# Configuring AWS GuardDuty with Lambda for Slack Notifications
Dennis Kelly
At Kong, we leverage many tools to protect our services and customers. [Terraform](https://www.terraform.io)Terraform from [HashiCorp](https://www.hashicorp.com)HashiCorp allows us to automate the process with Infrastructure as Code (IaC). Another important tool is [Amazon Web Services (AWS) GuardDuty](https://aws.amazon.com/guardduty)Amazon Web Services (AWS) GuardDuty, a continuous monitoring service for security threat detection in your AWS accounts. It analyzes events from CloudTrail, VPC Flow Logs and DNS logs using machine learning, anomaly detection and known threats to provide security intelligence in the form of GuardDuty alerts or *findings*. Multiple *member* AWS accounts can be aggregated into a *master* account to centrally manage alerts across an entire organization. It provides an enterprise with comprehensive threat detection, stronger security through automation and centralized management at scale.
GuardDuty is a regional service, so member accounts need to be invited for every region they use. Some accounts may not use the same regions as others. While there are more sophisticated ways to manage this, for the simplicity of this post, the following directory structure will be used:
# https://www.color-hex.com/color-palette/33993colors: low:"#fdc500" # Yellow
medium:"#fd8c00" # Orange
high:"#dc0000" # Red
# Format of GuardDuty finding URL
url:"https://console.aws.amazon.com/guardduty/home?region=%s#/findings?macros=current&fId=%s"
# Default webhook for unconfigured accounts
webhook: https://hooks.slack.com/services/XXXXXXXXX/XXXXXXXXX/XXXXXXXXXXXXXXXXXXXXXXXX
# Account specific settings
accounts:111111111111: name: member1
severity: medium
webhook: https://hooks.slack.com/services/XXXXXXXXX/XXXXXXXXX/XXXXXXXXXXXXXXXXXXXXXXXX
To setup a region directory, first add the account to the accounts directory. Using the example of an AWS account named *member1* with an ID of *111111111111*, create accounts/member1.tf:
When applied via Terraform, an email invitation from AWS will be sent allowing an administrator to login, enable GuardDuty and accept the invitation for the master account to be the GuardDuty administrator of the member account.
In the region directory, you will need the files *backend.conf *to configure the terraform state and *variables.tf* with the region (i.e. us-west-1). In the region directory, you can link *main.tf* and accounts desired:
$ cd us-west-1$ ln -s ../main.tf
$ ln -s ../accounts/member1.tf
To deploy the member account invitations in accounts.tf and the Lambda function:
GraphQL is a query language to enable applications to fetch data from servers. In fact, as it isn't tied to any specific database or storage engine, GraphQL can aggregate data from multiple sources to create a natural representation of your data.
Today, we're thrilled to announce that Kong Enterprise and Kong Konnect Data Planes are now validated to run on AWS Graviton3 processors and Amazon Linux 2023 OS. As an APN Advanced Tier Partner of AWS, we were delighted to have the opportunity to
I once heard someone say, "What the cloud migration strategies lack at the moment is a methodology to Lift-and-Shift connections to the cloud." Let's digest that. In today's landscape, maintaining a competitive edge and delivering a high-quality cus
Red Hat OpenShift is the industry's leading enterprise Kubernetes platform that runs ubiquitously across on-prem, and the cloud. With Red Hat OpenShift Service on AWS (ROSA) , a managed Red Hat OpenShift platform that runs natively on AWS, it is
A critical and challenging requirement for many organizations is meeting audit and compliance obligations. The goal of compliance is to secure business processes, sensitive data, and monitor for unauthorized activities or breaches.
AWS CloudTrail
From the modern application platform perspective, products should allow architects and DevOps teams to support dynamic topologies. That means a multi-platform capability is required but not sufficient. In fact, for several reasons, companies are loo
For the DevOps-averse developer, lambdas are heaven. They can focus on writing self-contained and modularized pieces of code, deploying these functions for on-demand execution without being concerned about resource management or infrastructure. Lamb