From the course: Google Cloud Security Command Center
Unlock this course with a free trial
Join today to access over 25,500 courses taught by industry experts.
Using anomaly and container threat detection - Google Cloud Platform Tutorial
From the course: Google Cloud Security Command Center
Using anomaly and container threat detection
- [Instructor] All right, so now we're going to talk about anomaly detection within Security Command Center. And the first question you may have is, "What is anomaly detection?" Anomaly detection is a built-in service that can detect potential abuse from outside your system. For example, if you had a credential leak or one of your Vms, virtual machines, was coin mining, you'd be notified in Security Command Center. Now, while anomaly detection can detect abuse from outside your system, Container Threat Detection can help detect abuse from inside your system. And it does so by providing a feature that monitors all of your Container-Optimized OS images, and this helps you identify some of the most common container runtime attacks and alerts you in the Security Command Center dashboard. For example, if you had a malicious bash script that was executed, you'll be notified in near real-time, and we're going to show you that next…