<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Linux process credentials on Tetragon - eBPF-based Security Observability and Runtime Enforcement</title>
    <link>/docs/use-cases/linux-process-credentials/</link>
    <description>Recent content in Linux process credentials on Tetragon - eBPF-based Security Observability and Runtime Enforcement</description>
    <generator>Hugo</generator>
    <language>en</language>
    <atom:link href="/docs/use-cases/linux-process-credentials/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Monitor Process Credentials changes at the System Call layer</title>
      <link>/docs/use-cases/linux-process-credentials/syscalls-monitoring/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>/docs/use-cases/linux-process-credentials/syscalls-monitoring/</guid>
      <description>Tetragon can hook at the system calls that directly manipulate the credentials. This allows us to determine which process is trying to change its credentials and the new credentials that could be applied by the kernel.&#xA;This answers the questions:&#xA;Which process or container is trying to change its UIDs/GIDs in my cluster?&#xA;Which process or container is trying to change its capabilities in my cluster?&#xA;Before going forward, verify that all pods are up and running, ensure you deploy our Demo Application to explore the Security Observability Events:</description>
    </item>
    <item>
      <title>Monitor Process Credentials changes at the Kernel layer</title>
      <link>/docs/use-cases/linux-process-credentials/monitor-changes-at-kernel/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>/docs/use-cases/linux-process-credentials/monitor-changes-at-kernel/</guid>
      <description>Monitoring Process Credentials changes at the kernel layer is also possible. This allows to capture the new process_credentials that should be applied.&#xA;This process-creds-installed tracing policy can be used to answer the following questions:&#xA;Which process or container is trying to change its own UIDs/GIDs in the cluster?&#xA;Which process or container is trying to change its own capabilities in the cluster?&#xA;In which user namespace the credentials are being changed?</description>
    </item>
  </channel>
</rss>
