AWS just revealed a host of security upgrades to keep your cloud systems safe

Three major security upgrades are coming to Amazon Web Services

When you purchase through links on our site, we may earn an affiliate commission.Here’s how it works.

AmazonWeb Services (AWS) GuardDuty, the company’s threat detection service in thecloud, is getting three new features that should further strengthen customer security.

In a press release, the cloud giant said that EKS Runtime Monitoring, GuardDuty RDS Protection, and GuardDuty Lambda Protection will provide expanded coverage and continuous enhancements in machine learning, anomaly detection, and integrated threat intelligence.

EKS Runtime Monitoring is tasked with better protecting containerized workloads; GuardDuty RDS Protection with data stored in Amazon Aurora databases, while GuardDuty Lambda Protection’s goal is to detect threats in serverless applications.

Free for all

Free for all

The new features will be available to all current GuardDuty users - free of charge. To activate the tool, one should navigate to the AWS Management Console. GuardDuty was launched in 2017 and has since added more than 100 new threat detection capabilities, including the ability to detect credential exfiltration and compromise, AWS claims.

“GuardDuty’s new capabilities build on this powerful foundation to expand security detection and monitoring even further, to where customers tell us they need it most: containers’ runtime monitoring, databases, and serverless applications,” said Jon Ramsey, vice president for Security Services at AWS. “We’ve now more than tripled the number of managed detections since we introduced GuardDuty.”

A global ad fraud campaign based on Google Ads has made millions>This Google Ads campaign pushes malware that your antivirus can’t pick up>Here’s our rundown of the best endpoint protection services

For AWS, being able to collect and alert users on events related to security is “fundamental” to every risk management program. The challenge to get that done grows bigger by the day, with the ever-expanding threat landscape, and a growing number of security tools, created by different vendors.

The volume, and type, of threats also grows, as threat actors target web server instances with malware, cryptocurrency miners, and data exfiltration techniques. At the same time, the shortage of IT security pros makes defending the premises even harder.

Are you a pro? Subscribe to our newsletter

Are you a pro? Subscribe to our newsletter

Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

This new phishing strategy utilizes GitHub comments to distribute malware

Should your VPN always be on?

Phishing attacks surge in 2024 as cybercriminals adopt AI tools and multi-channel tactics