Threat Exclusions
When a Threat exclusion rule is active, the underlying events still occur, but the associated threat is not created on the Threats page, and thus, alert notifications will not be sent.
Use Cases
You can use threat exclusion rules to reduce the noise from a variety of sources that do not constitute real threats. These may include:
- Known benign activities that consistently trigger Threats, such as routine admin activities in development or pre-production environments.
- Example: Actions performed by a role like
my_role
frequently creating VPCs and deleting flow logs.
- Example: Actions performed by a role like
- Activities occurring in specific environments, such as dev or pre-prod, where Threats are irrelevant or expected.
- Example: Cryptocurrency mining detected in a sandbox or test environment specifically set up for resource load testing.
- Activities performed by known, trusted identities / users / service accounts.
- Example: A known and trusted admin user performing high-privileged actions.
- Known noisy rules that consistently generate non-actionable Threats.
- Example: Rules detecting
Delete VPC Flow Log
actions that are part of automated cleanup processes.
- Example: Rules detecting
- Routine or expected package installations, software updates, or environment configuration activities.
- Example:
apt-get update -y
andapt install
Python commands frequently triggered by deployment processes.
- Example:
Create an Exclusion
You can create a threat exclusion from either the Threat Exclusion page or directly from a Threat.
To create it from the Threat Exclusion page:
Log in to Sysdig Secure.
Navigate to Policies > Threat Exclusion.
Select New Exclusion Rule.
Enter a Name and select the Criteria. For details, see Define Criteria.
To create an exclusion from an occurrence of a Threat:
Log in to Sysdig Secure.
Navigate to Threats > Threats.
Identify a threat you wish to make an exclusion rule for.
Select the three-dot menu icon.
Select Create Exclusion Rule.
The Exclusion Rule modal appears.
Enter a Name, review the Criteria, and edit as you wish. For details, see Define Criteria.
Select Save.
Created exclusions appear on the Threat Exclusion page. Here, you can enable or disable them with the toggle, and review their details, such as the creation date.
Define Criteria
In the Criteria section of the Exclusion Rule modal, you can define the exact threat you wish to ignore.
Use this when you always want to suppress Threats from particular clusters, users, workloads, or processes. You can combine multiple labels to target specific resources.
Feedback
Was this page helpful?
Glad to hear it! Please tell us how we can improve.
Sorry to hear that. Please tell us how we can improve.