{"id":14795,"date":"2026-05-14T09:29:22","date_gmt":"2026-05-14T09:29:22","guid":{"rendered":"https:\/\/www.securitytoday.de\/2026\/05\/15\/ebpf-kubernetes-runtime-detection\/"},"modified":"2026-05-17T15:12:28","modified_gmt":"2026-05-17T15:12:28","slug":"ebpf-kubernetes-runtime-detection","status":"publish","type":"post","link":"https:\/\/www.securitytoday.de\/en\/2026\/05\/14\/ebpf-kubernetes-runtime-detection\/","title":{"rendered":"eBPF Monitoring in Kubernetes: Detection of Invisible Runtime Threats"},"content":{"rendered":"<p style=\"color:#6190a9;font-size:0.9em;margin:0 0 16px;padding:0;\">9 Min. Read Time<\/p>\n<p><strong>Attackers were inside German Kubernetes clusters longer in 2025 than the DACH CISO median wants to admit. Sysdig&#8217;s Threat Report 2026 documented that the average dwell time of a container intruder is 196 hours, while Mandiant&#8217;s M-Trends Report puts it at 21 days. The gap between cluster reality and EDR visibility is wide and structural. Classic endpoint detection works at the host level and often misses most relevant activities in a container. With eBPF and the open-source tools Falco and Tetragon built on top of it, this gap closes in 2026. Black Hat USA 2026 has elevated eBPF to an official track, shaping the detection engineering market for the next twelve months.<\/strong><\/p>\n<h2>Key Takeaways<\/h2>\n<ul>\n<li><strong>EDR has constructive gaps in Kubernetes:<\/strong> Container runtime activities, in-memory code execution, ephemeral workloads, and sidecar patterns evade classic host EDR. eBPF looks at the kernel syscall level and closes this visibility gap.<\/li>\n<li><strong>Falco and Tetragon are production-ready in 2026:<\/strong> Falco offers a broad rule library and good operator integration, while Tetragon excels in process genealogy and network observability. The two tools are complementary, not competing.<\/li>\n<li><strong>Attackers use eBPF themselves:<\/strong> Stealth loaders, in-memory rootkits, and syscall manipulations via eBPF programs are visibly increasing in 2026. Detection must read kernel telemetry; otherwise, container hosts are blinded.<\/li>\n<\/ul>\n<p style=\"font-size:0.88em;color:#666;margin:20px 0 32px 0;border-top:1px solid #e5e5e5;border-bottom:1px solid #e5e5e5;padding:10px 0;\"><span style=\"color:#69d8ed;font-weight:700;text-transform:uppercase;font-size:0.72em;letter-spacing:0.14em;margin-right:14px;\">Related<\/span><a href=\"https:\/\/www.securitytoday.de\/en\/?p=14647\" style=\"color:#333;text-decoration:underline;\">Detection Engineering Without Vendor Lock<\/a>&nbsp;&nbsp;<span style=\"color:#ccc;\">\/<\/span>&nbsp;&nbsp;<a href=\"https:\/\/www.securitytoday.de\/en\/?p=14630\" style=\"color:#333;text-decoration:underline;\">Self-Replication: AI Agents<\/a><\/p>\n<h2 style=\"margin-top:48px;margin-bottom:18px;\">Why Classic EDR Isn&#8217;t Enough in the Cluster<\/h2>\n<p>Endpoint detection and response was designed for classic server and workstation setups. An EDR agent runs on the host, monitoring process genealogy, file operations, network connections, and responding to predefined anomalies. In a Kubernetes environment, this model falls short for three reasons.<\/p>\n<p>Firstly: Containers are ephemeral. A pod that lives only 90 seconds leaves behind at best a trail that falls through telemetry sampling in host EDR. Detection logic assumes minute-long processes; reality is seconds. Observing container workloads with host granularity means missing 70 to 80 percent of relevant events.<\/p>\n<p>Secondly: In-memory execution. Modern attacker toolchains for containers use memory-only loaders that never put a file on disk. Classic EDR detection, built on file system events, is conceptually blind here. eBPF, on the other hand, sees the underlying syscalls because they necessarily go through the kernel.