Bucket Monopoly: Breaching AWS Accounts Through Shadow Resources
Sign in
Contact
Support
We're hiring!
Aqua Security
Platform
Solutions
Resources
Company
Platform
Aqua Platform
Unified Cloud Security
Gain total lifecycle visibility, reduce risks and stop attacks with the most comprehensive, fully integrated Cloud Native Application Protection Platform (CNAPP)
Platform overview
All platform Integrations
Aqua CNAPP in action
Aqua Open Source
Driving security innovation in the cloud native community
Trivy
Tracee
Dev Security
Software Supply Chain Security
Protect your code, tools, and processes
Vulnerability Management
Reduce vulnerability noise and fix issues fast
Advanced Malware Protection
Stop stealthy malware from dev to cloud
Cloud Security
Cloud Workload Protection (CWPP)
Runtime protection for every cloud workload
Cloud Security Posture Management
Extend traditional CSPM with workload visibility
Kubernetes Security Posture Management
Holistic Kubernetes Security for the Enterprise
What's New?
Securing GenAI: Safeguarding LLM-Powered Applications
Discover Cloud Security Issues Faster with Event-based Scanning
Elevating Security: Protecting Containerized Workloads on Mainframes
Elevating AWS Kubernetes Security and Compliance
Research and Reports
The new Gartner® Market Guide for Cloud-Native Application Protection Platforms (CNAPP)
Solutions
Use Cases
Container Security
Modern container security for cloud native Apps
Detection and Response
Cloud native detection & Response (CNDR)
Hybrid-Cloud & Multi-Cloud
security for hybrid and multi-cloud deployments
Prove Compliance
Controls for PCI, HIPAA, GDPR, and beyond
Automate DevSecOps
Security and speed without compromise
Solutions
Docker Security
Enterprise-Grade security for Docker environments
AWS Cloud Security
Protect cloud native workloads on AWS
Google Cloud Security
Secure K8s apps on Google Cloud Platform
OpenShift Security
Cloud Native Security for Red Hat OpenShift
VMware Tanzu Security
Native security across VMware Tanzu
Azure Cloud Security
Full Lifecycle Security for Azure Container Workloads
Industry
Federal
CNAPP solution for Federal Government
Financial Services
One platform for financial services
Whitepaper
The 15 Riskiest AWS Misconfigurations
Resources
The best of cloud native
Aqua Blog
Expert insight, best practices and advice on cloud native security, trends, threat intelligence and compliance
Read the Blog
SEC vs. SolarWinds: A Cybersecurity Game Changer for CISOs
Accenture and Aqua Partner to Empower Cloud Security
Resources
Resources Center
eBooks, Data sheets, Whitepapers, Webinars, and much more
The Cloud Native Channel
Cloud native security webinars & videos
Aquademy
The Aqua academy
Cloud Native Wiki
The educational center for everything cloud native
Docker Containers
Software supply chain security
Cloud security
Kubernetes
Application Security
DevSecOps
Aqua research team
Security research focused on the cloud native stack to identify new threats and attack vectors
More security research
2023 Annual Aqua Nautilus Research
A Comprehensive Cloud Native Threat Report
Company
Recognized Leadership
CISO Choice Awards
Winner for Cloud Workload Protection Platform (CWPP)
Forrester Consulting: The Total Economic Impact™ of Aqua CNAPP
90% Reduction in vulnerability research and detection time
Frost & Sullivan CNAPP report
Top innovation leader
About Us
Customers
Partners
Newsroom
Upcoming Events
Careers
Support
Services
Connect
Contact
Twitter
Facebook
Linkedin
Instagram
News
Aqua Security Named a Representative Vendor in the 2024 Gartner® Market Guide for Cloud-Native Application Protection Platforms (CNAPP)
Aqua Security Unveils Traceeshark: Open Source Tool Combining Tracee’s Dynamic Analysis of Linux Malware with Wireshark
Aqua Discovers Critical Vulnerabilities in 6 AWS Cloud Services
Search
Get Started
Resource Center: Containers & Cloud Native Security
eBooks, Product Sheets, Whitepapers, Webinars and Videos
All Types
Case Study (20)
eBook (11)
Infographic (2)
Research and Reports (24)
