Define Container Protection rulesets to ensure protection for your containers during Runtime Security scanning.
Runtime security provides visibility into container activity
that violates a customizable set of rules. Currently, runtime security includes a
set of predefined rules that provide visibility into MITRE ATT&CK framework
tactics for containers, as well as container drift detection. Container Security can
automatically mitigate problems detected by the runtime security feature. If a pod
violates any rule during runtime, the issue is mitigated by terminating or isolating
the pod based on the ruleset assigned to its Container Security policy.
![]() |
NoteRulesets are compatible with Kubernetes and support
Amazon EKS, Microsoft Azure AKS, Google GKE, and OpenShift running supported Linux
kernels.
|
Options
|
Description
|
||
Create a ruleset
|
Create a new ruleset (New) or copy the
rules from an existing ruleset
(Duplicate) as the basis for a new
ruleset
|
||
Modify a ruleset
|
Select any existing ruleset in the list to modify the ruleset
settings
|
||
Delete a ruleset
|
Hover over the unneeded ruleset in the list and click the trash
can icon that appears next to the ruleset name
|