<\/p>\n<p>Thirdly: Sidecar and service mesh architectures. If a single pod maintains five containers and seven network connections running internally over mTLS, host EDR sees mostly unclear network packets. The semantic level is missing. eBPF can enrich this telemetry at the workload level because it comes from the kernel before mTLS takes effect.<\/p>\n<h2 style=\"margin-top:48px;margin-bottom:18px;\">How Falco and Tetragon work concretely<\/h2>\n<p>Both tools rely on eBPF, but differ in focus and maturity. Falco is the older project, CNCF-graduated, provides an established rule library, and integrates smoothly with Prometheus, Loki, and SIEM pipelines. Its strength lies in breadth and maturity: a standard Falco rule set catches between 60 and 80 percent of MITRE ATT&amp;CK-for-Container techniques right out of the box.<\/p>\n<p>Tetragon comes from the Cilium ecosystem, is closely intertwined with the Cilium CNI, and offers two features that Falco does not provide in this depth: firstly, complete process genealogy, i.e., the parent-child lineage of every container activity, and secondly, a real-time enforcement layer. Tetragon can not only detect that a process calls a forbidden syscall but also block the call directly in the kernel.<\/p>\n<p>For 2026, the pragmatic stack for larger DACH cluster operators often looks like this: Falco as a broadly positioned detector with rule library and SIEM integration, Tetragon supplementing process genealogy in particularly sensitive namespaces and selective runtime enforcement. If you only want to deploy one of the two in 2026, start with Falco, as its learning curve is flatter and operator integration is more advanced.<\/p>\n<div style=\"background:#0a1628;border:1px solid #1a3142;padding:20px 24px;margin:32px 0;border-radius:6px;\">\n<p style=\"font-size:0.8em;font-weight:700;text-transform:uppercase;letter-spacing:0.12em;color:#69d8ed;margin:0 0 10px 0;\">Telemetry Reach 2026<\/p>\n<p style=\"margin:0;font-size:1.05em;line-height:1.55;color:#fff;\"><strong>Sysdig Threat Report 2026: 73 percent of container intrusions remained undetected in hosts with pure EDR telemetry, 11 percent in clusters with Falco-based detection. Black Hat USA 2026 features eBPF in the speaker selection with 9 talks &#8211; more than ever.<\/strong><\/p>\n<\/div>\n<h2 style=\"margin-top:48px;margin-bottom:18px;\">Concrete Detection Examples for In-Memory Threats<\/h2>\n<p>Three example patterns that have measurably increased in DACH clusters in 2026 and can be grasped with eBPF telemetry.<\/p>\n<p><strong>Memfd Loader and Fileless Execution.<\/strong> Attackers create an anonymous memory file descriptor using memfd_create, write code into it, and execute it without disk traces. Falco rule pattern: alert on memfd_create followed by execveat within the same process group in a productive namespace. Host EDR sees no file here, eBPF sees the two syscalls.<\/p>\n<p><strong>Container Escape via cap_sys_admin Privilege Escalation.<\/strong> Classic escape pattern that reappears more frequently in honeypot logs in 2025\/2026. Tetragon tracing policy alert on capability change within a container that does not start in the privileged namespace. Host EDR sees the container only as a generic process of the container runtime; the privilege shift remains invisible.<\/p>\n<p><strong>eBPF-Based Rootkits.<\/strong> Attackers load their own eBPF programs that patch syscalls and hide activity from classic tools. Falco plugin ebpf-program-loaded alert on bpf_prog_load in a non-released namespace. Only telemetry from the kernel itself helps here, as the user-space view is manipulated by the rootkit.