You are on page 1of 7

ECS Forensics & Incident

Response

Cado Security | 1
What is ECS?

https://www.cadosecurity.com/aws-ecs-fully-managed-but-frustrating-to-investigate/
How does GuardDuty work with ECS?

https://docs.aws.amazon.com/guardduty/latest/ug/findings-malware-protection.html
Container Investigation Data Sources in AWS
Amazon S3 Amazon EC2 - Hosting EKS/ECS Inside Container - EKS/ECS on Fargate/EC2

EKS Audit / Control Plane Logs Docker Container Filesystems Container Filesystems
● Shows: API Level Calls ● Normally overlay2 versioned filesystem ● Live filesystem as seen by the container, Memory
● Usefulness: Medium ● Contains all the files from all the containers ● Contains all the files from all the containers
● Collected by: S3 ● Usefulness: High ● Usefulness: Very High
● Collected by: EC2 EBS (API) or Cado Host (SSM/SSH) ● Collected by: Cado Host (ECS Exec/kubectl exec))

CloudTrail Logs Docker Logs


● Shows: API Level Calls ● Logs what containers were started, stopped
● Usefulness: Low ● Usefulness: Medium
● Collected by: S3 ● Collected by: EC2 Import or Cado Host
How do you Investigate an ECS
Container in Cado?

https://docs.cadosecurity.com/cado-response/discovery-import/import/aws/aws-ecs
How do you Remediate a compromised
ECS Cluster?

https://docs.aws.amazon.com/guardduty/latest/ug/guardduty_remediate.html#compromised-ecs
Cado Response
Free 14-day trial
Receive unlimited access to the
Cado Response Platform for 14
days.

www.cadosecurity.com/free-investigation/

You might also like