Runtime pertains to the active execution of a system, which may encompass infrastructure, applications operating within containers, or local systems. Runtime security refers to the security measures implemented while the application is actively running. This is especially important, as revealed by the State of Kubernetes Security Report 2023, where it was observed that 49% of security incidents pertaining to containers and Kubernetes occurred during the runtime phase.
Runtime security tools can help to overcome challenges by providing observability and continuous visibility to security teams. They also facilitate alignment between developers and security teams, ensuring the dissemination and enforcement of best practices.
Tune into the third episode of the Security Series on Ask an OpenShift Admin, where Michael Foster, the host of the Secure Cloud Cast, joins Andrew and Jonny for an in-depth discussion on Runtime Security!
Ask an OpenShift Admin | Ep 116 | Security Series: Runtime Security
At Red Hat, we offer Red Hat Advanced Cluster Security for Kubernetes as a tool to help inform and enforce security policies during build, deploy and runtime. Try ACS Cloud Service today!
Don’t miss next week as we wrap up the Security Series with the final episode on CI/CD Pipeline Security!
关于作者
Jehlum is a Product Manager in the Red Hat AI team. She's focused on building platforms for generative AI applications. I am especially interested in data processing, observability, safety, evaluation - all key components to build production-grade generative AI applications on platforms that scale.