Runtime Audits
This document summarizes all the runtime audits (detections) that are available in Prisma Cloud Compute. For each detection, you can learn more about what it actually detects, how to enable or disable it, avoid false positives, relevant workloads (Containers, Hosts, Serverless and App-embedded), and if the audit also generates an incident.
Runtime detections for processes
Detection | Context | Audit message | Triggers an incident | Workloads |
---|---|---|---|---|
Unexpected Process | Indicates when a process that is not part of the runtime model was spawned.
|
| Containers | |
Port Scanning Process | Indicates a process was spawned, that is identified as being used for port scanning.
| <process> launched and is identified as a process used for port scanning | Containers | |
Explicitly Denied Process | Indicates that a process listed in the Denied & fallback list was spawned.
| <process> launched and is explicitly denied by runtime rule. Full command <command> | Containers,
Host,
Serverless,
App-embedded | |
Modified Process | Indicates a modified process was spawned. A modified process is a process whose binary was created or modified after the container was started.
| A modified executable <process> was launched | Containers,
App-embedded | |
Altered Binary | Indicates that a package binary file was replaced during image build. This detection will generate an audit when a process is started from an altered binary.
|