mirror of
https://github.com/falcosecurity/falco.git
synced 2025-06-30 00:22:15 +00:00
update(rules): adding container info to the output of the Lryke detecting kernel module injections from containers
Signed-off-by: Leonardo Di Donato <leodidonato@gmail.com>
This commit is contained in:
parent
78f710c706
commit
8216b435cb
@ -3003,7 +3003,7 @@
|
|||||||
- rule: Linux Kernel Module Injection Detected
|
- rule: Linux Kernel Module Injection Detected
|
||||||
desc: Detect kernel module was injected (from container).
|
desc: Detect kernel module was injected (from container).
|
||||||
condition: spawned_process and container and proc.name=insmod and not proc.args in (white_listed_modules)
|
condition: spawned_process and container and proc.name=insmod and not proc.args in (white_listed_modules)
|
||||||
output: Linux Kernel Module injection using insmod detected (user=%user.name user_loginuid=%user.loginuid parent_process=%proc.pname module=%proc.args)
|
output: Linux Kernel Module injection using insmod detected (user=%user.name user_loginuid=%user.loginuid parent_process=%proc.pname module=%proc.args %container.info image=%container.image.repository:%container.image.tag)
|
||||||
priority: WARNING
|
priority: WARNING
|
||||||
tags: [process]
|
tags: [process]
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user