All Projects → falcosecurity → Falco Security Workshop

falcosecurity / Falco Security Workshop

Licence: cc-by-sa-4.0
Container Security Workshop covering using Falco on Kubernetes.

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to Falco Security Workshop

Distribution
The toolkit to pack, ship, store, and deliver container content
Stars: ✭ 6,445 (+6982.42%)
Mutual labels:  containers, cncf
Aws Workshop For Kubernetes
AWS Workshop for Kubernetes
Stars: ✭ 2,450 (+2592.31%)
Mutual labels:  containers, cncf
Kops
Kubernetes Operations (kops) - Production Grade K8s Installation, Upgrades, and Management
Stars: ✭ 13,601 (+14846.15%)
Mutual labels:  containers, cncf
Kubernetes
Production-Grade Container Scheduling and Management
Stars: ✭ 83,715 (+91894.51%)
Mutual labels:  containers, cncf
Falco
Cloud Native Runtime Security
Stars: ✭ 4,340 (+4669.23%)
Mutual labels:  containers, cncf
K8s Tew
Kubernetes - The Easier Way
Stars: ✭ 269 (+195.6%)
Mutual labels:  containers, cncf
Netdata
Real-time performance monitoring, done right! https://www.netdata.cloud
Stars: ✭ 57,056 (+62598.9%)
Mutual labels:  containers, cncf
Minikube
Run Kubernetes locally
Stars: ✭ 22,673 (+24815.38%)
Mutual labels:  containers, cncf
Containerd
An open and reliable container runtime
Stars: ✭ 9,956 (+10840.66%)
Mutual labels:  containers, cncf
Blockerized Dockchain
Because all problems are solvable with containers and blockchains
Stars: ✭ 77 (-15.38%)
Mutual labels:  containers
Contribute
🙋🏿‍♀️🙋🏽‍♂️🙋🏻‍♀️Contribution guide to the CNCF ecosystem
Stars: ✭ 87 (-4.4%)
Mutual labels:  cncf
Tuf
A framework for securing software update systems
Stars: ✭ 1,202 (+1220.88%)
Mutual labels:  cncf
Common Workflow Language
Repository for the CWL standards. Use https://cwl.discourse.group/ for support 😊
Stars: ✭ 1,222 (+1242.86%)
Mutual labels:  containers
Policy Hub Cli
CLI for searching Rego policies
Stars: ✭ 88 (-3.3%)
Mutual labels:  cncf
Linuxcontainers.org
The linuxcontainers.org website
Stars: ✭ 76 (-16.48%)
Mutual labels:  containers
Copilot Cli
The AWS Copilot CLI is a tool for developers to build, release and operate production ready containerized applications on Amazon ECS and AWS Fargate.
Stars: ✭ 1,285 (+1312.09%)
Mutual labels:  containers
Bitnami Docker Ghost
Bitnami Docker Image for Ghost
Stars: ✭ 76 (-16.48%)
Mutual labels:  containers
Envoy Perf
Envoy performance testing
Stars: ✭ 76 (-16.48%)
Mutual labels:  cncf
Footloose
Container Machines - Containers that look like Virtual Machines
Stars: ✭ 1,289 (+1316.48%)
Mutual labels:  containers
Docker For All
Docker applied in development, devops, testing, product management etc.
Stars: ✭ 88 (-3.3%)
Mutual labels:  containers

Container Security Workshop with Falco

This repository contains the necessary files required to go through the exercises in the Container Security Workshop offered by the Falco team. Typically this workshop is offered as an instructor led course.

Exercises

Container Security Workshop - Google Slides

Each exercise contains a commands file with the commands to complete the exercise. In addition, the slides contain the commands to run and the expected output.

Exercise 1

This exercise walks you through the Falco basics. It teaches you about Falco rules, and how to use Sysdig to profile an application to create custom rules. At the end of this exercise, you'll understand how to write your own Falco rules.

Exercise 2

This exercise walks you through deploying Falco on Kubernetes and how to integrate Falco with Kubernetes Audit Logging. At the end of this exercise you'll understand how Kubernetes audit logging works and how Falco can detect abnormal behavior through Kubernetes audit logs.

Exercise 3

This exercise walks you through implementing a Response Engine with Security Playbooks. The playbooks are implemented as Serverless functions and allow you to take action based on Falco alerts. As part of this, you'll deploy Falco via Helm, as well as deploy NATS and Kubeless. At the end of this exercise, you'll understand how to take automated action on Falco alerts.

Exercise 4

This exercise walks you through setting up an EFK (Elasticsearch, Fluentd, and Kibana) stack and collecting Falco alerts for storage and analysis. You'll deploy Falco and the EFK stack via Helm, and create visualizations and dashboards in Kibana. At the end of the exercise, you'll understand how to collect and store Falco alerts, as well as how to visualize the alerts.

Required Workstation

AWS

For simplicity we've provided an AWS AMI (ami-0893c0781761fa458, us-east-1) that provides a workstation with all the required software.

  • Setup Script: /usr/local/bin/setup-falco.sh
    • This script MUST be ran by the falco user after the first login (or as part of the instance's userdata). This script clones the latest version of the training (this repo), installs the latest version of Sysdig, and configures other tools required. If running the script manually, it is suggested to logout and back in after running the script.
  • Suggested Instance Type: m4.large (2 cpu, 8 GB RAM minimum)
  • User: falco
  • Pass: FalcoCSWS! (must be changed at first login)
  • Required Ports: 22, 8000 (only for exercise 4)

Roll Your Own

If you wish to build your own workstation image, you can reference the Packer template provided in this repo. Anything installed in the image is done primarily by a Chef Cookbook. Additional software is installed by the setup-falco.sh script in order to pull the latest versions.

License

Creative Commons License This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

You are free to:

  • Share — copy and redistribute the material in any medium or format
  • Adapt — remix, transform, and build upon the material for any purpose, even commercially.

Under the following terms:

  • Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.

  • ShareAlike — If you remix, transform, or build upon the material, you must distribute your contributions under the same license as the original.

  • No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.

For the full text of the license, see COPYING.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].