While the code of the containers is being patched, how can Engineers quickly identify all compromised hosts and stop the egress of data on port 5353?

2 Comments

  1. Kathryn
    Author

    From my perspective, the answer is:
    Create an Amazon CloudWatch custom metric on the VPC Flow Logs identifying egress traffic on port 5353. Update the NACLs to block port 5353 outbound.

  2. Shirley
    Author

    As I see it, the answer is:
    Create an Amazon CloudWatch custom metric on the VPC Flow Logs identifying egress traffic on port 5353. Update the NACLs to block port 5353 outbound.

Leave a Reply

Your email address will not be published. Required fields are marked *

nine − four =