Container Workload Protection
Generates a detection alert each time a 'Container Workload Protection' alert is received. Enabling this rule allows you to immediately begin triaging and investigating these alerts.
Elastic rule (View on GitHub)
1[metadata]
2creation_date = "2023/04/05"
3integration = ["cloud_defend"]
4maturity = "production"
5updated_date = "2024/05/21"
6
7[rule]
8author = ["Elastic"]
9description = """
10Generates a detection alert each time a 'Container Workload Protection' alert is received. Enabling this rule allows you
11to immediately begin triaging and investigating these alerts.
12"""
13enabled = true
14from = "now-10m"
15index = ["logs-cloud_defend.alerts-*"]
16language = "kuery"
17license = "Elastic License v2"
18max_signals = 10000
19name = "Container Workload Protection"
20risk_score = 47
21rule_id = "4b4e9c99-27ea-4621-95c8-82341bc6e512"
22rule_name_override = "message"
23setup = """## Setup
24
25This rule is configured to generate more **Max alerts per run** than the default 1000 alerts per run set for all rules. This is to ensure that it captures as many alerts as possible.
26
27**IMPORTANT:** The rule's **Max alerts per run** setting can be superseded by the `xpack.alerting.rules.run.alerts.max` Kibana config setting, which determines the maximum alerts generated by _any_ rule in the Kibana alerting framework. For example, if `xpack.alerting.rules.run.alerts.max` is set to 1000, this rule will still generate no more than 1000 alerts even if its own **Max alerts per run** is set higher.
28
29To make sure this rule can generate as many alerts as it's configured in its own **Max alerts per run** setting, increase the `xpack.alerting.rules.run.alerts.max` system setting accordingly.
30
31**NOTE:** Changing `xpack.alerting.rules.run.alerts.max` is not possible in Serverless projects."""
32severity = "medium"
33tags = ["Data Source: Elastic Defend for Containers", "Domain: Container"]
34timestamp_override = "event.ingested"
35type = "query"
36
37query = '''
38event.kind:alert and event.module:cloud_defend
39'''
Related rules
- AWS Credentials Searched For Inside A Container
- Container Management Utility Run Inside A Container
- File Made Executable via Chmod Inside A Container
- Interactive Exec Command Launched Against A Running Container
- Modification of Dynamic Linker Preload Shared Object Inside A Container