Copyright (c) 2026 MindMesh Academy. All rights reserved. This content is proprietary and may not be reproduced or distributed without permission.
2.4. Phase 2 Reflection Checkpoint
Key Takeaways:
- Detection requires three layers: monitoring (real-time awareness), logging (evidence), and troubleshooting (maintaining coverage)
- Security Hub aggregates findings (ASFF); Security Lake aggregates raw logs (OCSF) — they're complementary
- GuardDuty detects, EventBridge routes, Lambda/Step Functions remediate — know the detection-to-response chain
- Most logging failures are caused by missing IAM permissions, disabled features, or network connectivity issues
- Always pair remediation with prevention (Config rules, SCPs, automation)
Connecting Forward: In Phase 3, you'll apply detection knowledge to Incident Response — designing response plans, capturing forensic evidence, and automating containment for the threats that your detection systems identify.
Self-Check Questions:
- Can you explain the difference between Security Hub (ASFF) and Security Lake (OCSF)?
- Can you trace the flow from a GuardDuty finding through EventBridge to an automated remediation?
- Can you list three common reasons why Lambda functions might not have CloudWatch logs?
Written byAlvin Varughese
Founder•15 professional certifications