Blog
Cloud security

AWS Security Services: What They Do and Don’t Do

Courtney De Winter
Author
Courtney De Winter
Product Marketing

Key Points

AWS provides a number of security services, like GuardDuty, Inspector, Config, and Security Hub, to help protect cloud environments - but relying on them alone can leave security gaps and make it harder to focus on the risks that matter most. Here’s what AWS’ security services do, don’t do, and how Intruder goes further to simplify your cloud security.

Breaking Down AWS Security Services

Amazon GuardDuty

What it does

Amazon GuardDuty is a threat detection service that monitors your AWS account and resources for malicious activity. It analyzes CloudTrail logs, VPC Flow Logs, and DNS logs to identify suspicious behavior like unusual API calls, unauthorized access attempts, and known bad IP addresses.

Use cases

Detecting compromised EC2 instances, identifying unusual access patterns, and flagging potential data exfiltration attempts.

Limitations

Amazon GuardDuty is primarily focused on detecting active threats at the infrastructure level. It doesn't directly address application vulnerabilities, static misconfigurations, exposed services, or over-permissive groups - which Intruder does.

Price estimate

Pricing is based on the volume of logs analyzed. For 500-1000 resources, you could expect a monthly cost ranging from $50 to $200, but this is a very rough estimate.

How it works (source: Amazon GuardDuty)

Amazon Inspector

What it does

Amazon Inspector is a vulnerability management service that automatically assesses your EC2 instances and Lambda functions for software vulnerabilities and security best practice deviations. 

Use cases

Identifying vulnerabilities in operating systems and applications, finding deviations from security best practices (like open ports or weak passwords), and generating security reports.

Limitations

Amazon Inspector only focuses on EC2 instances and Lambda functions - it doesn't cover other AWS services or access publicly exposed assets.It also requires agents to be installed on your instances. Intruder offers agentless scanning for EC2, Amazon Route 53, and other cloud resources, providing broader coverage without the complexity of agent deployment, along with extensive external vulnerability scanning.

Price estimate

Pricing is based on the number of assessments run. For 500-1000 resources, you could expect a monthly cost starting around $50, but it depends heavily on assessment frequency.

AWS Config

What it does

AWS Config provides a detailed inventory of your AWS resources and their configurations. It allows you to track changes to your resources over time and ensures compliance with internal policies and regulatory requirements.

Use cases

Tracking resource configurations, auditing changes, and ensuring compliance with security best practices.

Limitations

AWS Config provides visibility into resource configurations and includes pre-built rules to check for misconfigurations. However, these rules are limited in assessing and triaging risk and don't offer risk ratings. Intruder checks for AWS misconfigurations daily, providing clear risk ratings to help you prioritize.

Price estimate

AWS Config pricing is based on the number of configuration items recorded. For 500-1000 resources, you might see a monthly cost starting around $100, but it depends on the complexity and frequency of changes.

AWS Security Hub

What it does

AWS Security Hub acts as a central console for managing your security findings from various AWS security services, including GuardDuty, Inspector, and Macie. It provides a unified view of your security posture and helps you prioritize and manage security alerts.

Use cases

Centralizing security findings, prioritizing alerts, and automating security responses.

Limitations

AWS Security Hub aggregates findings from other services (excluding Config) and doesn't generate its own findings. Intruder consolidates all your security issues in one place, giving you insight into your cyber hygiene and helping you track important metrics like time to fix.

Price estimate

Pricing is based on the number of security checks performed. A rough estimate for 500-1000 resources could be in the $50-$150 range monthly.

How Intruder Compares: Simplified and Risk-Driven AWS Security

What it does

Intruder provides agentless cloud security scanning, vulnerability scanning, and attack surface management (ASM) in one powerful, easy-to-use platform, complete with detailed remediation advice, contextual insights, and severity ratings for simplified prioritization.

Use cases

  • Run agentless, daily scans for misconfigurations, insecure permissions, exposed secrets, and more.
  • Intruder combines external vulnerability scanning with information from AWS accounts to identify risks other solutions might miss.
  • Receive clear, actionable remediation guidance and intelligent prioritization to focus on the issues that truly matter.

Limitations

We don’t do active threat detection (yet!), so we’re not comparable to GuardDuty.

Price estimate

Cloud Security is included in Intruder’s Pro and Premium plans.* Find everything, protect the targets that matter.

*Up to 3 cloud accounts on Pro, unlimited accounts on Premium

Intruder vs. AWS Cloud Services: In a Nutshell

Security Need AWS Service Intruder
Threat Detection

GuardDuty

❌Not yet

Vulnerability Scanning

Inspector (EC2 and Lambda, agent-based, internal only)

✅ AWS vulnerability scanning, including internal and external scanning

Misconfiguration Checks

Config

✅ Full detection of AWS misconfigurations

Manage and prioritize security issues

Security Hub

✅ Noise-filtered results, intelligently prioritized

Ready to Level Up Your Cloud Security?

Intruder empowers businesses to identify critical exposures, respond faster, and prevent breaches. 

From apps to cloud, our powerful scanning, intelligent prioritization, and easy-to-use platform help teams like yours to make risk-driven decisions.

  • Unified platform: One powerful easy solution - from apps to cloud, we find and scan it all.
  • Focus on real risk: Intruder helps you prioritize the issues that could lead to real breaches - when we say it’s critical, you know you have to act fast.
  • User-friendly for all: Built with simplicity in mind, we empower DevOps and IT teams to spot and resolve issues fast - no cyber security expertise required. 

Get set up in minutes and receive instant insights into your cloud security - start your 14 day free trial today.

Get our free

Ultimate Guide to Vulnerability Scanning

Learn everything you need to get started with vulnerability scanning and how to get the most out of your chosen product with our free PDF guide.