diff --git a/chart/kubecop/templates/default-rule-binding.yaml b/chart/kubecop/templates/default-rule-binding.yaml index 110de5e..b027f15 100644 --- a/chart/kubecop/templates/default-rule-binding.yaml +++ b/chart/kubecop/templates/default-rule-binding.yaml @@ -35,7 +35,6 @@ spec: - ruleName: "Kernel Module Load" - ruleName: "Exec Binary Not In Base Image" - ruleName: "Malicious SSH Connection" - - ruleName: "Unshare System Call usage" - ruleName: "Crypto Miners port detected" - ruleName: "Exec from mount" diff --git a/system-tests/all_alerts_from_malicious_app.py b/system-tests/all_alerts_from_malicious_app.py index 0801a0f..48e2fdf 100644 --- a/system-tests/all_alerts_from_malicious_app.py +++ b/system-tests/all_alerts_from_malicious_app.py @@ -39,7 +39,6 @@ def all_alerts_from_malicious_app(test_framework): "Exec Binary Not In Base Image", "Malicious SSH Connection", "Exec from mount", - "Unshare System Call usage", "Crypto Miners port detected" ]