Central control of access policies is another area where container management software is wanting. Microsoft recently made a significant investment in Israeli security startup Aqua Security with software that automates and monitors policy enforcement throughout the container lifecycle.
Security, of course, is vitally important in all spheres of IT and telecom. This is nowhere truer than in DevOps. Code that has fatal flaws built in is a disaster waiting to happen. Another set of lists, this one on DevOps security, was offered last week by Aqua Security Co-Founder and CTO Amir Jerbi.
Byline by Aqua CTO Amir Jerbi – It’s no secret that devops and IT security, like oil and water, are hard to mix. After all, devops is all about going fast, while security is all about proceeding carefully. However, both devops and security serve a higher authority—the business—and the business will be served only if devops and security learn to get along.
Virtual IT technologies call for new approaches to security. Startup Aqua Security, founded by veterans from Intel Security, CA Technologies and Imperva, says it has an integrated solution.
It has developed a platform that secures the entire process of building and running virtual container applications. It recently announced a $9m funding round led by Microsoft. I recently spoke with Dror Davidoff, CEO of Aqua Security. Here are my main take-aways.
While Google didn’t issue an official fix for the Dirty Cow vulnerability (CVE-2016-5195), it did release “supplemental” firmware updates for its Nexus and Pixel handsets. According to Michael Cherny, head of security research at Aqua Security, Samsung also released the fix for Dirty Cow this month (SMR-NOV-2016), while other handset makers have not.
We used CB Insights Mosaic scoring tool, which uses public data and predictive algorithms to measure the overall health and growth potential of private companies, to identify 11 early-stage companies in the seed and Series A stage with traction.
Aqua Security Software researchers explain that the available POCs focused on privilege escalation inside the container, but that it is possible to run code inside a container, from a non-root user, to write data to a “protected” file on the read-only volume the container was mounted on. Aqua’s Sagie Dulce explains that even users with root privileges shouldn’t have write access to a mapped read-only volume in a container, let alone a non-root user. However, Dirty COW makes it possible for data on the host to be manipulated from within the container.
Integrates with Microsoft Visual Studio Team Services to Automate Container Image Vulnerability Scanning Tel Aviv, Israel – 27 October 2016 – Aqua Security, the leading platform provider for securing virtual container applications, today announced support for Windows Server 2016 containers as well as integration with Microsoft Visual Studio Team Services (VSTS). These latest additions to …