<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Process lifecycle on Tetragon - eBPF-based Security Observability and Runtime Enforcement</title>
    <link>/docs/use-cases/process-lifecycle/</link>
    <description>Recent content in Process lifecycle on Tetragon - eBPF-based Security Observability and Runtime Enforcement</description>
    <generator>Hugo</generator>
    <language>en</language>
    <atom:link href="/docs/use-cases/process-lifecycle/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Process execution</title>
      <link>/docs/use-cases/process-lifecycle/process-execution/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>/docs/use-cases/process-lifecycle/process-execution/</guid>
      <description>This first use case is monitoring process execution, which can be observed with the Tetragon process_exec and process_exit JSON events. These events contain the full lifecycle of processes, from fork/exec to exit, including metadata such as:&#xA;Binary name: Defines the name of an executable file Parent process: Helps to identify process execution anomalies (e.g., if a nodejs app forks a shell, this is suspicious) Command-line argument: Defines the program runtime behavior Current working directory: Helps to identify hidden malware execution from a temporary folder, which is a common pattern used in malwares Kubernetes metadata: Contains pods, labels, and Kubernetes namespaces, which are critical to identify service owners, particularly in a multitenant environments exec_id: A unique process identifier that correlates all recorded activity of a process As a first step, let&amp;rsquo;s start monitoring the events from the xwing pod:</description>
    </item>
    <item>
      <title>Advanced Process execution</title>
      <link>/docs/use-cases/process-lifecycle/advanced-process-execution/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>/docs/use-cases/process-lifecycle/advanced-process-execution/</guid>
      <description>Monitor ELF or Flat binaries execution Advanced process execution can be performed by using Tracing Policies to monitor the execve system call path.&#xA;If we want to monitor execution of Executable and Linkable Format (ELF) or flat binaries before they are actually executed. Then the process-exec-elf-begin tracing policy is a good first choice.&#xA;Note The process-exec-elf-begin tracing policy, will not report the different binary format handlers or scripts being executed, but will report the final ELF or flat binary, like the shebang handler.</description>
    </item>
    <item>
      <title>Privileged execution</title>
      <link>/docs/use-cases/process-lifecycle/privileged-execution/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>/docs/use-cases/process-lifecycle/privileged-execution/</guid>
      <description>Tetragon also provides the ability to check process capabilities and kernel namespaces access.&#xA;This information would help us determine which process or Kubernetes pod has started or gained access to privileges or host namespaces that it should not have. This would help us answer questions like:&#xA;Which Kubernetes pods are running with CAP_SYS_ADMIN in my cluster?&#xA;Which Kubernetes pods have host network or pid namespace access in my cluster?&#xA;Step 1: Enabling Process Credential and Namespace Monitoring Edit the Tetragon configmap:</description>
    </item>
    <item>
      <title>Namespace access monitoring</title>
      <link>/docs/use-cases/process-lifecycle/namespace-access/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>/docs/use-cases/process-lifecycle/namespace-access/</guid>
      <description>Tetragon can monitor Linux namespace operations to detect when processes change their namespaces. This is particularly useful for detecting container escapes where a process attempts to access host namespaces using tools like nsenter.&#xA;Use Case: Detecting Container Escapes via Namespace Changes A common container escape technique involves using nsenter to switch into the host&amp;rsquo;s namespaces. Even if a container is running with restricted privileges, monitoring setns syscalls helps detect attempts to break out of the container&amp;rsquo;s isolation.</description>
    </item>
  </channel>
</rss>
