While the code of the containers is being patched, how can Engineers quickly identify all compromised hosts and stop the egress of data on port 5353?

1 Comment

  1. Kathryn
    Author

    From my perspective, the answer is:
    Create an Amazon CloudWatch custom metric on the VPC Flow Logs identifying egress traffic on port 5353. Update the NACLs to block port 5353 outbound.

Leave a Reply

Your email address will not be published. Required fields are marked *

10 − 4 =