Agent vs Agentless
Agent and Agentless refer to two different architectural models for managing, monitoring, or securing IT environments, defining where the intelligence or collection mechanism resides.
- Agent: requires installing specialized software (the "agent") on the target system.
- Agentless: relies on existing network protocols or APIs to gather data remotely.
Agent-based
The agent is software that you install on the system you want to assess. That agent executes on the target system:
- reading configuration files
- checking ports and protocols
- collecting live data for alerts and reports
For example: "Run the Datadog Agent in your Kubernetes cluster to start collecting your cluster and applications metrics, traces, and logs." https://docs.datadoghq.com/containers/kubernetes/
Pros
- All information gathered is on the current state of your actual system.
- There’s no remote login required, which means no new end point, no remote connection management, and no lag or connectivity issues.
- The scanner can access all the necessary system elements with few security limitations.
- There are no snapshots required, which saves time and cost.
Cons
- Customers have to trust the agent and may have limited control on the agent.
- The agent taks up resources.
- The agent may introduce other issues, like a memory leak.
- The agent must be installed on each machine, which requires time installing, maintaining, and updating the agents.
- Customers may not be able to install agents on infrastructure assets. E.g. the infra may be managed by a third-party, which might not allow agents on their systems.
Agentless
A few options
- Remote access, either SSH or through a cloud shell. It executes outside the target system. It collects real–time information by connecting to the scan target.
- Disk snapshot scanning assesses a copy of the target system rather than the system itself. It never interacts with the scan target.
Disk scanning is the dominant approach.
- Low risk: scan a snapshot of the VM filesystem, not the live VM. Minimal chance to disrupt the running VM.
- Low impact: many customers routinely create daily VM snapshots for backup purposes, so little inconvenience to enable disk scanning.
- Disk scanners widely available
- Vulnerability databases widely available