<\/p>\n<h2 style=\"margin-top:48px;margin-bottom:18px;\">Pros and Cons of the Two Tools<\/h2>\n<div class=\"pros-cons\" style=\"display:grid;grid-template-columns:1fr 1fr;gap:20px;margin:24px 0 32px 0;\">\n<div style=\"background:#fafafa;padding:18px 22px;border-radius:6px;\">\n<p style=\"font-size:0.85em;font-weight:700;text-transform:uppercase;letter-spacing:0.14em;color:#1a7f37;margin:0 0 10px 0;\">Pro Falco<\/p>\n<ul style=\"margin:0;padding-left:20px;line-height:1.6;color:#202528;\">\n<li>CNCF-Graduated, high maturity<\/li>\n<li>Broad rule library out-of-the-box<\/li>\n<li>Clear SIEM and Loki integration<\/li>\n<li>Shallower learning curve for SOC teams<\/li>\n<\/ul>\n<\/div>\n<div style=\"background:#fafafa;padding:18px 22px;border-radius:6px;\">\n<p style=\"font-size:0.85em;font-weight:700;text-transform:uppercase;letter-spacing:0.14em;color:#cf222e;margin:0 0 10px 0;\">Contra Falco<\/p>\n<ul style=\"margin:0;padding-left:20px;line-height:1.6;color:#202528;\">\n<li>Pure detection, no enforcement<\/li>\n<li>Process genealogy less deep<\/li>\n<li>Rule library requires active maintenance<\/li>\n<li>False-positive rate in dense clusters<\/li>\n<\/ul>\n<\/div>\n<div style=\"background:#fafafa;padding:18px 22px;border-radius:6px;\">\n<p style=\"font-size:0.85em;font-weight:700;text-transform:uppercase;letter-spacing:0.14em;color:#1a7f37;margin:0 0 10px 0;\">Pro Tetragon<\/p>\n<ul style=\"margin:0;padding-left:20px;line-height:1.6;color:#202528;\">\n<li>Real-time enforcement in the kernel<\/li>\n<li>Full process genealogy<\/li>\n<li>Cilium CNI integration<\/li>\n<li>Network observability at the workload level<\/li>\n<\/ul>\n<\/div>\n<div style=\"background:#fafafa;padding:18px 22px;border-radius:6px;\">\n<p style=\"font-size:0.85em;font-weight:700;text-transform:uppercase;letter-spacing:0.14em;color:#cf222e;margin:0 0 10px 0;\">Contra Tetragon<\/p>\n<ul style=\"margin:0;padding-left:20px;line-height:1.6;color:#202528;\">\n<li>Steeper learning curve for detection teams<\/li>\n<li>Tracing policy syntax less documented<\/li>\n<li>Tighter binding to Cilium stack<\/li>\n<li>SIEM integration still in development<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<h2 style=\"margin-top:48px;margin-bottom:18px;\">What a Realistic Rollout Looks Like in 2026<\/h2>\n<div style=\"margin:24px 0 32px 0;\">\n<p style=\"font-size:0.85em;font-weight:700;text-transform:uppercase;letter-spacing:0.14em;color:#69d8ed;margin:0 0 14px 0;\">eBPF Detection Rollout in Four Waves<\/p>\n<p style=\"margin:0 0 10px 0;line-height:1.6;\"><strong>Week 1 to 4.<\/strong> Falco operator in two pilot clusters (staging, one productive namespace), standard rules enabled, telemetry streamed to Loki and SIEM. Goal: Baseline for alert volume and false-positive rate.<\/p>\n<p style=\"margin:0 0 10px 0;line-height:1.6;\"><strong>Week 5 to 12.<\/strong> Build custom rule library, use MITRE ATT&#038;CK for Containers as mapping, prioritize top three to five risks (privilege escalation, memfd loader, crypto mining, reverse shell, eBPF program load).<\/p>\n<p style=\"margin:0 0 10px 0;line-height:1.6;\"><strong>Week 13 to 20.<\/strong> Introduce Tetragon in parallel in the most sensitive namespaces, initially only tracing, no enforcement. Process genealogy as supplement to Falco telemetry in SIEM.<\/p>\n<p style=\"margin:0 0 10px 0;line-height:1.6;\"><strong>From week 21.<\/strong> Selective Tetragon enforcement for clearly defined anti-patterns (e.g., fork-exec from an init container, capability escalation in workload namespace). Careful change control with workload owners.<\/p>\n<\/div>\n<p>It&#8217;s crucial to approach the rollout not as a tool introduction, but as a detection engineering program. An eBPF-based pipeline without documented rules, without CI tests for detection logic, and without alert triage routine in SOC layers produces data without impact. Those who want to seriously deploy Falco and Tetragon plan for 2026 with two to three FTE detection engineering, which cannot be absorbed by normal SOC day-to-day business.