Entities

The Entities page is an automatically maintained inventory of AWS resources that have appeared in security findings. Entities are discovered passively as GuardDuty findings and S3 anomaly events reference them — no manual configuration is needed.

In the app: /entities

What is an Entity?

An entity is any AWS resource or actor that has been referenced in a security finding: an EC2 instance, an IAM user, an IAM role, an IAM access key, an S3 bucket, an EKS cluster, a Lambda function, or an ECS task. Entities are created automatically in DynamoDB the first time they appear in a finding.

Entity Table

Each row shows: the entity type (with icon), the entity identifier (ARN, instance ID, access key ID, or IP address depending on type), the AWS account it belongs to, the last time it appeared in a finding, and the total number of findings that reference it.

Risk Signals

Entities that have appeared in multiple findings, or in findings of varying types, are surfaced as higher-risk. A single entity appearing in both an S3DataExfiltration event and a UnauthorizedAccess:IAMUser finding is a strong signal of a compromised credential — the same actor is both accessing the IAM service and exfiltrating data.

Linking to Events

Click an entity row to filter the Events log to only findings that reference that specific resource. This is useful during incident response to build a timeline of all activity associated with a specific EC2 instance or IAM principal without sifting through unrelated findings.

Entity Types

EC2 Instance

Instance ID (i-xxxxxxxxx)

IAM Role

Role ARN

IAM User

User ARN

IAM Access Key

Access Key ID (AKIAxxxxxxxx)

S3 Bucket

Bucket name

EKS Cluster

Cluster ARN

Lambda Function

Function ARN

ECS Task

Task ARN

IP Address

IPv4 address (actor)

Stale Entities

Entities that have not appeared in any finding for 90 days are considered stale. They remain in the inventory but are visually de-emphasized. Periodically review stale entities — a decommissioned EC2 instance still in the list is harmless, but a stale IAM access key that reappears in a new finding may indicate a key that was not properly rotated.

Entity vs. Actor

A subtle distinction: the resource (e.g., an S3 bucket) is the target, while the actor (e.g., an IP address or IAM principal) is the entity that performed the action. Threat Reaction tracks both. In the entity list, actors are displayed alongside targeted resources, each with their own finding count and last-seen timestamp.

💡 Tip

During an active incident, start on the Entities page to find the compromised resource, then click through to the filtered Events view to reconstruct the full timeline. This is faster than scrolling through unfiltered events looking for a specific instance ID.

ℹ️ Note

Entities are created passively from finding data — they are not discovered by scanning your AWS account. An EC2 instance that has never appeared in a GuardDuty finding will not be in the inventory, even if it exists and is running.