<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Security Profiles on Tetragon - eBPF-based Security Observability and Runtime Enforcement</title>
    <link>/docs/use-cases/security-profiles/</link>
    <description>Recent content in Security Profiles on Tetragon - eBPF-based Security Observability and Runtime Enforcement</description>
    <generator>Hugo</generator>
    <language>en</language>
    <atom:link href="/docs/use-cases/security-profiles/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Record Linux Capabilities Usage</title>
      <link>/docs/use-cases/security-profiles/record-linux-capabilities/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>/docs/use-cases/security-profiles/record-linux-capabilities/</guid>
      <description>When the kernel needs to perform a privileged operation on behalf of a process, it checks the Capabilities of the process and issues a verdict to allow or deny the operation.&#xA;Tetragon is able to record these checks performed by the kernel. This can be used to answer the following questions:&#xA;What is the capabilities profile of pods or containters running in the cluster?&#xA;What capabilities to add or remove when configuring a security context for a pod or container?</description>
    </item>
  </channel>
</rss>
