SlideShare a Scribd company logo
How to approach Container
Security from Open Source to
Enterprise
Stefan Trimborn
Enterprise Sales Engineer
Source Run
What’s better?
OSS Enterprise
Why not both!
OSS based Enterprise Solution
Creating a Falco rule and apply it
Out of the Box Rules
Rules
Update packages
Modify /bin /usr
Write below /etc
Read sensitive file
DB spawned proc
Change namespace
Privileged container
Sensitive mount
Terminal shell
Best practices
FIM (File Integrity)
Privileged pod
ConfigMap creds
kubectl exec/attach
Role changes audit
PCI
NIST
Compliance
CVE-2019-11246
kubectl cp
CVE-2019-5736
runc breakout
CVE-2019-14287
sudo bypass
Vulnerabilities
K8s control plane
Nginx
Elasticsearch
Redis
HAproxy
Rook
MongoDB
PostgreSQL
Cloud Native Stack
Create your own rules
6
Rules
- macro: my_monitored_dir
condition: fd.directory in (my_monitored_directories)
- list: my_monitored_directories
items: [/tmp]
Introducing…
7
Rules
- rule: Write below my monitored dir
desc: an attempt to write to any file below a set of my monitored
directories
condition: >
evt.dir = < and open_write and my_monitored_dir
and not package_mgmt_procs
output: >
Hey Admin - File below a monitored directory opened for writing
(user=%user.name user_loginuid=%user.loginuid
command=%proc.cmdline file=%fd.name parent=%proc.pname
pcmdline=%proc.pcmdline gparent=%proc.aname[2] container_id=%container.id
image=%container.image.repository)
priority: ERROR
tags: [filesystem, mitre_persistence]
Let’s do this!
Let’s do this!
Let’s do this!
Let’s do this!
12
Let’s do this!
13
Let’s do this!
14
Let’s do this!
15
Sweet! All the infos we need to remediate!
16
Hello Sidekick!
16
Hello Sidekick! - Outputs
https://github.com/falcosecurity/falcosidekick
● Chat (Slack, Teams, Google Chat,...)
● Metrics (Datadog, Influxdb, StatsD,
Prometheus,...)
● Alerting,
● Logs (Elasticsearch,Loki...)
● Object Storage,
● Message Queue
● Email
● Web
● and more!
18
https://github.com/falcosecurity/plugins
There is more: Falco Plug-Ins!
Great! But…
● DIY - Installation, Roll Outs, Rule Updates, etc.
● Extra Work - No UI by default, No Plug-Ins
● Focus on Runtime Detection
● Community Support
Now for Enterprise
The best of both worlds
● Based on Falco - No need to start from scratch
● Based on OSS - Prometheus, OPA, Falco - Reuse your skills
● More than Runtime Detection - it’s a full CWAPP and CSPM Solution
● No manual management:
UI, Plugins, Rules OOTB
● Premium Support based in Europe!
Configuration
Management
Infrastructure as
Code Validation
Vulnerability
Management
Threat
Detection
Incident
Response
•CI/CD pipelines,
registries, and
hosts
•Prioritization based
on in-use vulns
• Capture detailed
record for
forensics
• Block malicious
containers /
processes
• CSPM / cloud
misconfigurations
• Cloud Inventory
CODE BUILD RUN RESPOND
Supply Chain Security
Compliance
• Cloud threat
detection
• Workload runtime
security
• Drift prevention
• Block risky
configs
Securing VMs, Hosts, Kubernetes and Cloud Services
Identity and Access
Management
• CIEM / least
privilege
• Prioritization
based on in-use
permissions
Shall we have a closer look at Sysdig Secure?
• Prioritize what matters
• Detect threats in real time
• Fix fast with context
Software Vulnerabilities Configuration & Access Risks Runtime Threats Compliance
Cloud Infrastructure
Containers/Kubernetes
24
Curios?
Want to discuss or see more?
Visit us at sysdig.com
Or contact me at:
stefan.trimborn@sysdig.com
Cloud and Container Security
from Source to Run

More Related Content

PDF
Cybersecurity and fraud detection at ING Bank using Presto & Alluxio on S3
PDF
Dockers zero to hero
PDF
Platform Security Summit 18: Xen Security Weather Report 2018
PDF
Scaleable PHP Applications in Kubernetes
PDF
The Future of Security and Productivity in Our Newly Remote World
PPTX
Attack on the Core
PDF
Tokyo OpenStack Summit 2015: Unraveling Docker Security
PDF
Unraveling Docker Security: Lessons From a Production Cloud
Cybersecurity and fraud detection at ING Bank using Presto & Alluxio on S3
Dockers zero to hero
Platform Security Summit 18: Xen Security Weather Report 2018
Scaleable PHP Applications in Kubernetes
The Future of Security and Productivity in Our Newly Remote World
Attack on the Core
Tokyo OpenStack Summit 2015: Unraveling Docker Security
Unraveling Docker Security: Lessons From a Production Cloud

