Deploy Falco for runtime detection and Kyverno for admission policies #55

Open
opened 2025-09-01 14:25:23 +00:00 by chris · 0 comments
Owner

Description

  • Deploy Falco to detect suspicious container behavior and forward alerts to Loki/Alertmanager.
  • Deploy Kyverno to enforce PodSecurity (deny privileged, hostPath, etc.) and reject non-compliant pods.

Priority: P1
Estimate: 10 hours
Acceptance criteria

  • Kyverno policies applied and block offending pods during tests.
  • Falco detects & alerts on simulated suspicious behavior (e.g., shell exec in webserver container).
Description - Deploy Falco to detect suspicious container behavior and forward alerts to Loki/Alertmanager. - Deploy Kyverno to enforce PodSecurity (deny privileged, hostPath, etc.) and reject non-compliant pods. Priority: P1 Estimate: 10 hours Acceptance criteria - Kyverno policies applied and block offending pods during tests. - Falco detects & alerts on simulated suspicious behavior (e.g., shell exec in webserver container).
chris added this to the E - Hardening, Backups & DR milestone 2025-09-01 14:25:23 +00:00
chris added the
security
runtime
policies
labels 2025-09-01 14:25:23 +00:00
chris self-assigned this 2025-09-01 14:25:23 +00:00
chris added this to the MVP project 2025-09-03 06:51:58 +00:00
This repository is archived. You cannot comment on issues.
No description provided.