Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Scan running Kubernetes containers #14

Open
ogarrett opened this issue Jul 5, 2022 · 0 comments
Open

Scan running Kubernetes containers #14

ogarrett opened this issue Jul 5, 2022 · 0 comments
Labels
enhancement New feature or request help wanted Extra attention is needed

Comments

@ogarrett
Copy link
Contributor

ogarrett commented Jul 5, 2022

Requirement: I am running pods in Kubernetes and I have reason to suspect that one of the containers may have been compromised (high CPU, unexpected network, or just a desire for routine verification). I wish to run IOCScanner against workloads on my Kubernetes cluster.

Use Cases:

  • Run IOCScanner against a single container (provide container ID, pod ID, node ID): IOCScanner scans that single container
  • Run IOCScanner against a named pod (provide pod ID): IOCScanner locates that pod on the cluster and scans the containers within
  • Run IOCScanner against a named selector (e.g. service name, label etc): IOCScanner locates all matching pods and scans all of the containers within

Documentation Requirements:

  • How to satisfy each use case interactively and identify potentially-compromised workloads
  • How to satisfy each use case non-interactively and identify potentially-compromised workloads
@ogarrett ogarrett added enhancement New feature or request help wanted Extra attention is needed labels Jul 5, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request help wanted Extra attention is needed
Projects
None yet
Development

No branches or pull requests

1 participant