eBPF Runtime Security at Scale: Top Tetragon Use Cases (Part 2) - Isovalent (2024)

Building off the interest in the top security observability use cases with Tetragon and eBPF, we decided to focus on another set of use cases around runtime security controls.

In Part 1, we highlighted Tetragon’s capabilities as the leading eBPF runtime security observability tool, covering the quick adoption by platform and security teams and how it provides context-rich telemetry combining network, process, and Kubernetes metadata to solve for a variety of use cases; for example, generating reliable audit trails, detecting container escapes, deploying dynamic policies for zero-day vulnerabilities, gaining deeper visibility into runtime events, or monitoring network traffic with minimal overhead.

In this post, we shift our emphasis towards granular runtime control over our environments. This manifests through Tetragon’s policies that implement precise security enforcement, streamline integrations with existing security tooling, and offer real-time insights to detect attacker behavior.

eBPF Security Observability: Top Tetragon Use Cases (Part 1)

Tetragon is the standard for eBPF-based security observability, let’s look at what that means for the top use cases being solved.

See the eBPF security observability use cases

eBPF Runtime Security at Scale: Top Tetragon Use Cases (Part 2) - Isovalent (1)

Data is gold, and Tetragon has it in troves. Easily pipe out events to a preferred SIEM or metrics dashboard.

Integrate modern observability and policy standards such as Kubernetes, Prometheus, fluentd, OpenTelemetry, Open Policy Agent, and traditional SIEM platforms. Teams shouldn’t have to work off a black boxed security solution; instead, Tetragon makes it easy to get the right data into the right hands in real time.

Let’s look at Splunk for example, providing deep insights from runtime telemetry. Tetragon easily integrates with Splunk to bring out insights from runtime security data.

In the Splunk dashboard below, a team is using the data from Tetragon to detect weak TLS cipher versions. Here theTLS protocol versions are tied to the source Kubernetes pod and namespace, with added context on the cipher key length and SNI. By combining Tetragon with your preferred SIEM, teams make it easy to get real-time actionable insights deep into network and runtime layers.

A core ethos of Tetragon is to simplify runtime security for teams, and that naturally extends to simplifying the interoperability between extracted data (from Tetragon) and the tools that glean or visualize insights. Integrate rich security data with your existing tools in real-time, without speed bumps.

eBPF Runtime Security at Scale: Top Tetragon Use Cases (Part 2) - Isovalent (2)

Monitoring Access to Sensitive Files in Splunk

This example shows an integration with Splunk to track access to sensitive files while providing context of the access such as Kubernetes metadata, container image, binary, and user information.

eBPF Runtime Security at Scale: Top Tetragon Use Cases (Part 2) - Isovalent (3)

Correlate network and runtime events

It’s no longer enough to know a network connection is suspicious; with Tetragon teams tie that network activity to a specific binary and identity that launched that connection.Tie together events across different layers to paint a picture of everything happening in your environment.

Teams struggle in securing Kubernetes environments because traditional IP-based tools are ineffective in dynamic cloud native environments; platform and security engineers need tools that map network and node processes together, really breaking down traditional silos around what data has what context.

Strong host-based visibility provides a unified layer of insight, with Tetragon’s ease of deployment saving thousands of hours across deployments, correlating data, and pinpointing the root cause of issues.

Linking network activity to specific processes and identities offers deeper visibility into Linux environments. For example, you can identify exactly which process sent out an HTTP request or identify weak TLS cipher versions in real time.

We need to know which process sent out this HTTP call on Tuesday at 3:15 p.m. from host A. How can we possibly get this info?

[Tetragon] gives us the depth all the way down to the process on a host. Even pods are just processes. And the speed of deployment is awesome.

Senior Security Engineer, Top Developer Platform

How to guide for host-based Kubernetes visibility

Learn how Tetragon’s lightweight eBPF sensor captures K8s telemetry down to the binary, tying process to network data with no application changes.

