Explore Kubernetes workloads
Copy link

The Workloads page provides a comprehensive inventory of Kubernetes workloads and their runtime posture. From this page, you can:

  • Identify workloads with elevated security risk
  • Monitor profiling status and runtime visibility
  • Review runtime behavior and security posture
  • Drill down into workload-specific details
⚠️

Use the Command Platform to access Container Runtime Security

Access Container Runtime Security from the Command Platform to authenticate and take action on findings. If you open Cloud Security outside the Command Platform, you can view detections, but some features are unavailable.

To view Kubernetes workloads:

  1. Log in to the Command Platform .
  2. Go to Controls & Compliance > Runtime.
  3. Click Manage Rules and Policies. The Container Runtime Security feature opens to the Threat Detection page.
  4. Click Workloads.

Before you begin
Copy link

Accessing the Workloads page requires Container Runtime Security. Review Enable and use Container Runtime Security for details.

Explore workloads
Copy link

Workloads are evaluated using runtime and configuration signals.

Risk FactorDescription
Internet facingPublicly reachable from the internet
External facingAccessible outside the cluster
PrivilegedRunning in privileged mode or with elevated permissions
Secret AccessHas access to Kubernetes secrets
Host AccessCan access the host system (for example, hostPath volumes)
Data AccessAccesses sensitive or persistent storage

The profiling engine observes runtime behavior to establish a baseline.

StatusMeaning
CompletedSufficient runtime data collected
LearningProfiling in progress
MissingInsufficient visibility or coverage
FailedProfiling error or misconfiguration

Investigate workload details
Copy link

Selecting a workload opens a detailed page with three tabs:

Graph

The Graph tab visualizes workload runtime context, including:

  • Observed network connections (last 24 hours)
  • Mounted volumes and resources

Optional display layers include:

  • Network Policy status
  • Port and protocol
  • Vulnerabilities
  • Incidents
  • Workload names

This view helps identify connectivity patterns and exposure.

App Profile

The App Profile tab shows baseline runtime behavior, including:

  • Processes running inside containers
  • Files accessed or modified
  • API calls
  • Network traffic
  • Linux capabilities used
  • System calls (syscalls)

This runtime baseline helps detect anomalies such as:

  • Reverse shells
  • Cryptomining activity
  • Privilege escalation
  • Unexpected binaries

Details

The Details tab provides workload security posture information, including:

  • Cluster, namespace, and pod details
  • Deployment information
  • Risks
  • Available protection