Aqua Blog

Cloud Security CSPM

Infographic: What is CSPM and Why You Need It

Infographic: What is CSPM and Why You Need It

As a major trend in 2020, enterprises have been increasingly adopting multi-cloud to elevate efficiency and maintain flexibility and independence. But multi-cloud environments are more complex and harder to secure, leading to more cloud service misconfigurations and breaches. Making matters worse, many organizations …

Continue reading ›
Auto-Remediation for Secure Configuration in Azure Cloud

Auto-Remediation for Secure Configuration in Azure Cloud

Each day, Aqua monitors millions of cloud infrastructure changes for misconfigurations, and control-plane events for security issues or malicious activity in our users’ cloud accounts. But we’ve learned that just identifying misconfigurations is not enough to protect cloud assets in a modern fast-paced environment. …

Continue reading ›
Achieving a Self-Securing Infrastructure in Public Clouds

Achieving a Self-Securing Infrastructure in Public Clouds

One thing that most researchers look for when investigating security breaches is whether or not there’s a common element. In the case of security breaches, the kill-chain for almost every cloud security breach we looked at involved the exploitation of misconfigured or mismanaged cloud infrastructure settings. The …

Continue reading ›
Bringing Unconstrained Flexibility to Cloud Native Security

Bringing Unconstrained Flexibility to Cloud Native Security

In the four short years since we launched Aqua and started our cloud native journey, we have all experienced dramatic change. During this time, we brought several new products to market. We witnessed the rise of Docker, then its decline. We recognized the growing popularity of Kubernetes and pivoted our capabilities …

Continue reading ›
Mitigating High Severity CVEs Affecting SaltStack on Public Clouds

Mitigating High Severity CVEs Affecting SaltStack on Public Clouds

Two high-severity CVEs in the SaltStack platform were published last week by researchers at F-Secure. These vulnerabilities can enable remote code execution (RCE), which lets attackers remotely execute commands on the Salt leader node. This results in a full compromise of the host and can expose sensitive information …

Continue reading ›
CloudSploit Delivers Best Practices for Oracle Cloud Security

CloudSploit Delivers Best Practices for Oracle Cloud Security

Our customers challenged us to add Oracle Cloud Infrastructure (OCI) security to the list of public clouds that Aqua CSPM (aka CloudSploit) covers – and make it seamless. That meant giving our customers a singular view into the public cloud platforms they use, while maintaining the same level of control with …

Continue reading ›
What You Need to Know About AWS Lambda Functions Risk Mitigation

What You Need to Know About AWS Lambda Functions Risk Mitigation

With serverless functions architecture gaining in popularity, it is also becoming clear that the architecture is not without its security drawbacks. Overly permissive permissions, vulnerability in the functions’ code, and embedded secrets could all be exploited. Despite being event-triggered and ephemeral by nature, …

Continue reading ›
Announcing General Availability of CloudSploit by Aqua for GCP

Announcing General Availability of CloudSploit by Aqua for GCP

Aqua Security announced the general availability of CloudSploit by Aqua for Google Cloud Platform (GCP). This release comes after an extended beta program, during which we worked closely with our customers to develop and deliver a robust set of out-of-the-box policies for GCP. This release also includes a Center for …

Continue reading ›
A CloudSploit Case Study: Trek10's Three AWS Cloud Security Concerns & One Solution

A CloudSploit Case Study: Trek10's Three AWS Cloud Security Concerns & One Solution

With all the security breaches that occurred on AWS in 2017, be they caused by poorly managed Amazon S3 permissions to inadequate security group configurations, we have seen that no company or government agency is above making simple mistakes. This post will explain three areas of security we’ve noticed many AWS …

Continue reading ›
Expanding into CSPM with CloudSploit and Deepening Security for Cloud VMs

Expanding into CSPM with CloudSploit and Deepening Security for Cloud VMs

IT spend on public cloud will more than double by 2023 (IDC) and hybrid multi-clouds will soon be the more common environment for enterprises. The benefits of using cloud infrastructure including the ability to scale, ease of use and speed of application delivery are too attractive to ignore, however, the complexity …

Continue reading ›
Cloud VM Security with Aqua CSP

Cloud VM Security with Aqua CSP

We have enhanced our Cloud Native Security Platform (CSP) by adding Cloud VM protection capabilities for VMs that are not running container workloads. Aqua now provides a full-stack security solution across all workload types: VMs, containers, and serverless functions, for both Linux and Windows VMs.

Continue reading ›

Subscribe to Email Updates

Popular Posts

Filter by Topic

Show more...