This document discusses using Linux Integrity Mechanisms (IMA) to protect container runtime executables from tampering. It begins with an overview of container technology and a motivating example attack (CVE-2019-5736). It then provides background on IMA and how it can be used to measure and appraise the integrity of container runtime executables. Specifically, it details using IMA rules and digital signatures to enforce that the runc binary has not been tampered with. This helps prevent attacks that aim to overwrite the runc binary and escape the container.