Skip to content
_CORE
AI & Agentic Systems Core Information Systems Cloud & Platform Engineering Data Platform & Integration Security & Compliance QA, Testing & Observability IoT, Automation & Robotics Mobile & Digital Banking & Finance Insurance Public Administration Defense & Security Healthcare Energy & Utilities Telco & Media Manufacturing Logistics & E-commerce Retail & Loyalty
References Technologies Blog Know-how Tools
About Collaboration Careers
CS EN DE
Let's talk

Container security with Falco — Kubernetes runtime protection

14. 11. 2018 Updated: 27. 03. 2026 1 min read CORE SYSTEMScloud
This article was published in 2018. Some information may be outdated.
Container security with Falco — Kubernetes runtime protection

We scan Docker images for vulnerabilities. We have Network Policies. We have RBAC. But what if an attacker penetrates inside a running container? Falco detects anomalous behavior at the system call level.

Why image scanning isn’t enough

Zero-day vulnerabilities aren’t in databases. Runtime misconfiguration. Supply chain attack. Insider threat. You need runtime monitoring.

Falco — behavioral monitoring

- rule: Terminal shell in container
  desc: A shell was spawned in a container
  condition: spawned_process and container and shell_procs
  output: Shell spawned (user=%user.name container=%container.name)
  priority: WARNING

Our rules

  • Shell spawned in container → WARNING
  • Reading /etc/shadow → WARNING
  • Unexpected outbound connection → NOTICE
  • Package manager in production → CRITICAL
  • Binary from /tmp → CRITICAL

False positives

Initially overwhelmed with false alerts. Rule tuning takes weeks. Recommendation: audit mode for a week, analyze, add exceptions, then enable alerting.

Runtime security is the last line of defense

Prevention (scanning, RBAC, Network Policies) is the foundation. Detection (Falco) is insurance. Together they form defense-in-depth.

falcocontainer securitykubernetesruntime security
Share:

CORE SYSTEMS

We build core systems and AI agents that keep operations running. 15 years of experience with enterprise IT.

Need help with implementation?

Our experts can help with design, implementation, and operations. From architecture to production.

Contact us
Need help with implementation? Schedule a meeting