Policies
Sysdig Secure deploys different types of policies.
Those described in this module include:
Vulnerability Management Policies and Rules for scanning pipeline and runtime images for vulnerabilities (only available after April 20, 2022)
Threat Detection Policies and Rules for all types of security threats such as disallowed actions, excessive permissions, suspicious changes, etc.
There are other optional tools to help automate the creation of policies, such as:
- Runtime Policy Tuning (Threat Detection) for reducing noisy false positives in the events feed
- Network Security Policy Tool to author and fine-tune Kubernetes network policies
Feedback
Was this page helpful?
Glad to hear it! Please tell us how we can improve.
Sorry to hear that. Please tell us how we can improve.