Guardduty

Guardduty taxonomy generated by the site skill importer.

4 skills
M
detecting-s3-data-exfiltration-attempts

by mukul975

detecting-s3-data-exfiltration-attempts helps investigate possible AWS S3 data theft by correlating CloudTrail S3 data events, GuardDuty findings, Amazon Macie alerts, and S3 access patterns. Use this detecting-s3-data-exfiltration-attempts skill for Security Audit, incident response, and suspicious bulk-download analysis.

Security Audit
Favorites 0GitHub 6.2k
M
detecting-cryptomining-in-cloud

by mukul975

detecting-cryptomining-in-cloud helps security teams detect unauthorized cryptomining in cloud workloads by correlating cost spikes, mining-port traffic, GuardDuty crypto findings, and runtime process evidence. Use it for triage, detection engineering, and detecting-cryptomining-in-cloud for Security Audit workflows.

Security Audit
Favorites 0GitHub 0
M
detecting-compromised-cloud-credentials

by mukul975

detecting-compromised-cloud-credentials is a cloud security skill for AWS, Azure, and GCP that helps confirm credential abuse, trace anomalous API activity, investigate impossible travel and suspicious logins, and scope incident impact with provider telemetry and alerts.

Security Audit
Favorites 0GitHub 0
M
detecting-cloud-threats-with-guardduty

by mukul975

detecting-cloud-threats-with-guardduty guides AWS teams through enabling Amazon GuardDuty, reviewing findings, and building automated response for cloud threats across accounts and workloads. It is useful for GuardDuty install, usage, and day-two operations in Cloud Architecture.

Cloud Architecture
Favorites 0GitHub 0