Blog Post

Microsoft Defender for Cloud Blog
6 MIN READ

Microsoft Defender for Cloud - Elevating Runtime Protection

EyalGur's avatar
EyalGur
Icon for Microsoft rankMicrosoft
Jan 17, 2025

 

In today's rapidly evolving digital landscape, runtime security is crucial for maintaining the integrity of applications in containerized environments.  As threats become increasingly sophisticated, the demand for more adaptive protection continues to rise. Attackers are no longer relying on generic exploits — they are actively targeting vulnerabilities in container configurations, runtime processes, and shared resources. From injecting malicious code to escalating privileges and exploiting kernel vulnerabilities, their tactics are constantly evolving.

Overcoming these challenges requires continuous monitoring, validating container immutability, and detecting anomalies to prevent and respond to threats in real time, ensuring container security throughout their lifecycle. Building on these best practices, Microsoft Defender for Cloud delivers advanced and innovative runtime threat protection for containerized environments, providing real-time defense and adaptive security to address evolving threats head-on.

Empowering SOC with real-time threat detection

At the heart of our enhanced runtime protection lies our advanced detection capabilities. To stay ahead of evolving threats and offer near real-time threat detection, Microsoft Defender for Cloud is proud to announce significant advancements in its unique eBPF sensor. This sensor now provides Kubernetes alerts, powered by Microsoft Defender for Endpoint (MDE) detection engine in the backend.  Leveraging Microsoft’s industry-leading security expertise, we've tailored MDE's robust security capabilities to specifically address the unique challenges of containerized environments. By carefully validating detections against container-specific threat landscapes, adding relevant context, and adjusting alerts as needed, we've optimized the solution for maximum accuracy and effectiveness that is needed for cloud-native environments.

By utilizing the MDE detection engine, we offer the following enhancements:

  • Near real-time detection: Our solution provides timely alerts, enabling you to respond quickly to threats and minimize their impact.
  • Expanded threat coverage: We've expanded our detection capabilities to cover a broader range of threats such as binary drift and additional threat matrix coverage.
  • Enhanced visibility: Gain deeper insights into your container environment with detailed threat information and context that is sent to Defender XDR for further investigation.

Switching between multiple portals leaves customers with a fragmented view of their security landscape, hindering their ability to investigate and respond to security incidents efficiently. To combat this, Defender for Cloud alerts are integrated with Defender XDR. By centralizing alerts from both solutions within Defender XDR, customers can gain comprehensive visibility of their security landscape and simplify incident detection, investigation, and response effectively.

Introducing binary drift detection to maintain optimal security and performance, containerized applications should strictly adhere to their defined boundaries. With binary drift detection in place, unauthorized code injections can be swiftly identified. By comparing the modified container image against the original, the system detects any discrepancies, enabling timely response to potential threats.

By combining binary drift detection with other security measures, organizations can reduce the risk of exploitation and protect their containerized applications from malicious attacks.

An example of binary drift detection

 

Key takeaways from above illustration:

  • Common Vulnerability and Exposures (CVE) pose significant risks to containerized environments.
  • Binary drift detection can help identify unauthorized changes to container images, even if they result from CVE exploitation.
  • Regular patching and updating of container images are crucial to prevent vulnerabilities.

 

In some customer environments, it's common to deviate from best practices. For example, tasks like debugging and monitoring often require running processes that aren’t part of the original container image. To handle this, we offer binary drift detection along with a flexible policy system. This lets you choose when to receive alerts or ignore them. You can customize these settings based on your cloud environment or by filtering specific Kubernetes resources.

 

Learn more about binary drift detection

For a deep dive into binary drift detection and how it can enhance your container security posture, please see Container, Security, Kubernetes.

 

Presenting new scenario-driven alert simulation

Simulate real-world attack scenarios within your containerized environments with this innovative simulator, enabling you to test your detection capabilities and response procedures. You can enhance your security posture and protect your containerized environments from emerging threats by leveraging this powerful tool.

 Examples of some of the attack scenarios that can be simulated using this tool are: 

  • Reconnaissance activity: Mimic the actions of attackers as they gather information about your cluster.
  • Cluster-to-cloud: Simulate lateral movement as attackers attempt to spread across your environment.
  • Secret gathering: Test your ability to detect attempts to steal sensitive information.
  • Crypto-mining activity: Simulate the impact of resource-intensive crypto-mining operations.
  • Webshell invocation: Test your detection capabilities for malicious web shells.

