Skip to main content
Security investigations are only as valuable as the actions they produce. Discovering that a container is exfiltrating data is critical — but if acting on that discovery requires switching to a separate tool, searching for the right host or pod name, and manually running commands, the attacker has time to complete the operation before you can stop it. Response Actions in Sysdig Secure let you execute containment and evidence-collection actions directly from the investigation interface, on the exact resource you are already looking at. You can kill a process, isolate a workload’s network, capture a volume snapshot for forensics, download container logs, or quarantine a file — without leaving Sysdig and without needing shell access to the target host or cluster.

Why Use Response Actions

Speed matters during an active incident. The longer a compromised workload runs, the more damage it can cause — data exfiltrated, lateral movement completed, persistence mechanisms installed. Response Actions reduce the time from detection to containment from minutes (opening a terminal, SSHing to the right host, running the right command) to seconds (selecting the action in Sysdig and confirming).Context is preserved. Because Response Actions run from within the investigation context — the same Resource 360 panel or Threats view where you identified the problem — you don’t lose your place or have to reconstruct which resource you were looking at.Evidence is collected before containment destroys it. The ordering matters: Sysdig lets you take a volume snapshot or download logs before killing a container. Actions taken from the same interface make it natural to follow the forensically correct order of operations.Undo is built in. For destructive or disruptive actions, Sysdig provides paired undo actions. You can pause a container to stop a process, investigate, and then unpause it — all from the same response history entry.Example (end-to-end): A runtime policy fires at 2:17 AM because a container in your payments namespace is running curl to an unknown external IP. You open the event in Sysdig, confirm it is not an expected behavior, and take these actions in sequence — all from the Sysdig UI, in under 5 minutes:
  1. Get Logs — Download the container’s stdout/stderr to confirm the extent of the outbound activity.
  2. Kubernetes Volume Snapshot — Create a point-in-time backup of the attached persistent volumes before any data is lost.
  3. Isolate Network — Apply a Kubernetes network policy that blocks all traffic to and from the workload, stopping the exfiltration.
  4. Acquire File — Download the binary that initiated the curl call for malware analysis.
You now have forensic evidence and a contained threat, and your on-call team wakes up to a complete incident record rather than an empty audit trail.

Next Steps