Aqua Blog
Expert insight, best practices and advice on cloud native security, trends, threat intelligence and compliance
CloudSploit Delivers Best Practices for Oracle Cloud Security

CloudSploit Delivers Best Practices for Oracle Cloud Security

Our customers challenged us to add Oracle Cloud Infrastructure (OCI) security to the list of public clouds that Aqua CSPM (aka CloudSploit) covers – and make it seamless. That meant giving our customers a singular view into the public cloud platforms they use, while maintaining the same level of control with …

Continue reading ›
Aqua CSP Globally Whitelisted for ARO: Red Hat OpenShift on Azure

Aqua CSP Globally Whitelisted for ARO: Red Hat OpenShift on Azure

To harness the power of a secure and mature Kubernetes platform, to increase their development teams’ productivity, and to lower costs, organizations choose to use Red Hat OpenShift. To achieve these goals, many deploy Red Hat OpenShift on-premise, which requires allocating resources to manage the infrastructure and …

Continue reading ›
Kube-Query: A Simpler Way to Query Your Kubernetes Clusters

Kube-Query: A Simpler Way to Query Your Kubernetes Clusters

osquery is a SQL powered operating system instrumentation, monitoring, and analytics tool that exposes an operating system as a relational database. Using SQL, you can run queries to gain the status of your entire infrastructure. What’s cool about osquery is how easy it is to use the SQL query interface. kube-query is …

Continue reading ›
Threat Alert: Attack Vector Uses Containers to Methodically Target Cloud Resources

Threat Alert: Attack Vector Uses Containers to Methodically Target Cloud Resources

The Aqua Research team has identified a new attack vector that points to an evolution in attacks’ techniques and capabilities. In these attacks, the attackers leverage containers as an entry point to discover and spread to other resources used within cloud accounts. The attackers deployed a clean Ubuntu container, …

Continue reading ›
Cloud Native Security Best Practices: Using Kubernetes Admission Controller for Image Assurance

Cloud Native Security Best Practices: Using Kubernetes Admission Controller for Image Assurance

With cloud native technologies quickly evolving and with their high adoption rate, security practices are falling behind, are not being fully applied, and in some cases, applied too late. As a result, customers pay a high, albeit avoidable price. Aqua Cloud Native Security Platform uniquely addresses these challenges …

Continue reading ›
What You Need to Know About AWS Lambda Functions Risk Mitigation

What You Need to Know About AWS Lambda Functions Risk Mitigation

With serverless functions architecture gaining in popularity, it is also becoming clear that the architecture is not without its security drawbacks. Overly permissive permissions, vulnerability in the functions’ code, and embedded secrets could all be exploited. Despite being event-triggered and ephemeral by nature, …

Continue reading ›
Cloud Native Best Practices: Security Policies in CI/CD Pipelines

Cloud Native Best Practices: Security Policies in CI/CD Pipelines

With the continual leftward shifting movement of traditional DevOps responsibilities, organizations can now detect security issues earlier in the software development lifecycle (SDLC). Using CI/CD tools such as Jenkins, GoCD, or Bamboo, organizations can continually develop, test, and ship applications. As containers …

Continue reading ›
Threat Alert: Exploiting Open Docker Daemons for DDoS Attacks

Threat Alert: Exploiting Open Docker Daemons for DDoS Attacks

Aqua’s research team continuously investigates and analyzes the anatomy of new attacks in the wild. Recently, we identified attacks that exploited misconfigured open Docker daemons, where attackers were actively using this attack vector to hijack environments in order to launch targeted DDoS attacks. Each of the …

Continue reading ›
Announcing General Availability of CloudSploit by Aqua for GCP

Announcing General Availability of CloudSploit by Aqua for GCP

Aqua Security announced the general availability of CloudSploit by Aqua for Google Cloud Platform (GCP). This release comes after an extended beta program, during which we worked closely with our customers to develop and deliver a robust set of out-of-the-box policies for GCP. This release also includes a Center for …

Continue reading ›
A Brief History of Containers: From the 1970s Till Now

A Brief History of Containers: From the 1970s Till Now

When we first published this blog post in 2017, the technology landscape for containers was quite different than it is today. Over the past few years, we have seen significant changes take place that have affected, and continue to affect how Containers are adopted. Read on to understand the changes and developments we …

Continue reading ›
A Deep Dive into eBPF: The Technology that Powers Tracee

A Deep Dive into eBPF: The Technology that Powers Tracee

Tracee, by Aqua Security, is an open source, lightweight, and easy to use container and system tracing utility. Tracee allows you to trace events that were generated within containers only, without needing to filter out other system processes.

Continue reading ›