← Back to Skills
SecurityEngineeringPlatinum

Securing running containers in Kubernetes from threats.

Container Runtime Security Expert

Falco, eBPF, Kubernetes Security

expertv5.0

Best for

  • Implementing Falco rules for detecting container escape attempts and cryptomining
  • Deploying eBPF-based runtime monitoring for suspicious process execution in Kubernetes pods
  • Creating incident response playbooks for containerized workload compromise
  • Configuring Pod Security Standards and seccomp profiles for production clusters

What you'll get

  • Step-by-step Falco deployment with custom detection rules for process anomalies, file system tampering, and network connections, including YAML configurations and tuning guidance
  • Container incident response runbook with forensic collection procedures, automated containment workflows, and evidence preservation steps for compromised workloads
  • Comprehensive runtime policy framework with Pod Security Standards, seccomp profiles, and AppArmor configurations mapped to specific workload requirements
Expects

Detailed information about your containerized environment, current security tooling, specific runtime threats you're concerned about, and existing Kubernetes security policies.

Returns

Comprehensive runtime security implementation plan with detection rules, enforcement policies, monitoring configurations, and incident response procedures tailored to your container workloads.

What's inside

You are a Container Runtime Security Expert. You detect and prevent malicious activity in running containers using behavioral monitoring, policy enforcement, and incident response. - **eBPF-Based Detection**: Deploy Falco, Tetragon, and KubeArmor rules that monitor process execution, file access, ne...

Covers

What You Do DifferentlyMethodologyWatch For
Not designed for ↓
  • ×Static vulnerability scanning of container images before deployment
  • ×Kubernetes cluster infrastructure hardening and network security
  • ×Application-level security testing or code vulnerability assessment
  • ×Container registry security and image supply chain scanning

SupaScore

89.33
Research Quality (15%)
8.85
Prompt Engineering (25%)
9.2
Practical Utility (15%)
8.55
Completeness (10%)
9.3
User Satisfaction (20%)
8.9
Decision Usefulness (15%)
8.75

Evidence Policy

Standard: no explicit evidence policy.

container-securityruntime-securityfalcoebpfkubernetes-security

Research Foundation: 6 sources (3 industry frameworks, 2 official docs, 1 books)

This skill was developed through independent research and synthesis. SupaSkills is not affiliated with or endorsed by any cited author or organisation.

Version History

v5.03/25/2026

v5.5 distilled from v2 via Claude Sonnet

v2.02/24/2026

Pipeline v4: rebuilt with 3 helper skills

v1.0.02/15/2026

Initial release

Prerequisites

Use these skills first for best results.

Works well with

Need more depth?

Specialist skills that go deeper in areas this skill touches.

Common Workflows

Container Security Hardening Pipeline

Complete container security implementation from cluster hardening through runtime monitoring to incident response preparation

© 2026 Kill The Dragon GmbH. This skill and its system prompt are protected by copyright. Unauthorised redistribution is prohibited. Terms of Service · Legal Notice