Cloud workload protection for VMs
editCloud workload protection for VMs
edit[preview] This functionality is in technical preview and may be changed or removed in a future release. Elastic will work to fix any issues, but features in technical preview are not subject to the support SLA of official GA features.
Cloud workload protection helps you monitor and protect your Linux VMs. It uses the Elastic Defend integration to capture cloud workload telemetry containing process, file, and network activity.
Use this telemetry with out-of-the-box detection rules and machine learning models to automate processes that identify cloud threats.
Use cases
edit- Runtime monitoring of cloud workloads: Provides visibility into cloud workloads, context for detected threats, and the historical data needed for retroactive threat investigations.
- Cloud-native threat detection and prevention: Provides security coverage for Linux, containers, and serverless applications. Protects against known and unknown threats using on-host detections and protections against malicious behavior, memory threats, and malware.
- Reducing the time to detect and remediate runtime threats: Helps you resolve potential threats by showing alerts in context, making the data necessary for further investigations readily available, and providing remediation options.
To continue setting up your cloud workload protection, learn more about:
- Getting started with Elastic Defend: configure Elastic Defend to protect your hosts. Be sure to select one of the "Cloud workloads" presets if you want to collect session data by default, including process, file, and network telemetry.
- Session view: examine Linux process data organized in a tree-like structure according to the Linux logical event model, with processes organized by parentage and time of execution. Use it to monitor and investigate session activity, and to understand user and service behavior on your Linux infrastructure.
- The Kubernetes dashboard: Explore an overview of your protected Kubernetes clusters, and drill down into individual sessions within your Kubernetes infrastructure.
-
Environment variable capture: Capture the environment variables associated with process events, such as
PATH
,LD_PRELOAD
, orUSER
.