Aqua Blog

Cloud compliance

New in Trivy: Kubernetes CIS Benchmark Scanning

New in Trivy: Kubernetes CIS Benchmark Scanning

CIS (Center for Internet Security) compliance scanning is a standard in Kubernetes (K8s) security and is widely adopted across the industry with implementations in several security scanners. Kube-bench, an open source project developed by Aqua Security was one of the first projects to provide Kubernetes CIS compliance …

Continue reading ›
White House Shifts Cybersecurity Strategy to Drive Resilience

White House Shifts Cybersecurity Strategy to Drive Resilience

This week, the White House released its updated National Cybersecurity Strategy detailing the comprehensive approach the U.S. Government’s Administration is taking to cybersecurity. 

Continue reading ›
Achieve Software Supply Chain Compliance with US Executive Order 14028

Achieve Software Supply Chain Compliance with US Executive Order 14028

Thanks to many factors like the rise of the cloud infrastructure, the abundance of prebuilt open-source code, and process improvements in DevOps, innovating with software is happening faster than ever. The software supply chain is the assembly line for these technological innovations and can be thought of as any …

Continue reading ›
Audit Your Software Supply Chain for CIS Compliance with Chain-bench

Audit Your Software Supply Chain for CIS Compliance with Chain-bench

The Center for Internet Security (CIS) has recently released the Software Supply Chain Security Guide, a set of practical, community-developed best practices for securing software delivery pipelines. As an initiator and one of the main contributors to this comprehensive and much-needed guidance, we at Aqua aim to help …

Continue reading ›
What You Need to Know About PCI DSS Compliance in Cloud Native

What You Need to Know About PCI DSS Compliance in Cloud Native

The Payment Card Industry Data Security Standard (PCI DSS) is a well-known compliance framework for any organization handling payment card data. However, translating the PCI DSS requirements into the world of containers and Kubernetes can be overwhelming. In this post, we break down how containerized applications …

Continue reading ›
Automate Cloud VM Compliance with Cloud Provider Tags and Labels

Automate Cloud VM Compliance with Cloud Provider Tags and Labels

Ensuring and monitoring compliance and security best practices policies at runtime can often be a barrier to both broader adoption of cloud native technologies and moving more cloud native applications into production at scale. Cloud provider attributes — tags, labels, and resource groups — are useful tools for …

Continue reading ›
What’s New in the Docker and Kubernetes CIS Benchmarks

What’s New in the Docker and Kubernetes CIS Benchmarks

One of the challenges with container security and its standards is keeping current with new releases and products. New versions of the Docker and Kubernetes CIS Benchmarks were released recently to capture changes in the new versions of those projects, both to keep things current and to expand coverage to help people …

Continue reading ›
Automating CIS Kubernetes Benchmark Compliance with Starboard Operator

Automating CIS Kubernetes Benchmark Compliance with Starboard Operator

Last year, we first released Starboard Operator, which automates vulnerability scanning and configuration auditing of Kubernetes workloads. We’re now pleased to announce the latest release (v0.10), which is focused on infrastructure and adds CIS Kubernetes Benchmark testing using kube-bench. The operator automatically …

Continue reading ›
How Neat Commerce Ensures Regulatory Compliance with Aqua

How Neat Commerce Ensures Regulatory Compliance with Aqua

The challenges of maintaining security and numerous compliance requirements are a very steep hill to climb for international business services providers. The latest example comes from an organization in Hong Kong called Neat, this financial services technology company has several offerings, including secure payment …

Continue reading ›
Visualize and Prioritize Risks in Kubernetes with Aqua Risk Explorer

Visualize and Prioritize Risks in Kubernetes with Aqua Risk Explorer

If you’re running workloads on Kubernetes, one of the toughest things to understand is where you have security gaps. Yes, there are CIS benchmarks and configurations to tweak, but they are generalized and won’t highlight the risks in workloads that are actually running in your clusters. The Aqua Risk Explorer’s …

Continue reading ›
Cloud Native Security Best Practices: Using Kubernetes Admission Controller for Image Assurance

Cloud Native Security Best Practices: Using Kubernetes Admission Controller for Image Assurance

With cloud native technologies quickly evolving and with their high adoption rate, security practices are falling behind, are not being fully applied, and in some cases, applied too late. As a result, customers pay a high, albeit avoidable price. Aqua Cloud Native Security Platform uniquely addresses these challenges …

Continue reading ›