Request a Demo

You can still request to
join our Private Beta. * E-mail is mandatory.

Aqua Blog

Taking a Comprehensive Approach to Container Security in 2018 

Taking a Comprehensive Approach to Container Security in 2018 (1).png

In late 2016 we enlisted the help of security analysts and thought leaders Securosis to perform an in-depth best practices analysis of what companies should do to build a security program around[…]

Cryptocurrency Miners Abusing Containers: Anatomy of an (Attempted) Attack

Cryptocurrency Miners Abusing Containers

This isn't a story about a Docker vulnerability; it's a story about how hackers are looking for unsecured Docker deployments where they can mine cryptocurrency. You shouldn't leave your Docker[…]

Docker Security Best Practices

Docker Security best practices

I recently attended a webinar in which one of the speakers said that a ‘container is never going to be as secure as a virtual machine’. I beg to differ. Docker containers are not inherently less[…]

CVE-2016-9962: Run Container Run

BLog runc CVE
RunC Like the Wind

Recently, an interesting vulnerability was discovered (CVE-2016-9962) that enables container escape to the host. The vulnerability stems from a bug found in opencontainers' runc[…]

Cisco CloudCenter Orchestrator Docker Privilege Escalation Vulnerability Explained

blog-cisco-banner.png

Cisco announced a few days ago that it discovered and fixed a critical vulnerability in its CloudCenter Orchestrator, whereby a misconfiguration caused the Docker Engine management port to be[…]

Docker 1.10 Security Features, part 2: Authorization Plug-In

security-binary-pd-898757.jpg

In the first part of this trilogy we focused on Docker 1.10 and its seccomp capabilities. In this post we’ll explore the authorization plug-in architecture, another feature which was released as[…]

New Docker Security Features and What They Mean: Seccomp Profiles

NEW DOCKER SECURITY FEATURES AND WHAT THEY MEAN: SECCOMP PROFILES.jpg

The new Docker 1.10 release has a host of new features, among them several security improvements that merit the attention of anyone using Docker to develop and run applications. I’d like to focus[…]