Those described in this module include:
Threat Detection Policies and Rules for all types of security threats such as disallowed actions, excessive permissions, suspicious changes, etc.
There are other optional tools to help automate the creation of policies, such as:
- Runtime Policy Tuning (Threat Detection) for reducing noisy false positives in the events feed
- Network Security Policy Tool to author and fine-tune Kubernetes network policies
Was this page helpful?
Glad to hear it! Please tell us how we can improve.
Sorry to hear that. Please tell us how we can improve.