Securing your cluster at build and deploy time isn’t enough. Runtime security monitors container behavior to detect and respond to threats in real-time.

Why Runtime Security?

Even with perfect image scanning and admission control:

Falco: Cloud-Native Runtime Security

Falco uses system calls to detect anomalous activity:

YAML
# Install with Helm
helm repo add falcosecurity https://falcosecurity.github.io/charts
helm install falco falcosecurity/falco
Click to expand and view more

Default Rules

Falco comes with rules detecting:

Custom Rules

YAML
- rule: Detect Cryptocurrency Mining
  desc: Detect crypto mining processes
  condition: >
    spawned_process and
    (proc.name in (xmrig, minerd, cpuminer) or
     proc.cmdline contains "stratum+tcp")
  output: >
    Cryptocurrency miner detected
    (user=%user.name command=%proc.cmdline container=%container.name)
  priority: CRITICAL
Click to expand and view more

Responding to Threats

Alert Integration

YAML
# Falco configuration
alertmanager:
  enabled: true
  endpoint: http://alertmanager:9093

slack:
  enabled: true
  webhook: https://hooks.slack.com/services/XXX
Click to expand and view more

Automated Response

Use Falco Sidekick to trigger actions:

Other Runtime Security Tools

Tetragon

eBPF-based security observability:

YAML
apiVersion: cilium.io/v1alpha1
kind: TracingPolicy
metadata:
  name: monitor-sensitive-files
spec:
  kprobes:
  - call: "fd_install"
    selectors:
    - matchArgs:
      - index: 1
        operator: "Prefix"
        values:
        - "/etc/shadow"
Click to expand and view more

Sysdig Secure

Commercial platform with deep container visibility.

Best Practices

  1. Start with default rules, then customize
  2. Tune to reduce false positives
  3. Test detection with attack simulations
  4. Have runbooks for common alerts
  5. Practice incident response

Runtime security is your last line of defense against attacks.

Start searching

Enter keywords to search articles

↑↓
ESC
⌘K Shortcut