Главная
Study mode:
on
1
Introduction
2
Overview
3
Falco
4
Psrux
5
Chmod
6
Creating a privilege part
7
Adding suspicious networking
8
Launching package management
9
Launching Telnet
10
Detecting a minor
11
Audience question
12
Plugin architecture
13
Plugin sources
14
XMRig
15
Building your own rules
16
Creating the environment
17
Testing Falco
18
Summary
19
Clear Guard Rail
20
Audience Questions
21
Falco Remediation
22
Custom Rule
23
Developer Guide
24
GitHub
25
Questions
26
Why use Palco
27
Hidden connections
28
Testing Falco in Kubernetes
29
Final Question
30
Final Words
Description:
Explore crypto-jacking detection in Kubernetes workloads through this comprehensive 57-minute Cloud Native Live conference talk. Dive into topics such as Falco, privilege escalation, suspicious networking, and package management. Learn about plugin architecture, XMRig, and custom rule creation. Gain insights on testing Falco in Kubernetes environments, understanding hidden connections, and implementing clear guard rails. Discover the developer guide, GitHub resources, and get answers to common questions about Palco usage and Falco remediation.

Detecting Crypto-Jacking in Kubernetes Workloads

CNCF [Cloud Native Computing Foundation]
Add to list