Request a Demo

You can still request to
join our Private Beta. * E-mail is mandatory.

Aqua Blog

What's New in Kubernetes 1.8

The newly released Kubernetes 1.8 is the third release this year, and shows great progress and maturity of the Kubernetes project. I’m happy that the community continues to make progress in[…]

Kubernetes Metadata and Manifesto

We recently released the first prototype of Manifesto, a tool for storing metadata alongside a container image. Metadata can hold information about software that can change even if the software[…]

Microsoft Launches Azure Container Instances: Aqua Is Ready to Secure Them

Yesterday Microsoft dropped a bombshell in containersphere, announcing Azure Container Instances, or ACI.

Announcing Kube-Bench: An Open Source Tool for Running Kubernetes CIS Benchmark Tests

The Center for Internet Security provides a number of guidelines and benchmark tests for best practices in securing your code. As Michael Cherny recently described, the CIS has recently published[…]

CIS Benchmark for Kubernetes 1.6

The Center for Internet Security (CIS) published a new banchmark last week for Kubernetes 1.6. As the adoption of container technologies grows rapidly, orchestrators have become a key enabler,[…]

Injecting Secrets - Kubernetes, HashiCorp Vault and Aqua on Azure

One of the neat features of the Aqua Security solution is the ability to inject secrets into the environment of a running container, so that they never get written to disk. In this article I’m[…]

Security Best Practices for Kubernetes: Redux

Last week I presented at the NY Kubernetes meetup on security best practices. 

The Year That Was (Almost) - 10 Milestones in The Container Ecosystem

2016 was a big year for the virtual container space, and 2017 looks even more promising. The industry saw tremendous growth and continues to evolve at a rapid pace. Containers, being still[…]

Scanning Docker Images on a Massive Scale

Working with several customers who are "heavy" adopters of Docker containers, we've seen environments where thousands of images are built on almost a daily basis. Organizations that fully commit[…]

Security Best Practices for Kubernetes Deployment

This is a blog post that Amir and I published on Kubernetes.io.

Kubernetes provides many controls that can greatly improve your application security. Configuring them requires intimate knowledge[…]