Alcide: Kubernetes Forensics and Analytics
Identify anomalous behaviors & suspicious activity in Kubernetes deployments
Detect security-related abuse and abnormal behavior monitoring via the Kubernetes audit log analysis. Alcide kAudit automatically analyzes Kubernetes Audit logs, detecting non-compliant and anomalous behaviors of users and automated service accounts as well as anomalous administration operations.
EXAMPLE USE CASES
Track anomalies and incidents, proactively identify non-compliant behavior based on organization’s policies. Investigate specific Ops and security issues, trace back to responsible parties, troubleshoot and identify root cause with ease.
The Alcide kAudit app provides real-time findings including:
- Audit entries identified by the kAudit policies
- FIELDS INCLUDED
- Stolen Credentials
- Misconfigured RBAC
- Exploited Vulnerabilities in the Kubernetes API Server
- Violated Security Policies
About the Provider:
Get access to the Alcide: Kubernetes Forensics and Analytics Dataset in Snowflake
Already a Snowflake customer?
Access this dataset directly from your Snowflake account*