Skip to content

Kubernetes Runtime Security Scanners in 2026

Suphi Cankurt

Written by Suphi Cankurt

Key Takeaways
  • Kubernetes runtime security splits into two layers: admission control (Kyverno, OPA Gatekeeper) catches policy violations before workloads start, and threat detection (Falco, Tetragon) catches malicious behavior in running containers.
  • Falco is the CNCF-graduated standard for Kubernetes runtime threat detection โ€” it watches kernel system calls and fires alerts when containers behave unexpectedly, catching threats that config scanners miss.
  • Kyverno is easier to adopt than OPA Gatekeeper for Kubernetes-native teams โ€” policies are Kubernetes YAML resources, not Rego, and it can mutate and generate resources in addition to validating them. Kyverno graduated within CNCF in March 2026.
  • eBPF-based tools like Cilium Tetragon provide deeper observability than kernel module-based approaches and can enforce security policies at the kernel level, not just detect violations.
  • For a complete Kubernetes security posture, runtime tools complement (not replace) config scanners like Kubescape and Kube-bench โ€” see the [Kubernetes security tools guide](/container-security-tools/kubernetes-security-tools) for the full config scanning layer.

Kubernetes configuration scanning tools โ€” Kubescape, Kube-bench, and Checkov โ€” catch misconfigurations before workloads run. But they cannot detect what happens once a container is running: a cryptominer spawning inside a pod, a shell being opened after a successful container escape, or a lateral movement attempt using a compromised service account. That’s the gap that Kubernetes runtime security tools and admission controllers address.

This guide covers the runtime and policy enforcement layer specifically. For config scanning (CIS benchmarks, Kubernetes hardening guidelines, manifest misconfiguration), see the Kubernetes security tools comparison. For container image vulnerability scanning, see Trivy, Grype, and the container security tools overview.

Scope: This guide covers Kubernetes runtime threat detection and admission control tools. For configuration and hardening scanners (Kubescape, Kube-bench, Trivy Kubernetes), see the Kubernetes security tools guide.

Runtime vs config scanning

Kubernetes security tools divide into two distinct categories based on when they act.

Config scanners act before a workload runs. They scan Kubernetes manifests, Helm charts, and cluster configurations for misconfigurations โ€” containers running as root, missing resource limits, exposed secrets in environment variables, privileged pod specs. Tools like Kubescape, Kube-bench, and Checkov operate here. They are essential for shift-left security but blind to runtime behavior.

Runtime security tools act while workloads are running. They monitor system calls, network connections, process execution, and file access from inside running containers. They detect container escapes, unexpected process spawns, data exfiltration attempts, and cryptomining. Falco and Tetragon operate here.

Admission controllers are a third category that acts at the boundary โ€” they intercept resource creation requests before resources are scheduled and enforce policy. Kyverno and OPA Gatekeeper are admission controllers: they prevent non-compliant pods from starting based on defined policies. They are neither config scanners nor runtime detectors โ€” they’re the enforcement point between the two.

A mature Kubernetes security program uses all three layers. This guide covers the runtime and admission controller layer.


Top Kubernetes runtime security tools

1. Falco

Falco is the CNCF-graduated standard for Kubernetes runtime threat detection โ€” it graduated within CNCF on February 29, 2024. It observes Linux kernel system calls from running containers using a kernel module or eBPF probe and evaluates them against a rule engine.

Falco rules match on syscall patterns: a rule fires when a container spawns a shell (execve of sh or bash), reads from /etc/shadow, opens a sensitive directory like /proc, or establishes a network connection to an unexpected address. The default ruleset ships 200+ rules covering common attack patterns including container escapes, credential access, lateral movement, and crypto mining.

Falcosidekick UI dashboard showing alert priorities donut chart, rules bar chart, and rule timeline over 6 hours
Falco โ€” Falcosidekick dashboard showing alert priorities, rule distribution, and rule/priority timelines

Rules are written in YAML with a conditional expression language. Custom rules can match on any combination of syscall fields โ€” process name, file path, network address, user ID, and more. Falcosidekick routes alerts to Slack, PagerDuty, Elasticsearch, Datadog, or any webhook.

