Has anyone tested if this will work if an attacker gains control of a Kubernetes or Docker container? Would you run this on the Kubernetes cluster or Docker host OS level? Containers aren't really VMs, so intuitively I think the CPU signature would be the same, but I'm not certain.
Has anyone tested if this will work if an attacker gains control of a Kubernetes or Docker container? Would you run this on the Kubernetes cluster or Docker host OS level? Containers aren't really VMs, so intuitively I think the CPU signature would be the same, but I'm not certain.