EN
ENNA

Falco

Apache-2.0

๐Ÿ“ฆ Container Security ยท C++

Falco is a cloud-native runtime security tool originally created by Sysdig and now a CNCF graduated project. It monitors system calls in real-time using eBPF or a kernel module to detect abnormal behavior, intrusions, and data theft in containers, Kubernetes clusters, and Linux hosts. Falco ships with a comprehensive rule set covering the MITRE ATT&CK framework, detecting events like shell spawning in containers, unauthorized process execution, sensitive file access, network connections to suspicious destinations, and privilege escalation attempts. Rules are written in a human-readable YAML format and can be customized to match any organization's security requirements. Falco integrates with Kubernetes admission controllers to enforce security policies at deploy time, and its output can be routed to Slack, PagerDuty, SIEM systems, or any webhook endpoint for alerting.

8.8kstars
1.0kforks
58issues
Updated 5d ago

Installation

Helm (Kubernetes)

$ helm repo add falcosecurity https://falcosecurity.github.io/charts && helm install falco falcosecurity/falco

apt (Debian/Ubuntu)

$ curl -fsSL https://falco.org/repo/falcosecurity-packages.asc | sudo gpg --dearmor -o /usr/share/keyrings/falco-archive-keyring.gpg && sudo apt install falco

Docker

$ docker run --rm -i -t --privileged falcosecurity/falco

Use Cases

  • Detecting shell spawning and unauthorized process execution inside containers
  • Monitoring for sensitive file access and credential theft on Kubernetes nodes
  • Alerting on network connections to known malicious destinations from pods
  • Enforcing runtime security policies across container orchestration environments
  • Detecting privilege escalation attempts and container escape techniques

Tags

runtime-securityebpfkubernetescontainersyscallcncfdetectioncloud-nativecncf-projectcontainersfalcohacktoberfestsecurity

More in Container Security