Cloud Native Runtime Security
Falco is a cloud native runtime security tool for Linux operating systems. It is designed to detect and alert on abnormal behavior and potential security threats in real-time.
At its core, Falco is a kernel monitoring and detection agent that observes events, such as syscalls, based on custom rules. Falco can enhance these events by integrating metadata from the container runtime and Kubernetes. The collected events can be analyzed off-host in SIEM or data lake systems.
Falco, originally created by Sysdig, is a graduated project under the Cloud Native Computing Foundation (CNCF) used in production by various organisations.
For detailed technical information and insights into the cyber threats that Falco can detect, visit the official Falco website.
For comprehensive information on the latest updates and changes to the project, please refer to the Change Log. Additionally, we have documented the Release Process for delivering new versions of Falco.
This is the main Falco repository which contains the source code for building the Falco binary. By utilizing its libs and the falco.yaml configuration file, this repository forms the foundation of Falco’s functionality. The Falco repository is closely interconnected with the following core repositories:
For more information, visit the official hub of The Falco Project: falcosecurity/evolution. It provides valuable insights and information about the project’s repositories.
Carefully review and follow the Official Documentation.
Considerations and guidance for Falco adopters:
Understand dependencies: Assess the environment where you’ll run Falco and consider kernel versions and architectures.
Define threat detection objectives: Clearly identify the threats you want to detect and evaluate Falco’s strengths and limitations.
Consider performance and cost: Assess compute performance overhead and align with system administrators or SREs. Budget accordingly.
Choose build and customization approach: Decide between the open source Falco build or creating a custom build pipeline. Customize the build and deployment process as necessary, including incorporating unique tests or approaches, to ensure a resilient deployment with fast deployment cycles.
Integrate with output destinations: Integrate Falco with SIEM, data lake systems, or other preferred output destinations to establish a robust foundation for comprehensive data analysis and enable effective incident response workflows.
A demo environment is provided via a docker-compose file that can be started on a docker host which includes falco, falcosidekick, falcosidekick-ui and its required redis database. For more information see the docker-compose section
Please refer to the Contributing guide and the Code of Conduct for more information on how to contribute.
To get involved with the Falco Project please visit the Community repository to find more information and ways to get involved.
If you have any questions about Falco or contributing, do not hesitate to file an issue or contact the Falco maintainers and community members for assistance.
How to reach out?
Full reports of various security audits can be found here.
In addition, you can refer to the falco and libs security sections for detailed updates on security advisories and policies.
To report security vulnerabilities, please follow the community process outlined in the documentation found here.
Stay updated with Falco’s evolving capabilities by exploring the Falco Roadmap, which provides insights into the features currently under development and planned for future releases.
Falco is licensed to you under the Apache 2.0 open source license.
Falco’s Build Falco from source is the go-to resource to understand how to build Falco from source. In addition, the falcosecurity/libs repository offers additional valuable information about tests and debugging of Falco’s underlying libraries and kernel drivers.
Here’s an example of a cmake
command that will enable everything you need for all unit tests of this repository:
cmake \
-DUSE_BUNDLED_DEPS=ON \
-DBUILD_LIBSCAP_GVISOR=ON \
-DBUILD_BPF=ON \
-DBUILD_DRIVER=ON \
-DBUILD_FALCO_MODERN_BPF=ON \
-DCREATE_TEST_TARGETS=ON \
-DBUILD_FALCO_UNIT_TESTS=ON ..;
Build and run the unit test suite:
nproc=$(grep processor /proc/cpuinfo | tail -n 1 | awk '{print $3}');
make -j$(($nproc-1)) falco_unit_tests;
# Run the tests
sudo ./unit_tests/falco_unit_tests;
Optionally, build the driver of your choice and test run the Falco binary to perform manual tests.
Lastly, The Falco Project has moved its Falco regression tests to falcosecurity/testing.