check related books on Amazon.

Detective Pricing

Detective pricing is based on the volume of data ingested. CloudTrail management events cost approximately $2 per GB, and VPC Flow Logs cost approximately $0.75 per GB. The first 30 days are a free trial, allowing you to estimate actual costs in advance. When aggregating data from all accounts through Organizations integration, data volumes can be large, so verify costs beforehand. Use GuardDuty data as the primary source, and enable VPC Flow Logs ingestion based on security requirements.

Summary

Detective is a service that investigates the root cause of security incidents using behavior graphs and entity profiles. Starting investigations from GuardDuty findings, it automatically aggregates CloudTrail and VPC Flow Logs data to visualize anomalies in API call patterns and network connections over the past 12 months in a timeline.