AWS脅威検知:定義、リスク、およびアプローチ

主な洞察

  • AWS threat detection transforms cloud logs and metadata into attacker-behavior signals, enabling identification and prioritization of suspicious activity across AWS environments — critical as over 70% of cloud breaches now originate from compromised identities.
  • その目的は、断片化されたログ、高い誤検知率、不明確なアイデンティティ帰属に起因する可視性のギャップを解消し、調査の遅延を軽減することにある。
  • Rather than relying on isolated events, it focuses on detecting multi-step attacker behaviors, including role chaining, logging evasion, and lateral movement across cloud services.
  • AWS native tools like Amazon GuardDuty, AWS Security Hub, and Amazon Detective provide foundational detection capabilities, but behavioral correlation across identity, network, and cloud activity is essential for catching sophisticated attacks.

AWS threat detection refers to identifying and prioritizing malicious or suspicious activity in AWS by analyzing cloud telemetry for signs of attacker behavior. Rather than evaluating single events in isolation, this approach examines what an actor is doing across identities, roles, and services. With 80% of organizations experiencing at least one cloud security breach in the past year and public cloud incidents averaging $5.17 million per breach, the stakes for effective AWS threat detection continue to grow.

AWS environments generate large volumes of logs and metadata that are difficult to interpret independently. Connecting this telemetry into behavioral signals helps reveal attacker movement through a cloud attack lifecycle, which matters because uncorrelated activity can delay investigation and response.

AWS脅威検知が実際に意味するもの

実際の運用では、AWS脅威検知は関連するアクションを振る舞い として結び付け、調査と優先順位付けを可能にします。クラウドテレメトリを無関係なアラートの集合体として扱うのではなく、活動を潜在的な攻撃シーケンスの証拠として解釈します。この区別が重要なのは、多くのAWSアクションが技術的には正当な操作でありながら、アクセス権、ロール、サービスの悪用を表している場合があるためです。

Activity types that reveal intent across time and services:

  • Using compromised identities to gain initial access to AWS resources.
  • Assuming roles and leverage temporary credentials to obscure the original actor.
  • Chaining or "jumping" between roles to evade attribution across multiple accounts or services.
  • Evading defenses by attempting to disable, suppress, or bypass logging.
  • Exfiltrating data or performing destructive actions after expanding privileges.

AWS threat detection tools and services

AWS provides several native security services that form the foundation of a cloud threat detection strategy. Understanding what each tool does — and where gaps remain — helps teams build effective detection coverage.

Amazon GuardDuty

Amazon GuardDuty is the primary AWS threat detection service. It continuously analyzes CloudTrail management events, VPC Flow Logs, DNS query logs, and runtime telemetry using machine learning, anomaly detection, and integrated threat intelligence. In December 2025, AWS launched Extended Threat Detection for EC2 and ECS, which uses AI/ML to correlate signals across multiple data sources and map multi-stage attack sequences to MITRE ATT&CK tactics.

AWS Security Hub

Security Hub aggregates findings from GuardDuty, Amazon Inspector, AWS Config, and third-party tools into a unified dashboard. It provides compliance checks against standards like CIS AWS Foundations and supports automated remediation through integrations with AWS Lambda and Amazon EventBridge.

Amazon Detective

Detective complements GuardDuty by providing deeper investigative analysis. When GuardDuty identifies a high-severity finding, Detective helps trace the origin, scope, and relationships of the suspicious activity across resources.

Table: AWS native threat detection services compared

能力 Amazon GuardDuty AWS Security Hub Amazon Detective
主な焦点 Threat detection via ML and behavioral analysis Centralized findings aggregation and compliance Investigative analysis and root cause tracing
データソース CloudTrail, VPC Flow Logs, DNS, S3, EKS, ECS Aggregates from GuardDuty, Inspector, Config, Macie Log correlations across GuardDuty findings and AWS logs
主要な強み Real-time detection with low false positives Unified view that reduces alert fatigue Deep forensics beyond initial detection
Limitation Scope limited to individual AWS events without cross-environment correlation Aggregation without behavioral analysis Reactive — requires an initial finding to investigate

These native tools provide essential coverage, but they focus on activity within AWS. Attacks that start outside AWS — through compromised identity providers, on-premises networks, or SaaS applications — require additional correlation across hybrid environments to detect the full attack chain.