Solution Brief (26)
Video (20)
Webinar (82)
Whitepaper (28)
All Topics
KSPM (3)
Kubernetes Security (3)
Financial Services (8)
CWPP (14)
cloud attacks (2)
Federal cloud native security (9)
Software supply chain security (19)
CNAPP (30)
Container Security (66)
AWS Security (28)
Azure Security (8)
CI/CD (10)
Cloud Native Security (59)
Cloud Security (26)
CSPM (18)
Compliance (14)
Container Vulnerability (9)
DevOps and DevSecOps (18)
Docker Security (4)
Dynamic Container Analysis (5)
Google Cloud Security (9)
Image Vulnerability Scanning (11)
Kubernetes Security, KSPM (40)
Open Source (15)
Pivotal Cloud Foundry (3)
Red Hat OpenShift (10)
Runtime Security (17)
Secrets Management (2)
Secure VMs (3)
Security Threats (18)
Serverless (9)
Service Mesh (2)
Vulnerability Management (13)
Filter Resources
Topics
All
KSPM
3
Kubernetes Security
3
Financial Services
8
CWPP
14
cloud attacks
2
Federal cloud native security
9
Software supply chain security
19
CNAPP
30
Container Security
66
AWS Security
28
Azure Security
8
CI/CD
10
Cloud Native Security
59
Cloud Security
26
CSPM
18
Compliance
14
Container Vulnerability
9
DevOps and DevSecOps
18
Docker Security
4
Dynamic Container Analysis
5
Google Cloud Security
9
Image Vulnerability Scanning
11
Kubernetes Security, KSPM
40
Open Source
15
Pivotal Cloud Foundry
3
Red Hat OpenShift
10
Runtime Security
17
Secrets Management
2
Secure VMs
3
Security Threats
18
Serverless
9
Service Mesh
2
Vulnerability Management
13
Show more
Types
All
Case Study
20
eBook
11
Infographic
2
Research and Reports
24
Solution Brief
26
Video
20
Webinar
82
Whitepaper
28
Research and Reports
The new Gartner® Market Guide for Cloud-Native Application Protection Platforms (CNAPP)
eBook
6 common CNAPP Pitfalls and How to Avoid Them
Whitepaper
Digital Operation Resilience Act (DORA):
How Financial Institutes Meet the Standard
eBook
The Evolution of Cloud Security: From Security Posture to Application Protection
Webinar
AWS Security LIVE! Modernizing Cloud Native Applications
Research and Reports
Kinsing Demystified: A Comprehensive Technical Guide
Webinar
6 CNAPP Pitfalls and How to Avoid Them
Solution Brief
Securing GenAI Applications From Code to Cloud
Webinar
Aligning to the DORA Regulations with Aqua
Solution Brief
Real-Time Malware Protection for Cloud Native Environments
Case Study
Audi uses Aqua to Protect Container Platform at Scale
Webinar
Catch Me If You Can: Uncovering Malicious Behavior in Container Images
Solution Brief
Detect and stop live attacks with intelligence-driven runtime protection
Webinar
Accelerate Application Modernization: Faster, Smarter Deployments on AWS
eBook
Debunking the Top 9 Cloud Native Security Myths
Solution Brief
Aqua Dynamic Threat Analysis (DTA) Detect and Stop Malicious Attacks Before Production
eBook
Building the Foundation for Securing Containers in Runtime
Webinar
Proactive Strategies for Risk Prevention in Container Based Workloads
Solution Brief
Aqua CNAPP: Go beyond visibility to true cloud native application protection
Webinar
Operationalizing Zero Trust: Securing Containers in Runtime
Research and Reports
KuppingerCole Leadership Compass on CNAPP
Video
Aqua Security: Enabling Real Time Blocking, Scalability, and High Availability in Containers
Solution Brief
Assurance policies: Security gates to deploy only trusted container images
Webinar
REDIScovering Headcrab - A Technical Analysis of a Novel Malware and the Mind Behind It
Solution Brief
Real-world research to prevent and stop cloud native attacks
Whitepaper
DevSecOps, Making it Happen: The Essential DevSecOps Guide
Webinar
The Top 7 Cloud Native Security Myths Debunked
Research and Reports
GigaOm's First Radar for Cloud Workload Security (CWS)
Webinar
Blinders Off: Synergetic Security in Cloud Native Applications
Research and Reports
Mitigate Enterprise Software Supply Chain Security Risks
Webinar
Unbreakable Cloud: Building the Foundation for Runtime Security
Solution Brief
Automate container security across the full application life cycle
Webinar
