Cloud Run Threat Detection 是 Security Command Center 的一项内置服务,可持续监控受支持的 Cloud Run 资源的状态,以检测最常见的运行时攻击。如果 Cloud Run Threat Detection 检测到攻击,它会在 Security Command Center 中近乎实时地生成发现结果。
Cloud Run Threat Detection 运行时检测器会监控 Cloud Run 资源以查找可疑的二进制文件和库,并使用自然语言处理 (NLP) 来检测恶意 Bash 和 Python 代码。
[[["易于理解","easyToUnderstand","thumb-up"],["解决了我的问题","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["很难理解","hardToUnderstand","thumb-down"],["信息或示例代码不正确","incorrectInformationOrSampleCode","thumb-down"],["没有我需要的信息/示例","missingTheInformationSamplesINeed","thumb-down"],["翻译问题","translationIssue","thumb-down"],["其他","otherDown","thumb-down"]],["最后更新时间 (UTC):2025-08-19。"],[],[],null,["# Cloud Run Threat Detection overview\n\n| Premium and Enterprise [service tiers](/security-command-center/docs/service-tiers)\n|\n| **Preview**\n|\n|\n| This product or feature is subject to the \"Pre-GA Offerings Terms\" in the General Service Terms section\n| of the [Service Specific Terms](/terms/service-terms#1).\n|\n| Pre-GA products and features are available \"as is\" and might have limited support.\n|\n| For more information, see the\n| [launch stage descriptions](/products#product-launch-stages).\n\nCloud Run Threat Detection is a built-in service of Security Command Center that continuously\nmonitors the state of supported Cloud Run resources to detect the most\ncommon runtime attacks. If Cloud Run Threat Detection detects an attack, it generates a\nfinding in Security Command Center in near real-time.\n\nCloud Run Threat Detection runtime detectors monitor Cloud Run\nresources for suspicious binaries and libraries and use natural language\nprocessing (NLP) to detect malicious Bash and Python code.\n\nIn addition, control plane detectors are available through\n[Event Threat Detection](/security-command-center/docs/concepts-event-threat-detection-overview).\nThese detectors monitor the [Cloud Logging](/logging/docs/basic-concepts)\nstream of your organization or projects to detect potential attacks to the\ncontrol plane of your Cloud Run resources.\n\nSupported resources\n-------------------\n\nCloud Run Threat Detection monitors the following resources:\n\n- [Cloud Run services](/run/docs/resource-model#services)\n- [Cloud Run jobs](/run/docs/resource-model#jobs)\n\nSupported execution environments\n--------------------------------\n\nThe supported execution environments differ for runtime detectors and\ncontrol plane detectors.\n\n### Supported execution environments for runtime detectors\n\nCloud Run Threat Detection [runtime detectors](#runtime-detectors) support only\nCloud Run resources that run on the [second generation execution\nenvironment](/run/docs/about-execution-environments). Consider the following\nbefore enabling Cloud Run Threat Detection:\n\n- When you enable Cloud Run Threat Detection, you can't create a\n Cloud Run service or service revision that runs on the first\n generation execution environment. The Cloud Run service must\n use the second generation execution environment. We recommend that you test\n your workloads on the second generation execution environment before enabling\n Cloud Run Threat Detection.\n\n- To enable runtime threat detection for a service, [deploy a\n revision](/run/docs/deploying#revision) that sets the execution environment of\n the service to either the second generation or the default execution\n environment.\n\n### Supported execution environments for control plane detectors\n\nThe [control plane detectors](#control-plane-detectors) support both first\nand second generation execution environments.\n\nHow Cloud Run Threat Detection runtime threat detection works\n-------------------------------------------------------------\n\nWhen you enable Cloud Run Threat Detection, it collects telemetry from the\n[supported Cloud Run resources](#supported-resources) to analyze\nprocesses, scripts, and libraries that might indicate a runtime attack. The\nfollowing is the execution path when events are detected:\n\n1. Cloud Run Threat Detection uses a watcher process to collect container and event information for the complete duration of a Cloud Run workload.\n2. Cloud Run Threat Detection analyzes the collected event information to determine\n whether an event is indicative of an incident. It uses NLP to analyze Bash\n and Python scripts for malicious code.\n\n - If Cloud Run Threat Detection identifies an incident, it reports the incident as\n a finding in Security Command Center.\n\n - If Cloud Run Threat Detection doesn't identify an incident, no information is\n stored.\n\n - All data collected is ephemeral and isn't persistently stored.\n\nFor information about how to review Cloud Run Threat Detection findings in the\nGoogle Cloud console, see [Review\nfindings](/security-command-center/docs/use-cloud-run-threat-detection#review-findings).\n\nKnown issues\n------------\n\n- Instances of your Cloud Run services or jobs that live longer than seven days stop sending telemetry information.\n- If the watcher process prematurely stops in a running instance of your Cloud Run service or job, the watcher process doesn't restart. The instance stops sending telemetry information to Cloud Run Threat Detection. Cloud Run Threat Detection logs are absent from the instance logs. There is no indicator that a watcher process has stopped.\n\nDetectors\n---------\n\nThis section lists the runtime and control plane detectors that are available.\nWe regularly add new detectors as new cloud threats emerge.\n\n### Runtime detectors\n\nCloud Run Threat Detection includes the following runtime detectors:\n\n### Control plane detectors\n\nThe following control plane detectors are available through Event Threat Detection.\nThese detectors are enabled by default. You manage these detectors the same way\nyou do other Event Threat Detection detectors. For more information, see [Use\nEvent Threat Detection](/security-command-center/docs/how-to-use-event-threat-detection). \n\nFor deprecated and shut down rules, see [Deprecations](/security-command-center/docs/deprecations).\n\nWhat's next\n-----------\n\n- Learn how to [use Cloud Run Threat Detection](/security-command-center/docs/use-cloud-run-threat-detection).\n- Learn how to [use\n Event Threat Detection](/security-command-center/docs/how-to-use-event-threat-detection)."]]