Falco runs as a DaemonSet on each node and adds minimal overhead โ€” typically under 3% CPU on active workloads. The eBPF-based probe (the preferred modern mode) does not require kernel headers and is stable across major Kubernetes distributions.

Best fit: Any Kubernetes cluster that needs runtime threat detection. Falco is the default choice โ€” it is the only CNCF-graduated runtime security tool and has the broadest community-maintained ruleset.


2. Kyverno

Kyverno is a Kubernetes-native policy engine and admission controller. Policies are written as Kubernetes YAML resources โ€” no new policy language required. It validates, mutates, and generates Kubernetes resources at admission time.

A Kyverno ClusterPolicy can validate that all pods have resource requests and limits, mutate pod specs to add security context defaults like readOnlyRootFilesystem: true, generate NetworkPolicies automatically when a new namespace is created, or block images from untrusted registries. Policies use familiar Kubernetes patterns (label selectors, JMESPath expressions) rather than a separate DSL.

Kyverno Workload Policies dashboard showing policy list with categories, actions, cluster counts, and violation counts
Kyverno โ€” Workload Policies dashboard showing policy categories, cluster coverage, and violation counts

Kyverno also supports image signature verification via Cosign, allowing you to enforce that only signed container images from approved registries are admitted to the cluster. This is a meaningful supply chain security control that most admission controllers require additional tooling to achieve.

Kyverno is a CNCF graduated project (graduated March 2026) with strong adoption across the community. It installs via a Helm chart and integrates with existing GitOps workflows โ€” policies can be stored in Git and synced via Flux or Argo CD.

Best fit: Teams that want Kubernetes admission control without learning Rego. Kyverno is the most accessible policy engine for Kubernetes-native teams and is the default recommendation for new deployments.


3. OPA Gatekeeper

OPA Gatekeeper is a Kubernetes admission controller that enforces policies written in Rego โ€” the policy language of the Open Policy Agent (OPA) project. It is a CNCF graduated project alongside Falco.

Gatekeeper uses a two-resource model: ConstraintTemplates define the Rego logic for a policy, and Constraints instantiate those templates with specific parameters. This separation allows policy authors to create reusable templates and policy consumers to apply them with environment-specific configuration.

OPA Constraint Framework diagram showing ConstraintTemplate CRD and Constraint Instance CRD interacting with Kubernetes apiserver and OPA Gatekeeper admission webhook
OPA Gatekeeper โ€” Constraint Framework architecture showing how ConstraintTemplates and Constraints interact with the Kubernetes admission controller

The Gatekeeper policy library provides 80+ pre-built ConstraintTemplates covering standard security policies: disallowing privileged containers, requiring pod security contexts, restricting host networking, blocking NodePort services, and enforcing image tag uniqueness. These can be deployed directly or adapted.

Rego is significantly more expressive than Kyverno’s YAML policies โ€” it can perform arithmetic, string manipulation, data lookups, and complex logical conditions. Organizations that already use OPA for admission control in non-Kubernetes systems (Terraform, Envoy, API gateways) benefit from a single policy language across their infrastructure.

Best fit: Teams with existing OPA investments or those that need complex policy logic that exceeds what Kyverno’s YAML-based policies can express.


4. Cilium Tetragon

Cilium Tetragon is an eBPF-based Kubernetes runtime security tool from the Cilium project. Unlike Falco which operates at the syscall level primarily for detection, Tetragon can both observe and enforce security policies in real-time at the kernel level.

Tetragon’s TracingPolicy resources define kernel-level policies โ€” which processes can be executed, which files can be accessed, which network connections are allowed. Violations can be logged, alerted on, or blocked (with the SIGKILL enforcement mode) without going through the Kubernetes API server. This makes enforcement faster and harder to bypass than webhook-based admission controllers.

