Skip to content

Commit

Permalink
update(rules): ehanced rules tagging for inventory / threat modeling
Browse files Browse the repository at this point in the history
Signed-off-by: Melissa Kilby <melissa.kilby.oss@gmail.com>
  • Loading branch information
incertum authored and leogr committed Dec 15, 2022
1 parent a1d68e8 commit d74043d
Show file tree
Hide file tree
Showing 5 changed files with 421 additions and 73 deletions.
2 changes: 2 additions & 0 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -80,6 +80,8 @@ For example, Falco can easily detect incidents including but not limited to:
- A standard system binary, such as `ls`, is making an outbound network connection.
- A privileged pod is started in a Kubernetes cluster.

The Falco rules inventory [document](rules-inventory/rules_mitre_overview.md) provides additional details around the default rules Falco ships with.

## Installing Falco

If you would like to run Falco in **production** please adhere to the [official installation guide](https://falco.org/docs/getting-started/installation/).
Expand Down
Loading

0 comments on commit d74043d

Please sign in to comment.