What Is a Workload (Computing)? Definition, Types & Cloud Workload Security | Checkmarx Glossary

Webinar Series | Secure Coding in the AI Era with Developer Assist Agent

Secure Your Spot

Glossary

Workload (Computing): Definition, Types & Security

Workload: a concise definition

In computing, a workload represents the unit of work an application or service performs and the resources required to perform it. In the cloud, it includes any app, function, or service running on VMs, containers, or serverless platforms.

Workload vs. application vs. use case

  • Application: the software that processes something (e.g., an order‑processing microservice).
  • Workload: the processing being done and the resources consumed (e.g., 5k requests/min, 4 vCPU, 8 GB RAM).
  • Use case: the business reason for running it (e.g., checkout and payment).

Common workload types

  • Transactional: latency‑sensitive APIs and web apps.
  • Batch: scheduled reporting, ETL jobs.
  • Streaming: event ingestion, real‑time analytics.
  • AI/ML: model training and inference.
  • Data processing: pipelines, warehousing, lakehouse jobs.
  • Serverless & microservices: fine‑grained, autoscaled functions and services.

How workloads are measured

Key indicators include throughput and concurrency (RPS/QPS), resource consumption (vCPU, memory, I/O, network), latency and tail performance (p95/p99), and error rates/SLOs.

Cloud workloads

In the cloud, workloads span VMs, containers, and serverless functions and often compose into cloud‑native architectures.
See also: Cloud Computing, Cloud‑Native, Container Security, CI/CD Security.

Kubernetes workloads (terminology)

In Kubernetes (K8s), “workload” refers to applications deployed via workload resources such as Deployments (typically stateless), StatefulSets (stable identity and storage), DaemonSets (one per node), and Jobs/CronJobs for run‑to‑completion tasks.
See: Kubernetes (K8s): https://checkmarx.com/glossary/kubernetes-k8s/

Why workloads matter for AppSec

Workloads process code, data, and secrets – making them prime targets.

Security should start in development and continue through deployment:

For end‑to‑end coverage, see Code‑to‑Cloud Security and Software Supply Chain Security:

Checklist: Best practices to secure workloads

  • Map critical workloads and owners; tag assets by environment and sensitivity.
  • Continuously correlate & prioritize with ASPM to reduce noise and focus on real risk.
  • Automate in the SDLC with SAST/SCA gating in CI/CD.
  • Lock down IaC: least privilege, network policies, encryption by default.
  • Harden containers: minimal base images, SBOMs, immutability.
  • Protect secrets: remove hardcoded credentials; use a vault.

FAQ

What is a workload in computing?

The work your app/service executes plus the compute, memory, storage, and network it consumes—tracked via throughput, latency, and SLOs.

What are Kubernetes workloads?

Apps represented by Deployments, StatefulSets, DaemonSets, and Jobs/CronJobs.

How do developers measure workload health?

RPS/QPS, p95/p99 latency, CPU/memory saturation, error rate, queue depth, and SLO adherence.

How do I secure workloads in the SDLC?

Automate SAST/SCA, IaC/K8s checks, and container scanning on every PR; enforce policy; manage secrets; correlate with ASPM.

Read More