JFrog Runtime delivers deep security and operational insights for Kubernetes environments. Powered by JFrog’s end-to-end security, it ensures that Artifactory remains the single source of truth for binary management. The platform detects vulnerabilities, integrity violations, and untrusted registries in real time, continuously monitoring workloads and containers to help security and DevOps teams mitigate threats. By flagging unauthorized images, it prevents unverified code execution. Seamless integration with JFrog Artifactory and Xray extends security from pre-deployment to live runtime environments.
Before You Begin
It is essential you have:
- Artifactory version 7.77.20
- Xray version 3.104.08
How JFrog Runtime Collects Information
JFrog Runtime acquires its data through two primary mechanisms: the JFrog Platform and dedicated sensors deployed within customer clusters.
JFrog Platform Integration
JFrog Runtime integrates with the broader JFrog Platform, which includes Artifactory, Xray, and Advanced Security. This integration allows it to:
- Correlate runtime artifacts with their sources in Artifactory for complete trust in your Runtime environment.
- Enrich runtime data with security insights from Xray, identifying vulnerabilities and malicious packages on an ongoing basis based on JFrog Catalog and JFrog research information.
- Aggregate and analyze data for security triaging and prioritization.
Runtime Sensors Installed in Customer Clusters
Within Kubernetes environments, JFrog Runtime deploys specialized sensors to collect real-time runtime data. These sensors:
- Monitor running processes, file access, and kernel activity using eBPF technology.
- Detect security threats and integrity violations in real time.
- Transmit collected data securely to the Runtime Service within the JFrog Platform for further analysis.
Runtime Modes of Deployment
JFrog Runtime offers two modes of deployment, each designed for different levels of security coverage and cost considerations.
Runtime Integrity (Controller-only)
Runtime Integrity enables communication with the Kubernetes API. It tracks Kubernetes cluster activity, including resource execution and orchestration, and collects data on Nodes, Workloads, Pods, and Containers.
Runtime Integrity provides foundational security insights by:
- Communicating directly with the Kubernetes controller API.
- Focusing on monitoring Kubernetes cluster resources such as Nodes, Workloads, Pods, and Containers.
Runtime Impact (Controller + Sensors)
Runtime Impact installs on each node within a Kubernetes cluster an eBPF sensor for capturing detailed runtime behavior at the process and file level. It sends collected data to the Runtime Service for security analysis and is deployed via Kubernetes DaemonSets with host privileges.
Runtime Impact delivers a granular and comprehensive runtime security assessment by:
- Deploying a sensor on every cluster node for deeper visibility.
- Monitoring container runtime behavior, process executions, and file interactions.
Where Runtime Fits in the JFrog Security Timeline
Stage | Runtime' Role |
---|---|
Production & Runtime Security | Provides real-time monitoring of your clusters for running images, workloads, and processes. Detects running vulnerabilities, unauthorized processes, and integrity violations. Prioritizes security incidents by determining if vulnerable code is actively loaded into memory. |
Install Runtime
The Runtime installation instructions can be found here.
Business Needs for JFrog Runtime
As organizations increasingly adopt Kubernetes and cloud-native architectures, securing the runtime environment becomes as critical as pre-deployment protection. JFrog Runtime extends security into live environments, ensuring continuous monitoring, trust validation, and real-time threat detection. Key concerns include:
- Continuous Runtime Security & Threat Detection
Traditional security measures focus on static analysis, but runtime threats emerge dynamically. JFrog Runtime provides real-time monitoring of running workloads, processes, and file activity to detect security risks as they occur, preventing unauthorized code execution and integrity violations. - Trust Validation for Deployed Artifacts
Organizations need assurance that only trusted and verified artifacts run in production. Runtime correlates live images with their source in JFrog Artifactory, flagging untrusted registry usage, image tampering, and discrepancies between stored and deployed artifacts. - Prioritizing Real, Exploitable Vulnerabilities
Security teams are often overwhelmed by vulnerability alerts that lack context. JFrog Runtime analyzes whether vulnerable code is actively loaded into memory, reducing false positives and prioritizing threats that pose immediate risks to running applications. - Visibility & Compliance for Kubernetes Security
Maintaining security visibility across distributed Kubernetes clusters is a challenge. Runtime provides blast radius analysis, workload risk insights, and integrity monitoring, helping organizations enforce security policies, meet compliance standards, and respond quickly to incidents. - Reducing Operational Overhead for DevOps & Security Teams
Manual runtime security management slows down operations and increases risk. JFrog Runtime automates security policy enforcement, alerting, and event-driven workflows, integrating seamlessly with existing DevSecOps pipelines for efficient risk mitigation.