Cilium Tetragon detecting a container reading /etc/shadow โ€” JSON event output showing process execution, pod metadata, and file access details in a Kubernetes cluster
Cilium Tetragon โ€” real-time detection of a container reading /etc/shadow, showing full pod and process context in the event output

Tetragon provides deep observability: every process execution, file open, socket connection, and privilege escalation is captured with full context including the Kubernetes pod, namespace, and workload metadata. This telemetry integrates with OpenTelemetry and can feed into SIEM platforms.

Tetragon requires Cilium as the CNI plugin. For clusters already using Cilium for networking, Tetragon adds a security layer with no additional agent overhead.

Best fit: Clusters already running Cilium as the CNI plugin and teams that need kernel-level policy enforcement (not just detection) for high-security workloads.


5. NeuVector

NeuVector (now open-source under SUSE) is a full-lifecycle Kubernetes security platform covering runtime protection, network segmentation, and vulnerability management. It was acquired by SUSE in 2021 and open-sourced in 2022.

NeuVector’s core runtime security capability is behavioral learning: it observes a workload during a learning period, automatically generates a process and network security profile based on observed behavior, and then switches to protect mode โ€” blocking any deviation from the learned profile. This zero-trust behavioral approach catches novel attacks without requiring a pre-written rule for each threat pattern.

NeuVector console Network Activity view showing pod-to-pod traffic topology graph with namespace groups, ingress/egress connections, and a legend distinguishing monitored, protected, and quarantined containers
NeuVector โ€” Network Activity console showing live pod-to-pod traffic topology with container protection status

The network segmentation feature provides Layer 7 network policy enforcement directly within Kubernetes, blocking east-west traffic between pods that should not communicate. This is a network security capability that goes beyond what admission controllers and kernel-level security tools typically cover.

NeuVector’s open-source version is fully functional; SUSE offers commercial support contracts.

Best fit: Teams that want automated behavioral security profiles without writing manual rules, or those needing Layer 7 network policy enforcement alongside runtime protection.


6. Aqua Security

Aqua Security offers a full commercial Kubernetes security platform covering admission control, runtime protection, image scanning, and compliance. For runtime security specifically, Aqua uses eBPF to monitor container behavior and provides a managed rules service that keeps threat signatures current.

Aqua’s admission controller enforces image assurance policies โ€” only images that have been scanned and pass defined policies (no critical vulnerabilities, must be from approved registries, must have a valid Aqua scan certificate) are admitted to the cluster. This tightly integrates the build-time scanning and runtime enforcement layers.

Aqua Security console showing User Access Control Policies with role assignment for Kubernetes Pod Creator, displaying available commands for pod create, update, delete, and connect operations
Aqua Security โ€” Access Control Policies console showing Kubernetes role-based command assignment for pod operations

The runtime component monitors process, file, and network activity with policies expressed through Aqua’s policy framework. Aqua provides out-of-the-box compliance mappings for PCI DSS, HIPAA, NIST, and CIS Kubernetes Benchmark.

Best fit: Enterprises that want a single commercial vendor for Kubernetes security across the full lifecycle โ€” image scanning, admission control, and runtime โ€” with managed updates and compliance reporting.


Comparison table

ToolLayerLanguageOpen SourceKey Strength
FalcoRuntime detectionYAML rulesYes (CNCF)Syscall-level threat detection
KyvernoAdmission controlKubernetes YAMLYes (CNCF)Validate, mutate, generate resources
OPA GatekeeperAdmission controlRegoYes (CNCF)Complex policy logic
Cilium TetragonRuntime enforcementTracingPolicy YAMLYes (CNCF)eBPF kernel-level enforcement
NeuVectorRuntime + networkBehavioral learningYes (SUSE)Auto-learned behavioral profiles
Aqua SecurityFull lifecycleCommercial policyCommercialIntegrated lifecycle enforcement

How to choose

Start with your primary security gap: detection or prevention.

If your priority is threat detection in running workloads: Deploy Falco first. It is the easiest path to runtime visibility with the most mature community ruleset. Add Tetragon later if you need kernel-level enforcement or are already on Cilium.

