Cloudanix home page
Search...
⌘K
Ask AI
Community
Login
Login
Search...
Navigation
Kubernetes
Container Monitoring
Overview
AWS
Azure
GCP
GitHub
On-Demand Scan
Kubernetes
Integrations
Kubernetes
Container Security Onboarding
Container Monitoring
On this page
Monitoring Events
Kubernetes
Container Monitoring
Monitoring Events
BPF Program Not Profiled
Directory traversal monitored file read
Read sensitive file trusted after startup
Read sensitive file untrusted
Run shell untrusted
System user interactive
Terminal shell in container
Contact K8S API Server From Container
Netcat Remote Code Execution in Container
Search Private Keys or Passwords
Clear Log Activities
Remove Bulk Data from Disk
Create Symlink Over Sensitive Files
Create Hardlink Over Sensitive Files
Packet socket created in container
Redirect STDOUT or STDIN to Network Connection in Container
Linux Kernel Module Injection Detected
Debugfs Launched in Privileged Container
Detect release_agent File Container Escapes
PTRACE attached to process
PTRACE anti-debug attempt
Find AWS Credentials
Execution from shm directory in dev directory
Drop and execute new binary in container
Disallowed SSH Connection Non Standard Port
Unexpected inbound connection source
Read Shell Configuration File
Update Package Repository
Write below binary dir
Write below monitored dir
Write below etc
Write below root
Write below rpm database
Modify binary dirs
Mkdir binary dirs
Launch Sensitive Mount Container
Launch Disallowed Container
Interpreted procs inbound network activity
Unexpected K8s NodePort Connection
Create Hidden Files or Directories
Detect outbound connections to common miner pool ports
Detect crypto miners using the Stratum protocol
The docker client is executed in a container
Container Drift Detected (chmod)
Container Drift Detected (open+create)
Container Run as Root User
Sudo Potential Privilege Escalation
Unprivileged Delegation of Page Faults Handling to a Userspace Process
Polkit Local Privilege Escalation Vulnerability (CVE-2021-4034)
Java Process Class File Download
Modify Container Entrypoint
Decoding Payload in Container
Modify Shell Configuration File
Schedule Cron Jobs
Read ssh information
DB program spawned process
Change thread namespace
Launch Privileged Container
Launch Excessively Capable Container
System procs network activity
Program run with disallowed http proxy env
Unexpected UDP Traffic
Non sudo setuid
User mgmt binaries
Create files below dev
Contact EC2 Instance Metadata Service From Container
Contact cloud metadata service from container
Launch Package Management Process in Container
Launch Suspicious Network Tool in Container
Launch Suspicious Network Tool on Host
Delete or rename shell history
Set Setuid or Setgid bit
Launch Remote File Copy Tools in Container
Network Connection outside Local Subnet
Mount Launched in Privileged Container
Launch Ingress Remote File Copy Tools in Container
Read environment variable from proc files
Exfiltrating Artifacts via Kubernetes Control Plane
Fileless execution via memfd_create
Adding ssh keys to authorized_keys
Backdoored library loaded into SSHD (CVE-2024-3094)
Basic Interactive Reconnaissance
Change namespace privileges via unshare
Disallowed SSH Connection
Execution from dev shm
Kubernetes Client Tool Launched in Container
Outbound Connection to C2 Servers
Outbound or Inbound Traffic not to Authorized Server Process and Port
Potential Local Privilege Escalation via Environment Variables Misuse
Redirect STDOUT STDIN to Network Connection in Container
Unexpected outbound connection destination
Container Security Onboarding
Assistant
Responses are generated using AI and may contain mistakes.