Chapter 5. Data Enrichment
Falcoâs architecture allows you to capture events from different data sources, as youâve learned. This process delivers raw data, which can be very rich but isnât very useful for runtime security unless paired with the right context. Thatâs why Falco first extracts and then enriches the raw data with contextual information, so that the rule author can comfortably use it. Typically, we refer to this information as the event metadata. Getting metadata can be a complex task, and getting it efficiently is even more complex.
Youâve already seen that the system-state collection capabilities in libscap and the state engine implemented by libsinsp (discussed in Chapter 3) are central to this activity, but thereâs much more to discover. In this chapter, weâll delve into the design aspects of the Falco stack to help you better understand how data enrichment works. In particular, we will show you libsinspâs efficient layered approach to obtaining system, container, and Kubernetes metadata for system call (syscall) events. This is what enables you to access the information you need relating to different contexts (depending on your use case), such as a containerâs ID or the name of a Pod where a suspicious event occurred. Finally, weâll show you how plugins, Falcoâs other main data source, can implement their own data enrichment mechanisms, opening up infinite possibilities.
Understanding Data Enrichment for Syscalls
Understanding how data ...
Get Practical Cloud Native Security with Falco now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.