なぜログ中心のAWS監視は攻撃者の振る舞いを見逃すのか

Log-centric monitoring in AWS often fails to expose attacker behavior because events are analyzed as standalone records. Attribution frequently stops at the most recent role or temporary credential, causing investigations to focus on the wrong abstraction. As a result, defenders may not identify the original actor in time to contain activity before impact.

Failure modes when AWS activity is evaluated as isolated events:

  • Event-by-event alerting that fails to connect actions across services or time
  • Incomplete attribution that stops at an assumed role instead of tracing back to the original actor
  • Siloed views across accounts, regions, and domains that prevent a unified narrative
  • Manual correlation burden that delays response and increases cognitive load
  • High alert volume that obscures which identity or account poses the highest risk

脅威検知が明らかにする攻撃者の振る舞い

Understanding how attackers move through AWS requires looking beyond individual service actions. Behavior-focused detection highlights progression patterns, such as role chaining, logging evasion, and lateral service access, that can appear legitimate when viewed in isolation.

Progression patterns:

  • ソーシャルエンジニアリングによる侵入および信頼されたアイデンティティ関係の悪用
  • 仮の役割を用いてアイデンティティを抽象化し、直接的な帰属を回避する
  • 元の侵害された身元を隠蔽する多段階の役割連鎖

AWS脅威検知で使用されるシグナルとインジケーター

AWS内のすべてのシグナルが同等の調査価値を持つわけではありません。検知活動では、特定のアクターに関連する異常な行動や複数段階にわたる行動を反映する指標を優先します。初期段階の指標は微細で分散している場合があり、一方、後期段階のシグナルは重大な被害が発生した後に初めて表面化することが多いのです。

Key signals:

  • 異常なAPI呼び出しや認証情報の使用パターンなどのベースラインからの逸脱
  • Early reconnaissance behaviors that suggest exploration of permissions or resources
  • ロールチェイニング活動を示すロール仮定チェーンと認証情報シーケンス
  • ログ記録および監視範囲を無効化、縮小、または回避しようとする試み
  • 同一主体による行動を示す、アイデンティティ、ネットワーク、クラウド活動における相関関係のある行動
  • Late-stage indicators such as command-and-control communication or data exfiltration

Real-world AWS threat detection incidents

Recent incidents illustrate why behavioral detection matters more than log-level monitoring alone.

Codefinger ransomware (January 2025)

The Codefinger ransomware group exploited compromised AWS credentials to encrypt S3 data using server-side encryption with customer-provided keys (SSE-C). Because the attackers used legitimate AWS encryption features rather than malware, traditional signature-based detection tools missed the activity. Only behavioral monitoring — detecting unusual bulk encryption operations tied to a suspicious credential chain — could surface the attack before data became unrecoverable.

AI-augmented FortiGate exploitation (January–February 2026)

Amazon Threat Intelligence documented a campaign in which a Russian-speaking financially motivated threat actor used commercial generative AI services to compromise over 600 FortiGate devices across 55+ countries between January 11 and February 18, 2026. The attackers leveraged AI to scale their operations, demonstrating that AI-augmented threats are accelerating attack volume for both skilled and unskilled adversaries.

LexisNexis ECS role abuse (February 2026)

In February 2026, a threat actor exploited an unpatched React frontend application running on AWS to gain initial access, then abused an over-permissive ECS task role with broad read access to AWS Secrets Manager. This enabled exfiltration of Redshift credentials, VPC maps, and millions of database records. The incident mapped to MITRE ATT&CK techniques including T1190 (exploit public-facing application), T1078 (valid accounts), and T1530 (data from cloud storage object) — underscoring why monitoring identity and role behavior is essential for AWS threat detection.

