Kernel runtime security instrumentation
Kernel runtime security instrumentation
Posted Sep 6, 2019 16:53 UTC (Fri) by cpitrat (subscriber, #116459)In reply to: Kernel runtime security instrumentation by Cyberax
Parent article: Kernel runtime security instrumentation
For example if the host is supporting a critical service, then switching to a highly protected mode (think read-only, potentially degraded mode) allows to continue serving while investigating rather than having a DoS caused by a script kiddy doing a prank.
This is just one scenario. This seems like a flexible solution that allows for some interesting tools.