Documentation Index
Fetch the complete documentation index at: https://docs.iru.com/llms.txt
Use this file to discover all available pages before exploring further.
About Amazon GuardDuty
The Amazon GuardDuty connector collects detectors, findings, and member-account relationships for threat-detection evidence. GuardDuty must be enabled per Region - otherwise APIs legitimately return nothing. Authentication usessts:AssumeRole into your role (typically in the administrator or delegated admin account).
How it works
UseAmazonGuardDutyReadOnlyAccess, or the guardduty: inline JSON below.
| Detail | Value |
|---|---|
| Category | Threat detection |
| Authentication | Cross-account IAM role |
Prerequisites
- IAM rights to create roles where GuardDuty is centrally managed.
- Detectors enabled in Regions you expect evidence from.
Connect AWS GuardDuty to Iru
Copy the trust policy from Iru
Turn on AWS GuardDuty
Find AWS GuardDuty (use Category or Search by name or description). On that card, turn on the toggle. Leave the wizard tab open.
Create the IAM role in AWS
Configure trusted entity
Choose AWS account → Another AWS account. Enter
753695775620 (or the ID Iru shows). Enable Require external ID and paste the external ID from Iru.Attach GuardDuty read permissions
Attach
AmazonGuardDutyReadOnlyAccess, or attach this inline policy:Submit the role ARN in Iru
Troubleshooting
Nothing opens when you turn the source on
Nothing opens when you turn the source on
Check pop-up blocker settings for the Iru site and try again.
Silent Regions
Silent Regions
Enable GuardDuty detectors there first.
AssumeRole denied
AssumeRole denied
External ID mismatch.
Considerations
Detections can be cross-account: align role…
Detections can be cross-account - align role placement with your org’s delegated-admin pattern.
See also
- See Sources Management for the full connector list.
