Skip to content

Commit

Permalink
[Runtime & Compute] PCSUP-24360, CWP-61990 (#954)
Browse files Browse the repository at this point in the history
  • Loading branch information
arane26 authored Oct 21, 2024
1 parent 7f71844 commit 2fe9d98
Show file tree
Hide file tree
Showing 6 changed files with 77 additions and 61 deletions.
Original file line number Diff line number Diff line change
@@ -1,14 +1,16 @@
== Other incident types

* *Hijacked Process:*
Indicates that an allowed process has been used in ways that are inconsistent with its expected behavior.
This type of incident could be a sign that a process has been used to compromise a container.
* *Data exfiltration:*
Indicates the unauthorized transfer of data from one system to another.
These incidents are triggered when a pattern of audits indicate attempts to move data to an external location.
For example: High rate of DNS query events, reporting aggregation started in a container, DNS resolution of suspicious name (www.<WEBSITE_NAME>.com).
== Other Incident Types

* *Cloud Provider:*
Indicates attempts to abuse a provider's service to extract sensitive information.
For example: Container A queried provider API at <IP_ADDRESS>.
+
For example: Container `A` queried provider API at `<IP_ADDRESS>`.
* *Data Exfiltration:*
Indicates a potential compromise on a container because of a modified binary listening on a port. This typically leads with a DNS suspicious activity.
+
For example: Container process `/bin/bash` is listening on unexpected port `50000`.
* *Hijacked Process:*
Indicates that an allowed process was used in a way that is inconsistent with its expected behavior. This can be a sign that a process has been used to compromise a container.
//revised previous description on 10/21/2024 CWP-61990/PCSUP-24360 - Data Exfiltration: Indicates the unauthorized transfer of data from one system to another. These incidents are triggered when a pattern of audits indicate attempts to move data to an external location. For example: High rate of DNS query events, reporting aggregation started in a container, DNS resolution of suspicious name (www.<WEBSITE_NAME>.com).
Original file line number Diff line number Diff line change
@@ -1,14 +1,17 @@
== Other incident types
== Other Incident Types

* *Cloud Provider:*
Indicates attempts to abuse a provider's service to extract sensitive information.
+
For example: Container `A` queried provider API at `<IP_ADDRESS>`.
* *Data Exfiltration:*
Indicates a potential compromise on a container because of a modified binary listening on a port. This typically leads with a DNS suspicious activity.
+
For example: Container process `/bin/bash` is listening on unexpected port `50000`.
* *Hijacked Process:*
Indicates that an allowed process has been used in ways that are inconsistent with its expected behavior.
This type of incident could be a sign that a process has been used to compromise a container.
Indicates that an allowed process was used in a way that is inconsistent with its expected behavior. This can be a sign that a process has been used to compromise a container.
* *Data exfiltration:*
Indicates the unauthorized transfer of data from one system to another.
These incidents are triggered when a pattern of audits indicate attempts to move data to an external location.
For example: High rate of DNS query events, reporting aggregation started in a container, DNS resolution of suspicious name (www.<WEBSITE_NAME>.com).
* *Cloud Provider:*
Indicates attempts to abuse a provider's service to extract sensitive information.
For example: Container A queried provider API at <IP_ADDRESS>.
//revised previous description on 10/21/2024 CWP-61990/PCSUP-24360 - Data Exfiltration: Indicates the unauthorized transfer of data from one system to another. These incidents are triggered when a pattern of audits indicate attempts to move data to an external location. For example: High rate of DNS query events, reporting aggregation started in a container, DNS resolution of suspicious name (www.<WEBSITE_NAME>.com).
Original file line number Diff line number Diff line change
@@ -1,14 +1,17 @@
== Other incident types
== Other Incident Types

* *Cloud Provider:*
Indicates attempts to abuse a provider's service to extract sensitive information.
+
For example: Container `A` queried provider API at `<IP_ADDRESS>`.
* *Data Exfiltration:*
Indicates a potential compromise on a container because of a modified binary listening on a port. This typically leads with a DNS suspicious activity.
+
For example: Container process `/bin/bash` is listening on unexpected port `50000`.
* *Hijacked Process:*
Indicates that an allowed process has been used in ways that are inconsistent with its expected behavior.
This type of incident could be a sign that a process has been used to compromise a container.
Indicates that an allowed process was used in a way that is inconsistent with its expected behavior. This can be a sign that a process has been used to compromise a container.
* *Data exfiltration:*
Indicates the unauthorized transfer of data from one system to another.
These incidents are triggered when a pattern of audits indicate attempts to move data to an external location.
For example: High rate of DNS query events, reporting aggregation started in a container, DNS resolution of suspicious name (www.<WEBSITE_NAME>.com).
* *Cloud Provider:*
Indicates attempts to abuse a provider's service to extract sensitive information.
For example: Container A queried provider API at <IP_ADDRESS>.
//revised previous description on 10/21/2024 CWP-61990/PCSUP-24360 - Data Exfiltration: Indicates the unauthorized transfer of data from one system to another. These incidents are triggered when a pattern of audits indicate attempts to move data to an external location. For example: High rate of DNS query events, reporting aggregation started in a container, DNS resolution of suspicious name (www.<WEBSITE_NAME>.com).
Original file line number Diff line number Diff line change
@@ -1,14 +1,16 @@
== Other incident types