Incident Immunity: Effective Response Without Downtime in Cloud Native Apps
Research and Reports
Forrester Consulting: The Total Economic Impact™ of the Aqua Platform
Webinar
A Symbiotic Journey of CISO Expertise & Researcher Insight in Cloud Native Environments
Research and Reports
GigaOm Radar Report: Container Security
Webinar
Incorporating Security into Platform Engineering: The Dos and Dont’s
Whitepaper
The 2023 Buyer’s Guide for Cloud Native Application Protection Platforms (CNAPPs)
Webinar
Navigating the Landscape of Runtime Security for Cloud-Native Environments
Whitepaper
Best Practices for Securing Cloud Native Worklods on AWS
Webinar
3 Ways to streamline your cloud security initiatives
Whitepaper
Unified Security from Code to Cloud for Financial Services Institutions
Webinar
CSPM ≠ CNAPP: A Thought Leadership Panel
Case Study
Aqua Protects a Fortune 500 from Log4j Attacks
Webinar
Serverless, Not Defenseless: Demystifying AWS Fargate Security Challenges
Webinar
NIS2 Compliance and What You Need to Know
Webinar
Fortify Your Cloud Journey: Mastering Workload Protection
Case Study
Backpack Networks Uses Aqua to Scale Security Across Cloud Native Stack
Webinar
Cloud Security Explained: Code-To-Cloud and Back Webinar Series
Research and Reports
TAG Cyber Tech Report: The Evolution of CSPM
Webinar
CNAPP Explained: Code-To-Cloud & Back Webinar Series
Solution Brief
Enforcing the immutability of containers for robust workload protection
Research and Reports
GigaOm Radar for Cloud Security Posture Management (CSPM)
Research and Reports
KuppingerCole Leadership Compass: Software Supply Chain Security
Research and Reports
Gartner Market Guide for CNAPP (Cloud-Native Application Protection Platforms)
Case Study
Expanding Cybersecurity Through the Department of Defense
Webinar
The Evolution of Cloud Security Posture Management (CSPM)
Webinar
Cloud Security 101
Whitepaper
How to Protect FinServs from Cyber and Compliance Risk Banking on Cloud Native Security
Webinar
Empowering Financial Services Organizations with CSPM
Case Study
Hyper-Growth Travel Startup Uses Aqua to Secure AWS Fargate Environment
eBook
The Evolution of Cloud Security:
To Real-Time CSPM and Beyond
eBook
The State of Cloud Native Security:
An Aqua 2023 Survey
Case Study
Modern FinTech Uses Aqua as Cornerstone for Cloud Native Security
Webinar
Real-Time CSPM: Cloud Security Starts with Complete Visibility
Webinar
Strengthening Federal Software Infrastructure: Importance of SBOM Compliance Standards
Whitepaper
13 Recommendations: Mitigate Risk from Exposed Registries & Artifact Repositories
Webinar
CISO Panel: Tips for Optimizing your cloud native stack
Case Study
NCR Securely Transitions to Multi-Cloud Microservices Applications with Aqua
Webinar
Implementing Zero-Trust Security: A Comprehensive Guide for Cloud-Native Environments
Whitepaper
MAS IT Cloud Security Advisory
Webinar
Steve Wrenn, former CIO of Johnson & Johnson Speaks About Achieving Better OUTCOMES
Research and Reports
Cloud Security Report: Cloud Configuration Risks Exposed
Case Study
ABAX Unifies Cloud Native Application Protection with Aqua
Solution Brief
Aqua CWPP Solution
Cloud Workload Protection Platform
Webinar
Webinar Series: Dev Security Explained. Code-To-Cloud
Whitepaper
451 Business Impact Brief Kubernetes Security Must Unify Strategy
Webinar
A Long Term Strategy for Maintaining Compliance Guidelines
Webinar
Moving Beyond SBOMS to Secure the Software Supply Chain
Whitepaper
451 Business Impact Security for Software Must Begin with the Supply Chain
eBook
CNAPP 101: Achieving Cloud Native Security
Webinar
PwC Panel: Hands On Readiness for Software Supply Chain Security
Whitepaper
451 Business Impact The Value of a Platform Approach to Cloud-Native Security
Webinar
CISO Panel: Getting Ready for Executive Order 14028
Whitepaper
A Compliance Guide: NIST Secure Software Development Framework
Research and Reports
2022 Cloud Native Threat Report: Tracking Software Supply Chain and Kubernetes Attacks
Webinar
Uber Verdict: The CISO, The Law and The Door!