Read more about host based visibility

eBPF Runtime Security at Scale: Top Tetragon Use Cases (Part 2) - Isovalent (5)

Implement file integrity monitoring at scale

Traditional tools relied on periodic scanning to understand file modifications, reads, or writes – leaving environments vulnerable to common TOCTOU (time of check time of use) attacks or delayed incident response.File monitoring with eBPF represents a significant leap forward in flexibility, hardening, and depth.

Isovalent Enterprise for Tetragon monitors inline at the kernel level, using inodes. Inodes are kernel structures that are a stronger guarantee of monitoring a file.

For example, instead of evaluating based off of filename (which can be modified or moved), the inode is constant regardless of how the filename or filepath changes. Let’s imagine a financial institution needs to monitor sensitive files (i.e. customer account records) across their Linux servers. With legacy FIM solutions the security team relies on periodic scans or event notifications from mechanisms like inotify. These methods are at risk of TOCTOU attacks when new files are created or failing to handle context around an event, such as which user or application accessed the file.

With eBPF, Tetragon sits in the kernel monitoring new files as soon as they are created, leaving no time for an attacker to tamper with the file.

File monitoring is a difficult problem at scale, with extremely high volumes of I/O activity to evaluate. Traditionally, this high-volume activity incurs a resource overhead from almost every event needing policy evaluation plus potential event generation to user space. eBPF programs resolve this overhead issue and leap us forward by monitoring file activity and filtering events directly in the kernel, this means extensive filtering is performed in-kernel so that no events are pushed to user space unless they match an applied policy.

eBPF Runtime Security at Scale: Top Tetragon Use Cases (Part 2) - Isovalent (7)

File Monitoring with eBPF and Tetragon (Part 1)

Deep dive into Tetragon’s file monitoring capabilities, focused on implementing low-overhead, highly scalable monitoring directly in the kernel with eBPF.

Read the dev blog on Tetragon's file monitoring

eBPF Runtime Security at Scale: Top Tetragon Use Cases (Part 2) - Isovalent (8)

Track anomalous behavior in real time

Because Tetragon is uniquely positioned to extract data at the Linux kernel level, it is able to collect telemetry all the way down to the library or binary level of your applications. This brings rich user behavior data for any application security use case, and with the right data correlation, should allow any anomalous behavior to surface quite early on.

Monitor and visualize anomalous behavior in any Linux environment in real time. A top use case for security teams, effectively visualize and analyze suspicious user behavior, map out potential attack paths, and monitor for compromised accounts. This proactive approach using the richness of Tetragon’s data enables organizations to stay ahead of threats and respond quickly to emerging security challenges no matter where it originates.

For instance, imagine a service account begins executing system calls that are inconsistent with typical behavior or a situation where a normally dormant endpoint begins transmitting large volumes of data unexpectedly. Tetragon is capturing all the runtime telemetry and context needed to highlight a possible data exfiltration attempt, helping teams swiftly intervene and mitigate.

With the growing number of security incidents where malicious actors have unfettered access to an environment, it’s important to have the data to answer whether third party or end user behavior is expected or abnormal. Tetragon generates clear audit trails, and gives the flexibility in policy to block malicious runtime events from executing.

eBPF Runtime Security at Scale: Top Tetragon Use Cases (Part 2) - Isovalent (10)

Brewing the Kubernetes Storm Center: Open Source Threat Intelligence for the Cloud Native Ecosystem

Based on a given threat model: a) generates a Kubernetes-based environment with embedded trip-wires b) exposes these simulated environments to the wild to observe quantitative threat intelligence, and c) informs cost-effective decisions for a security team.

Watch the KubeCon session

eBPF Runtime Security at Scale: Top Tetragon Use Cases (Part 2) - Isovalent (11)

Proactive security enforcement and control

Anything you can observe with Tetragon, you can enforce upon.

This level of granular enforcement is a game changer for Linux environments, particularly when it comes to context-aware process control. Leveraging identity-aware mappings, Tetragon provides a sophisticated alternative to traditional seccomp filters, allowing for precise control over syscalls based on the identity and context of workloads. This allows security teams to enforce exceedingly fine-grained policies with ease, addressing sensitive namespaces or workloads without compromising on operational overhead.

