Frequently Asked Questions

Understanding Runtime Security

What is runtime security?

Runtime security is the practice of protecting applications, containers, and cloud workloads while they are running by continuously monitoring their behavior and intervening in real time to stop threats. Unlike traditional security that focuses on pre-deployment or network perimeters, runtime security operates during the production phase, detecting and blocking threats as they happen. [Source]

Why is runtime security important for cloud and container environments?

Cloud and container environments are dynamic and ephemeral, with workloads spinning up and down rapidly. Runtime security is crucial because threats can manifest only during execution, such as in-memory malware or abuse of legitimate processes. It provides live protection and visibility, ensuring immediate detection and response to attacks that bypass pre-deployment controls. [Source]

How does runtime security differ from traditional security approaches?

Traditional security focuses on code before deployment or securing network perimeters, while runtime security operates during the production phase. It uses agents or sensors to monitor application behavior, system calls, and memory usage in real time, detecting and blocking threats as they occur, rather than relying solely on static analysis or perimeter defenses. [Source]

What types of threats does runtime security address?

Runtime security addresses threats that manifest during execution, such as fileless (in-memory) malware, abuse of legitimate processes, container breakouts, privilege escalation, and lateral movement within cloud or container environments. It also detects misconfigurations and zero-day exploits that may only be visible at runtime. [Source]

What are the main categories of runtime security?

Runtime security can be applied at multiple layers, including cloud runtime security (protecting cloud workloads in real time), Kubernetes runtime security (securing containerized applications orchestrated by Kubernetes), container runtime security (monitoring containers on any platform), and Runtime Application Self-Protection (RASP) for application-level defense. [Source]

How does runtime security work in Kubernetes environments?

Kubernetes runtime security focuses on securing running containers and cluster components by monitoring system calls and Kubernetes API events. It detects threats like container breakouts, crypto mining payloads, and lateral movement. Tools such as Falco or Kubernetes-native agents flag abnormal behavior and can alert or stop suspicious activity in real time. [Source]

What is Runtime Application Self-Protection (RASP)?

Runtime Application Self-Protection (RASP) is a technology that embeds instrumentation into an application's runtime environment to monitor and intercept attacks in real time. Unlike external defenses, RASP operates inside the application, detecting injection attacks, memory exploits, and abnormal behaviors at the application level. [Source]

How does runtime security support compliance requirements?

Runtime security supports compliance frameworks like GDPR, PCI-DSS, NIST 800-53, NIST 800-190, and CIS Benchmarks by enabling continuous monitoring, real-time auditing, file integrity monitoring, and incident detection. For example, PCI-DSS Requirement 11 mandates regular security testing, which can be fulfilled by continuous validation of runtime defenses. [Source]

What are some key tools and frameworks for runtime security?

Key tools and frameworks include eBPF (for deep visibility into system calls and kernel events), Falco (an open-source runtime security tool for containers and Kubernetes), and Cloud Workload Protection Platforms (CWPPs) like Prisma Cloud, Sysdig Secure, Aqua Security, and Trend Micro Cloud One. These tools provide real-time monitoring, anomaly detection, and enforcement. [Source]

How does runtime security integrate with other security solutions?

Runtime security integrates with SIEM systems for centralized alerting, XDR platforms for automated cross-domain response, and Breach and Attack Simulation (BAS) platforms like Cymulate for validating runtime defenses. It also connects with CI/CD pipelines and ITSM systems to automate security testing and policy enforcement. [Source]

How does Cymulate help optimize runtime security?

Cymulate enables organizations to test and optimize runtime security by simulating real-world cyberattacks in cloud, container, and hybrid environments. The platform validates whether runtime security tools detect and respond to threats, identifies gaps, and helps refine configurations for continuous improvement. [Source]

Can Cymulate validate runtime security across hybrid and multi-cloud environments?

Yes, Cymulate validates security controls across applications, containers, and cloud workloads, ensuring consistent runtime defense in on-premises, multi-cloud, and hybrid infrastructures. This continuous validation helps organizations maintain strong security postures regardless of environment complexity. [Source]

How does Cymulate integrate with DevSecOps and CI/CD pipelines?

Cymulate can automate security simulations in CI/CD pipelines or staging environments, treating security tests like unit tests. Failed tests trigger immediate remediation, ensuring proactive detection and rapid resolution of issues before attackers can exploit vulnerabilities. [Source]

What are the benefits of using breach and attack simulation (BAS) for runtime security?

