☸️Kubernetes Runtime Security with Falco Labs

🎯 Objective

Deploy and use Falco to detect suspicious activity and runtime security events inside a Kubernetes cluster.


🧰 Prerequisites

  • Kubernetes cluster

  • kubectl configured

  • Helm installed


πŸ”Ή Lab 1: Install Falco using Helm

Add the Falco Helm repository:

helm repo add falcosecurity https://falcosecurity.github.io/charts
helm repo update

Install Falco:

helm install --replace falco --namespace falco --create-namespace --set tty=true falcosecurity/falco

βœ… Falco daemonset is deployed to monitor syscalls on all cluster nodes.


πŸ”Ή Lab 2: Check Falco is Running

βœ… Falco should be logging system call events.


πŸ”Ή Lab 3: Trigger Suspicious Activities

Step 1: Create a Pod to Simulate an Attacker


Step 2: Touch a Sensitive File

βœ… Expected: Falco alerts on sensitive file access.


Step 3: Start a Shell Inside a Container (Unexpected Shell)

βœ… Expected: Falco may alert on a shell being spawned in a container.


Step 4: Make a Network Connection from Pod

Inside the pod:

βœ… Expected: Falco alerts on wget.


πŸ”Ή Lab 4: View Falco Alerts

Check Falco logs:

βœ… You should see alerts for file access, shell execution or network activity.


πŸ”Ή Lab 5: Clean Up


βœ… Wrap-Up

  • βœ… Installed Falco with Helm

  • βœ… Triggered multiple runtime security events

  • βœ… Detected suspicious activity like file tampering, shell spawning, network access, and privilege escalation

  • βœ… Practiced real-world runtime threat detection


Last updated