Falco logo Falco logo background glow

Falco

A tool that monitors system calls and container events to identify deviations in system behavior and generate alerts to log changes

&

+
Real-time Event Monitoring
Captures system calls and process events as they occur; enables detection of system changes as they happen.
+
Linux Kernel Monitoring
Observes Linux kernel events through system call tracing to identify activities that differ from defined behavior patterns
+
Rule-based Detection Engine
Evaluates events against rules written in YAML; allows users to define detection logic based on their environment.
+
Container Security Integration
Observes activities within containerized environments; monitors container metadata alongside system events to detect deviations from expected container activity
+
Plugin Architecture
Supports integration with plugins that connect external data sources, thereby expanding the scope of monitored events
+
Cloud-native Support
Integrates with Kubernetes and similar platforms; supports monitoring in distributed system setups.
+
Log Generation
Stores event data over time so that past system activity can be reviewed at a later time.
+
Integration with SIEM Tools
Supports output formats compatible with SIEM systems; helps centralize security events for analysis.
+
Kubernetes Audit Monitoring
Reads Kubernetes audit logs to capture cluster activity; assists in monitoring actions within Kubernetes clusters.
+
Community-driven Rule Sets
Includes a set of rules maintained by the user community; offers a starting point for event detection scenarios.
+
Event Enrichment
Adds metadata from orchestrators and container runtimes to raw event data, improving the context available for security analysis
+
Event Correlation
Combines system call data with process context; helps users understand the context around detected events.
+
Process Activity Tracking
Records events such as process creation, termination, and modifications to enable review of process activity patterns
+
File Operation Monitoring
Tracks file access and modification events to reveal operations that may not align with expected file activity patterns
+
Network Activity Monitoring
Observes system calls related to network operations, such as socket and connection calls; helps track network actions.
+
Deployment Change Tracking
Monitors changes in container and cluster configuration to register alterations in the deployment environment
+
Default Configuration File
Provides a preset configuration file that defines detection settings; reduces the steps needed to begin monitoring.
+
Output Customization
Provides multiple output formats including JSON and plain text; facilitates integration with different logging systems.
+
Dynamic Rule Management
Updates rules while the monitoring service is running; allows adjustments without restarting the system.
+
Rule Simulation Mode
Enables testing of user-defined rules against sample data before deployment, reducing the risk of unintended alerting in production
+
System Call Filtering
Applies user-defined criteria to filter system calls, presenting only those events that match specified definitions
-
Rule Tuning
Default rules can trigger alerts for non-malicious events that require manual tuning.
-
Configuration Complexity
Creating and adjusting rules involves the use of YAML and Falco’s specific rule structure.
-
Log Volume Generation
Generates a substantial volume of logs that users must manage. This requires additional log management processes for effective analysis.
-
Event Drops
Under heavy system loads, performance issues have been observed to cause a drop in the event capture rate. This reduction in observability can limit the overall security monitoring efficiency.

Platform

Desktop

Social

System Requirements

Not available, but we appreciate help! You can help us improve this page by contacting us.

Ratings

Not available, but we appreciate help! You can help us improve this page by contacting us.

Developer

Written in

C++, C, CMake

Initial Release

18 May 2016

Repository

License

Categories