TalksAWS re:Invent 2025 - Protecting Your Infrastructure with Amazon Threat Intelligence (SEC311)

AWS re:Invent 2025 - Protecting Your Infrastructure with Amazon Threat Intelligence (SEC311)

Protecting Your Infrastructure with Amazon Threat Intelligence

AWS's Unique Visibility and Scale

  • AWS interacts with 60% of the entire internet daily, equating to 2.6 billion out of 4 billion IPv4 addresses
  • This global visibility comes from AWS's networking stack, which sees 4.8 billion network flow records and 34 million DNS requests per second
  • AWS also has visibility into 100 million API requests per second and 1 billion host telemetry events per second
  • This massive scale allows AWS to collect and analyze over 6 billion security telemetry events per second

AWS's Threat Intelligence Capabilities

  • AWS operates a data platform that can handle the high-volume data, with the ability to:
    • Perform real-time stream filtering and threat detection
    • Store and optimize data for historical querying and investigation
    • Selectively summarize data for long-term retention
  • AWS's threat intelligence comes from multiple sources:
    • Deception technologies like honeypots that elicit malicious behavior
    • Human analysts tracking specific threat actors and campaigns
    • Automated detection and analysis of the security telemetry data

AWS-Wide Protections

  • AWS can apply mitigations at scale, such as:
    • Blocking malicious IPs at the networking layer
    • Selectively throttling abusive API usage
    • Isolating abusive EC2 instances from the network
  • AWS also notifies customers of threats through email and integrations with services like GuardDuty

Customer-Level Protections

  • Customers can leverage AWS's threat intelligence through services like:
    • AWS Network Firewall, which includes managed rules for active threat defense
    • AWS WAF, which has managed rule groups for IP reputations, anonymous IPs, and known bad inputs
    • AWS Inspector, which incorporates AWS's vulnerability intelligence to prioritize remediation
  • AWS GuardDuty can ingest AWS's global threat intelligence to enhance its local detection capabilities

Protecting Against Network Reconnaissance

  • AWS detects broad network scanning and probing using traffic analysis and behavioral monitoring
  • Malicious scans are blocked at the networking layer, and the associated IPs are added to a threat intelligence feed
  • Customers can leverage this threat intelligence through Network Firewall and GuardDuty

Mitigating Compromised Credentials

  • Compromised credentials, especially long-lived AWS API keys, are a major source of security incidents
  • AWS detects attempts to validate large numbers of stolen credentials across accounts
  • AWS can apply a "compromised key quarantine" policy to disable high-risk functionality for affected credentials
  • Customers should enable GuardDuty and configure services like WAF's account takeover prevention rules

Defending Against Malware

  • AWS analyzes malware samples collected from honeypots and network traffic patterns
  • Malware command-and-control infrastructure is identified and blocked at scale
  • Customers can leverage services like Route 53 DNS Firewall, GuardDuty runtime monitoring, and S3 malware protection

Key Takeaways

  • AWS's global visibility and scale allow it to collect and analyze vast amounts of security telemetry
  • AWS leverages this data to proactively detect, mitigate, and share threat intelligence with customers
  • Customers can take advantage of AWS's threat intelligence by configuring native security services like Network Firewall, WAF, and GuardDuty
  • Adopting these services can significantly enhance an organization's security posture against common threats like reconnaissance, credential compromise, and malware

Your Digital Journey deserves a great story.

Build one with us.

Cookies Icon

These cookies are used to collect information about how you interact with this website and allow us to remember you. We use this information to improve and customize your browsing experience, as well as for analytics.

If you decline, your information won’t be tracked when you visit this website. A single cookie will be used in your browser to remember your preference.