Similar to Container Security - Let's see Falco and Sysdig in Action by Stefan Trimborn (20)

PDF
Docker Runtime Security
PPTX
Docker - Demo on PHP Application deployment
PDF
CoreOS and cloud provider integration: simple cloud-init example at Exoscale
PDF
Automating cloud security - Jonny Griffin
PPTX
InSpec For DevOpsDays Amsterdam 2017
PPTX
Securing the Infrastructure and the Workloads of Linux Containers
PDF
There is No Server: Immutable Infrastructure and Serverless Architecture
PPT
J+s
PDF
Comment améliorer le quotidien des Développeurs PHP ?
PPTX
Chris OBrien - Pitfalls when developing with the SharePoint Framework (SPFx)
PDF
Kubernetes Summit 2019 - Harden Your Kubernetes Cluster
PDF
5 Ways to Secure Your Containers for Docker and Beyond
PDF
NSC #2 - D3 02 - Peter Hlavaty - Attack on the Core
PDF
Kubernetes security
PDF
Container Security Mmanagement
PPTX
Docker based Architecture by Denys Serdiuk
PDF
Lions, Tigers and Deers: What building zoos can teach us about securing micro...
PDF
Stas Kolenkin & Taras Bobalo - CloudFlare Recon Workshop
PPTX
Cloud Application Security: Lessons Learned
PDF
I got 99 trends and a # is all of them
Docker Runtime Security
Docker - Demo on PHP Application deployment
CoreOS and cloud provider integration: simple cloud-init example at Exoscale
Automating cloud security - Jonny Griffin
InSpec For DevOpsDays Amsterdam 2017
Securing the Infrastructure and the Workloads of Linux Containers
There is No Server: Immutable Infrastructure and Serverless Architecture
J+s
Comment améliorer le quotidien des Développeurs PHP ?
Chris OBrien - Pitfalls when developing with the SharePoint Framework (SPFx)
Kubernetes Summit 2019 - Harden Your Kubernetes Cluster
5 Ways to Secure Your Containers for Docker and Beyond
NSC #2 - D3 02 - Peter Hlavaty - Attack on the Core
Kubernetes security
Container Security Mmanagement
Docker based Architecture by Denys Serdiuk
Lions, Tigers and Deers: What building zoos can teach us about securing micro...
Stas Kolenkin & Taras Bobalo - CloudFlare Recon Workshop
Cloud Application Security: Lessons Learned
I got 99 trends and a # is all of them
Ad

More from ContainerDay Security 2023 (11)

PDF
Constellation - The first always encrypted Kubernetes by Moritz Eckert
PDF
How to Prevent Your Kubernetes Cluster From Being Hacked by Nico Meisenzahl
PDF
Container Security Scanning by Timo Pagel
PDF
Cloud Hacking Scenarios by Michał Brygidyn Mar. 10, 2023 • 0 likes •
PDF
Container Security Scanning by Timo Pagel
PDF
How to Prevent Your Kubernetes Cluster From Being Hacked by Nico Meisenzahl
PDF
Hardening automation with Kubespray by Alessio Greggi
PDF
Enhancing Network and Runtime Security with Cilium and Tetragon by Raymond De...
PDF
Constellation - The first always encrypted Kubernetes by Moritz Eckert
PDF
Cloud Hacking Scenarios by Michał Brygidyn
PDF
Lines of Defense - Securing your Kubernetes Clusters by Koray Oksay
Constellation - The first always encrypted Kubernetes by Moritz Eckert
How to Prevent Your Kubernetes Cluster From Being Hacked by Nico Meisenzahl
Container Security Scanning by Timo Pagel
Cloud Hacking Scenarios by Michał Brygidyn Mar. 10, 2023 • 0 likes •
Container Security Scanning by Timo Pagel
How to Prevent Your Kubernetes Cluster From Being Hacked by Nico Meisenzahl
Hardening automation with Kubespray by Alessio Greggi
Enhancing Network and Runtime Security with Cilium and Tetragon by Raymond De...
Constellation - The first always encrypted Kubernetes by Moritz Eckert
Cloud Hacking Scenarios by Michał Brygidyn
Lines of Defense - Securing your Kubernetes Clusters by Koray Oksay
Ad

Recently uploaded (20)

