Aqua Blog
Experts insight, best practices and advice on cloud native security, trends, threat intelligence and compliance
Container Security

“Thin OS” Security for Container Hosts

In the spectrum of deployment options available for cloud native applications, the most widely used option, at least presently, is running containers on VMs that use the Linux operating system (or less frequently, bare-metal servers running Linux).

Continue reading ›
Container compliance policies

Out-of the-Box Policies Simplify Container Compliance

One of the challenges organizations have in using cloud-native technologies is in figuring out how compliance requirements translate into actionable control points. Most regulations predate containers and serverless technologies and don’t have specific articles governing the use of such technologies.

We recently …

Continue reading ›
Applying Multiple Security Policies to Images in Your Pipeline - Blog Banner (1).png

Applying Multiple Security Policies to Images in Your Pipeline to Improve Speed and Efficiency

When it comes to securing containerized applications, the first item on everyone’s agenda is to ensure that only trusted images are running in your environment, based on security and compliance policies. And for good reason too. This is by far the most effective preventive measure you can take to protect your …

Continue reading ›