Security Command Center performs runtime and control plane monitoring of Cloud Run resources. For recommended responses to these threats, see Respond to Cloud Run threat findings.
Runtime finding types
The following runtime detections are available with Cloud Run Threat Detection:
Execution: Added Malicious Binary ExecutedExecution: Added Malicious Library LoadedExecution: Built in Malicious Binary ExecutedExecution: Container EscapeExecution: Kubernetes Attack Tool ExecutionExecution: Local Reconnaissance Tool ExecutionExecution: Malicious Python executedExecution: Modified Malicious Binary ExecutedExecution: Modified Malicious Library LoadedMalicious Script ExecutedMalicious URL ObservedReverse ShellUnexpected Child ShellControl plane finding types
The following control plane detections are available with Event Threat Detection:
Execution: Cryptomining Docker ImageImpact: Cryptomining CommandsPrivilege Escalation: Default Compute Engine Service Account SetIAMPolicyWhat's next
- Learn about Cloud Run Threat Detection.
- Learn about Event Threat Detection.
- Learn how to respond to Cloud Run threat findings.
- Refer to the Threat findings index.