Tetragon’s use of eBPF combines the advantages of traditional tools while avoiding common pitfalls around asynchronous enforcement, high overhead, and depth of telemetry.

Tetragon’s in-kernel enforcement policies are stronger than traditional reactive policies, as the decision logic + action both happen in the kernel. In-kernel enforcement policies offer a more robust approach to security by blocking malicious actions before they execute, providing a proactive security model through blocking (i.e. SIGKILL) or overriding events.

Tetragon’s enforcement capabilities are built on two main mechanisms: overriding values and signal actions.

  • Override Return Value: Modifies a function’s return value, preventing it from being executed.
  • Signals: Sends signals like SIGKILL to terminate processes matching specific criteria.

eBPF policies are flexible, both mechanisms can be used in the same policy for a layered approach, offering a stronger guarantee the specified event is not completed.

Sandbox policies for simplified auditing and enforcement of system calls

In this example sandbox policy, we have set up a list of allowed syscalls and prevent all other sensitive syscalls outside this list (operator:

Test the policy snippet

eBPF Runtime Security at Scale: Top Tetragon Use Cases (Part 2) - Isovalent (13)

Catch supply chain attacks

Ensuring the integrity of your build process is critical. Supply-chain vulnerabilities like SolarWinds, log4shell, and XZ Utils continue to expose gaps in visibility into our downstream software dependencies.

With Tetragon and eBPF, teams are building proactive policies and verifiable attestation pipelines to ensure that every software package is delivered exactly as the author intended, free from malicious interference.

In his presentation at Kubecon EMEA 2024, Tom Meadows, Software Engineer at TestifySec, uses the metadata from Tetragon’s eBPF programs to secure the build system of a Kubernetes environment. Generating an attestation that nothing was tampered with or injected into the build. This builds the use case out into not just monitoring specific programmatic libraries, but also opens up the policies towards covering your CI/CD environment and generating SBOM’s (software bill of material) for any runtime dependencies.

eBPF Runtime Security at Scale: Top Tetragon Use Cases (Part 2) - Isovalent (15)

[Tetragon] maps all of these eBPF events seamlessly straight to the pod, and just basically did my job for me. It was [doing] what I wanted to do. All the magic’s done inside this project called Tetragon.

Tom Meadows, Software Engineer, TestifySec

Bee-Lieve in the Metadata: Pollenating Build Attestations on Kubernetes with Tetragon and eBPF

Like bees making honey, we developers forage the internet for code that we borrow and thread together to create software. It’s built, uploaded and shared, resulting in hundreds of thousands (if not millions) of software artifacts being built each day. For an unlucky few, attackers seek to infiltrate the build process like a hornet attacking a beehive.

Watch the recording

eBPF Runtime Security at Scale: Top Tetragon Use Cases (Part 2) - Isovalent (16)

Embedded zero trust across Linux infrastructure

Zero trust involves juggling numerous tools across your organization, each addressing different aspects of security – identity, network, OS, service mesh, and on – resulting in a fragmented and complex control over your environment. Tetragon solves this fragmented approach to zero trust, giving teams a central tool for all Linux workloads to be monitored and enforced with zero trust policies.

Traditional solutions may cover network security, but overlook OS-level protections, creating gaps to be exploited. Using eBPF, Tetragon is the glue between the multiple layers of your runtime and network observability.These flexible and dynamic policies also give teams granular control over their environment to enforce rules that block malicious activity or surface insights into who or what is spawning suspicious traffic.

So, rather than enforcing zero trust in isolation based on only network events or only runtime processes, eBPF programs bring these layers together and give a unified approach to collecting, observing, and enforcing on security-significant events.

eBPF Runtime Security at Scale: Top Tetragon Use Cases (Part 2) - Isovalent (18)

Zero Trust Security with Cilium & Tetragon

Implement advanced runtime security capabilities covering protocol enforcement, IP and port whitelisting, and automatic application-aware policy generation.