If your priority is policy enforcement at admission: Choose Kyverno if your team works primarily in Kubernetes YAML and you want the simplest path to admission control. Choose OPA Gatekeeper if you already use OPA across other systems or need complex policy logic that Kyverno cannot express.

If you need both: Deploy Falco for runtime detection and Kyverno for admission control โ€” this is the most common production combination for teams using open-source tools.

For enterprises: Evaluate Aqua Security if you want a single commercial vendor covering image scanning, admission control, and runtime protection with managed compliance reporting.


Combining tools

Runtime and admission control tools are not mutually exclusive โ€” they are complementary. A typical production setup might look like:

  1. Kyverno (admission control) โ€” prevents non-compliant pods from starting, enforces image signing, and auto-generates NetworkPolicies.
  2. Falco (runtime detection) โ€” alerts on malicious behavior in running containers with kernel-level precision.
  3. Kubescape or Kube-bench (config scanning) โ€” audits the cluster configuration against CIS benchmarks before workloads are scheduled.

For IaC-layer scanning of Kubernetes manifests and Helm charts before deployment, Trivy and Checkov add a fourth layer to the stack. See the IaC security tools overview for context on where manifest scanning fits in the pipeline.

This three-layer approach covers the full Kubernetes security lifecycle: configuration hardening, admission policy enforcement, and runtime threat detection.


FAQ

This guide is part of the resource hub.

Frequently Asked Questions

What is the difference between Falco and Kyverno?
Falco is a runtime threat detection tool โ€” it monitors kernel system calls from running containers and alerts when a container executes an unexpected binary, opens a sensitive file, or spawns a shell. Kyverno is a Kubernetes admission controller and policy engine โ€” it validates, mutates, and generates Kubernetes resources at admission time (before they run), preventing policy-violating resources from being created. Falco catches threats in running workloads; Kyverno prevents non-compliant workloads from starting. They serve different security layers and are commonly deployed together.
What does OPA Gatekeeper do in Kubernetes?
OPA Gatekeeper is a Kubernetes admission controller that enforces custom policies written in Rego (Open Policy Agent’s policy language). When any resource is created or modified, Gatekeeper evaluates it against your defined ConstraintTemplates and blocks resources that violate policy โ€” for example, preventing pods without resource limits, blocking containers running as root, or requiring specific label sets. Unlike Kyverno which uses Kubernetes-native YAML policies, Gatekeeper uses Rego, which is more expressive but has a steeper learning curve.
Is Falco free to use?
Yes. Falco is a CNCF graduated open-source project. The core engine, default ruleset, and Falcosidekick integration are all free and open-source under Apache 2.0. Sysdig offers a commercial platform built on Falco with managed rules, cloud threat detection, and hosted SaaS management โ€” but the open-source Falco is fully functional without the commercial layer.
What is eBPF-based Kubernetes security?
eBPF (extended Berkeley Packet Filter) allows security tools to observe kernel events with low overhead and without loading kernel modules. Cilium Tetragon and the modern version of Falco both use eBPF to monitor system calls, network connections, and process activity from running containers. eBPF-based tools are more reliable than tools that depend on ptrace or kernel modules, and they can observe events at a lower level โ€” including process execution, file access, and network I/O โ€” with minimal performance impact on the cluster.
Can I use Kyverno and OPA Gatekeeper in the same cluster?
Technically yes, but it is not recommended. Both are Kubernetes validating admission webhooks and both will be called for every resource creation and update. Running both adds latency to every API server request, doubles the policy management surface, and creates potential conflicts if the same constraint is expressed differently in each system. Choose one policy engine for your cluster and migrate all policies to it. Kyverno is generally preferred for teams that want Kubernetes-native YAML policies; OPA Gatekeeper is preferred for teams that already use Rego across other infrastructure.
Suphi Cankurt

Years in application security. Reviews and compares 209 AppSec tools across 11 categories to help teams pick the right solution. More about me →