Runtime defense for App-Embedded
App-Embedded Defenders monitor your App-Embedded containers including AWS Fargate tasks to ensure they execute as designed, protecting containers from running suspicious processes or making suspicious network connections.
Policies let you define:
- Allow process activity. Enables verification of launched processes against policy.
- Allow networking activity. Enables verification of domain name resolution, and inbound and outbound network connections.
- Configure custom rules policy. For details refer to Custom runtime rules.
Besides runtime policy, you can also configure the WAAS application firewall to protect front-end Fargate containers.
Securing your App-Embedded containers
To secure App-Embedded containers including Fargate tasks, embed the Prisma Cloud App-Embedded Defender into it.
The steps are:
- Define your policy in Prisma Cloud Console underDefend > Runtime > App-Embedded policy.
- Embed the App-Embedded Defender into your Container or task definition.
- Start the service.
Securing Fargate tasks
The following provides an example for how to secure your AWS Fargate tasks.
Defining your policy
Add runtime protection for your App-Embedded by defining a runtime rule for it in Prisma Cloud Console.
Prisma Cloud ships with a default App-Embedded runtime policy.
App-Embedded Defenders dynamically retrieve policies from Console as they are updated.
You can embed App-Embedded Defender into a task/container with empty or very simple initial policies, and refine them as needed later.
This procedure demonstrates how to block the
Sample task
(in the next paragraph, from executing a new process and establishing outbound network connections.
You will create a new rule that prevents mkdir from running in the container named twistlock-fargate-task, and blocks outbound network requests to yahoo.com.
If you’ve got your own task, configure the rule to meet your own specific objectives.
By default, new rules apply to all images and containers (*), but you can target them to specific images or containers using pattern matching.- Log into Prisma Cloud Console.
- Go toDefend > Runtime > App Embedded Policy.
- ClickAdd rule.
- Enter a rule name.
- By default, the rule applies to all images and all containers.Target the rule to specific images or containers. A task definition declares the container name in the containerDefinitions→name field.
- Click theNetworkingtab.
- EnableDNStoggle
- SetEffecttoPrevent.
- Add gmail.com to theDNS allow list