EXTENSION OF OPEN POLICY AGENT FUNCTIONS USING FALCO

Authors

DOI:

https://doi.org/10.28925/2663-4023.2026.32.1188

Keywords:

kubernetes; dynamic access; contextual security; OPA; Falco; information security, information protection.

Abstract

The paper considers approaches to integrating the real-time threat detection system Falco with the Open Policy Agent (OPA) policy mechanism in the Kubernetes environment. Three main interaction models are analyzed: direct event sending via Falcosidekick to the OPA HTTP API, using OPA as an admission controller to block dangerous configurations at the resource creation stage, and using an intermediate service as a connecting link between Falco and OPA with the ability to process complex events. The study demonstrates that the combination of sensor control mechanisms and policy-oriented decision-making allows for a higher level of security, automated response, and compliance with Zero Trust principles. The combination of Falco and Open Policy Agent forms a multi-layered security model, where runtime threat detection is complemented by a flexible policy mechanism. The option of direct event sending from Falco via Falcosidekick to the OPA HTTP interface provides a prompt response and minimal delay between incident detection and decision-making, which makes it appropriate for clusters with increased response time requirements. Using OPA as an admission controller enhances proactive protection by blocking unwanted objects before they are deployed, but requires constant adjustment of Rego policies based on the knowledge provided by Falco. The scenario with an intermediate service combines the advantages of both approaches: it allows for complex business logic, enables limited isolation of suspicious workloads, and at the same time does not overload OPA with an excessive number of events. All three schemes confirm that the integration of sensor and policy-oriented components significantly increases the level of protection of containerized environments, contributes to the implementation of Zero Trust principles, and creates the prerequisites for a self-healing infrastructure with automated compliance control.

Downloads

Download data is not yet available.

References

Chen, G., Gao, X., Xu, W., Liu, J., & Xu, X. (2025). MAC-UAE: Multi-level access control based on updateable attribute encryption of secure data in mobile cloud center. Mobile Networks and Applications. https://doi.org/10.1007/s11036-025-02451-y

Chakraborty, S., & Sandhu, R. (2021). Formal analysis of ReBAC policy mining feasibility. In Proceedings of the 11th ACM Conference on Data and Application Security and Privacy (CODASPY ’21) (pp. 197–207). ACM. https://doi.org/10.1145/3422337.3447828

Cheng, Y., Bijon, K., & Sandhu, R. (2016). Extended ReBAC administrative models with cascading revocation and provenance support. In Proceedings of the 21st ACM Symposium on Access Control Models and Technologies (SACMAT 2016). ACM. https://doi.org/10.1145/2914642.2914655

Vijayaraghavan, S. K. J. (2025). Policy as code: A paradigm shift in infrastructure security and governance. World Journal of Advanced Research and Reviews, 26(1), 3399–3405. https://doi.org/10.30574/wjarr.2025.26.1.1441

Yaqub, N., Ullah, S., Jalil, A., & Khan, I. (2025). Blockchain-enabled policy-based access control mechanism to restrict unauthorized access to electronic health records. PeerJ Computer Science, 11, e2647. https://doi.org/10.7717/peerj-cs.2647

Merlec, M. M., & In, H. P. (2024). SC-CAAC: A smart contract-based context-aware access control scheme for blockchain-enabled IoT systems. IEEE Internet of Things Journal. https://doi.org/10.1109/JIOT.2024.3371504

Lee, B., Almutairi, A., & Barka, E. (2017). Situational awareness-based risk-adaptable access control in enterprise networks. In Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security. https://doi.org/10.5220/0006363404000405

Kermabon-Bobinnec, H., et al. (2022). ProSPEC: Proactive security policy enforcement for containers. In Proceedings of the 12th ACM Conference on Data and Application Security and Privacy (CODASPY ’22). ACM. https://doi.org/10.1145/3508398.3511515

Vaarandi, R., et al. (2025). A systematic literature review of cyber security monitoring in maritime. IEEE Access. https://doi.org/10.1109/ACCESS.2025.3567385

Ebute, M. (2025). Continuous monitoring and assessment mechanisms in cybersecurity: Best practices for sustained protection of critical assets. SSRN. https://ssrn.com/abstract=4912624

Dempsey, K., et al. (2021). ISCMA: An information security continuous monitoring program assessment (NIST IR 8212). National Institute of Standards and Technology. https://doi.org/10.6028/NIST.IR.8212

Pitkar, H. (2025). Enhancing Kubernetes security with AI: Anomaly detection for cloud-based workloads. International Scientific Journal of Engineering and Management, 4(4), 1–9. https://doi.org/10.55041/isjem02746

Open Policy Agent. (n.d.). Overview & architecture. https://www.openpolicyagent.org/docs/latest/kubernetes-introduction/

Falco Project. (n.d.). Falco documentation. https://falco.org/docs/

Ali, A., et al. (2024). Implementation of new security features in CMSWEB Kubernetes cluster at CERN. EPJ Web of Conferences, 295, 07026. https://doi.org/10.1051/epjconf/202429507026

Open Policy Agent. (n.d.). REST API. https://www.openpolicyagent.org/docs/latest/rest-api/

Falco Project. (n.d.). Alerts forwarding. https://falco.org/docs/concepts/outputs/forwarding/

Kermabon-Bobinnec, H., et al. (2024). PerfSPEC: Performance profiling-based proactive security policy enforcement for containers. IEEE Transactions on Dependable and Secure Computing, 1–18. https://doi.org/10.1109/TDSC.2024.3420712

Falco Project. (n.d.). Falco performance testing. https://falco.org/blog/falco-performance-testing/

Zhang, R., et al. (2019). OPA Gatekeeper: Policy and governance for Kubernetes. Kubernetes Blog. https://kubernetes.io/blog/2019/08/06/opa-gatekeeper-policy-and-governance-for-kubernetes/

Downloads


Abstract views: 2

Published

2026-03-26

How to Cite

Darienko, D., & Kohut, N. (2026). EXTENSION OF OPEN POLICY AGENT FUNCTIONS USING FALCO. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 4(32), 188–197. https://doi.org/10.28925/2663-4023.2026.32.1188