EchelonGraph Tier 3 (EcheDeep) is GA — Continuous, Zero-Knowledge eBPF Detection in Your Cluster
Tier 3 ships an eBPF DaemonSet that runs in your customer cluster, redacts PII at the kernel boundary, and submits envelope-encrypted findings sealed by a customer-controlled KMS. We never see your plaintext. Here's what's inside the v3.0.0 release.
EchelonGraph Engineering
Tier 3 Platform Team
TL;DR. Tier 3 (EcheDeep) is generally available. It's a Kubernetes DaemonSet that runs eBPF detection on every node in your cluster, redacts PII at the kernel boundary, and submits envelope-encrypted findings sealed by a customer-controlled KMS (AWS, GCP, or Vault). We never see plaintext from your environment.
Why we built this
Cloud security platforms make a hard trade-off: either you ship logs, syscalls, and packets to the vendor's SaaS for analysis (and trust them with the plaintext), or you keep everything on-cluster and lose all the graph correlation, IOC enrichment, and compliance scoring that makes a SaaS valuable.
EcheDeep refuses the trade-off.
The agent runs in your cluster. Kernel events flow through eBPF into a redaction pipeline. Findings — not raw events — get envelope-encrypted with a per-event Data Encryption Key (DEK) wrapped by your KMS, then submitted to our SaaS. Our backend processes the ciphertext and stores the wrapped DEK alongside it. To decrypt, our backend has to call back into _your_ KMS — which means you can revoke access at any time and lock us out.
> If you yank our KMS access, the ciphertext we already hold becomes > useless. That's the contract: you control the key, you control the > data.
What ships in v3.0.0
Continuous, on-cluster runtime detection (T3.1 → T3.6)
Customer-controlled remediation (T3.7)
dry-run (default) → approvalpr (auto-PR via GitHub/GitLab connectors) → auto
Hardware KMS & envelope encryption (T3.8)
Custom Compliance Builder (T3.9)
compliance_score_snapshotsLICENSE_GATE=enforce is setObservability + production hardening (T3.10)
/metrics, includingcorrelation_id, pod_name, cluster_id, tenant_id
How to install
Helm:
helm repo add echelongraph https://charts.echelongraph.io
helm install echelongraph-tier3 echelongraph/echelongraph-tier3 \
--namespace echelongraph-system --create-namespace \
--set tier3.tenantId=<your-tenant-id> \
--set tier3.licenseToken=<your-license> \
--set kms.provider=aws \
--set kms.aws.keyArn=arn:aws:kms:us-east-1:...Per-cloud examples ship in the chart:
examples/values-aws-eks.yaml, values-gcp-gke.yaml,
values-azure-aks.yaml, values-onprem.yaml. The on-prem example
uses Vault AppRole; the Azure example uses Vault Kubernetes auth.
What's next
If you're a Pro or Enterprise customer, Tier 3 is included. Reach out at echelongraph.io/enterprise for a deployment review.
— EchelonGraph Engineering
Protect your infrastructure before the breach
Map your attack surface, automate compliance, and detect insider threats in real time.
Start free trial →