Container Workload Protection
Elastic Stack Serverless Security
Generates a detection alert each time a Container Workload Protection alert is received. Enabling this rule allows you to immediately begin triaging and investigating these alerts.
Rule type: query
Rule indices:
- logs-cloud_defend.alerts-*
Severity: medium
Risk score: 47
Runs every: 5m
Searches indices from: now-10m (https://www.elastic.co/guide/en/elasticsearch/reference/current/common-options.html#date-math[Date Math format], see also Additional look-back time
)
Maximum alerts per execution: 10000
References: None
Tags:
- Data Source: Elastic Defend for Containers
- Domain: Container
- Resources: Investigation Guide
Version: 5
Rule authors:
- Elastic
Rule license: Elastic License v2
Triage and analysis
[TBC: QUOTE]
Investigating Container Workload Protection
Container Workload Protection is crucial for securing containerized environments by monitoring and defending against threats. Adversaries may exploit vulnerabilities in container orchestration or escape isolation to access host systems. The detection rule leverages alerts from cloud defense modules, focusing on suspicious activities within container domains, enabling timely triage and investigation of potential security incidents.
Possible investigation steps
- Review the alert details to confirm it matches the query criteria, specifically checking for event.kind:alert and event.module:cloud_defend.
- Examine the context of the alert to identify any suspicious activities or anomalies within the container environment.
- Investigate the source and destination of the alert to determine if there are any unauthorized access attempts or lateral movement within the container infrastructure.
- Check for any recent changes or updates in the container orchestration system that might have introduced vulnerabilities.
- Correlate the alert with other security events or logs to identify patterns or repeated attempts that could indicate a larger attack campaign.
- Assess the impact of the alert on the containerized environment and determine if any immediate remediation actions are necessary to protect the host systems.
False positive analysis
- Alerts triggered by routine maintenance tasks in container environments can be false positives. Users can create exceptions for known maintenance activities to reduce unnecessary alerts.
- Automated deployment processes might generate alerts due to rapid changes in container states. Exclude these processes by identifying and whitelisting their specific event patterns.
- Frequent updates to container images can cause alerts. Implement rules to recognize and exclude these updates if they match expected patterns and sources.
- Legitimate administrative actions within container orchestration platforms may be flagged. Document and exclude these actions by correlating them with authorized user activities.
- Network scanning tools used for security assessments might trigger alerts. Ensure these tools are recognized and excluded by defining their IP ranges and expected behaviors.
Response and remediation
- Isolate the affected container to prevent lateral movement and further exploitation. This can be done by stopping the container or disconnecting it from the network.
- Analyze the container’s logs and configurations to identify any unauthorized changes or suspicious activities that align with the alert.
- Patch any identified vulnerabilities in the container image or orchestration platform to prevent similar exploits.
- Restore the container from a known good backup or rebuild it using a secure and updated image to ensure no residual threats remain.
- Implement network segmentation and access controls to limit the exposure of containerized environments to potential threats.
- Escalate the incident to the security operations team if the threat appears to have impacted the host system or other critical infrastructure.
- Enhance monitoring and alerting rules to detect similar suspicious activities in the future, ensuring timely response to potential threats.
Setup
This rule is configured to generate more Max alerts per run than the default 1000 alerts per run set for all rules. This is to ensure that it captures as many alerts as possible.
IMPORTANT: The rule’s Max alerts per run setting can be superseded by the xpack.alerting.rules.run.alerts.max
Kibana config setting, which determines the maximum alerts generated by any rule in the Kibana alerting framework. For example, if xpack.alerting.rules.run.alerts.max
is set to 1000, this rule will still generate no more than 1000 alerts even if its own Max alerts per run is set higher.
To make sure this rule can generate as many alerts as it’s configured in its own Max alerts per run setting, increase the xpack.alerting.rules.run.alerts.max
system setting accordingly.
NOTE: Changing xpack.alerting.rules.run.alerts.max
is not possible in Serverless projects.
event.kind:alert and event.module:cloud_defend