Operating System Integrity

Tetragon Operating System Integrity lets you observe kernel Module operations, eBPF subsystem activity, and process injections⁠

Thumbnail for video about Operating System Integrity

Understanding Process Behavior in Complex Environments

Modern containerized environments often rely on dynamic host system changes, such as loading kernel modules or modifying kernel parameters, to deliver necessary functionality. However, this same flexibility introduces significant security risks. Malicious actors can exploit these capabilities to load unauthorized kernel modules, alter system behavior, or hide their presence within the system. For security teams, the challenge lies in distinguishing legitimate activity from malicious manipulation of these critical kernel-level components.

Tetragon monitors the loading and unloading of kernel modules in real time, identifying the processes or containers responsible. It captures critical details such as whether a kernel module is signed, ensuring that only verified code is integrated into the kernel. Tetragon also keeps an eye on the eBPF subsystem, providing the observability to detect suspicious program loads or interactions. This comprehensive monitoring allows security teams to detect, investigate, and respond to potential threats swiftly, ensuring the integrity of the operating system while maintaining the agility that modern applications demand.

Tetragon empowers security teams with actionable process insights

  • Real-Time Kernel Module Monitoring

    Track the loading and unloading of kernel modules, identifying responsible processes or containers.

  • Code Integrity Assurance

    Verify kernel modules by checking for signatures, ensuring only authorized code is integrated.

  • eBPF Subsystem Observability

    Monitor eBPF program loads and interactions to detect suspicious activity and potential threats.

  • Threat Detection and Response

    Swiftly detect, investigate, and respond to malicious manipulation of kernel-level components to protect system integrity.