This section focuses on the following exam objectives:
Domain 1: Detection
Task Statement 1.1: Design and implement monitoring and alerting solutions for an AWS account or organization
Detection in AWS involves continuously observing workloads, identifying anomalies, and triggering automated responses before issues escalate into security incidents.
Unlike traditional environments, AWS systems are:
Because of this, monitoring must be:
In scenario-based questions, you will be expected to:
| Best Practice | Description | AWS Services |
|---|---|---|
| Workload Analysis | Identify monitoring needs based on workload type | CloudWatch, CloudTrail |
| Centralized Logging | Aggregate logs across accounts | CloudWatch Logs, S3, Security Lake |
| Threat Detection | Use managed detection services | GuardDuty, Macie, Inspector |
| Alerting | Configure real-time alerts | CloudWatch Alarms, SNS |
| Automation | Trigger remediation workflows | EventBridge, Lambda |
| Compliance Monitoring | Enforce compliance checks | AWS Config, Conformance Packs |
| Visualization | Monitor trends and anomalies | CloudWatch Dashboards |
Monitoring begins with understanding workload behavior and associated risks.
| Workload Type | Monitoring Focus | AWS Services |
|---|---|---|
| EC2 / Compute | CPU, memory, system logs | CloudWatch, GuardDuty |
| S3 / Storage | Access patterns, data exposure | Macie, CloudTrail |
| IAM / Identity | Login attempts, API activity | CloudTrail, GuardDuty |
| Networking | Traffic anomalies | VPC Flow Logs |
Always apply this mapping:
Workload → Risk → Monitoring Service
An effective monitoring strategy combines multiple components:
| Component | Description | AWS Service |
|---|---|---|
| Metrics | Performance indicators | CloudWatch Metrics |
| Logs | Detailed activity records | CloudWatch Logs |
| Health Checks | Resource availability | Route 53 Health Checks |
| Tracing | Request-level visibility | AWS X-Ray |
Use multi-layer monitoring instead of relying on a single service.
Centralized aggregation provides unified visibility across accounts.
| Service | Purpose |
|---|---|
| AWS Security Hub | Centralized findings (ASFF format) |
| Amazon Security Lake | Centralized security data repository |
| CloudWatch Logs | Log aggregation |
| AWS Organizations | Multi-account governance |
If a question mentions multi-account environments, the answer typically involves centralization.
Effective detection requires visibility, alerting, and response.
| Component | Purpose | AWS Service |
|---|---|---|
| Metrics | Collect data | CloudWatch |
| Alarms | Trigger alerts | CloudWatch Alarms |
| Dashboards | Visualize trends | CloudWatch Dashboards |
| Notifications | Alert teams | SNS |
| Service | Function |
|---|---|
| GuardDuty | ML-based threat detection |
| Security Hub | Aggregates findings |
| Macie | Sensitive data detection |
| Inspector | Vulnerability scanning |
GuardDuty → Security Hub → EventBridge → Lambda/SNS
Correct answers typically emphasize:
Automation ensures continuous compliance and rapid response.
| Service | Function |
|---|---|
| AWS Config | Track configuration changes |
| Conformance Packs | Predefined compliance rules |
| Systems Manager State Manager | Enforce configurations |
| EventBridge | Event-driven triggers |
| Lambda | Automated remediation |
Automation is always preferred over manual intervention.
| Service | Role |
|---|---|
| GuardDuty | Threat detection |
| Security Hub | Centralized findings |
| Macie | Sensitive data discovery |
| Inspector | Vulnerability detection |
| CloudTrail | API logging |
| AWS Config | Configuration tracking |
| Amazon Detective | Investigation and root cause analysis |
This is a common exam scenario pattern:
{
"source": ["aws.guardduty"],
"detail-type": ["GuardDuty Finding"]
}
Always identify:
Look for:
Designing monitoring and alerting solutions in AWS requires: