🔖 Monitoring, Logging and Runtime Security#
- 🏷️ Perform behavioral analytics to detect malicious activities
- 🏷️ Detect threats within physical infrastructure, apps, networks, data, users and workloads
- 🏷️ Investigate and identify phases of attack and bad actors within the environment
- 🏷️ Ensure immutability of containers at runtime
- 🏷️ Use Kubernetes audit logs to monitor access