BAS platforms like Cymulate provide regular runtime security testing, helping organizations identify misconfigurations, fine-tune detection rules, and reduce false positives/negatives. This continuous feedback loop strengthens security posture and improves response readiness. [Source]

How does runtime security help with PCI-DSS compliance?

PCI-DSS requires regular security testing, file integrity monitoring, and intrusion detection. Runtime security agents monitor processes, logins, and file changes in real time, helping organizations detect and mitigate unauthorized access and malware at runtime, and ensuring compliance with PCI-DSS mandates. [Source]

What is the role of eBPF in runtime security?

eBPF (Extended Berkeley Packet Filter) is a Linux kernel technology that allows programs to run safely inside the kernel space. Many modern runtime security tools use eBPF to gain deep visibility into system calls and kernel events without significant performance overhead, enabling real-time monitoring and filtering of behavior. [Source]

How does Falco enhance runtime security?

Falco is an open-source runtime security tool designed for containers and Kubernetes. It uses a kernel module or eBPF probe to monitor system calls and applies rules to identify suspicious behavior, such as a container process spawning a shell or accessing sensitive files. Falco generates real-time alerts for possible breaches or policy violations. [Source]

What are Cloud Workload Protection Platforms (CWPPs) and how do they relate to runtime security?

CWPPs are security products that provide unified runtime protection for workloads across VMs, containers, and serverless environments. They combine vulnerability scanning with runtime defense features like anomaly detection, firewalling, and anti-malware, monitoring file integrity and enforcing application allow-lists in real time. [Source]

How does runtime security help with NIST and CIS compliance?

NIST 800-53 and 800-190 frameworks require continuous monitoring and real-time threat detection, which runtime security provides. CIS Benchmarks recommend audit logging and minimal privileges for containers, both of which are supported by runtime security practices and tools. [Source]

Features & Capabilities

What features does Cymulate offer for runtime security validation?

Cymulate offers continuous validation of runtime security controls through simulated cyberattacks in cloud, container, and hybrid environments. Features include attack path discovery, automated mitigation, integration with CI/CD pipelines, and actionable insights for optimizing runtime defenses. [Source]

Does Cymulate integrate with other security tools for runtime security?

Yes, Cymulate integrates with a wide range of security technologies, including cloud security tools (AWS GuardDuty, Check Point CloudGuard), endpoint security (CrowdStrike Falcon, SentinelOne), and vulnerability management solutions. These integrations enhance runtime security validation and response. [Source]

How easy is it to implement Cymulate for runtime security validation?

Cymulate is designed for quick and easy implementation, operating in agentless mode without the need for additional hardware or complex configurations. Customers can start running simulations almost immediately, with comprehensive support and educational resources available. [Source]

What compliance certifications does Cymulate hold?

Cymulate holds several industry-leading certifications, including SOC2 Type II, ISO 27001:2013, ISO 27701, ISO 27017, and CSA STAR Level 1. These certifications demonstrate Cymulate's commitment to robust security and compliance standards. [Source]

How does Cymulate support GDPR compliance?

Cymulate incorporates data protection by design, with a dedicated privacy and security team, including a Data Protection Officer (DPO) and Chief Information Security Officer (CISO). The platform ensures encryption in transit and at rest, secure AWS-hosted data centers, and continuous monitoring, supporting GDPR requirements. [Source]

Use Cases & Benefits

Who can benefit from runtime security validation with Cymulate?

Cymulate's runtime security validation benefits CISOs, security leaders, SecOps teams, red teams, and vulnerability management teams in organizations of all sizes and industries, including finance, healthcare, retail, and more. The platform is tailored to address the unique needs of each role. [Source]

What business impact can organizations expect from using Cymulate for runtime security validation?

Organizations using Cymulate can achieve up to a 52% reduction in critical exposures, a 60% increase in team efficiency, and an 81% reduction in cyber risk within four months. Continuous validation leads to improved security posture, operational efficiency, and cost savings. [Source]

Are there customer success stories related to runtime security validation with Cymulate?

Yes, for example, Hertz Israel reduced cyber risk by 81% in four months by addressing gaps in visibility and control using Cymulate. More case studies are available on the Cymulate website. [Read the case study]

How does Cymulate address pain points like fragmented security tools and resource constraints?

Cymulate integrates exposure data and automates validation, providing a unified view of the security posture. It automates processes to improve efficiency, helping teams overcome resource constraints and focus on strategic initiatives. [Source]

How does Cymulate help with unclear risk prioritization?

