Falco logo Falco logo background glow

Falco

A tool that monitors system calls and container events to identify deviations in system behavior and generate alerts to log changes

&

+Real-time Event MonitoringCaptures system calls and process events as they occur; enables detection of system changes as they happen.
+Linux Kernel MonitoringObserves Linux kernel events through system call tracing to identify activities that differ from defined behavior patterns
+Rule-based Detection EngineEvaluates events against rules written in YAML; allows users to define detection logic based on their environment.
+Container Security IntegrationObserves activities within containerized environments; monitors container metadata alongside system events to detect deviations from expected container activity
+Plugin ArchitectureSupports integration with plugins that connect external data sources, thereby expanding the scope of monitored events
+Cloud-native SupportIntegrates with Kubernetes and similar platforms; supports monitoring in distributed system setups.
+Log GenerationStores event data over time so that past system activity can be reviewed at a later time.
+Integration with SIEM ToolsSupports output formats compatible with SIEM systems; helps centralize security events for analysis.
+Kubernetes Audit MonitoringReads Kubernetes audit logs to capture cluster activity; assists in monitoring actions within Kubernetes clusters.
+Community-driven Rule SetsIncludes a set of rules maintained by the user community; offers a starting point for event detection scenarios.
+Event EnrichmentAdds metadata from orchestrators and container runtimes to raw event data, improving the context available for security analysis
+Event CorrelationCombines system call data with process context; helps users understand the context around detected events.
+Process Activity TrackingRecords events such as process creation, termination, and modifications to enable review of process activity patterns
+File Operation MonitoringTracks file access and modification events to reveal operations that may not align with expected file activity patterns
+Network Activity MonitoringObserves system calls related to network operations, such as socket and connection calls; helps track network actions.
+Deployment Change TrackingMonitors changes in container and cluster configuration to register alterations in the deployment environment
+Default Configuration FileProvides a preset configuration file that defines detection settings; reduces the steps needed to begin monitoring.
+Output CustomizationProvides multiple output formats including JSON and plain text; facilitates integration with different logging systems.
+Dynamic Rule ManagementUpdates rules while the monitoring service is running; allows adjustments without restarting the system.
+Rule Simulation ModeEnables testing of user-defined rules against sample data before deployment, reducing the risk of unintended alerting in production
+System Call FilteringApplies user-defined criteria to filter system calls, presenting only those events that match specified definitions
-Rule TuningDefault rules can trigger alerts for non-malicious events that require manual tuning.
-Configuration ComplexityCreating and adjusting rules involves the use of YAML and Falco’s specific rule structure.
-Log Volume GenerationGenerates a substantial volume of logs that users must manage. This requires additional log management processes for effective analysis.
-Event DropsUnder heavy system loads, performance issues have been observed to cause a drop in the event capture rate. This reduction in observability can limit the overall security monitoring efficiency.

Platform

Social

   

System Requirements

Not available, but we appreciate help! You can help us improve this page by contacting us.

Ratings

Not available, but we appreciate help! You can help us improve this page by contacting us.

Written in

C++, C, CMake

Initial Release

18 May 2016