Главная
Study mode:
on
1
Introduction
2
Who is Loris
3
What is Falco
4
Falco Architecture
5
Rule Examples
6
How Falco collects data
7
Why Falco uses kernelbased instrumentation
8
Falco needs access to the kernel
9
LD Preload
10
LD Limitations
11
Ptrace
12
Amazon Fargate
13
Falco Trace SSH
14
Change System Binary
15
Performance
16
Links
17
QA
Description:
Explore runtime security with Falco in userspace in this conference talk by Loris Degioanni from Sysdig. Dive deep into the tradeoffs of using different backend drivers to access system call information for cloud-native security. Learn about eBPF, kernel modules, and ptrace(2), and understand the performance impacts of various solutions like LD_PRELOAD. Gain insights from Loris' extensive experience contributing to Wireshark and creating Sysdig and Falco. Discover Falco's architecture, rule examples, data collection methods, and the importance of kernel-based instrumentation. Examine LD Preload limitations, Ptrace, Amazon Fargate integration, and Falco Trace SSH. Understand system binary changes and performance considerations in this comprehensive exploration of Falco's userspace implementation.

Deep Dive - Runtime Security With Falco in Userspace

CNCF [Cloud Native Computing Foundation]
Add to list