Cymulate validates exploitability and ranks exposures based on prevention and detection capabilities, business context, and threat intelligence, enabling organizations to focus on the most critical vulnerabilities. [Source]

What educational resources does Cymulate provide for runtime security and cybersecurity in general?

Cymulate offers a Resource Hub, blog, webinars, e-books, and a continuously updated Cybersecurity Glossary to help users stay informed about runtime security and broader cybersecurity topics. [Resource Hub] [Glossary]

Where can I find a glossary of runtime security and cybersecurity terms?

You can find a glossary of cybersecurity terms, including runtime security concepts, on Cymulate's continuously updated glossary page: Cybersecurity Glossary.

Pricing & Plans

What is Cymulate's pricing model for runtime security validation?

Cymulate operates on a subscription-based pricing model tailored to each organization's requirements. Pricing depends on the chosen package, number of assets, and scenarios selected for testing. For a detailed quote, you can schedule a demo with the Cymulate team. [Schedule a Demo]

Competition & Differentiation

How does Cymulate differ from other runtime security validation solutions?

Cymulate stands out with its unified platform that combines Breach and Attack Simulation (BAS), Continuous Automated Red Teaming (CART), and Exposure Analytics. It offers continuous, automated attack simulations, AI-powered optimization, and the most advanced library of attack actions, updated daily. Customers report measurable outcomes such as a 52% reduction in critical exposures and an 81% reduction in cyber risk. [Source]

What are the advantages of Cymulate for different user segments?

Cymulate provides quantifiable metrics and insights for CISOs, automates processes for SecOps teams, offers advanced offensive testing for red teams, and enables efficient vulnerability prioritization for vulnerability management teams. Solutions are tailored to the needs of each persona. [Source]

Cymulate named a Customers' Choice in 2025 Gartner® Peer Insights™
Learn More
New Case Study: Credit Union Boosts Threat Prevention & Detection with Cymulate
Learn More
New Research: Cymulate Research Labs Discovers Token Validation Flaw
Learn More
An Inside Look at the Technology Behind Cymulate
Learn More

Runtime Security

Modern cloud-native environments are dynamic and ephemeral – containers spin up and down in seconds, serverless functions run on demand, and applications are updated continuously.  

Traditional security tools that only check for vulnerabilities before runtime or rely on fixed perimeters cannot keep up with threats that manifest only at runtime, such as in-memory (fileless) malware or abuse of legitimate processes  

Attackers increasingly exploit gaps after deployment – for instance, a new zero-day vulnerability might be exploited in a running application, or a misconfiguration could be abused at runtime.  

Runtime security fills this gap by providing live protection and visibility in production environments. It plays a considerate role in cloud security (securing workloads running on platforms like AWS, Azure, GCP), container security (detecting threats inside Docker/Kubernetes environments), and application security (guarding applications during execution via techniques like  Runtime Application Self-Protection (RASP)). 

What is Runtime Security? 

Runtime security is the practice of protecting applications, containers, and cloud workloads while they are running by continuously monitoring their behavior and intervening in real time to stop threats.  

In contrast to traditional security measures that focus on code before deployment or securing the network perimeter, runtime security operates during the production phase – when software is executing and most vulnerable to active attacks  

It involves instruments like agents or sensors that observe application behavior, system calls, memory usage, and other telemetry to detect anomalies or malicious actions as they happen.  

By analyzing this activity in real time, a runtime security solution can alert on or even automatically block suspicious events (for example, killing a malicious process or quarantining a compromised container). This approach offers immediate, dynamic protection, complementing the “shift-left” practices (like code scanning) with “shift-right” defense. 

Types of Runtime Security 

Runtime security can be applied at multiple layers of the modern technology stack. Key categories include: 

Cloud runtime security 

Cloud runtime security focuses on protecting cloud workloads and infrastructure in real time. This means monitoring the execution of virtual machines, cloud services, and applications running in cloud environments for any malicious or abnormal activity.  

Cloud providers offer native tools (like AWS GuardDuty or Azure Defender) to detect threats in cloud runtime, and third-party Cloud Workload Protection Platforms (CWPPs) add additional real-time defenses.  

Cloud runtime security might catch things like suspicious process activity on a cloud VM, unauthorized API calls, or unusual network traffic within your cloud environment. The goal is to secure cloud workloads (VMs, serverless functions, etc.) against attacks as they occur, providing immediate detection and response within cloud platforms. 