<\/p>\n<h2 style=\"margin-top:48px;margin-bottom:18px;\">Where Discipline Wavers in 2026<\/h2>\n<p>Three open issues accompany the eBPF trend in 2026 and should be reflected in every concept. First: kernel version drift. eBPF programs are closely tied to the kernel interface, which can change between kernel versions. Those relying on long-lived worker nodes must take CO-RE (Compile Once, Run Everywhere) seriously, otherwise, every kernel update will break the detection pipeline.<\/p>\n<p>Second: performance overhead in dense clusters. Falco with moderate rules costs between 1 and 3 percent of worker CPU under normal load, but can be significantly higher in dense multi-tenant clusters. Careful rule performance profiles and targeted filters are mandatory in 2026, otherwise, FinOps discussions will start that jeopardize the program.<\/p>\n<p>Third: cloud-managed Kubernetes with lockdown lifecycles. AWS EKS, GKE, and AKS now allow eBPF programs, but with different restrictions. Those operating multi-cloud K8s must build a consistent detection strategy across platforms, not for each cluster separately.<\/p>\n<h2 style=\"margin-top:48px;margin-bottom:18px;\">Frequently Asked Questions<\/h2>\n<h3>Does eBPF detection replace classical EDR in the cluster?<\/h3>\n<p>No. Classical EDR remains relevant for host-level and worker node compromise. eBPF-based tools close the container visibility gap and extend the stack. A modern cluster detection in 2026 combines EDR on worker level with Falco or Tetragon on pod level and with network detection on mesh level.<\/p>\n<h3>What is the performance overhead of Falco in production?<\/h3>\n<p>With moderate rules, the CPU overhead per worker node typically ranges between 1 and 3 percent. In dense multi-tenant clusters with aggressive rules, 5 to 8 percent can occur. Those actively maintaining rule performance profiles keep the overhead in the single-digit percentage range.<\/p>\n<h3>What learning curve should SOC teams plan for eBPF?<\/h3>\n<p>Realistically, two to four weeks for Falco until productive rule maintenance, four to eight weeks for Tetragon. More important than tool expertise is detection engineering practice: MITRE ATT&#038;CK mapping, CI for rules, alert triage loops. Without this practice, eBPF remains an expensive telemetry source.<\/p>\n<h3>Should one deploy Falco and Tetragon simultaneously?<\/h3>\n<p>In large clusters with twenty or more worker nodes and several sensitive namespaces, parallel operation is worthwhile. Falco provides broad coverage and SIEM connection, Tetragon deepens process genealogy and delivers enforcement. In smaller setups, Falco alone usually suffices.<\/p>\n<h3>How does eBPF change the NIS2 compliance discussion?<\/h3>\n<p>Positively. NIS2 obliged parties must demonstrate detection and response capabilities. eBPF-based telemetry significantly improves audit trail quality because kernel syscalls are the most reliable source for forensics. Those upgrading their NIS2 set in 2026 should include eBPF coverage as an argument.<\/p>\n<h2 style=\"margin-top:48px;margin-bottom:18px;\">Editor&#8217;s Reading Recommendations<\/h2>\n<ul>\n<li><a href=\"https:\/\/www.securitytoday.de\/en\/?p=14647\">Detection Engineering without Vendor Lock: Wazuh Stack 2026<\/a><\/li>\n<li><a href=\"https:\/\/www.securitytoday.de\/en\/?p=14630\">Self-Replication: AI Agents from 6 to 81 Percent<\/a><\/li>\n<li><a href=\"https:\/\/www.securitytoday.de\/en\/2026\/05\/10\/ai-phishing-llm-email-filter-detection-2026\/\">AI Phishing: Mail Filters Go Blind<\/a><\/li>\n<\/ul>\n<p style=\"margin:48px 0 12px 0;font-size:0.78em;font-weight:700;text-transform:uppercase;letter-spacing:0.18em;color:#666;\">More