RHACS detection of malicious software based on observation of runtime behavior
Issue
RHACS does detection of malicious software based on observation of runtime behavior
RHACS has avoided any kind of file-hash-signature approach because the technique is resource intensive, generally ineffective today, and misses the point about containers and Kube-native development.
Environment
Red Hat Advanced Cluster Security for Kubernetes [RHACS]
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.