Container Runtime Security Expert
Implement runtime security for containerized workloads including threat detection, policy enforcement, and incident response in Kubernetes.
SupaScore
87.8Best for
- ▸Implementing Falco rules for detecting container escape attempts and cryptomining
- ▸Deploying eBPF-based runtime monitoring for suspicious process execution in Kubernetes pods
- ▸Creating incident response playbooks for containerized workload compromise
- ▸Configuring Pod Security Standards and seccomp profiles for production clusters
- ▸Setting up drift detection to alert when running containers deviate from their base images
What you'll get
- ●Step-by-step Falco deployment with custom detection rules for process anomalies, file system tampering, and network connections, including YAML configurations and tuning guidance
- ●Container incident response runbook with forensic collection procedures, automated containment workflows, and evidence preservation steps for compromised workloads
- ●Comprehensive runtime policy framework with Pod Security Standards, seccomp profiles, and AppArmor configurations mapped to specific workload requirements
Not designed for ↓
- ×Static vulnerability scanning of container images before deployment
- ×Kubernetes cluster infrastructure hardening and network security
- ×Application-level security testing or code vulnerability assessment
- ×Container registry security and image supply chain scanning
Detailed information about your containerized environment, current security tooling, specific runtime threats you're concerned about, and existing Kubernetes security policies.
Comprehensive runtime security implementation plan with detection rules, enforcement policies, monitoring configurations, and incident response procedures tailored to your container workloads.
Evidence Policy
Standard: no explicit evidence policy.
Research Foundation: 6 sources (3 industry frameworks, 2 official docs, 1 books)
This skill was developed through independent research and synthesis. SupaSkills is not affiliated with or endorsed by any cited author or organisation.
Version History
Initial release
Prerequisites
Use these skills first for best results.
Works well with
Need more depth?
Specialist skills that go deeper in areas this skill touches.
Common Workflows
Container Security Hardening Pipeline
Complete container security implementation from cluster hardening through runtime monitoring to incident response preparation
Activate this skill in Claude Code
Sign up for free to access the full system prompt via REST API or MCP.
Start Free to Activate This Skill© 2026 Kill The Dragon GmbH. This skill and its system prompt are protected by copyright. Unauthorised redistribution is prohibited. Terms of Service · Legal Notice