from the MBF Media Network<\/p>\n<p style=\"background:#fafafa;padding:14px 18px;margin:0 0 10px 0;\"><span style=\"display:block;font-size:0.7em;letter-spacing:0.14em;text-transform:uppercase;color:#0bb7fd;margin-bottom:6px;\">cloudmagazin<\/span><a href=\"https:\/\/www.cloudmagazin.com\/2026\/05\/12\/multi-cluster-kubernetes-ohne-ops-silo\/\" style=\"color:#202528;text-decoration:underline;\">Multi-Cluster without New Ops Silo: What Teams Solve Wrongly<\/a><\/p>\n<p style=\"background:#fafafa;padding:14px 18px;margin:0 0 10px 0;\"><span style=\"display:block;font-size:0.7em;letter-spacing:0.14em;text-transform:uppercase;color:#F21F05;margin-bottom:6px;\">MyBusinessFuture<\/span><a href=\"https:\/\/mybusinessfuture.com\/cloud-kosten-chefsache-cfo-cio-finops-mittelstand-2026\/\" style=\"color:#202528;text-decoration:underline;\">Cloud Costs are a Matter for Top Management: When CFO and CIO No Longer Calculate Side by Side<\/a><\/p>\n<p style=\"background:#fafafa;padding:14px 18px;margin:0 0 32px 0;\"><span style=\"display:block;font-size:0.7em;letter-spacing:0.14em;text-transform:uppercase;color:#d65663;margin-bottom:6px;\">Digital Chiefs<\/span><a href=\"https:\/\/www.digital-chiefs.de\/rechenkapazitaet-lieferkette-compute-supply-chain-cio-2026\/\" style=\"color:#202528;text-decoration:underline;\">Computing Capacity Becomes a Supply Chain: Compute as a Scarce Production Factor in 2026<\/a><\/p>\n<p style=\"text-align:right;font-style:italic;color:#666;\"><em>Source of title image: AI-generated via nano<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"Classic EDR has blind spots in containers. Falco and Tetragon leverage eBPF to make in-memory rootkits and syscall abuse in K8s visible.","protected":false},"author":10,"featured_media":14704,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_yoast_wpseo_focuskw":"","_yoast_wpseo_title":"eBPF Monitoring in Kubernetes: Detection of Invisible Runtime Threats","_yoast_wpseo_metadesc":"eBPF monitoring closes the container blind spot of classic EDR: Falco and Tetragon detect in\u2011memory threats and syscall abuse in Kubernetes.","_yoast_wpseo_meta-robots-noindex":"","_yoast_wpseo_meta-robots-nofollow":"","_yoast_wpseo_meta-robots-adv":"","_yoast_wpseo_canonical":"","_yoast_wpseo_opengraph-title":"","_yoast_wpseo_opengraph-description":"","_yoast_wpseo_opengraph-image":"https:\/\/www.securitytoday.de\/wp-content\/uploads\/2026\/05\/ebpf-monitoring-kubernetes-falco-tetragon-runtime-detection-2026-cover-hero-1.jpg","_yoast_wpseo_opengraph-image-id":0,"_yoast_wpseo_twitter-title":"","_yoast_wpseo_twitter-description":"","_yoast_wpseo_twitter-image":"https:\/\/www.securitytoday.de\/wp-content\/uploads\/2026\/05\/ebpf-monitoring-kubernetes-falco-tetragon-runtime-detection-2026-cover-hero-1.jpg","_yoast_wpseo_twitter-image-id":0,"footnotes":""},"categories":[2],"tags":[],"class_list":["post-14795","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-innovation"],"wpml_language":"en","wpml_translation_of":14694,"_links":{"self":[{"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/posts\/14795","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/comments?post=14795"}],"version-history":[{"count":2,"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/posts\/14795\/revisions"}],"predecessor-version":[{"id":15080,"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/posts\/14795\/revisions\/15080"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/media\/14704"}],"wp:attachment":[{"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/media?parent=14795"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/categories?post=14795"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/tags?post=14795"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}