AWS re:Invent 2025 - Protecting Your Infrastructure with Amazon Threat Intelligence (SEC311)

Published: (December 5, 2025 at 01:44 PM EST)
2 min read
Source: Dev.to

Source: Dev.to

Overview

In this session, the presenters explain how AWS leverages massive‑scale threat intelligence to protect customer workloads. Key points include:

  • AWS sees roughly 60 % of the global internet each day (≈ 2.6 billion IPv4 addresses).
  • The platform processes 6 billion security telemetry events per second from sources such as VPC Flow Logs, DNS queries, API logs, and the MadPot honeypot fleet.
  • Threat intelligence is integrated into native AWS security services, allowing customers to benefit from global visibility without operational overhead.

AWS Scale and Visibility

Global Internet Visibility

  • Internet coverage: AWS interacts with about 2.6 billion of the 4 billion IPv4 addresses daily.
  • Network flow data: ~4.8 billion flows per second are observed at the networking stack.
  • DNS telemetry: ~34 million DNS requests per second provide insight into domain resolutions.
  • API activity: ~100 million AWS API requests per second give visibility into service usage and authentication events.
  • Host telemetry: ~1 billion host‑level events per second (process starts/stops, etc.) are collected from Amazon‑owned hosts.

Data Sources

SourceApprox. VolumeWhat It Reveals
VPC Flow Logs / Network Flow4.8 B flows/sIP‑to‑IP, port, protocol, and internal mapping to accounts/instances
DNS Queries34 M req/sDomains accessed, resolved IPs, potential malicious domains
AWS API Logs100 M req/sService calls, credential usage, anomalous API patterns
MadPot Honeypots & Dark‑Space MonitoringElicits malicious traffic, identifies active threat actors
Host Telemetry Agents1 B events/sProcess activity, system calls, potential malware execution

Threat Categories

  1. Network Reconnaissance – AWS blocks ≈ 20 000 malicious IPs per minute based on reconnaissance patterns.
  2. Compromised Credentials – Account takeover attempts account for ≈ 2/3 of security incidents.
  3. Malware Detection – Continuous analysis of host telemetry and network traffic surfaces malicious binaries and command‑and‑control communications.

Integration with Native AWS Security Services

AWS threat intelligence feeds directly into several managed services, enabling customers to apply global insights locally:

  • Amazon GuardDuty – Detects anomalous activity using threat‑intel feeds (e.g., known malicious IPs, credential compromise).
  • AWS WAF & AWS Network Firewall – Managed rule groups such as Active Threat Defense and Account Takeover Prevention block malicious web traffic.
  • Amazon Route 53 DNS Firewall – Blocks resolution of known malicious domains.
  • Amazon Inspector – Uses intel to prioritize vulnerability findings related to active threats.

These services require no additional operational overhead; customers simply enable the relevant managed rule groups or findings.

Takeaways

  • Leverage AWS’s global visibility: Even without deep security expertise, customers can protect workloads by enabling native services that consume AWS threat intelligence.
  • Focus on high‑impact threats: Prioritize defenses against network reconnaissance, credential compromise, and malware—areas where AWS sees the most activity.
  • Use managed rule groups: Activate pre‑built protections (e.g., Active Threat Defense) to get immediate coverage.
  • Continuous improvement: AWS continuously refines its intel pipelines, so staying up‑to‑date with service enhancements ensures ongoing protection.
Back to Blog

Related posts

Read more »