Skip to content

Commit

Permalink
apps: Falco rule updates
Browse files Browse the repository at this point in the history
  • Loading branch information
aarnq committed Oct 15, 2024
1 parent 9bd5dc6 commit 89b13d1
Showing 1 changed file with 56 additions and 40 deletions.
96 changes: 56 additions & 40 deletions helmfile.d/values/falco/falco-common.yaml.gotmpl
Original file line number Diff line number Diff line change
Expand Up @@ -108,53 +108,69 @@ customRules:
# Run shell untrusted
# Contact K8S API Server From Container
- list: trusted_image_repositories
items: [
docker.io/elastisys/curl-jq,
docker.io/jaegertracing/jaeger-operator,
docker.io/kiwigrid/k8s-sidecar,
docker.io/library/rabbitmq,
docker.io/openpolicyagent/gatekeeper,
docker.io/openpolicyagent/gatekeeper-crds,
docker.io/rabbitmqoperator/cluster-operator,
docker.io/velero/velero,
gcr.io/k8s-staging-multitenancy/hnc-manager,
gcr.io/tekton-releases/github.com/tektoncd/dashboard/cmd/dashboard,
gcr.io/tekton-releases/github.com/tektoncd/pipeline/cmd/controller,
gcr.io/tekton-releases/github.com/tektoncd/pipeline/cmd/resolvers,
gcr.io/tekton-releases/github.com/tektoncd/pipeline/cmd/webhook,
ghcr.io/aquasecurity/node-collector,
ghcr.io/aquasecurity/trivy-operator,
ghcr.io/dexidp/dex,
ghcr.io/elastisys/argocd-managed-namespaces-manager,
ghcr.io/elastisys/fluentd,
ghcr.io/elastisys/logical-backup,
ghcr.io/elastisys/spilo-15,
ghcr.io/elastisys/spilo-16,
ghcr.io/kiwigrid/k8s-sidecar,
ghcr.io/kubereboot/kured,
quay.io/argoproj/argocd,
quay.io/calico/node,
quay.io/jetstack/cert-manager-controller,
quay.io/jetstack/cert-manager-webhook,
quay.io/kiwigrid/k8s-sidecar,
quay.io/metallb/controller,
quay.io/prometheus/prometheus,
registry.k8s.io/ingress-nginx/controller-chroot,
registry.k8s.io/ingress-nginx/controller,
registry.k8s.io/kube-state-metrics/kube-state-metrics
]
items:
- docker.io/calico/ctl
- docker.io/elastisys/curl-jq
- docker.io/jaegertracing/jaeger-operator
- docker.io/kiwigrid/k8s-sidecar
- docker.io/library/rabbitmq
- docker.io/openpolicyagent/gatekeeper
- docker.io/openpolicyagent/gatekeeper-crds
- docker.io/rabbitmqoperator/cluster-operator
- docker.io/rook/ceph
- docker.io/velero/velero
- gcr.io/k8s-staging-multitenancy/hnc-manager
- gcr.io/tekton-releases/github.com/tektoncd/dashboard/cmd/dashboard
- gcr.io/tekton-releases/github.com/tektoncd/pipeline/cmd/controller
- gcr.io/tekton-releases/github.com/tektoncd/pipeline/cmd/resolvers
- gcr.io/tekton-releases/github.com/tektoncd/pipeline/cmd/webhook
- ghcr.io/aquasecurity/node-collector
- ghcr.io/aquasecurity/trivy-operator
- ghcr.io/dexidp/dex
- ghcr.io/elastisys/argocd-managed-namespaces-manager
- ghcr.io/elastisys/calico-accountant
- ghcr.io/elastisys/fluentd
- ghcr.io/elastisys/logical-backup
- ghcr.io/elastisys/spilo-15
- ghcr.io/elastisys/spilo-16
- ghcr.io/kiwigrid/k8s-sidecar
- ghcr.io/kubereboot/kured
- quay.io/argoproj/argocd
- quay.io/calico/apiserver
- quay.io/calico/cni
- quay.io/calico/kube-controllers
- quay.io/calico/node
- quay.io/calico/typha
- quay.io/ceph/ceph
- quay.io/cephcsi/cephcsi
- quay.io/tigera/operator
- quay.io/jetstack/cert-manager-controller
- quay.io/jetstack/cert-manager-webhook
- quay.io/kiwigrid/k8s-sidecar
- quay.io/metallb/controller
- quay.io/prometheus/prometheus
- registry.k8s.io/autoscaling/cluster-autoscaler
- registry.k8s.io/capi-openstack/capi-openstack-controller
- registry.k8s.io/cluster-api/cluster-api-controller
- registry.k8s.io/cluster-api/kubeadm-bootstrap-controller
- registry.k8s.io/cluster-api/kubeadm-control-plane-controller
- registry.k8s.io/ingress-nginx/controller-chroot
- registry.k8s.io/ingress-nginx/controller
- registry.k8s.io/kube-state-metrics/kube-state-metrics
- registry.k8s.io/sig-storage/csi-attacher
- registry.k8s.io/sig-storage/csi-provisioner
- registry.k8s.io/sig-storage/csi-resizer
- registry.k8s.io/sig-storage/csi-snapshotter

# Contact K8S API Server From Container
- macro: user_known_contact_k8s_api_server_activities
condition: >
(
container.image.repository in (trusted_image_repositories)
) or (
proc.cmdline = "kubectl get rolebindings --all-namespaces -o json"
) or (
proc.cmdline startswith "kubectl patch secret -n argocd-system argocd-manager-config -p"
) or (
proc.cmdline glob 'kubectl get crd *.constraints.gatekeeper.sh -o jsonpath={.status.conditions[?(@.type=="Established")].status}'
container.image.repository = "docker.io/bitnami/kubectl" and
k8s.ns.name = "gatekeeper-system" and
k8s.pod.name startswith "gatekeeper-templates-wait"
)

# Run shell untrusted
Expand Down

0 comments on commit 89b13d1

Please sign in to comment.