Aqua Blog
Expert insight, best practices and advice on cloud native security, trends, threat intelligence and compliance
Mitigating High Severity RunC Vulnerability (CVE-2019-5736)

Mitigating High Severity RunC Vulnerability (CVE-2019-5736)

Yesterday it was disclosed that a new high severity (CVSS score 7.2)vulnerability (CVE-2019-5736) was found in runc, that allows an attacker to potentially compromise the container host.Patches are already available from most providers (see below). Aqua customers can also prevent this vulnerability from being …

Continue reading ›
Amazon Firecracker: Isolating Serverless Containers and Functions

Amazon Firecracker: Isolating Serverless Containers and Functions

Infrastructure protection, sandboxed containers, MicroVM hypervisors– these are interchangeable terms describing emerging technologies to isolate micro-services from their underlying infrastructure. These isolation technologies aim to protect the underlying host that runs containers and functions against malicious …

Continue reading ›
Kubernetes Secrets: How to Create, Use, and Secure Them

Kubernetes Secrets: How to Create, Use, and Secure Them

Kubernetes applications frequently need access to confidential information like API keys or database credentials. Storing this data directly in container images or environment variables is not advisable and can create severe security risks. 

Continue reading ›
Impressions from KubeSec, The First Enterprise Kubernetes Security Summit

Impressions from KubeSec, The First Enterprise Kubernetes Security Summit

On Monday, “day 0” of this year’s KubeCon/CloudNativeCon, we held our first KubeSec Enterprise Summit event, co-located with KubeCon under the auspices of the CNCF. Aqua hosted the event together with our partners Red Hat and AWS. The event was over-subscribed, and we had to make special allowance for late …

Continue reading ›
Istio Security: Zero-Trust Networking

Istio Security: Zero-Trust Networking

This is the second in our series of blog posts on Istio, and will focus on Istio’s security features: what they are, how they work and how they help protect your workloads and your data.

Building, deploying and maintaining secure, cloud native software requires multiple overlapping solutions at different stages of the …

Continue reading ›
Severe Privilege Escalation Vulnerability in Kubernetes (CVE-2018-1002105)

Severe Privilege Escalation Vulnerability in Kubernetes (CVE-2018-1002105)

Earlier this week, a severe vulnerability in Kubernetes (CVE-2018-1002105) was disclosed that allows an unauthenticated user to perform privilege escalation and gain full admin privileges on a cluster. The CVE was given the high severity score of 9.8 (out of 10) and it affects all Kubernetes versions from 1.0 onwards, …

Continue reading ›
Enterprise Kubernetes Security at KubeCon + CloudNativeCon

Enterprise Kubernetes Security at KubeCon + CloudNativeCon

KubeCon + CloudNativeCon North America is just around the corner, and looks like it is going to break attendance records, becoming the largest gathering of the Kubernetes and cloud native community ever!

Such massive adoption by large organizations in their production deployments, brings with it security and …

Continue reading ›
How to Secure Amazon ECS Workloads On Demand

How to Secure Amazon ECS Workloads On Demand

In support of Amazon’s announcement this week at re:Invent surrounding the new AWS Container Marketplace, we’ve made the Aqua Container Security Platform available for on-demand consumption (pay as you go), via the newly minted AWS Container category in the Marketplace. 

We have several new listings in the AWS …

Continue reading ›
Serverless Security: The Importance of FaaS Risk Assessment

Serverless Security: The Importance of FaaS Risk Assessment

In my previous blog, I discussed the serverless services spectrum and the unique security considerations of serverless functions. In this post, I’d like to elaborate on the importance of preliminary risk assessment checks and their contribution to an effective security strategy, based on lessons learned in …

Continue reading ›
Istio: The Enterprise Upgrade Path to Microservices

Istio: The Enterprise Upgrade Path to Microservices

Istio, Google’s open source project for large scale, containerized application management was released in May 2017 and has undergone rapid development since then, culminating in the landmark 1.0 release in July 2018. In this blog post we will be exploring what Istio is, how it works and how to adopt it. In subsequent …

Continue reading ›
Streamline Image Vulnerability Management for OpenShift Image Streams

Streamline Image Vulnerability Management for OpenShift Image Streams

In traditional cloud native environments, actions such as building and deploying applications will usually involve working directly with images hosted in one or more registries. Customers wishing to track changes in those images, in order to identify security and compliance issues, would need to set up an automatic …

Continue reading ›