Serverless Security: The Importance of FaaS Risk Assessment

Serverless functions risk

In my previous blog, I discussed the serverless services spectrum and the unique security considerations of serverless functions. In this post, I’d like to elaborate on the importance of[…]

Istio: The Enterprise Upgrade Path to Microservices

Kubernetes Security

Istio, Google’s open source project for large scale, containerized application management was released in May 2017 and has undergone rapid development since then, culminating in the landmark 1.0[…]

Streamline Image Vulnerability Management for OpenShift Image Streams

Container Security Openshift

In traditional cloud native environments, actions such as building and deploying applications will usually involve working directly with images hosted in one or more registries. Customers wishing[…]

“Thin OS” Security for Container Hosts

Container Security

In the spectrum of deployment options available for cloud native applications, the most widely used option, at least presently, is running containers on VMs that use the Linux operating system (or[…]

Securing ISV-Provided Container Images

Container security

Containers make it very easy to package and deliver applications, so it’s not surprising that many ISVs (Independent Software Providers) are leading the trend of packaging their software, whether[…]

Report by Gartner Highlights Maturing Options for Securing Containers

Container Secuirty

Gartner recently released a Technical Professional Advice report titled Container Security -- From Image Analysis to Network Segmentation, Options Are Maturing* (by Joerg Fritsch and Michael[…]

Security for Pivotal PAS and PKS

PCF Security

“When will Aqua support Pivotal Container Service (PKS)?” has become a recurring theme since we announced Aqua Security Scanner for PCF last spring. It seems many, many Pivotal Cloud Foundry PaaS[…]

Securing Serverless: Persistent Security for Ephemeral Environments

serverless2.png

Cloud-native workloads terminology is used a lot these days to describe new technologies and deployment models of applications in the cloud universe. Serverless is a notable example of such[…]

Kube-hunter - an open source tool for Kubernetes penetration testing

Kubernetes security

We just released a new free tool called kube-hunter. You give it the IP or DNS name of your Kubernetes cluster, and kube-hunter probes for security issues - it’s like automated penetration[…]

Out-of the-Box Policies Simplify Container Compliance

Container compliance policies

One of the challenges organizations have in using cloud-native technologies is in figuring out how compliance requirements translate into actionable control points. Most regulations predate[…]

Subscribe to Email Updates

Filter by Topic

Show more...