You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+7
Original file line number
Diff line number
Diff line change
@@ -115,6 +115,13 @@ ecs:DescribeTaskDefinition
115
115
116
116
Check official documentation on [Secure for cloud - AWS, Confirm the Services are working](https://docs.sysdig.com/en/docs/installation/sysdig-secure-for-cloud/deploy-sysdig-secure-for-cloud-on-aws/#confirm-the-services-are-working)
117
117
118
+
### General
119
+
120
+
Generally speaking, a triggered situation (threat or image-scanning) whould be check (from more functional-side to more technical)
121
+
- Secure UI > Events / Insights / ...
122
+
- Cloud-Connector Logs
123
+
- Cloudtrail > Event History
124
+
118
125
### Forcing Events - Threat Detection
119
126
120
127
Choose one of the rules contained in an activated Runtime Policies for AWS, such as `Sysdig AWS Activity Logs` policy and execute it in your AWS account.
0 commit comments