Skip to main content

Security event management

Big picture

Get alerts on security events in a single dashboard.


Security events indicate that a threat actor may be present in your Kubernetes cluster. For example, a DNS request to a malicious hostname, a triggered WAF rule, or the opening of a sensitive file. Calico Cloud provides security engineers and incident response teams with a single dashboard to manage threat alerts. Benefits include:

  • A filtered list of critical events with recommended remediation
  • Identify impacts on applications
  • Understand the scope and frequency of the issue
  • Manage alert noise by dismissing events (show/hide)
  • Manage alert noise by creating exceptions

Before you begin


-- Container threat detection is enabled


  • Only WAF basic security events. Over time, the dashboard will contain a full range of Calico Cloud security events.
  • You cannot control which users can view or edit the page using fine-grained role-based access controls

Security Events Dashboard

The Security Events Dashboard page gives you a high-level view of recent security events. You can use this visual reference to get an overall sense of your cluster's health. If you find anything that merits further investigation, you can click on an event for more details.

  • In Manager UI, go to Threat defense > Security Events Dashboard.

Security Events Dashboard

Security Events

The Security Events page lists all the security events that have been detected for your cluster. You can view and filter your security events to focus on

  • In Manager UI, go to Threat Defense > Security Events.

Dismiss a security event

You can clear your security events list by dismissing events that you've finished reviewing. When you dismiss an event, that event is no longer visibile in the list.

  1. In Manager UI, go to Threat Defense > Security Events.
  2. Find a security event in the list, and then click Action > Dismiss Security Event.

Create a security event exception

You can prevent certain kinds of security events from appearing in the list by creating a security event exception. This is helpful if you want to reduce alert noise for workloads that you know are safe. When you create an exception, all matching security events are removed from the security events list. Future matches will not appear in the list.

  1. In Manager UI, go to Threat Defense > Security Events.
  2. Find a security event in the list, and then click Action > Add exception.
  3. On the Create an Exception dialog, select a scope for the exception and click Create Exception.

You can manage your exceptions by clicking Threat Defense > Security Events > Exceptions. You can browse, edit, and delete exceptions on the list.

UI help

Event details page

Provides actions to remediate the detection and stop the attack from progressing. For example:



Calico Cloud calculates severity (Critical, High, Medium, Low) using a combination of NIST CVSS 3.0 and MITRE IDs.


Multiple MITRE IDs may be associated with a security event.

Attack Vector

  • Network
  • Process
  • File

MITRE Tactic (based on the MITRE tactics) includes a specific path, method, or scenario that can compromise cluster security. Valid entries:

TacticTargetAttack techniques
Initial accessNetworkGain an initial foothold within a network using various entry vectors.
ExecutionCode in local or remove systemsControl code running on local or remote systems using malicious code.
ImpactSystems and dataDisrupt availability or compromise integrity by manipulating business and operational processes.
PersistenceMaintain footholdsMaintain access to systems across restarts, credential changes, and other interruptions.
Privilege EscalationAccess permissionsAccess higher-level permissions on a system or network.
Defense EvasionAvoid detectionMasquerade and hide malware to avoid detection to compromise software, data, scripts, and processes.
DiscoveryDetermine your environmentGain knowledge about your system and internal network.

Frequently asked questions

How is the recommended remediation determined?

The Tigera Security Research team maps MITRE IDs to events and provides the recommended remediation.

Will I see all Calico Cloud alerts in this dashboard?

No. Calico Cloud security events do not encompass all types of alerts nor all security alert types; they only contain alerts for threats. Alerts for vulnerabilities detected in a container image, or misconfigurations in your Kubernetes cluster, are displayed in their respective dashboards. However, when vulnerabilities or misconfigurations are exploited by an attacker, those indicators of an attack are considered security events.

What does dismissing a security event do?

Dismissing a security event hides it from view.

Why are some fields in columns blank?

Security events generated from older managed clusters will not have values for the new fields (for example, MITRE IDs). You can dismiss these events.

Where can I view security event logs?

Go to: Logs, Kibana index, tigera_secure_ee_events.