Главная
Study mode:
on
1
Introduction
2
Our Cluster Architecture
3
Securing Our Cluster
4
No System is Perfectly Secured
5
Here Comes 2020
6
How Do We Trace Back?
7
Why Falco?
8
Our Falco Strategy
9
System Analysis
10
Security Kill Chain with Falco
11
Rule Example
12
Falco Rules Testing (Demo)
13
Our Approach To Use Falco
14
Using Falco Alerts
15
Security Observability
Description:
Explore a comprehensive conference talk on implementing security measures in a large-scale container environment using Falco. Dive into the Security Kill Chain stages and learn how to monitor and identify anomalous system calls and abnormal Kubernetes API events in a cloud infrastructure hosting over 100,000 daily MATLAB containers. Gain insights into Falco integration, including eBPF, and discover how to write and test Falco rules for enhanced security observability. Follow a detailed walkthrough of the event pipeline and understand how Falco detects activities related to various stages of the attack lifecycle, from reconnaissance to actions on objectives. Learn practical strategies for improving your system's security posture and leave equipped with knowledge to implement robust security measures in your own cloud-native environments.

Security Kill Chain Stages in a 100k+ Daily Container Environment with Falco

CNCF [Cloud Native Computing Foundation]
Add to list