Aqua Blog
Experts insight, best practices and advice on cloud native security, trends, threat intelligence and compliance
Kubernetes security

What's New in Kubernetes 1.8

The newly released Kubernetes 1.8 is the third release this year, and shows great progress and maturity of the Kubernetes project. I’m happy that the community continues to make progress in several security-related areas that have been under development or in beta for a while, and are now officially released.

Continue reading ›
Docker Security best practices

Docker Security Best Practices

I recently attended a webinar in which one of the speakers said that a ‘container is never going to be as secure as a virtual machine’. I beg to differ. Docker containers are not inherently less secure than running applications without them -- in fact, the opposite is true. But they need to be used correctly. …

Continue reading ›
K8S_blog.png

Security Best Practices for Kubernetes: Redux

Last week I presented at the NY Kubernetes meetup on security best practices. 

Continue reading ›
Keys_IBM_flaw.png

Don't Leave Your Keys Exposed: Lessons from IBM Privilege Escalation Flaw

Would you ever give your keys to a stranger? That’s exactly what someone at IBM did: they left private keys to the Docker host environment in IBM’s Data Science Experience service accessible to the outside world. Wayne Chang, security consultant who found this, explains in his original report:

Continue reading ›
blog-nano.png

Network Nano-Segmentation for Container Security in Aqua 2.0

Network segmentation is not a new concept in security. It’s been around for a while and is considered one of the most effective methods of limiting the “blast radius”, i.e., preventing extensive damage in case of an attack or a breach by limiting the attacker to a sealed-off segment of the network. In the era of …

Continue reading ›