Skip to content

Latest commit

 

History

History
11 lines (7 loc) · 1014 Bytes

File metadata and controls

11 lines (7 loc) · 1014 Bytes

Detect and Stop Unauthorized Memory Access

Allowed resources:

28 Detect and Stop Unauthorized Memory Access
Acceptance criteria There are different pods in k8s cluster with managed by different deployments. One pod is attempting to access /dev/mem, which is a potential security risk. Your task is to identify the pod using falco and scale down the associated deployment.