Check provider logo

GuardDuty detector is enabled and not suspended

guardduty_is_enabled

Severityhigh
Serviceguardduty
by Prowler

Amazon GuardDuty detector existence and health are evaluated per Region. It identifies where GuardDuty isn't enabled for the account, where a detector has no status, or where a detector is configured but suspended.

Risk

Without active GuardDuty, threats in CloudTrail, VPC Flow Logs, DNS, S3, EKS, EBS, and Lambda can go unnoticed. Attackers can exfiltrate data, move laterally, and mine crypto, degrading confidentiality, integrity, and availability-especially in unmonitored Regions.

Run this check with Prowler CLI

prowler aws --checks guardduty_is_enabled

Fix finding with Prowler CLI

prowler aws --checks guardduty_is_enabled --fixer

Recommendation

Enable and keep GuardDuty active in all supported Regions and accounts under a delegated admin. Turn on relevant protection plans and auto-enroll new accounts. Avoid suspended detectors, enforce least privilege for admins, and integrate findings into response for defense in depth.

Remediation

Native IaC
Terraform
Other
  1. Sign in to the AWS Console and open Amazon GuardDuty
  2. Switch to the target AWS Region
  3. If prompted with Get started, click Enable GuardDuty
  4. If GuardDuty is already configured but suspended, go to Settings and click Enable (or Resume) to activate the detector
  5. Repeat in each required Region

Source Code

Resource Type

AwsGuardDutyDetector

References