Aqua Blog
Expert insight, best practices and advice on cloud native security, trends, threat intelligence and compliance
A Closer Look Into the NSA Kubernetes Hardening Guide

A Closer Look Into the NSA Kubernetes Hardening Guide

In August, the National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) released their Kubernetes Hardening Guidance. As Kubernetes continues to rapidly gain adoption, it’s good to see government organizations, such as the NSA, providing guidance on how to secure this critical …

Continue reading ›
Using CO:RE to Achieve Portable Tracee eBPF Code

Using CO:RE to Achieve Portable Tracee eBPF Code

One of the biggest challenges of eBPF development is distribution of your eBPF project. With so many different versions of the Linux kernel out in the wild, it seems like an impossible task to compile your eBPF program against all of them to ensure compatibility. However, by using CO:RE, a feature of libbpf, this gets …

Continue reading ›
Advanced Persistent Threat Techniques Used in Container Attacks

Advanced Persistent Threat Techniques Used in Container Attacks

This blog was co-authored with Itamar Maouda, security researcher at Aqua Security

Aqua’s Team Nautilus detected an intensive campaign targeting cloud native environments that uses advanced persistent threat (APT) techniques usually leveraged by nation-state threat actors. As part of the campaign, the attackers used …

Continue reading ›
A Security Review of Docker Official Images: Which Do You Trust?

A Security Review of Docker Official Images: Which Do You Trust?

A key element in building secure containerized applications is to ensure that the base image that you use is well-maintained and secure. A common piece of advice is to use the Docker Official Images for this purpose. However, our research reveals that you need to be careful when using these images, as some are no …

Continue reading ›
It’s About Time for Runtime: 2021 Cloud Native Security Survey

It’s About Time for Runtime: 2021 Cloud Native Security Survey

While container environments grow in size and complexity, many misconceptions persist about securing cloud native applications. Our latest survey reveals a huge knowledge gap around runtime security, with 97% of cloud native security practitioners still unaware of crucial container security principles. Here are the …

Continue reading ›
Top 10 Kubernetes Application Security Hardening Techniques

Top 10 Kubernetes Application Security Hardening Techniques

One of the main challenges developers face is how to manage security risks when deploying applications to Kubernetes clusters. A great way to address this early is by applying security hardening to the application manifests during the development process. In this post, we run down 10 ways that developers can apply …

Continue reading ›
Securing Cloud Native Applications: Your Checklist

Securing Cloud Native Applications: Your Checklist

Cloud native development brings tremendous benefits of speed and agility, but existing security approaches break down as organizations migrate their workloads to containers. What fundamental capabilities do you need to secure modern applications deployed in these increasingly dynamic environments? Use our cloud native …

Continue reading ›
Threat Alert: Supply Chain Attacks Using Container Images

Threat Alert: Supply Chain Attacks Using Container Images

Team Nautilus, Aqua Security’s threat research team, has uncovered several supply chain attacks that use malicious container images to compromise their victim. These five container images were found on Docker Hub, which we scan daily for signs of malicious activity. The images hijack organizations’ resources to mine …

Continue reading ›
Kubernetes Version 1.22: Security Features You Need to Know

Kubernetes Version 1.22: Security Features You Need to Know

Even with Kubernetes’ new, longer release cycle in place, it doesn’t seem long since the last version came along with all its new features, but 1.22 is upon us. As ever, there’s an interesting mix of new features that are starting their maturation process as alpha releases and other features that are graduating to …

Continue reading ›
How GitLab Innovates DevOps Security Using Aqua Trivy

How GitLab Innovates DevOps Security Using Aqua Trivy

Digital leaders must adapt, scale, and fine-tune their operations and the solutions they provide to their customers to keep up with market demands. GitLab provides a complete DevOps platform in a single application to help developers and engineers across all industries to be successful. With many high-profile security …

Continue reading ›
Trivy's Journey: From Personal Project to Open Source Scanner of Choice

Trivy's Journey: From Personal Project to Open Source Scanner of Choice

Trivy is a comprehensive, easy-to-use open source vulnerability scanner for container images. Since its introduction two years ago, the project has gained a broad following among open source community members. I’m excited to share that it has now become the first container image vulnerability scanner to surpass 8,000 …

Continue reading ›