Kubernetes runtime security 

Kubernetes runtime security is specifically about securing containerized applications orchestrated by Kubernetes during their execution. Kubernetes clusters are complex, with many moving parts (pods, containers, network policies, etc.), so specialized runtime security is needed to detect threats like a container breakout, a crypto mining payload running in a pod, or an attacker moving laterally in the cluster  

Tools in this category (such as Falco or Kubernetes-native security agents) monitor system calls and Kubernetes API events to flag abnormal behavior in containers or the cluster.  

For example, if a container suddenly spawns a process that is not in its normal profile (maybe a web server container starting a bash shell and downloading a file), the runtime security tool can alert or stop it.  

Kubernetes runtime security ensures that running containers and the cluster’s components (like the kubelet, API server, etc.) are protected, complementing build-time checks (like image scanning) with real-time threat detection in the live environment  

Container runtime security 

Closely related to Kubernetes security, container runtime security refers to protecting any container platform (Docker, containered, CRI-O, etc.) during operation. Even if you’re not using full Kubernetes orchestration (for example, running Docker containers on VMs or using other container services), you need to monitor those containers at runtime.  

Container runtime security tools watch the container’s processes, file system changes, and network usage for signs of compromise.  

This might include detecting a shell spawned inside a container, a container making outbound network connections it never did before, or changes to files that should be immutable.  

Runtime application self-protection (RASP) 

Runtime Application Self-Protection (RASP) is a specific technology focused on securing applications from within while they run. RASP solutions embed instrumentation (agents or libraries) into an application’s runtime environment (often within the application server or the app’s code) to monitor and intercept attacks in real time.  

Unlike external defenses like firewalls, RASP operates inside the application – it has insight into the code execution flow, inputs, and internal state. This enables it to detect things like injection attacks, attempts to exploit a function in memory, or other abnormal behaviors at the application level.  

Why Is Runtime Security Crucial in Cloud Environments? 

In cloud and hybrid environments, workloads are highly dynamic, scalable, and often short-lived. This brings unique security challenges that make runtime protection crucial: 

1. Dynamic workloads & ephemeral infrastructure 

Cloud instances, containers, and serverless functions can be created and destroyed on demand. Their configuration and behavior can change rapidly. Runtime security is needed to continuously adapt to these changes – providing protection even as new workloads spin up or environments shift.  

Traditional static security (like one-time scans or predefined firewall rules) may miss threats in such a fluid environment, whereas runtime monitoring adjusts in real time to each workload’s lifecycle. 

2. Increased attack surface from microservices 

Modern cloud applications often use microservices architectures and rely on numerous third-party services or open-source components. This distributed design means many more moving parts that attackers can target.  

A vulnerability in one microservice or a misconfigured permission between services might only be exploitable once everything is deployed and interacting.  

3. Threats that bypass pre-deployment controls 

Some attacks manifest purely at runtime, such as fileless malware that resides in memory, or a malicious insider abusing credentials at runtime. These don’t involve adding new files or code that a scanner could catch beforehand.  

Similarly, a container breakout (where a process escapes the container to the host) can only be detected by watching running processes and system calls.  

4. Compliance and visibility 

Many compliance frameworks such as General Data Protection Regulation (GDPR) and  require organizations to monitor their systems and maintain audit logs of activity. Ensuring continuous security monitoring in production is often a compliance mandate. For instance, financial regulations and standards demand real-time auditing and detailed logs of system access and changes. 

Key Tools and Frameworks

A variety of tools and technologies can help implement runtime security. Some focus on providing visibility, others on enforcement, and some on validation of security. Key examples include: 

eBPF (Extended berkeley packet filter) 

eBPF is a powerful Linux kernel technology that enables programs to run inside the kernel space safely. Many modern runtime security tools leverage eBPF to gain deep visibility into system calls and kernel events without significant performance overhead.  

 By attaching eBPF programs to events (like file access, process execution, or network sockets), security tools can monitor and even filter behavior in real time.  

Falco (CNCF falco) 

Falco is an open-source runtime security tool (a Cloud Native Computing Foundation project) specifically designed for containers and Kubernetes. It uses either a kernel module or eBPF probe to tap into system calls, and it applies a set of rules to identify suspicious behavior.  

Security teams can define Falco rules such as “alert if any container process spawns a shell” or “alert if a container tries to open a sensitive file like /etc/shadow.” Falco will then generate real-time alerts when such events occur, indicating a possible breach or policy violation.  

Cloud workload protection platforms (CWPPs) 

CWPP is a category of security products (often commercial) that provide unified runtime protection for workloads across VMs, containers, and serverless. Examples include Prisma Cloud (Palo Alto Networks), Sysdig Secure, Aqua Security, Trend Micro Cloud One, and others.  