Whitepaper
The Zero Trust Guide to Cloud Architecture
Webinar
A Cloud Native Approach to Zero Trust
Research and Reports
2023 Aqua Nautilus Research: A Comprehensive Cloud Native Threat Report
Research and Reports
2022 Container Attacks Catalog: A detailed analysis of container attacks
Whitepaper
7 Top Things You Should Know About Software Supply Chain Security Compliance
Webinar
Security Best Practices for Azure Kubernetes Services
Webinar
The Good, The Bad & The Ugly of Enterprise Wide Kubernetes Adoption
Webinar
Software Supply Chain Security with Azure DevOps
Research and Reports
Aqua named the top innovation leader in Frost Radar Global Cloud Native Application Protection Platform Report
Case Study
Electric Company, Elvia, Automates Security and Meets Regulatory Guidelines with Aqua
Webinar
Scaling Kubernetes Security with Kubernetes Goat
Webinar
Thinking Different: How to Approach Kubernetes Security & Governance
Whitepaper
The CISO's guide to CNAPP
Webinar
Managing your SaaS apps with Terraform, the GitOps way
Solution Brief
Stop Cloud Native Attacks for VMware Tanzu Application Service and Kubernetes Grid
Webinar
Red Hat, Aqua Security & IBM Power: Demystifying Security for App Modernization
Webinar
Extending the focus of application security to securing the software supply chain
Whitepaper
Aqua Security Federal Government Capability Statement
Webinar
How to remediate zero day attacks 3x faster: Within your software supply chain
Solution Brief
Software Supply Chain Security with the Aqua Platform
Webinar
Security and Assurance for AWS Fargate Containers
Solution Brief
Aqua Cloud Native Application Protection Platform (CNAPP): SaaS Edition
Webinar
Cloud Native Attacks: Why Runtime Protection is Not Optional
Solution Brief
Operationalize cloud native with Zero Trust Architectures
Webinar
Best Practices for Zero Trust & Securing the Federal Software Supply Chain
Video
Security Means Freedom
Run free with Aqua Security
Video
Detecting a Log4j attack with Aqua's CNDR
Webinar
Building Blocks of a Cloud Native Security Program
Webinar
Jump/Start Webinar Series: Container and Cloud Native Application Security
Research and Reports
Gartner® Report: Innovation Insight for SBOMs Report
Case Study
Bayad Secures Its Digital Transformation with Aqua Security
eBook
The Top 10 Container Security Checklist
Research and Reports
Cloud Native Threat Report: Attacks in the Wild on the Container Supply Chain and Infrastructure
Video
Aqua Security Explained 2020
Redefining Security for cloud native apps & infrastructure
Webinar
CNAPP 101: Tech’s Newest Approach to Securing Cloud Native Assets
Webinar
Securing the Software Supply Chain
Webinar
Log4j - What to Know and How to Mitigate It
Webinar
A DZone and Aqua Webinar
What is Kubernetes Security?
Case Study
Aqua’s SaaS Solution to Manage Container Vulnerabilities and Secure Cloud Accounts with Thoughtworks
Webinar
What’s Next for DevSecOps: 'Shift Right' for Runtime Protection
Video
Tracee Presentation at BlackHat USA 2021
Case Study
GitLab Uses Aqua Trivy to Provide Customers with Default DevSecOps Container Security
Webinar
KubeSec Enterprise Online NA 2021
Whitepaper
The Security Risks of Using Open Source Software
eBook
Securing Modern Applications and Infrastructure
Webinar
Runtime Security using Tracee: A Walk-through Explainer Demo
Research and Reports
GovLoop Cloud Native Security Report for US Federal Government & Agencies
Webinar
Native and Holistic Kubernetes Security
Webinar
Climbing High - The State of DevSecOps Today
Case Study
Aqua Delivers Security for “Human-level” HCM SaaS at Forum Engineering
Webinar
Anatomy of Cloud Native Attacks and How To Stop Them
Webinar
Rethinking the Sec in DevSecOps: Security as Code
Case Study
U.S. Federal Government Agency Realizing The Full Potential of Cloud Native Transformation
Webinar
Securing the Software Supply Chain for Cloud Native
Solution Brief
See, prioritize, and remediate your most critical multi-cloud risks with Aqua Real-Time CSPM
Webinar
Infrastructure & Ops Superstream: Creating Your Kubernetes Platform
Video
Tracee 0.5 Quick Intro
Whitepaper
The 10 Most Common Azure Configuration Challenges
Webinar
Risk-based Vulnerability Management for Cloud Native Apps: A Comprehensive View
Case Study
Internet Services Provider Kakaku.com Improves Security and Operational Efficiency with Aqua
Webinar
Identity-Based Microsegmentation
