Maintained with ☕️ by
IcePanel logo

Cloud Security Command Center - December 16th, 2024 [Feature]

Share

Services

## Feature Security Command Center can now produce [Cloud Infrastructure Entitlement Management (CIEM)](https://cloud.google.com/security-command-center/docs/ciem-overview) misconfiguration findings for federated identities that are connected to your AWS environment through the AWS IAM Identity Center. ## Feature **Detector for Container Threat Detection released to General Availability** **Container Threat Detection**, a built-in service available in Security Command Center Premium and Enterprise, has launched three new detectors to [General Availability](https://cloud.google.com/products?e=48754805&hl=en#product-launch-stages): * **Execution: Container Escape**: Detects when a process inside a container tries to break out of its isolation and interact with the host system or other containers. * **Execution: Kubernetes Attack Tool Execution**: Detects when a Kubernetes attack tool is run inside a container, indicating a potential attempt to exploit vulnerabilities in the Kubernetes environment. * **Execution: Local Reconnaissance Tool Execution**: Detects when a local reconnaissance tool is executed within a container, suggesting that an attacker is gathering information about the container environment, such as network configurations, active processes, or mounted file systems. For more information, see [Container Threat Detection detectors](https://cloud.google.com/security-command-center/docs/concepts-container-threat-detection-overview#detectors).