Aqua Blog

Cloud Native Security

What You Need to Know About PCI DSS Compliance in Cloud Native

What You Need to Know About PCI DSS Compliance in Cloud Native

The Payment Card Industry Data Security Standard (PCI DSS) is a well-known compliance framework for any organization handling payment card data. However, translating the PCI DSS requirements into the world of containers and Kubernetes can be overwhelming. In this post, we break down how containerized applications …

Continue reading ›
RATs in the Cloud: Kubernetes UI Tools Turn into a Weapon

RATs in the Cloud: Kubernetes UI Tools Turn into a Weapon

For many years, threat actors have been using legitimate remote access tools (RATs) in their campaigns, tricking users into installing them to get full control over the victims’ systems. Similarly, in the cloud native world, attackers are increasingly targeting user interface (UI) tools to gain access to Docker and …

Continue reading ›
Tracee Runtime Security Series: Writing Custom Tracee Rules

Tracee Runtime Security Series: Writing Custom Tracee Rules

As an open source runtime security tool, Tracee provides a base rule set that can detect a variety of attacks. However, there’s often the need to add new rules either to contribute to the project or to provide specific rules for your environment. Because Tracee allows for new rules to be written in Rego and Golang, …

Continue reading ›
What is a CNAPP and How to Choose the Right One

What is a CNAPP and How to Choose the Right One

A prospect’s CISO recently asked me: “I’m facing a growing stream of vulnerabilities coming from our CI/CD pipelines on the one hand, while our SecOps team is flooded with alerts and configuration issues from our production environment. How do I reconcile those separate streams and focus on what’s really important?

Continue reading ›
Unveiling CNDR: eBPF-Based Cloud Native Detection and Response

Unveiling CNDR: eBPF-Based Cloud Native Detection and Response

Today, Aqua announced the addition of a new, industry-leading detection and response capability to its Cloud Native Application Protection Platform (CNAPP), called Cloud Native Detection and Response (CNDR). CNDR uses real-time behavioral indicators from Aqua’s cyber research team, Nautilus, to identify zero-day …

Continue reading ›
Securing Cloud Native Applications: Your Checklist

Securing Cloud Native Applications: Your Checklist

Cloud native development brings tremendous benefits of speed and agility, but existing security approaches break down as organizations migrate their workloads to containers. What fundamental capabilities do you need to secure modern applications deployed in these increasingly dynamic environments? Use our cloud native …

Continue reading ›
Cloud Native Threat Report: How Quickly Will You Be Attacked?

Cloud Native Threat Report: How Quickly Will You Be Attacked?

The cloud native threat landscape is evolving fast, with 50% of vulnerable targets getting attacked within only one hour. While adversaries are constantly advancing their techniques to craft more sophisticated and targeted attacks, organizations are leaving themselves exposed. Aqua’s 2021 Cloud Native Threat Report

Continue reading ›
Provision Aqua on AWS CloudFormation Public Registry with IaC Automation

Provision Aqua on AWS CloudFormation Public Registry with IaC Automation

The availability of AWS CloudFormation Public Registry makes it possible to manage Aqua components using Infrastructure as Code (IaC) workflows just as easily as AWS resource types. You can now seamlessly automate how you deploy and update Aqua as native resource types across multiple accounts and regions.

Continue reading ›
Supply Chain Attacks and Cloud Native: What You Need to Know

Supply Chain Attacks and Cloud Native: What You Need to Know

The past couple of years have seen a rise in software supply chain attacks, with the most salient example being the Solarwinds attack. As production environments have gained multiple layers of protection, and much of the attention of security teams, malicious actors have set their sights on “poisoning the well”, i.e., …

Continue reading ›
Bridging the Cloud Native Security Gap: Why Darkbit Joined Aqua

Bridging the Cloud Native Security Gap: Why Darkbit Joined Aqua

With extensive hands-on experience in cloud native security, we founded Darkbit to help organizations address security risks in their ever-growing and changing cloud environments. As the next chapter in our journey, we’re now joining forces with Aqua to realize this shared vision, helping deliver best in class …

Continue reading ›
Improving Your K8s Security: Upgrade Your Clusters and Avoid Exposure

Improving Your K8s Security: Upgrade Your Clusters and Avoid Exposure

With the move to cloud native development comes potentially increased risk of services that are exposed to the Internet and can easily be discovered by attackers. When combined with the fast pace of change in Kubernetes versions, there’s real risk of being one vulnerability away from a security incident. Recently I …

Continue reading ›