Amazon Detective · Capability

Amazon Detective Security Investigation

Workflow capability for SOC analysts and security engineers to conduct end-to-end security investigations using Amazon Detective. Combines behavior graph management, member account administration, investigation lifecycle management, and indicator analysis into a unified workflow for threat hunting and security forensics.

Run with Naftiko Amazon DetectiveSecurity InvestigationForensicsThreat HuntingSOCAWS

What You Can Do

GET
List graphs — List all behavior graphs
/v1/graphs
POST
Create graph — Create a new behavior graph
/v1/graphs
GET
List members — List member accounts contributing to the behavior graph
/v1/graphs/{graphArn}/members
POST
Create members — Invite AWS accounts to become member accounts
/v1/graphs/{graphArn}/members
DELETE
Delete members — Remove member accounts from the behavior graph
/v1/graphs/{graphArn}/members
GET
List investigations — List all investigations in a behavior graph
/v1/investigations
POST
Start investigation — Start a new investigation on an IAM user or role
/v1/investigations
GET
Get investigation — Get results and status of an investigation
/v1/investigations/{investigationId}
PUT
Update investigation state — Archive or reactivate an investigation
/v1/investigations/{investigationId}
GET
List indicators — Get indicators of compromise from an investigation
/v1/investigations/{investigationId}/indicators
GET
List datasource packages — List data source packages in the behavior graph
/v1/datasources

MCP Tools

list-graphs

List all Amazon Detective behavior graphs

read-only
create-graph

Create a new Amazon Detective behavior graph to begin security monitoring

list-members

List member accounts contributing data to a behavior graph

read-only
get-members

Get detailed membership information for specific accounts

read-only
create-members

Invite AWS accounts to contribute data to a behavior graph

delete-members

Remove member accounts from a behavior graph

start-investigation

Initiate a Detective investigation on a suspicious IAM user or role

get-investigation

Get the results, severity, and status of a security investigation

read-only
list-investigations

List all security investigations with filtering by severity, status, and state

read-only
update-investigation-state

Archive a completed investigation or reactivate an archived one

idempotent
list-indicators

Get indicators of compromise (TTPs, flagged IPs, impossible travel) from an investigation

read-only
list-datasource-packages

List data source packages and their ingest status in a behavior graph

read-only
update-datasource-packages

Enable additional data source packages like EKS audit logs or AD audit logs

describe-organization-configuration

Get the organization behavior graph configuration including auto-enable settings

read-only
list-organization-admin-accounts

List Detective administrator accounts in the organization

read-only

APIs Used

detective