Aqua Blog
Expert insight, best practices and advice on cloud native security, trends, threat intelligence and compliance
Privilege Escalation from Node/Proxy Rights in Kubernetes RBAC

Privilege Escalation from Node/Proxy Rights in Kubernetes RBAC

One of the side effects of Kubernetes’ rich API and extensive functionality is that sometimes there are security implications to granting users permissions. Security architects should be aware of these side effects when designing platforms that use Kubernetes. In recent research with Iain Smart of NCC Group, we looked …

Continue reading ›
Empowering Developers to Succeed: How and Why I Joined Aqua

Empowering Developers to Succeed: How and Why I Joined Aqua

For the past few years, I’ve been dedicating my career to helping developers improve their skills and discover useful tools and communities. As the industry is moving from customer-driven to community-focused development, Aqua is embracing this shift. I’m excited to take on the role of Aqua’s developer advocate to …

Continue reading ›
Adopting Zero Trust in Kubernetes: The Fundamentals

Adopting Zero Trust in Kubernetes: The Fundamentals

In late January, the White House published a memo that lays the groundwork for creating a zero-trust architecture for federal agencies. With renewed attention from the US government, zero-trust networking is an area that many organizations are focusing on to improve their security posture. With that focus, it makes …

Continue reading ›
Securing GitHub Actions with Trivy and Cosign

Securing GitHub Actions with Trivy and Cosign

One of the advantages of automated CI/CD pipelines is that they’re a great place to implement regular security controls and checks. Using GitHub Actions, it’s easy to improve the security of your containers by automating vulnerability scanning and digital signing of container images on a regular basis. In this post, …

Continue reading ›
Identify Security Risks in AWS CloudFormation Templates with Trivy

Identify Security Risks in AWS CloudFormation Templates with Trivy

Aqua Security’s open source project Trivy now includes scanning of AWS CloudFormation templates to help developers better identify and remediate security issues within infrastructure as code (IaC) templates. Building on the technology and rule sets behind our popular open source project tfsec, Trivy now allows …

Continue reading ›
Why Agent vs Agentless is a False Choice

Why Agent vs Agentless is a False Choice

There are important decisions to be made across the entire journey to implementing a cloud native security strategy, from initial visibility to automation of prevention and response.

This blog post will guide you through the implementation decisions across that journey, from initial, frictionless API based visibility …

Continue reading ›
Winning with Cloud Native Security: Joe Sexton on Why He Joined Aqua's BOD

Winning with Cloud Native Security: Joe Sexton on Why He Joined Aqua's BOD

I’m thrilled to be joining the Aqua board of directors to drive the company’s aggressive growth and help enterprises all over the world accelerate their cloud journeys with a security-first mindset. Cloud native security is on a fast track to become a massive, important market, and I see Aqua as its clear winner.

Continue reading ›
RBAC Virtual Verbs: Teaching Kubernetes to Educate Dolphins

RBAC Virtual Verbs: Teaching Kubernetes to Educate Dolphins

Kubernetes’ role-based access control (RBAC) system is a cornerstone of cluster security. Most clusters use RBAC to determine which users have access to specific operations, and its core elements are well covered in the Kubernetes documentation. However, there are some less well-known features that could be relevant …

Continue reading ›
Software Supply Chain Attacks: 2021 in Review

Software Supply Chain Attacks: 2021 in Review

As CI/CD pipelines have become an increasingly popular attack vector, 2021 saw a huge rise in software supply chain attacks. With their number more than tripling in the past year, securing the software delivery process is one of the most urgent needs. In our latest study, we examine the top supply chain security …

Continue reading ›
CVE-2022-0185 in Linux Kernel Can Allow Container Escape in Kubernetes

CVE-2022-0185 in Linux Kernel Can Allow Container Escape in Kubernetes

Last week, a new high-severity CVE was released that affects the Linux kernel. This vulnerability provides an opportunity for an attacker who has access to a system as an unprivileged user to escalate those rights to root. To do this, the attacker must have a specific Linux capability, CAP_SYS_ADMIN, which reduces the …

Continue reading ›
Transforming Cloud Native Security: The Allure of Becoming Aqua's CISO

Transforming Cloud Native Security: The Allure of Becoming Aqua's CISO

Cybersecurity has always been to me the most fascinating thing on the planet. I was lucky to discover my passion and get exposed to the security world early on, when the industry was just taking shape. More than two decades later, as companies are rapidly shifting to the cloud and deploying digital services, I’m …

Continue reading ›