Entities
The Entities page is an automatically maintained inventory of AWS resources that have appeared in security findings. Entities are discovered passively as GuardDuty findings and S3 anomaly events reference them — no manual configuration is needed.
In the app: /entities
What is an Entity?
An entity is any AWS resource or actor that has been referenced in a security finding: an EC2 instance, an IAM user, an IAM role, an IAM access key, an S3 bucket, an EKS cluster, a Lambda function, or an ECS task. Entities are created automatically in DynamoDB the first time they appear in a finding.
Entity Table
Each row shows: the entity type (with icon), the entity identifier (ARN, instance ID, access key ID, or IP address depending on type), the AWS account it belongs to, the last time it appeared in a finding, and the total number of findings that reference it.
Risk Signals
Entities that have appeared in multiple findings, or in findings of varying types, are surfaced as higher-risk. A single entity appearing in both an S3DataExfiltration event and a UnauthorizedAccess:IAMUser finding is a strong signal of a compromised credential — the same actor is both accessing the IAM service and exfiltrating data.
Linking to Events
Click an entity row to filter the Events log to only findings that reference that specific resource. This is useful during incident response to build a timeline of all activity associated with a specific EC2 instance or IAM principal without sifting through unrelated findings.
Entity Types
EC2 Instance
Instance ID (i-xxxxxxxxx)
IAM Role
Role ARN
IAM User
User ARN
IAM Access Key
Access Key ID (AKIAxxxxxxxx)
S3 Bucket
Bucket name
EKS Cluster
Cluster ARN
Lambda Function
Function ARN
ECS Task
Task ARN
IP Address
IPv4 address (actor)
Stale Entities
Entities that have not appeared in any finding for 90 days are considered stale. They remain in the inventory but are visually de-emphasized. Periodically review stale entities — a decommissioned EC2 instance still in the list is harmless, but a stale IAM access key that reappears in a new finding may indicate a key that was not properly rotated.
Entity vs. Actor
A subtle distinction: the resource (e.g., an S3 bucket) is the target, while the actor (e.g., an IP address or IAM principal) is the entity that performed the action. Threat Reaction tracks both. In the entity list, actors are displayed alongside targeted resources, each with their own finding count and last-seen timestamp.
💡 Tip
During an active incident, start on the Entities page to find the compromised resource, then click through to the filtered Events view to reconstruct the full timeline. This is faster than scrolling through unfiltered events looking for a specific instance ID.
ℹ️ Note
Entities are created passively from finding data — they are not discovered by scanning your AWS account. An EC2 instance that has never appeared in a GuardDuty finding will not be in the inventory, even if it exists and is running.