The host and container protection features of Security Center generate alerts based on your asset protection rules. These alerts are displayed on the Cloud Workload Protection Platform (CWPP) tab of the Alert page. This topic describes the basic concepts of CWPP security incidents.
Overview
Source of CWPP security incidents
Alerts are generated based on the asset protection rules that you configure for host protection and container protection in Security Center. Security Center then uses graph computing technology to aggregate related CWPP alerts into security incidents. For example, it groups alerts that share the same MD5 hash or parent process ID. The overview section of the incident details page lists Security Center as the alert source.
You can view CWPP alert information on the CWPP tab of the page.
CWPP security incident generation rules
By default, all CWPP alerts generate security incidents, except for Precision-Defense alerts. If a host alert is not related to any other ones, it generates a single incident.
If you configure incident whitelisting rules, alerts that hit a rule do not generate a security incident.
Incident retention period
The Security Incident page only displays incidents from the last 180 days.
Incident risk levels and handling instructions
Risk Level | Description | Handling Instructions |
Serious |
| Review and handle this incident immediately. |
High Risk |
| Review and handle this incident immediately. |
Medium Risk | Suspected malicious behavior or entities were detected. The incident might be a successful intrusion that has affected your assets. It could also be caused by unusual O&M operations, such as an abnormal logon. | This risk level indicates a possibility that your assets are under attack. Review the incident details to determine whether a threat exists and take appropriate action. |
Low Risk | It's possible that the incident is a successful intrusion. It could also mean your assets are undergoing continuous attack probes from an external source, such as access from 106.11.XX.XX. | You should follow security incidents at this level if your assets have high security requirements. |
Reminder | These are typically alerts from job automation software. They only indicate that certain jobs have run or reached a specific milestone. | Such incidents are no cause for concern. |
Objects to be handled
You can handle security incidents by addressing the aggregated alerts and extracted alert entities.
CWPP security alerts
CWPP security incidents are generated by aggregating CWPP security alerts using graph computing technology. If an incident is a false positive, you can add it and its associated alerts to a whitelist.
The alert aggregation rules are as follows:
A CWPP security incident can aggregate a maximum of 2,000 alerts using graph computing technology.
For incidents in the Unhandled state, new alerts can be aggregated into the incident.
For incidents in the Handling, Handled, or Handling Failed state, new alerts are not aggregated into the incident. Instead, a new incident is generated in the Unhandled state.
Entities
In a security incident, an entity is a specific object or actor associated with the incident. Security Center extracts and aggregates entities from security alerts. Security Center classifies entities as either malicious or non-malicious based on whether they have malicious tags. You can also view entity details, run playbooks, and query Alibaba Cloud threat intelligence. Security Center can identify the following types of entities:
Entity Name | Is Asset Entity | Can Be Identified as Malicious |
Host | ✅ | ❌ |
IP address | ✅ | ✅ |
Alibaba Cloud account | ✅ | ❌ |
AccessKey pair | ✅ | ❌ |
Domain name | ✅ | ✅ |
File | ❌ | ✅ |
Host process | ❌ | ✅ |
Host account | ❌ | ❌ |
URL | ❌ | ❌ |
Registry | ❌ | ✅ |
Container | ✅ | ❌ |
Cluster | ✅ | ❌ |
Object Storage Service (OSS) | ✅ | ❌ |
Security incident handling flowchart
More services
If you activate the Cloud Threat Detection and Response (CTDR) service, you gain access to additional capabilities for security incident analysis and response. The following table compares the services:
Differences | With CTDR | Without CTDR |
Supported incident types for handling |
| Security incidents are generated by aggregating CWPP security alerts using graph computing. Examples include intrusion detection and defense alerts for Security Center hosts and containers. |
Incident handling methods |
|
|