Skip to main content

Cyware Orchestrate

Amazon GuardDuty

App Vendor: AWS

App Category: Network Security

Connector Version: 2.0.0

API Version: 1.28.0

About App

Amazon GuardDuty is a managed threat detection service that continuously monitors for malicious or unauthorised behaviour to help you protect your AWS accounts and workloads.

The Amazon GuardDuty app is configured with the Orchestrate application to perform the following actions:

Action Name

Description

Create Detector 

This action creates an Amazon GuardDuty detector on the integration instance specified for the AWS account.

Create IP Set 

This action creates a list of trusted IP addresses that have been whitelisted for a secure communication with the AWS infrastructure and applications.

Create Sample Findings 

This action generates sample findings of types.

Delete Detector 

This action deletes a detector.

Delete IP Set 

This action deletes an IP set.

Delete Threat Intel Set 

This action deletes a threat intel set.

Archive Findings 

This action archives Amazon GuardDuty findings specified by the list of finding IDs.

Create Threat Intel Set  

This action creates a threat intel set specified by ThreatIntelSet ID.

List Threat Intel Sets 

This action retrieves all the threat intel sets. 

Update Threat Intel Set 

This action is used to update the threat intel set specified by ThreatIntelSet ID.

Get Threat Intel Set 

This action retrieves all the threat intel sets.

Configuration Parameters

The following configuration parameters are required for the Amazon GuardDuty app to communicate with the Amazon GuardDuty enterprise application. The parameters can be configured by creating instances in the app.

Parameter

Description

Field Type

Required/Optional

Comments

Session Token 

Enter the session token.

Text

Optional

 

Region Name

Enter the AWS region for accessing the endpoint.

Text

Required

 

Access Key ID 

Enter the access key for accessing the endpoint.

Text

Required

 

Secret Access Key 

Enter the secret key to access the endpoint.

Password

Required

 

Action: Create Detector

This action creates an Amazon GuardDuty detector on the integration instance for the AWS account.

Action Input Parameters 

Parameter

Description

Field Type

Required/Optional

Comments

Client Token 

Enter the client token.

Password

Optional

 

Enable Detector 

Choose to enable the detector.

Boolean

Required

Allowed values:

  • true

  • false

Find Publishing Frequency

Enter the frequently updated findings.

Text

Optional

Allowed values :

  • FIFTEEN_MINUTES

  • ONE_HOUR

  • SIX_HOURS

Extra Params

Enter any additional parameters you want to pass while creating detector.

Example:{'Tags':tags}

Key_value

Optional

 

Example Request 

[
  {
    "extra_params": {},
    "enable_detector": false
  }
]
Action: Create IP Set

This action creates a list of trusted IP addresses that have been whitelisted for secure communication with AWS infrastructure and applications.

Action Input Parameters 

Parameter

Description

Field Type

Required/Optional

Comments

Is Active 

Enter true to start using the uploaded IP set.

Boolean

Required

Allowed values:

  • true

  • false

Client Token 

Enter the client token.

Password

Optional

 

Detector ID 

Enter the detector ID.

Example:

dac5b803e9471c624aaf2012e1

Text

Required

 

File Format 

Enter the file format.

Text

Required

Allowed values:

  • 'TXT''

  • 'STIX'

  • 'OTX_CSV'

  • 'ALIEN_VAULT'

  • 'PROOF_POINT'

  • 'FIRE_EYE'

IP set Location 

Enter the IP set location URL.

Example: 

https://s3.amazonaws.com/my-bucket/my-threat-list.txt

Text

Required

 

IP set name 

Enter the IP set name.

Text

Required

 

Example Request 

[
  {
    "detector_id": "0ec5c04d0c247d4ce01656ad6ef0bada"
  }
]
Action: Create Sample Findings

This action generates example findings of types specified by the list of finding types.

Action Input Parameters 

Parameter

Description

Field Type

Required/Optional

Comments

Detector ID 

Enter the detector ID.

Example: dac5b803e9471c624aaf2012e1

Text

Required

 

Finding types 

Enter the finding types.

List

Optional

 

Example Request 

[
  {
    "detector_id": "0ec5c04d0c247d4ce01656ad6ef0bada"
  }
]
Action: Delete Detector

This action deletes the detector.

Action Input Parameters 

Parameter

Description

Field Type

Required/Optional

Comments

Detector ID 

Enter the detector ID.

Example: dac5b803e9471c624aaf2012e1

Text

Required

 

Example Request 

[
  {
    "detector_id": "a0c5c04b43056842b4825939d2a40494"
  }
]
Action: Delete IP Set

This action deletes an IP set.

Action Input Parameters 

Parameter

Description

Field Type

Required/Optional

Comments

Detector ID 

Enter the unique ID of the detector that the IP set is associated with. 