These platforms typically combine multiple capabilities: they might do vulnerability scanning (pre-runtime) and runtime defense like anomaly detection, firewalling, and anti-malware. At runtime, CWPPs can monitor file integrity, detect exploit attempts, enforce application allow-lists, and more.  

Compliance and Regulations Affecting Runtime Security 

Organizations operating in regulated industries have an added incentive to implement runtime security—various laws and standards either explicitly require or implicitly benefit from continuous runtime monitoring.  

GDPR (General data protection regulation) 

GDPR mandates that organizations protect personal data with “appropriate technical and organizational measures” and report breaches within 72 hours.  

While GDPR does not prescribe specific security technologies, runtime security plays a crucial role in meeting its requirements. 

PCI-DSS (Payment card industry data security standard) 

PCI-DSS, which governs credit card data security, has explicit requirements that align with runtime security. For instance: 

  • Requirement 11 mandates regular security testing, which can be fulfilled by continuous security validation of runtime defenses. Breach and Attack Simulation (BAS) platforms automate this process by continuously assessing security controls against real-world attack techniques. By simulating sophisticated cyber threats in a controlled environment, BAS enables organizations to identify gaps in runtime defenses, validate their effectiveness, and ensure compliance with Requirement 11. 
  • PCI-DSS requires file integrity monitoring and intrusion detection, often achieved using runtime security agents that monitor processes, logins, and file changes in real time
  • Organizations must detect and mitigate unauthorized access and malware at runtime, ensuring compliance with PCI’s mandate to “detect and address failures of critical security controls.” 

NIST 800-53 and NIST 800-190 (container security guidelines) 

The NIST 800-53 framework establishes security and privacy controls for federal information systems. Key runtime security-related controls include: 

  • SI-4 (System Monitoring): Requires continuous monitoring of system activities. 
  • IR-5 (Incident Monitoring): Mandates real-time threat detection and response capabilities. 

Additionally, NIST 800-190 (focused on container security) specifically recommends runtime monitoring tools to detect threats like container escapes or privilege escalation attempts. 

CIS Benchmarks (center for internet security) 

CIS Benchmarks define security best practices for platforms like Windows, Linux, Kubernetes, Docker, and cloud accounts. While CIS primarily focuses on preventative measures, runtime security complements these controls by providing real-time monitoring and threat response. For example: 

  • CIS Kubernetes Benchmark recommends audit logging, a runtime security best practice that improves visibility into real-time activities within Kubernetes clusters. 
  • CIS also advises minimal privileges for containers, reducing the risk of exploitable vulnerabilities at runtime
  • Many CIS frameworks require host-based intrusion detection, reinforcing the need for real-time runtime monitoring

How Runtime Security Integrates with Other Security Solutions 

Runtime security is most effective when integrated into a broader security ecosystem. SIEM centralizes real-time alerts and correlates runtime security data with network and identity activity for better threat detection. XDR extends this by integrating endpoint, cloud, and runtime security data for automated cross-domain responses.

Breach and Attack Simulation (BAS) platforms like Cymulate validate runtime security by simulating threats to ensure effective detection and reduce false positives. Runtime security also integrates with CI/CD pipelines, ITSM systems, and APIs, allowing security policies to scale dynamically.

Optimizing Runtime Security with Cymulate 

Implementing runtime security is just the beginning—continuous validation is essential to ensure its effectiveness. 

The Cymulate Security Validation Platform, enables organizations to test and optimize runtime security through simulated cyberattacks in cloud, container, and hybrid environments. 

cymulate dashboard

The platform simulates real-world threats (e.g., malware infections, privilege escalation, container breakouts) in a controlled environment to assess if runtime security tools detect and respond correctly. If threats go unnoticed, security teams can identify gaps and refine configurations. 

  • Continuous validation across cloud & hybrid setups: Cymulate validates security controls across applications, containers, and cloud workloads, ensuring consistent runtime defense in on-premises, multi-cloud, and hybrid infrastructures. 
  • Benefits of breach and attack simulation (BAS): Regular runtime security testing helps organizations identify misconfigurations, fine-tune detection rules, and reduce false positives/negatives. This continuous feedback loop strengthens security posture and improves response readiness. 
  • Integration with DevSecOps & CI/CD: Organizations can automate Cymulate simulations in CI/CD pipelines or staging environments, treating security tests like unit tests. Failed tests trigger immediate remediation, ensuring proactive detection and rapid issue resolution before attackers can exploit vulnerabilities. 
Book a Demo