https://github.com/iamgp21/capstone-runtime-sec
POC Repo for Implementing Runtime Security fo a Kubernetes Cluster.
https://github.com/iamgp21/capstone-runtime-sec
architecture cloud-security cncf ebpf kubernetes observability runtime-security
Last synced: 4 months ago
JSON representation
POC Repo for Implementing Runtime Security fo a Kubernetes Cluster.
- Host: GitHub
- URL: https://github.com/iamgp21/capstone-runtime-sec
- Owner: iamgp21
- License: other
- Created: 2025-01-25T12:23:24.000Z (about 1 year ago)
- Default Branch: main
- Last Pushed: 2025-02-22T07:52:30.000Z (11 months ago)
- Last Synced: 2025-02-22T08:29:56.042Z (11 months ago)
- Topics: architecture, cloud-security, cncf, ebpf, kubernetes, observability, runtime-security
- Language: Go
- Homepage:
- Size: 553 KB
- Stars: 0
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
## k8s Runtime Security
POC Repo for Implementing Runtime Security on Kubernetes Cluster.
### Environment Details:
- **K8s Cluster** : On Public Cloud GKE.
- **Runtime Security Tool** : CNCF Opensource Graduated Project Falco and FalcoSidekick.
- **Visualization Tool for Security Events** : Grafana.
- **Security Events Long Term Storage** : Grafana Loki.
> [!IMPORTANT]
> This repo doesn't cover the Infra Creation. As It covers more the Architecture point of view.
### HLD:

Above diagram can be summarized as below:
- Falco when deployed on a k8’s cluster installs **epbf Probe Module/kernel Module**(depending on kernel version) in the kernel space.
- Any communications done by K8s application workload goes to the kernel and post installation of Falco the **epbf probe would capture syscalls**, thus tracking any kernel level activity.
- **Probed events are passed via Ring Buffer to User space** to Falco Rule engine that evaluates the Raw event against the Rules.
- **Events are then matched with based on Rules Config** and sent as output to **FalcoSidekick**.
- The **Sidekick based on the routing configured passes the events to Long term events storage engine(Loki)**.
- To **Visualize the Received Events** and make Runtime Security Dashboards Opensource tool **Grafana** can be used.
### Deployment Configurations:
The **runtime-sec** directory contains the relevant helm charts for Falco security Tooling that can be deployed to Cluster using helm as an example:
- Install **falco**: `helm install -f falco.yaml -n --create-namespace`
- Install **falcosidekick**: `helm install -f falcosidekick.yaml -n --create-namespace`
### POC Results:
A **Notice** Severity Event Reported on Grafana Dashboard when user perform `exec` operation on container/pod.


**Note:** This is just an example severity event and any Critical/High Priority events can be displayed as well Similarly.