IR-014cloudv1.0.0
Container and Kubernetes Security Incident Response
⚠️ high⚠️ critical
⏱ Est. Time60m
📋 Steps10 steps
🔧 Tools7 required
🔗 Integrations5 platforms
📊 Avg Resolution90m
🔧 Tools Required
kubernetes clicontainer runtimesiemcloud consolefalcotrivythreat intelligence platform
⚡ Triggers
falco_container_escape_alertkubernetes_audit_privileged_podresource_spike_cpu_memoryunexpected_network_policy_changekubernetes_rbac_anomalycontainer_scanning_critical_findingsiem_k8s_audit_anomalycryptominer_detected
🔌 Integrations
req
falco
Runtime security for container escape, privilege escalation, and anomalous syscall detection
opt
aws eks
EKS control plane audit logs, CloudTrail for Kubernetes API server events
opt
gke security command center
GKE threat detection and container threat analysis
opt
datadog
Container performance monitoring for resource hijacking and crypto mining detection
opt
trivy
Container image vulnerability scanning and SBOM analysis
Click each step to expand the full procedure, automation hints, and expected outputs.