Bucket Monopoly: Breaching AWS Accounts Through Shadow Resources
Sign in
Contact
Support
We're hiring!
Aqua Security
Platform
Solutions
Resources
Company
Platform
Aqua Platform
Unified Cloud Security
Gain total lifecycle visibility, reduce risks and stop attacks with the most comprehensive, fully integrated Cloud Native Application Protection Platform (CNAPP)
Platform overview
All platform Integrations
Aqua CNAPP in action
Aqua Open Source
Driving security innovation in the cloud native community
Trivy
Tracee
Dev Security
Software Supply Chain Security
Protect your code, tools, and processes
Vulnerability Management
Reduce vulnerability noise and fix issues fast
Advanced Malware Protection
Stop stealthy malware from dev to cloud
Cloud Security
Cloud Workload Protection (CWPP)
Runtime protection for every cloud workload
Cloud Security Posture Management
Extend traditional CSPM with workload visibility
Kubernetes Security Posture Management
Holistic Kubernetes Security for the Enterprise
What's New?
Securing GenAI: Safeguarding LLM-Powered Applications
Discover Cloud Security Issues Faster with Event-based Scanning
Elevating Security: Protecting Containerized Workloads on Mainframes
Elevating AWS Kubernetes Security and Compliance
Research and Reports
The new Gartner® Market Guide for Cloud-Native Application Protection Platforms (CNAPP)
Solutions
Use Cases
Container Security
Modern container security for cloud native Apps
Detection and Response
Cloud native detection & Response (CNDR)
Hybrid-Cloud & Multi-Cloud
security for hybrid and multi-cloud deployments
Prove Compliance
Controls for PCI, HIPAA, GDPR, and beyond
Automate DevSecOps
Security and speed without compromise
Solutions
Docker Security
Enterprise-Grade security for Docker environments
AWS Cloud Security
Protect cloud native workloads on AWS
Google Cloud Security
Secure K8s apps on Google Cloud Platform
OpenShift Security
Cloud Native Security for Red Hat OpenShift
VMware Tanzu Security
Native security across VMware Tanzu
Azure Cloud Security
Full Lifecycle Security for Azure Container Workloads
Industry
Federal
CNAPP solution for Federal Government
Financial Services
One platform for financial services
Whitepaper
The 15 Riskiest AWS Misconfigurations
Resources
The best of cloud native
Aqua Blog
Expert insight, best practices and advice on cloud native security, trends, threat intelligence and compliance
Read the Blog
SEC vs. SolarWinds: A Cybersecurity Game Changer for CISOs
Accenture and Aqua Partner to Empower Cloud Security
Resources
Resources Center
eBooks, Data sheets, Whitepapers, Webinars, and much more
The Cloud Native Channel
Cloud native security webinars & videos
Aquademy
The Aqua academy
Cloud Native Wiki
The educational center for everything cloud native
Docker Containers
Software supply chain security
Cloud security
Kubernetes
Application Security
DevSecOps
Aqua research team
Security research focused on the cloud native stack to identify new threats and attack vectors
More security research
2023 Annual Aqua Nautilus Research
A Comprehensive Cloud Native Threat Report
Company
Recognized Leadership
CISO Choice Awards
Winner for Cloud Workload Protection Platform (CWPP)
Forrester Consulting: The Total Economic Impact™ of Aqua CNAPP
90% Reduction in vulnerability research and detection time
Frost & Sullivan CNAPP report
Top innovation leader
About Us
Customers
Partners
Newsroom
Upcoming Events
Careers
Support
Services
Connect
Contact
Twitter
Facebook
Linkedin
Instagram
News
Aqua Security Named a Representative Vendor in the 2024 Gartner® Market Guide for Cloud-Native Application Protection Platforms (CNAPP)
Aqua Security Unveils Traceeshark: Open Source Tool Combining Tracee’s Dynamic Analysis of Linux Malware with Wireshark
Aqua Discovers Critical Vulnerabilities in 6 AWS Cloud Services
Search
Get Started
Starboard: The Kubernetes-Native Toolkit for Unifying Security
Aqua Cloud Native Blog
\ Categories: AQUA OPEN SOURCE
AQUA OPEN SOURCE
Starboard: The Kubernetes-Native Toolkit for Unifying Security
There are lots of security tools in the cloud native world, created by Aqua and by others, for identifying and informing users about security issues in Kubernetes environments. However powerful and useful they might be, they tend to sit alongside Kubernetes, with each new product requiring users to learn a separate set of commands and …
AQUA OPEN SOURCE
Trivy Image Vulnerability Scanner Now Under Apache 2.0 License
In our view, making security tools easy to use is one of the best ways to increase adoption and help end users improve the security of their deployments. One of the strengths of our open source vulnerability scanner for container images, Trivy, is that it’s very easy to install and to integrate into different workflows. That’s …
AQUA OPEN SOURCE
A Deep Dive into eBPF: The Technology that Powers Tracee
Tracee, by Aqua Security, is an open source, lightweight, and easy to use container and system tracing utility. Tracee allows you to trace events that were generated within containers only, without needing to filter out other system processes.
AQUA OPEN SOURCE
DevSecOps with Trivy and GitHub Actions
The premise of DevSecOps is that in the Software Development Life Cycle (SDLC), each member is responsible for security. This unifies the operations and development teams in terms of security operations. DevSecOps’ goal is to add security to each step of the development process by integrating security controls and processes as early as possible in …
AQUA OPEN SOURCE
Trivy Vulnerability Scanner Joins the Aqua Open-source Family
If you’re interested in container image vulnerability scanning, there’s a good chance that you have come across the Trivy open source scanning tool. This project has been receiving rave reviews for its ease-of-use, as well as its comprehensive vulnerability tracking across both OS packages and language-specific dependencies.
AQUA OPEN SOURCE
Kube-hunter – an open source tool for Kubernetes penetration testing
Aqua released a free tool called kube-hunter to help with Kubernetes Security. You give it the IP or DNS name of your Kubernetes cluster, and kube-hunter probes for security issues – it’s like automated penetration testing.
AQUA OPEN SOURCE
Manifesto: A New Open Source Container Metadata Tool
Here at Aqua Security, we recently released an open source project to help container users manage the metadata associated with their container images. It’s called Manifesto, and it stores free-form metadata in the registry, alongside the images themselves.
AQUA OPEN SOURCE
Kube-Bench: An Open Source Tool for Running Kubernetes CIS Benchmark Tests
The Center for Internet Security provides a number of guidelines and benchmark tests for best practices in securing your code. As Michael Cherny recently described, the CIS has recently published a benchmark for Kubernetes, and now we’re pleased to tell you about our new open source implementation of these tests: kube-bench.
Page 4 of 4
‹ Prev
1
2
3
4
Aqua Security