Security Monitoring
Dynamic Security Controls
Falco Runtime Security
apiVersion: falco.security.dev/v1beta1
kind: FalcoRule
metadata:
name: detect-privilege-escalation
spec:
output: Privilege escalation detected (user=%user.name container=%container.name command=%proc.cmdline)
rule: >
spawned_process and container and
proc.name in (sudo, su) and
not proc.name in (usermod, groupmod, chown)Audit Policy Configuration
apiVersion: audit.k8s.io/v1
kind: Policy
rules:
- level: RequestResponse
resources:
- group: ""
resources: ["pods", "services", "secrets"]
- level: Metadata
resources:
- group: "rbac.authorization.k8s.io"
resources: ["roles", "clusterroles"]Monitoring Stack Integration
Prometheus Rules
Grafana Dashboard Example
Security Response Automation
Automated Response with Kubectl-Kuberhealthy
Best Practices
Last updated