Use the Docker CLI to pull this image
Read the change log.
Falco is a behavioral activity monitor designed to detect anomalous activity in your applications. Falco audits a system at the most fundamental level, the kernel. Falco then enriches this data with other input streams such as container runtime metrics, and Kubernetes metrics. Falco lets you continuously monitor and detect container, application, host, and network activity—all in one place—from one source of data, with one set of rules.
Falco is hosted by the Cloud Native Computing Foundation (CNCF) as a sandbox level project. If you are an organization that wants to help shape the evolution of technologies that are container-packaged, dynamically-scheduled and microservices-oriented, consider joining the CNCF. For details read the Falco CNCF project proposal.
Falco can detect and alert on any behavior that involves making Linux system calls. Falco alerts can be triggered by the use of specific system calls, their arguments, and by properties of the calling process. For example, Falco can easily detect incidents including but not limited to:
/proc, from the host.
ls, is making an outbound network connection.
You can find the latest release downloads on the official release archive
Furthermore the comprehensive installation guide for Falco is available in the documentation website.
One of the questions we often get when we talk about Falco is “How does Falco differ from other Linux security tools such as SELinux, AppArmor, Auditd, etc.?”. We wrote a blog post comparing Falco with other tools.
See Falco Documentation to quickly get started using Falco.
To get involved with The Falco Project please visit the community repository to find more.
Falco is licensed to you under the Apache 2.0 open source license.
See the CONTRIBUTING.md.
A third party security audit was performed by Cure53, you can see the full report here.
Please report security vulnerabilities following the community process documented here.