Read the zero trust walkthrough

eBPF Runtime Security at Scale: Top Tetragon Use Cases (Part 2) - Isovalent (19)

Enriched threat detection and response

Detect and mitigate attacks at runtime. Tetragon excels in threat detection and response focusing on zero-day exploits, indicators of compromise, and lateral movement in containers. There is also a growing policy library of open source detection and enforcement use cases, in addition to the Isovalent Enterprise library of CVE policies. Isovalent’s policy library spans common CVE’s targeting the Linux kernel, container runtimes, and daemons or services.

Tetragon’s unique ability to look across runtime layers with eBPF gives the necessary context to collect meaningful real-time insights from system calls, network activity, and process events. Two core use cases expand on this: first, real time enforcement using TracingPolicies to respond to suspicious activity as they occur, and the second, generate alerts for your platform or security team with detailed telemetry that improves swift and effective responses.

eBPF Runtime Security at Scale: Top Tetragon Use Cases (Part 2) - Isovalent (21)

Privilege Escalation and Kernel CVEs Protection

Address infrastructure risk by monitoring for privilege escalations and specific kernel CVEs, safeguarding against known exploits in the kernel, container runtimes, and Linux daemons.

Read about CVE protection

eBPF Runtime Security at Scale: Top Tetragon Use Cases (Part 2) - Isovalent (22)

Summary of the top Tetragon use cases

Tetragon’s key advantage lies in its ability to provide detailed, real-time security data from networks, processes, and workloads with incredible amounts of context. Teams use this data to quickly and easily understand what’s happening in their systems, making it possible to detect and respond to threats swiftly.

As the leading eBPF runtime security tool, Tetragon has proven its wide range of uses for illuminating security blind spots. From enforcing strict security rules to monitoring file activity, Tetragon keeps critical systems secure and running smoothly.

Contact Isovalent (creators of eBPF, Cilium, and Tetragon) for expertise into where Tetragon’s eBPF runtime security fits into your architecture and gives your team the modern security toolkit for protecting highly-distributed enterprise deployments.

eBPF Runtime Security at Scale: Top Tetragon Use Cases (Part 2) - Isovalent (2024)

FAQs

What is isovalent tetragon? ›

Tetragon is a Kubernetes-native synchronous monitoring, filtering & enforcement tool that applies policies and filtering directly in-kernel with eBPF.

How much does Cilium tetragon cost? ›

Base prices are $600 a node for tetragon and $1,000 per node for cilium features. It changes based on features and support needed.

What is Cilium tetragon? ›

Cilium Tetragon is a flexible Kubernetes-aware security observability and runtime. Read the documentation. Controlling binary execution (e.g. disallow binary execution from /tmp or allow binaries to be executed) Detect Linux Namespace & Privilege Changes.

How much did Cisco pay for isovalent? ›

No financial terms of the deal were disclosed although The Information reported Cisco paid $650 million in cash for the company. The deal was first announced in December.

What is a tetragon most commonly known as? ›

A figure that is bounded by four straight lines is termed a quadrangle, quadrilateral or tetragon.

Why do we need Cilium? ›

Cilium enables you to secure the network connectivity between application services deployed using Linux container management platforms like Kubernetes. At the core of Cilium is eBPF, which enables the dynamic insertion of control logic within Linux itself.

What does isovalent do? ›

Isovalent builds open-source software and enterprise solutions solving networking, security, and observability needs for modern cloud native infrastructure. The flagship technology Cilium is the choice of leading global organizations including Adobe, AWS, Capital One, Datadog, GitLab, Google, and many more.

Who uses Cilium? ›

Major cloud providers, including Google Cloud, AWS, Azure, and Alibaba, have all standardized on Cilium for Kubernetes networking and security as a testament to its scalability, performance, and rich feature set.

Is Tetragon open source? ›

Tetragon is an open source Security Observability and Runtime Enforcement tool from the makers of Cilium.

What is the main function of the cilium? ›

The function of cilia is to move water relative to the cell in a regular movement of the cilia. This process can either result in the cell moving through the water, typical for many single-celled organisms, or in moving water and its contents across the surface of the cell.