You can gain valuable insights into your security controls and identify areas for improvement. This tool provides a safe and controlled environment to practice incident response, ensuring that your team is well-prepared to handle real-world threats.

Key benefits of scenario-driven alert simulation:

  • Test detection capabilities: Validate your ability to identify and respond to various attack types.
  • Validate response procedures: Ensure your incident response teams are prepared to handle real-world threats.
  • Identify gaps in security: Discover weaknesses in your security posture and address them proactively.
  • Improve incident response time: Practice handling simulated incidents to reduce response times in real-world situations.

 

Alert simulation tool

 

Enhancing Cloud Detection and Response (CDR)

From detection to resolution, we've streamlined every step of the process to ensure robust and efficient threat management. By enabling better visibility, faster investigation, and precise response capabilities, SOC teams can confidently address container threats, reducing risks and operational disruptions across multi-cloud environments.

Cloud-native response actions for containers

Swift and precise containment is critical in dynamic, containerized environments. To address this, we’ve introduced cloud-native response actions in Defender XDR, enabling SOC teams to:

  • Cut off unauthorized pod access and prevent lateral movement by instantly isolating compromised pods.
  • Stop ongoing malicious pod activity and minimize impact by terminating compromised pods with a single click.

These capabilities are specifically designed to meet the unique challenges of multi-cloud ecosystems, empowering security teams to reduce Mean Time to Resolve (MTTR) and ensure operational continuity.

Response actions

Action center view

 

Log collection in advanced hunting
Limited visibility in Kubernetes activities, cloud infrastructure changes, and runtime processes weakens effective threat detection and investigation in containerized environments. To bridge this gap, we’ve enhanced Defender XDR’s advanced hunting experience by collecting:

  • KubeAudit logs: Delivering detailed insights into Kubernetes events and activities.
  • Azure Control Plane logs: Providing a comprehensive view of cloud infrastructure activities.
  • Process events: Capturing detailed runtime activity.

This enriched data enables SOC teams to do deeper investigations, hunt for advanced threats, and create custom detection rules. With full visibility across AKS, EKS, and GKE, these capabilities strengthen defenses and support proactive security strategies.

 

Advance hunting view

Accelerating investigations with built-in queries 

Lengthy investigation processes can delay incident resolution and can potentially lead to a successful attack attempt. To address this, we’ve equipped go hunt with pre-built queries specifically tailored for cloud and containerized threats. These built-in queries allow SOC teams to:

  • Focus their time in quickly identifying attacker activity and not write custom queries.
  • Gain insights in minutes vs. hours, reducing the investigation time enormously.

This streamlined approach enhances SOC efficiency, ensuring that teams spend more time on remediation and less on query development.

 

Go hunt view

 

Bridging knowledge gaps with guided response using Microsoft Security Copilot

Many security teams, especially those working in complex environments like containers, may not have deep expertise in every aspect of container threat response. Additionally, security teams might encounter threats or vulnerabilities they haven’t seen before. We are excited to integrate with Security Copilot to bridge this gap. Security Copilot serves as a valuable tool that offers:

  • Step-by-step, context-rich guidance for each incident.
  • Tailored recommendations for effective threat containment and remediation.

By leveraging AI-driven insights, Security Copilot empowers SOC teams of varying expertise levels to navigate incidents with precision, ensuring consistent and effective responses across the board.

 

Security copilot recommendations

Summary

Microsoft Defender for Cloud has introduced significant advancements in runtime protection for containerized environments. By leveraging the Microsoft Defender for Endpoint (MDE) detection engine, this solution now offers near real-time threat detection, enhancing threat visibility and response capabilities. A key feature, binary drift detection, monitors changes in container images to identify unauthorized modifications and prevent security breaches. Additionally, the integration with Defender XDR centralizes alerts, providing comprehensive visibility and simplifying incident detection, investigation, and response. With enhanced cloud-native response actions and advanced hunting capabilities, SOC teams can confidently address container threats, reducing risks and operational disruptions across multi-cloud environments.

 

Learn more

Ready to elevate your container security? Experience the power of our new features firsthand with our cutting-edge simulator—test them in your containerized environments and see the difference!  Alerts for Kubernetes Clusters - Microsoft Defender for Cloud | Microsoft Learn

 

Updated Jan 17, 2025
Version 1.0
No CommentsBe the first to comment