PDF
Getting Started with Data Integration: FME Form 101
PPT
Teaching material agriculture food technology
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PPTX
A Presentation on Artificial Intelligence
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Empathic Computing: Creating Shared Understanding
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Spectroscopy.pptx food analysis technology
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
Getting Started with Data Integration: FME Form 101
Teaching material agriculture food technology
Assigned Numbers - 2025 - Bluetooth® Document
Group 1 Presentation -Planning and Decision Making .pptx
A Presentation on Artificial Intelligence
NewMind AI Weekly Chronicles - August'25-Week II
Empathic Computing: Creating Shared Understanding
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
cloud_computing_Infrastucture_as_cloud_p
Unlocking AI with Model Context Protocol (MCP)
Spectroscopy.pptx food analysis technology
A comparative analysis of optical character recognition models for extracting...
MIND Revenue Release Quarter 2 2025 Press Release
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Encapsulation_ Review paper, used for researhc scholars
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
SOPHOS-XG Firewall Administrator PPT.pptx
Reach Out and Touch Someone: Haptics and Empathic Computing
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf

Container Security - Let's see Falco and Sysdig in Action by Stefan Trimborn

  • 1. How to approach Container Security from Open Source to Enterprise Stefan Trimborn Enterprise Sales Engineer Source Run
  • 3. Why not both! OSS based Enterprise Solution
  • 4. Creating a Falco rule and apply it
  • 5. Out of the Box Rules Rules Update packages Modify /bin /usr Write below /etc Read sensitive file DB spawned proc Change namespace Privileged container Sensitive mount Terminal shell Best practices FIM (File Integrity) Privileged pod ConfigMap creds kubectl exec/attach Role changes audit PCI NIST Compliance CVE-2019-11246 kubectl cp CVE-2019-5736 runc breakout CVE-2019-14287 sudo bypass Vulnerabilities K8s control plane Nginx Elasticsearch Redis HAproxy Rook MongoDB PostgreSQL Cloud Native Stack
  • 6. Create your own rules 6 Rules - macro: my_monitored_dir condition: fd.directory in (my_monitored_directories) - list: my_monitored_directories items: [/tmp]
  • 7. Introducing… 7 Rules - rule: Write below my monitored dir desc: an attempt to write to any file below a set of my monitored directories condition: > evt.dir = < and open_write and my_monitored_dir and not package_mgmt_procs output: > Hey Admin - File below a monitored directory opened for writing (user=%user.name user_loginuid=%user.loginuid command=%proc.cmdline file=%fd.name parent=%proc.pname pcmdline=%proc.pcmdline gparent=%proc.aname[2] container_id=%container.id image=%container.image.repository) priority: ERROR tags: [filesystem, mitre_persistence]
  • 15. 15 Sweet! All the infos we need to remediate!
  • 17. Hello Sidekick! - Outputs https://github.com/falcosecurity/falcosidekick ● Chat (Slack, Teams, Google Chat,...) ● Metrics (Datadog, Influxdb, StatsD, Prometheus,...) ● Alerting, ● Logs (Elasticsearch,Loki...) ● Object Storage, ● Message Queue ● Email ● Web ● and more!
  • 19. Great! But… ● DIY - Installation, Roll Outs, Rule Updates, etc. ● Extra Work - No UI by default, No Plug-Ins ● Focus on Runtime Detection ● Community Support
  • 21. The best of both worlds ● Based on Falco - No need to start from scratch ● Based on OSS - Prometheus, OPA, Falco - Reuse your skills ● More than Runtime Detection - it’s a full CWAPP and CSPM Solution ● No manual management: UI, Plugins, Rules OOTB ● Premium Support based in Europe!
  • 22. Configuration Management Infrastructure as Code Validation Vulnerability Management Threat Detection Incident Response •CI/CD pipelines, registries, and hosts •Prioritization based on in-use vulns • Capture detailed record for forensics • Block malicious containers / processes • CSPM / cloud misconfigurations • Cloud Inventory CODE BUILD RUN RESPOND Supply Chain Security Compliance • Cloud threat detection • Workload runtime security • Drift prevention • Block risky configs Securing VMs, Hosts, Kubernetes and Cloud Services Identity and Access Management • CIEM / least privilege • Prioritization based on in-use permissions
  • 23. Shall we have a closer look at Sysdig Secure? • Prioritize what matters • Detect threats in real time • Fix fast with context Software Vulnerabilities Configuration & Access Risks Runtime Threats Compliance Cloud Infrastructure Containers/Kubernetes
  • 24. 24 Curios? Want to discuss or see more? Visit us at sysdig.com Or contact me at: [email protected]
  • 25. Cloud and Container Security from Source to Run