Aqua Blog
Expert insight, best practices and advice on cloud native security, trends, threat intelligence and compliance
Shifting Left: Infrastructure as Code security with Trivy

Shifting Left: Infrastructure as Code security with Trivy

One of the great security benefits of the move to cloud native development is the increased use of Infrastructure as Code (IaC) to describe computing environments. Once things are described as code, we can shift left and secure our environments before they’re deployed. As a major new feature, the latest version of …

Continue reading ›
How Forum Engineering Secures its AI Solution with Aqua

How Forum Engineering Secures its AI Solution with Aqua

Digital transformation is fundamentally changing how organizations compete and engage with customers, even redefining traditional labor-intensive industries. A great example of this is Forum Engineering, a staffing company from Japan, which developed an AI-based Software-as-a-Service solution to stay ahead of the …

Continue reading ›
How Do Containers Contain? Container Isolation Techniques

How Do Containers Contain? Container Isolation Techniques

If you work with containers long enough, you already know that containers should not be considered as security boundaries. In this blog, we’ll explore how different container isolation techniques intend to provide a solution to this problem, and whether their strengths and weaknesses make them a practical choice.

Continue reading ›
Container Isolation: Is a Container a Security Boundary?

Container Isolation: Is a Container a Security Boundary?

One of the fundamental questions in container security, since the early days of Docker, is whether a container constitutes a security boundary. In this first part of a two-blog discussion of containers and isolation, we take a look at the security boundary question, along with key examples. Part II will continue with …

Continue reading ›
Taking IaC Security to the Next Level: Why TFsec Joined Aqua

Taking IaC Security to the Next Level: Why TFsec Joined Aqua

Coming from a software engineering background, we built tfsec to help developers like us scan their infrastructure-as-code (IaC) templates and prevent cloud misconfigurations from being deployed. Teams at the world’s leading organizations are now leveraging tfsec to “shift left” and introduce security earlier in the …

Continue reading ›
Innovation in the Hands of Threat Actors: Analyzing Supply Chain Attacks

Innovation in the Hands of Threat Actors: Analyzing Supply Chain Attacks

Hot on the heels of highly publicized attacks like those affecting Solarwinds and Codecov, organizations are taking a firm stance on software supply chain security. But in order to be effective at securing the slurry of artifacts that get incorporated into cloud native applications, we must first understand the enemy. …

Continue reading ›
Detect and Prevent Exploits in Runtime with Vulnerability Shielding

Detect and Prevent Exploits in Runtime with Vulnerability Shielding

A single vulnerability in one of the code dependencies can put an entire application at risk, yet 48% of organizations knowingly push vulnerable code into production regularly. With a heavy reliance on open source software to build applications, patching a myriad of vulnerabilities has become an extremely hard and …

Continue reading ›
Top 22 Docker Security Best Practices: Ultimate Guide

Top 22 Docker Security Best Practices: Ultimate Guide

While Docker has become synonymous with containers, various container tools and platforms have emerged to make the process of developing and running containers more efficient. Still, a lot of the same principles around Docker security apply for protecting container-based applications built with other tools as well. We …

Continue reading ›
What’s New in the Docker and Kubernetes CIS Benchmarks

What’s New in the Docker and Kubernetes CIS Benchmarks

One of the challenges with container security and its standards is keeping current with new releases and products. New versions of the Docker and Kubernetes CIS Benchmarks were released recently to capture changes in the new versions of those projects, both to keep things current and to expand coverage to help people …

Continue reading ›
Cloud Native Threat Report: How Quickly Will You Be Attacked?

Cloud Native Threat Report: How Quickly Will You Be Attacked?

The cloud native threat landscape is evolving fast, with 50% of vulnerable targets getting attacked within only one hour. While adversaries are constantly advancing their techniques to craft more sophisticated and targeted attacks, organizations are leaving themselves exposed. Aqua’s 2021 Cloud Native Threat Report

Continue reading ›
Provision Aqua on AWS CloudFormation Public Registry with IaC Automation

Provision Aqua on AWS CloudFormation Public Registry with IaC Automation

The availability of AWS CloudFormation Public Registry makes it possible to manage Aqua components using Infrastructure as Code (IaC) workflows just as easily as AWS resource types. You can now seamlessly automate how you deploy and update Aqua as native resource types across multiple accounts and regions.

Continue reading ›