What are the three parts of a cilium? ›

Cilia are made up of microtubules coated by the plasma membrane. Each cilium comprises nine pairs of microtubules that form the outside ring and two central microtubules. This structure is called an axoneme. The nine outer pairs are made up of motor proteins called dynein.

What is an isovalent element? ›

In chemistry, isovalent or second order hybridization is an extension of orbital hybridization, the mixing of atomic orbitals into hybrid orbitals which can form chemical bonds, to include fractional numbers of atomic orbitals of each type (s, p, d).

What is Isovalent vs Heterovalent? ›

Two Lewis structures are termed isovalent if they possess the same number of bonds. Two Lewis structures are termed heterovalent resonance if they differ by one or more bonds.

What is the side of a tetragon? ›

Tetragon (4-gon)

Because a tetragon has an even number of sides, in a regular tetragon, opposite sides are parallel. A regular tetragon is a square.

Top Articles
I bought these 5 things just for my European cruise. I think it will make my vacation better and feel better too
Kool Prison
Spasa Parish
Gilbert Public Schools Infinite Campus
Rentals for rent in Maastricht
159R Bus Schedule Pdf
11 Best Sites Like The Chive For Funny Pictures and Memes
Finger Lakes 1 Police Beat
Craigslist Pets Huntsville Alabama
Paulette Goddard | American Actress, Modern Times, Charlie Chaplin
Red Dead Redemption 2 Legendary Fish Locations Guide (“A Fisher of Fish”)
What's the Difference Between Halal and Haram Meat & Food?
R/Skinwalker
Rugged Gentleman Barber Shop Martinsburg Wv
Jennifer Lenzini Leaving Ktiv
Havasu Lake residents boiling over water quality as EPA assumes oversight
Justified - Streams, Episodenguide und News zur Serie
Epay. Medstarhealth.org
Olde Kegg Bar & Grill Portage Menu
Half Inning In Which The Home Team Bats Crossword
Amazing Lash Bay Colony
Cyclefish 2023
Truist Bank Open Saturday
What’s Closing at Disney World? A Complete Guide
New from Simply So Good - Cherry Apricot Slab Pie
Ohio State Football Wiki
Find Words Containing Specific Letters | WordFinder®
FirstLight Power to Acquire Leading Canadian Renewable Operator and Developer Hydromega Services Inc. - FirstLight
Webmail.unt.edu
When Is Moonset Tonight
2024-25 ITH Season Preview: USC Trojans
Navy Qrs Supervisor Answers
Trade Chart Dave Richard
Sweeterthanolives
How to get tink dissipator coil? - Dish De
Lincoln Financial Field Section 110
1084 Sadie Ridge Road, Clermont, FL 34715 - MLS# O6240905 - Coldwell Banker
Kino am Raschplatz - Vorschau
Classic Buttermilk Pancakes
Pick N Pull Near Me [Locator Map + Guide + FAQ]
'I want to be the oldest Miss Universe winner - at 31'
Gun Mayhem Watchdocumentaries
Ice Hockey Dboard
Infinity Pool Showtimes Near Maya Cinemas Bakersfield
Dermpathdiagnostics Com Pay Invoice
A look back at the history of the Capital One Tower
Alvin Isd Ixl
Maria Butina Bikini
Busted Newspaper Zapata Tx
2045 Union Ave SE, Grand Rapids, MI 49507 | Estately 🧡 | MLS# 24048395
Upgrading Fedora Linux to a New Release
Latest Posts
Article information

Author: Jeremiah Abshire

Last Updated:

Views: 5907

Rating: 4.3 / 5 (54 voted)

Reviews: 85% of readers found this page helpful

Author information

Name: Jeremiah Abshire

Birthday: 1993-09-14

Address: Apt. 425 92748 Jannie Centers, Port Nikitaville, VT 82110

Phone: +8096210939894

Job: Lead Healthcare Manager

Hobby: Watching movies, Watching movies, Knapping, LARPing, Coffee roasting, Lacemaking, Gaming

Introduction: My name is Jeremiah Abshire, I am a outstanding, kind, clever, hilarious, curious, hilarious, outstanding person who loves writing and wants to share my knowledge and understanding with you.