Example: dac5b803e9471c624aaf2012e1

Text

Required

 

IP set ID 

Enter the IP set ID.

Text

Required

 

Example Request 

[
  {
    "ipset_id": "cac5c04d0d8ee90258f053f6734f0a92",
    "detector_id": "0ec5c04d0c247d4ce01656ad6ef0bada"
  }
]
Action: Delete Threat Intel Set

This action deletes the threat intel set.

Action Input Parameters 

Parameter

Description

Field Type

Required/Optional

Comments

Detector ID 

Enter the detector ID.

Text

Required

 

Threat Intel Set ID 

Enter the threat intel ID.

Text

Required

 

Example Request 

[
  {
    "detector_id": "0ec5c04d0c247d4ce01656ad6ef0bada",
    "threatintelset_id": "58c5c04d0ee2836cf7d02fad2d84a6de"
  }
]
Action: Archive Findings

This action is used to archive Amazon GuardDuty findings specified by the list of finding IDs.

Action Input Parameters 

Parameter

Description

Field Type

Required/Optional

Comments

Detector ID 

Enter the unique ID of the detector. 

Example: dac5b803e941c624aaf2012e1

Text

Required

 

Finding IDs 

Enter the comma separated list of finding ids. 

Example: 

$list['9424949dsa']

List

Required

 

Example Request 

[
  {
    "detector_id": "a0c5c04b43056842b4825939d2a40494",
    "finding_ids": [
      "46f36dfa6a204bc0a18473d493618493"
    ]
  }
]
Action: Create Threat Intel Set

This action is used to create a threat intel set specified by ThreatIntelSet ID.

Action Input Parameters 

Parameter

Description

Field Type

Required/Optional

Comments

Format 

Enter the format of the file that contains the threat intel set. 

Text

Required

Allowed values: 

  • 'txt'

  • 'stix'

  • 'otx_csv'

  • 'alien_vault'

  • 'proof_point'

  • 'fire_eye'

Detector ID 

Enter the unique ID of the detector that specifies the Guardd=Duty service whose threatintelset you want to create. 

Example: dac5b803e9471c624aaf2012e1

Text

Required

 

Name 

Enter the unique name that you want to create.

Text

Required

 

Location 

Enter the URI of the file that contains the threat intel set.

Text

Required

 

Activate 

Enter true to specify if the threat intel set is active.

Boolean

Required

 

Extra params 

Enter any additional params you want to pass while creating threat intel. Example:

{'tags':tags}

Key Value

Optional

 

Example Request 

[
  {
    "name": "Testgdapi",
    "activate": false,
    "location": "https://testbucketgdddd.s3.amazonaws.com/test-ip",
    "detector_id": "0ec5c04d0c247d4ce01656ad6ef0bada",
    "file_format": "“Txt.",
    "extra_params": {}
  }
]
Action: List Threat Intel Sets

This action retrieves all the threat intel sets.

Action Input Parameters 

Parameter

Description

Field Type

Required/Optional

Comments

Detector ID 

Enter the unique id of the detector that the ThreatIntelSet is associated with. 

Example: dac5b803e9471c624aaf2012e1

Text

Required

 

Max result 

Enter the maximum number of items that you want in the response.

Integer

Optional

default value:

50

Next token 

Enter the next token to fetch the next set of results.

Text

Optional

 

Example Request 

[
  {
    "detector_id": "0ec5c04d0c247d4ce01656ad6ef0bada"
  }
]
Action: Update Threat Intel Set

This action updates the threatintelset specified by the ThreatIntelSet ID.

Action Input Parameters 

Parameter

Description

Field Type

Required/Optional

Comments

Threat intel set ID

Enter the unique ID that specifies the ThreatIntelSet that you want to update.

Text

Required

 

Detector ID

Enter the unique ID of the detector that specifies the GuardDuty service whose ThreatIntelSet you want to update. 

Example: dac5b803e9471c624c2aaf2012e1

Text

Required

 

Name 

Enter the unique ID that specifies the ThreatIntelSet that you want to update.

Text

Optional

 

Location 

Enter the updated URI of the file that contains the ThreatIntelSet.

Text

Optional

 

Activate 

Enter the updated boolean value that specifies whether the ThreatIntelSet is active or not.

Boolean

Optional

 

Example Request 

[
  {
    "activate": false,
    "detector_id": "0ec5c04d0c247d4ce01656ad6ef0bada",
    "threatintelset_id": "58c5c04d0ee2836cf7d02fad2d84a6de"
  }
]
Get Threat Intel Set

This action retrieves all the threat intel sets.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Detector ID

Enter the unique ID of the detector that the threat intel set is associated with. 

Example: dac5b803e9471c624aaf2012e1

Text

Required

 

Threat Intel Set ID

Enter the unique ID that specifies the Threat Intel Set that you want to get.

Text 

Required