In November, as part of the re:Invent 2017 keynote, Amazon Web Services announced a new hacker intrusion monitoring and detection service: Amazon GuardDuty — an agentless service that can be enabled across all AWS accounts and workloads with a few clicks in the AWS Management Console. In this blog we will explore the features and benefits of Amazon GuardDuty, as well as the advantages of bundling this service with CloudCheckr’s Cloud Management Platform (CMP) that optimizes spend, eliminates waste and improves security and compliance across multi-cloud deployments.
With no upfront cost and no need to install software or security infrastructure, Amazon GuardDuty provides the following benefits:
The following schematic summarizes how Amazon GuardDuty works:
As noted, there are no upfront costs for the GuardDuty service. After a 30-day free trial, users pay only for the events analyzed, as follows:
As an AWS partner, CloudCheckr believes that GuardDuty provides an important link in the cloud security chain. However, the ideal solution is to avoid hacks in the first place by using CloudCheckr, adhering to our Best Practice checklist, and staying compliant with the leading security standards.
With both CloudCheckr’s CMP and Amazon GuardDuty in place, AWS users can rest easier knowing that most hack attempts will be thwarted by CloudCheckr before they become bona fide threats. Additionally, Amazon GuardDuty will provide another important level of protection should some of those attempts succeed in compromising their AWS accounts or instances.
CloudCheckr and Amazon GuardDuty make an ideal pair for protecting against security intrusions and detection, without the overhead associated with an agent.
Schedule a demo to see how CloudCheckr can keep your cloud environment secure, or try a 14-day free trial.