Webinar
Securing workloads on innovative cloud native architectures
Whitepaper
Debunking the Top Seven Cloud Native Security Myths
Research and Reports
Cloud Security Report: Cloud Configuration Risks Exposed
Whitepaper
The 15 Riskiest AWS Misconfigurations
Webinar
A Blueprint to Cloud Native Security on Red Hat OpenShift
Webinar
A Complete Approach to Cloud Native Security
Whitepaper
Using open source software to evolve enterprise-class security solutions
Research and Reports
Analyse des menaces visant la « supply chain » dans dans les environnements cloud-native
Webinar
CSPM (Cloud Security Posture Management) 101 Webinar
Infographic
What is CSPM and Why You Need It
Solution Brief
Protecting Cloud VMs in Modern Cloud Native Stacks
Case Study
Online Retailer Leverages Aqua to Build Secure Cloud Native Applications from the Start
Webinar
A Case Study and a Checklist: Open Source vs Commercial Vulnerability Scanning
Case Study
Aqua Secures the “Entrepreneur Economy” at Neat Commerce
Solution Brief
Securing Cloud Functions
Go Time - Episode #97 Live from Gophercon UK with Liz Rice
Red Hat OpenShift: Container Vulnerability Scanning
DevOps Chat: Container Security and Aqua 3.5
Improve Security with Automated Image Scanning Through CI/CD
With Liz Rice, Technology Evangelist
Solution Brief
Segregation of Duties in Multi-Tenant Cloud Native Environments
Video
Running Compliance Checks with Aqua
Case Study
AIB Centralizes their Container Security with Aqua
Video
Secure Windows Containers on GKE clusters
Video
Deploying Aqua CSP on AWS Fargate
Video
How to Integrate Aqua with a Registry
Webinar
Achieving Least Privilege Access in Kubernetes
Webinar
Hack-Proofing Your Kubernetes Clusters
Webinar
KubeSec Enterprise Online:
A Webinar Series
Video
How to Deploy Aqua Enforcers on Windows VMs
Video
Deploy Aqua on GKE on the GCP Marketplace
Webinar
Dynamic Analysis of Container Images for Detecting Stealthy Malware
Video
Visualize Risks in Your K8s Clusters with Aqua Risk Explorer
Video
How to Integrate Aqua with Jenkins
Webinar
A Calculated, Visual, Risk-Based Approach for Exploring Your Security Risks
DtSR Episode 368
Contain(er) Your Security
Webinar
Secure your cloud native applications – an AWS customer case study
Webinar
The Container Security Checklist
Webinar
The Sharp Edges of Kubernetes Security
Case Study
Clarizen secures Kubernetes-based cloud native apps on AWS with Aqua Security
Solution Brief
Aqua Security for Pivotal Application Service (PAS)
eBook
Operating Kubernetes Clusters and Applications Safely
Webinar
Kubernetes RBAC: Audit Your Cluster’s RBAC Configuration for Vulnerabilities
Solution Brief
Aqua Security for VMware Enterprise PKS
Webinar
Aqua Serverless Security for AWS Lambda
Webinar
Vulnerability Management Strategies for Cloud Native Security
Case Study
Video compliance tech innovator Theta Lake ensures compliance on Amazon ECS
Solution Brief
Aqua Security for AWS Lambda Functions
Whitepaper
Securing Containers and Serverless
on AWS
Research and Reports
Frost & Sullivan Report
Serverless Security Maturing: Serverless Adoption & Competitive Security Options are Expanding
Research and Reports
2020 Threat Report: Attacks in the Wild on Container Infrastructure
Whitepaper
Security in the New World of Containers and Serverless
eBook
Container Security:
10 Things DevOps Need to Do
Solution Brief
Aqua Security for Azure Container Service and Windows Containers
Solution Brief
Aqua for Commercial Kubernetes Apps in GCP Marketplace
Whitepaper
NIST SP 800-190
Container Security Guide
Solution Brief
Aqua Container Security for Red Hat OpenShift
Video
Kubernetes, Metadata, and You (KubeCon NA 2017)
Video
Equifax Breach Contained by Containers
Whitepaper
Compliance Guide: Achieving HIPAA Compliance for Containers
Whitepaper
Supporting PCI-DSS Compliance for Cloud Native Environments
Whitepaper
Compliance Guide: Achieving GDPR Compliance for Containers
Video
Containers from Scratch - The Sequel (ContainerCamp AU 2017)
Video
Your Secret's Safe with Me - Securing Container Secrets with Vault
Solution Brief
Aqua - OpenShift Product Brief
Solution Brief
Aqua - ArcSight Product Brieft
Video
Docker Image Vulnerability Scanning in Microsoft Visual Studio Team Services
Video
Scanning Docker Images on a Massive Scale
Infographic
Infographic: DevOps, Security or DevSecOps?
No matching resources for "
"
Aqua Security