@@ -15,29 +15,29 @@ spec:
15
15
- " kubeconfig"
16
16
rules :
17
17
- ruleName : " Unexpected process launched"
18
- - ruleName : " Unexpected file access "
18
+ - ruleName : " Files Access Anomalies in container "
19
19
parameters :
20
20
ignoreMounts : true
21
21
ignorePrefixes : ["/proc", "/run/secrets/kubernetes.io/serviceaccount", "/var/run/secrets/kubernetes.io/serviceaccount", "/tmp"]
22
- - ruleName : " Unexpected system call "
23
- - ruleName : " Unexpected capability used "
24
- - ruleName : " Unexpected domain request "
25
- - ruleName : " Unexpected Service Account Token Access "
26
- - ruleName : " Kubernetes Client Executed "
27
- - ruleName : " Exec from malicious source"
28
- - ruleName : " Kernel Module Load "
29
- - ruleName : " Exec Binary Not In Base Image "
30
- - ruleName : " Malicious SSH Connection "
31
- - ruleName : " Fileless Execution "
32
- - ruleName : " XMR Crypto Mining Detection "
33
- - ruleName : " Exec from mount"
22
+ - ruleName : " Syscalls Anomalies in container "
23
+ - ruleName : " Linux Capabilities Anomalies in container "
24
+ - ruleName : " DNS Anomalies in container "
25
+ - ruleName : " Unexpected service account token access "
26
+ - ruleName : " Workload uses Kubernetes API unexpectedly "
27
+ - ruleName : " Process executed from malicious source"
28
+ - ruleName : " Process tries to load a kernel module "
29
+ - ruleName : " Drifted process executed "
30
+ - ruleName : " Disallowed ssh connection "
31
+ - ruleName : " Fileless execution detected "
32
+ - ruleName : " Crypto miner launched "
33
+ - ruleName : " Process executed from mount"
34
34
- ruleName : " Crypto Mining Related Port Communication"
35
35
- ruleName : " Crypto Mining Domain Communication"
36
36
- ruleName : " Read Environment Variables from procfs"
37
37
- ruleName : " eBPF Program Load"
38
- - ruleName : " Symlink Created Over Sensitive File "
38
+ - ruleName : " Soft link created over sensitive file "
39
39
- ruleName : " Unexpected Sensitive File Access"
40
- - ruleName : " Hardlink Created Over Sensitive File "
40
+ - ruleName : " Hard link created over sensitive file "
41
41
- ruleName : " Exec to pod"
42
42
- ruleName : " Port forward"
43
43
- ruleName : " Unexpected Egress Network Traffic"
0 commit comments