Part 6: Runtime Security
Monitor and respond to runtime threats using audit logging, Falco, container forensics, and immutable infrastructure patterns.
Modules
Section titled “Modules”| Module | Description |
|---|---|
| Module 6.1: Kubernetes Audit Logging | Configuring and analyzing API server audit logs |
| Module 6.2: Runtime Security with Falco | Detecting anomalous container behavior in real time |
| Module 6.3: Container Investigation | Forensic analysis of compromised containers |
| Module 6.4: Immutable Infrastructure | Read-only filesystems and immutable deployments |