Key features
- eBPF kernel monitoring — syscall-level visibility into all container process activity in APAC Kubernetes clusters
- Kubernetes audit integration — detect control plane threats via Kubernetes API audit log analysis alongside runtime events
- Rule engine — YAML-based detection rules covering container escapes, privilege escalation, and APAC-specific threat patterns
- Default ruleset — curated rules for common container threats maintained by the CNCF Falco community
- Alert routing — forward Falco events to SIEM, Slack, PagerDuty, and Falco Sidekick for APAC SOC integration
- Falcosidekick — fanout event router forwarding Falco alerts to 50+ APAC output destinations simultaneously
- Low overhead — eBPF probe minimises performance impact on APAC production workloads vs kernel module approach
Best for
- APAC DevSecOps and platform security teams needing runtime threat detection in Kubernetes clusters beyond what image scanning provides
- Security operations teams building APAC Kubernetes-native SIEM integration for container threat detection and incident response
- APAC regulated industries (financial services, healthcare) requiring runtime audit trails for container and Kubernetes API activity
- Platform engineering teams supplementing OPA admission control with runtime detection for APAC production cluster security
Limitations to know
- ! Alert volume at scale — Falco generates high alert volumes in busy APAC clusters; teams must invest in rule tuning and alert triage to avoid alert fatigue
- ! Kernel module/eBPF requirements — Falco requires kernel-level access that managed Kubernetes services (GKE Autopilot, EKS Fargate) may restrict; verify APAC cloud provider compatibility
- ! Runtime detection, not prevention — Falco detects threats after they occur; it does not block malicious activity like OPA admission control does; APAC teams need both tools
- ! Rule writing expertise — effective custom Falco rules for APAC application-specific threats require understanding of both Falco rule syntax and Linux syscall semantics
About Falco
Falco is a CNCF-graduated open-source Kubernetes runtime security tool that provides APAC platform security teams with real-time threat detection in production Kubernetes clusters — monitoring Linux kernel system calls through an eBPF-based kernel module to detect anomalous container behaviour, privilege escalation attempts, container escape patterns, cryptomining activity, and Kubernetes API abuse as it happens, rather than scanning for known vulnerabilities in container images before deployment.
Falco's kernel-level monitoring approach — where a Falco kernel module or eBPF driver instruments every syscall made by every process in every container on the node — enables APAC security teams to detect threats that container image scanning and Kubernetes admission control cannot catch: a legitimate container binary that is exploited at runtime, a container spawning an unexpected shell, a process writing to sensitive host filesystem paths, or a container establishing network connections to command-and-control infrastructure.
Falco's rule engine — where detection rules are defined in YAML specifying the syscall conditions, process attributes, container metadata, and Kubernetes metadata that constitute a security event — enables APAC security teams to build a rule library covering their specific threat model, from generic container escape patterns (container spawning a shell in a production namespace) to application-specific anomalies (payment service container making outbound connections to non-approved IPs).
Falco's Kubernetes audit log integration — where Falco processes the Kubernetes API server audit log alongside kernel events to detect Kubernetes-layer threats (exec into production pods, service account token exfiltration, RBAC changes, secret access from unexpected principals) — provides APAC security teams with a unified runtime detection layer covering both the container runtime and the Kubernetes control plane.
Falco's alert routing — where security events are forwarded to SIEM platforms (Splunk, Elastic), chat platforms (Slack, PagerDuty), serverless functions (AWS Lambda, GCP Cloud Functions), and Kubernetes event streams — enables APAC security operations centres to integrate Falco alerts into existing incident response workflows without building custom alerting infrastructure.
Beyond this tool
Where this category meets practice depth.
A tool only matters in context. Browse the service pillars that operationalise it, the industries where it ships, and the Asian markets where AIMenta runs adoption programs.
Other service pillars
By industry