Kubernetes Master Class - 2020-04-20 - Detecting Anomalous Kubernetes Activity with Falco

Kubernetes Master Class - 2020-04-20 - Detecting Anomalous Kubernetes Activity with Falco

Published Apr 20, 2020

Even when processes are in place for vulnerability scanning and implementing pod security and network policies, not every risk will be addressed. You still need mechanisms to confirm these security barriers are effective and provide a last line of defense when they fail.

In order to keep up with threats at runtime, an open-source based approach can help you stay up to date.

In this Kubernetes Master Class, you will learn how to manage security risk at runtime in your RKE environments using Falco, a CNCF project for runtime security. Falco efficiently leverages Extended Berkeley Packet Filter (eBPF), a secure mechanism, to capture system calls and gain deep visibility. By adding Kubernetes application context and Kubernetes API audit events, teams can understand exactly who did what.

At the end of the session, we will also cover how Sysdig Secure extends the Falco detection engine and eases the burden of creating and updating Falco rules. It can also generate fewer false positives by tuning Falco-based policies for your own environment.

Agenda

  • Why Runtime Security? Examples and use-cases of anomalous, malicious activity in your clusters
  • Understanding and implementing threat detection in Rancher using Falco
  • Exploring how to extend runtime security in Rancher using Sysdig Secure

Go To Website