* *Hijacked Process:*
Indicates that an allowed process has been used in ways that are inconsistent with its expected behavior.
This type of incident could be a sign that a process has been used to compromise a container.
* *Data exfiltration:*
Indicates the unauthorized transfer of data from one system to another.
These incidents are triggered when a pattern of audits indicate attempts to move data to an external location.
For example: High rate of DNS query events, reporting aggregation started in a container, DNS resolution of suspicious name (www.<WEBSITE_NAME>.com).
== Other Incident Types

* *Cloud Provider:*
Indicates attempts to abuse a provider's service to extract sensitive information.
For example: Container A queried provider API at <IP_ADDRESS>.
+
For example: Container `A` queried provider API at `<IP_ADDRESS>`.
* *Data Exfiltration:*
Indicates a potential compromise on a container because of a modified binary listening on a port. This typically leads with a DNS suspicious activity.
+
For example: Container process `/bin/bash` is listening on unexpected port `50000`.
* *Hijacked Process:*
Indicates that an allowed process was used in a way that is inconsistent with its expected behavior. This can be a sign that a process has been used to compromise a container.
//revised previous description on 10/21/2024 CWP-61990/PCSUP-24360 - Data Exfiltration: Indicates the unauthorized transfer of data from one system to another. These incidents are triggered when a pattern of audits indicate attempts to move data to an external location. For example: High rate of DNS query events, reporting aggregation started in a container, DNS resolution of suspicious name (www.<WEBSITE_NAME>.com).
Original file line number Diff line number Diff line change
@@ -1,14 +1,17 @@
== Other incident types
== Other Incident Types

* *Cloud Provider:*
Indicates attempts to abuse a provider's service to extract sensitive information.
+
For example: Container `A` queried provider API at `<IP_ADDRESS>`.
* *Data Exfiltration:*
Indicates a potential compromise on a container because of a modified binary listening on a port. This typically leads with a DNS suspicious activity.
+
For example: Container process `/bin/bash` is listening on unexpected port `50000`.
* *Hijacked Process:*
Indicates that an allowed process has been used in ways that are inconsistent with its expected behavior.
This type of incident could be a sign that a process has been used to compromise a container.
Indicates that an allowed process was used in a way that is inconsistent with its expected behavior. This can be a sign that a process has been used to compromise a container.
* *Data exfiltration:*
Indicates the unauthorized transfer of data from one system to another.
These incidents are triggered when a pattern of audits indicate attempts to move data to an external location.
For example: High rate of DNS query events, reporting aggregation started in a container, DNS resolution of suspicious name (www.<WEBSITE_NAME>.com).
* *Cloud Provider:*
Indicates attempts to abuse a provider's service to extract sensitive information.
For example: Container A queried provider API at <IP_ADDRESS>.
//revised previous description on 10/21/2024 CWP-61990/PCSUP-24360 - Data Exfiltration: Indicates the unauthorized transfer of data from one system to another. These incidents are triggered when a pattern of audits indicate attempts to move data to an external location. For example: High rate of DNS query events, reporting aggregation started in a container, DNS resolution of suspicious name (www.<WEBSITE_NAME>.com).
Original file line number Diff line number Diff line change
@@ -1,15 +1,18 @@
[#others]
== Other Incident Types

* *Cloud Provider:*
Indicates attempts to abuse a provider's service to extract sensitive information.
+
For example: Container `A` queried provider API at `<IP_ADDRESS>`.
* *Data Exfiltration:*
Indicates a potential compromise on a container because of a modified binary listening on a port. This typically leads with a DNS suspicious activity.
+
For example: Container process `/bin/bash` is listening on unexpected port `50000`.
* *Hijacked Process:*
Indicates that an allowed process has been used in ways that are inconsistent with its expected behavior.
This type of incident could be a sign that a process has been used to compromise a container.
Indicates that an allowed process was used in a way that is inconsistent with its expected behavior. This can be a sign that a process has been used to compromise a container.
* *Data exfiltration:*
Indicates the unauthorized transfer of data from one system to another.
These incidents are triggered when a pattern of audits indicate attempts to move data to an external location.
For example: High rate of DNS query events, reporting aggregation started in a container, DNS resolution of suspicious name (www.<WEBSITE_NAME>.com).
* *Cloud Provider:*
Indicates attempts to abuse a provider's service to extract sensitive information.
For example: Container A queried provider API at <IP_ADDRESS>.
//revised previous description on 10/21/2024 CWP-61990/PCSUP-24360 - Data Exfiltration: Indicates the unauthorized transfer of data from one system to another. These incidents are triggered when a pattern of audits indicate attempts to move data to an external location. For example: High rate of DNS query events, reporting aggregation started in a container, DNS resolution of suspicious name (www.<WEBSITE_NAME>.com).

0 comments on commit 2fe9d98

Please sign in to comment.