These incidents share a pattern: attackers used legitimate AWS mechanisms (encryption features, valid roles, temporary credentials) to carry out malicious activity that looked normal at the event level but revealed itself through behavioral analysis.

AWS脅威検知の限界と誤解

AWSにおける脅威の検知には依然として限界がある。不審な行動を特定できる一方で、脅威の検知はクラウドセキュリティリスクを自動的に防止または修復するものではない。つまり、チームは依然として対応ワークフローとアナリストの判断に依存する必要がある。検知と防止を混同すると、封じ込めを遅らせる盲点が生じる可能性がある。

Table: Misconceptions vs. corrections

誤解 訂正 なぜそれが重要なのか
より多くのセキュリティツールが自動的にAWSのセキュリティを強化します ツールを追加すると、明瞭さを向上させずにノイズと相関負荷が増加する可能性がある アラートの音量は、調査すべき最も重要なIDやアカウントを隠してしまう可能性がある
不審な活動を目撃することは、それを阻止することと同じである 検知は行動を特定するが、阻止には対応アクションとワークフローが必要である チームは、可視性が封じ込めに等しいと仮定すると時間を失う可能性がある
AWS native tools cover the full attack chain Native services focus on activity within AWS but cannot correlate hybrid attacks that start on-premises or in other cloud environments Attackers routinely pivot from identity providers or endpoints into AWS, requiring cross-environment behavioral correlation

The future of AWS threat detection

Several trends are reshaping how organizations approach threat detection in AWS environments.

  • AI-augmented attacks are accelerating. As demonstrated by the 2026 FortiGate campaign, threat actors are using generative AI to scale exploitation. AWS threat detection must keep pace by correlating signals faster than attackers can generate them.
  • Identity is the new perimeter. With over 70% of cloud breaches originating from compromised identities and 61% of organizations maintaining root users without MFA, identity-centric detection will continue to take priority over network-centric approaches.
  • Multi-stage attack detection is becoming table stakes. GuardDuty's Extended Threat Detection represents a shift toward correlating actions across services and time rather than evaluating events individually. This pattern will expand to cover more AWS services and cross-cloud scenarios.
  • Hybrid attack paths require unified visibility. As organizations operate across AWS, Azure, on-premises, and SaaS environments, threat detection strategies that treat each domain in isolation will miss the attacks that matter most — those that move laterally across boundaries.

Vectra AI 攻撃者の振る舞い相関を通じてAWSの脅威検知をどのように支援するか

Supporting AWS threat detection requires understanding attacker behavior across identity, network, and cloud activity as a single continuum. The Vectra AI Platform approaches this problem by correlating actions instead of treating AWS events as isolated alerts, which reduces uncertainty when roles, temporary credentials, and multi-service activity obscure attribution. Vectra AI's Cloud Detection and Response (CDR) for AWS extends detection beyond native tools by analyzing behaviors across hybrid attack surfaces.

Platform capabilities:

  • アイデンティティ、ロール、クラウド活動全体にわたる攻撃者の相関行動を、孤立したAWSイベントではなく把握する
  • 緊急性と文脈を量よりも重視することで、どのIDまたはアカウントが最も高いリスクを表すかを判断する
  • 可能な限り、不審な活動を元の行為者に結びつけることで、役割連鎖の帰属を見落とすリスクを低減する
  • Detecting suspicious sequences of exploration activities that indicate early-stage reconnaissance before lateral movement begins

See AWS attacker behavior in action with a guided attack tour

よくある質問 (FAQ)

AWSの脅威検知は、CloudTrailログの監視とどのように異なりますか?

AWSの脅威検知は設定ミスを防ぎますか?

なぜアイデンティティとロールはAWSの脅威検知において中心的な役割を果たすのか?

検知 、どの種類のアクティビティが検知 最も難しいですか?

AWSの脅威検知は、AWS外で開始された攻撃を追跡できますか?

What is the difference between Amazon GuardDuty and AWS Security Hub?

What AWS threat detection tools should organizations enable first?

How do attackers use AI to target AWS environments?

What is Extended Threat Detection in Amazon GuardDuty?