If an enterprise lets a third party onto their network, regardless of the reason, that third party then becomes an integral part of their security perimeter, notes Amir Jerbi, CTO of container security company Aqua Security. “Organizations should therefore vet third parties for their security measures and practices and ensure they are aligned with their own, and furthermore, periodically check and test those practices to verify they are still in compliance. These checks may (and should) cover systems, process and people.”
Learn how system calls can handle a lot of processes, simple and complex, in Linux applications
Read on for some helpful tips on how to integrate your security practices with your DevOps initiative and get your DevSecOps up and running.
Companies that lead with application security have security practitioners willing and able to lead
Aqua Security looks to take lion’s share of emerging container security space
Learn how to use secret injection to ensure your secret doesn’t get written to disk, resulting in a more secure development environment.
Aqua’s security platform for Docker container-based applications is a comprehensive solution. With features that include risk management for the container development pipeline, full CI/CD automation, advanced runtime defenses that include automated profiling of container behavior, network nano-segmentation for containers, and secrets management, it simplifies the process securing containerized applications and removes obstacles to adopting Docker in the enterprise.
eWeek lists Aqua among 10 vendors that are providing container security solutions and services.