docs: add lab9 — falco runtime + conftest policies#10
Open
ph1larmon1a wants to merge 1 commit intomainfrom
Open
docs: add lab9 — falco runtime + conftest policies#10ph1larmon1a wants to merge 1 commit intomainfrom
ph1larmon1a wants to merge 1 commit intomainfrom
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Goal
Enhance the project’s runtime and deployment security posture by introducing Falco-based runtime detection and Conftest policy-as-code validation.
This update delivers continuous behavioral monitoring for container workloads and ensures Kubernetes/Compose manifests meet hardened baselines, aligning the environment with modern container compliance practices
Changes
Deployed Falco with modern eBPF and captured real-time container alerts.
Triggered baseline detection (
Terminal shell in container) and implemented a custom Falco ruleWrite Binary Under UsrLocalBinto detect image drift through writes in/usr/local/bin.Validated Falco alerting by running the Falco event-generator, confirming detection of critical events (fileless execution, release agent container escape, etc.).
Added the custom rule to
labs/lab9/falco/rules/custom-rules.yamlwith tuning notes and evidence screenshots referenced insubmission9.md.Executed Conftest (OPA/Rego) policies against:
Documented comprehensive findings, evidence tables, and mitigation reasoning in
labs/submission9.md.Testing
Manual validation performed as part of the lab workflow:
Falco runtime test
/usr/local/bin/drift.txtandcustom-rule.txt.Policy-as-code test
Steps to reproduce and screenshots/logs are detailed in
labs/submission9.mdand supporting analysis files.Artifacts & Screenshots
Falco custom rule:
labs/lab9/falco/rules/custom-rules.yamlSubmission report:
labs/submission9.md— includes Falco evidence, rule source, and Conftest analysis.Falco log:
labs/lab9/falco/logs/falco.log— baseline and custom alerts + event-generator detections.Conftest results:
labs/lab9/analysis/conftest-unhardened.txt— 20 passed / 2 warn / 8 faillabs/lab9/analysis/conftest-hardened.txt— 30 passed / 0 faillabs/lab9/analysis/conftest-compose.txt— 15 passed / 0 failManifests for reference:
labs/lab9/manifests/k8s/juice-unhardened.yamllabs/lab9/manifests/k8s/juice-hardened.yamllabs/lab9/manifests/compose/juice-compose.ymlChecklist