Holistic Kubernetes Security for the Enterprise

Tame the complexity of Kubernetes security with KSPM (Kubernetes Security Posture Management) and advanced Kubernetes runtime protection. Leverage Kubernetes-native capabilities to attain policy-driven, full lifecycle protection and compliance for your K8s applications.

See Kubernetes Security in Action
Automate Kubernetes Security
Control Pod Deployment
Advanced Runtime Protection
Automate Kubernetes security configuration and compliance
Identify and remediate risks through security assessments and automated compliance monitoring. Help your security and cloud teams enforce policy-driven security monitoring and governance.
Control pod deployment based on K8s risk
Determine admission of workloads across the cluster based on pod, node, and cluster attributes. Enable contextual reduction of risk with out-of-the-box best practices and custom OPA Rego rules.
Protect entire clusters with granular policies driving K8s admission controllers
Provide runtime protection for Kubernetes workloads using native K8s deployment mechanism, for easy, seamless protection on any managed or unmanaged K8s environment.
Holistic Security for Kubernetes

Visualize and Prioritize Risks in your Cluster

Interact with a dynamic map of your running K8s clusters that highlights and rates Kubernetes security risks. Get real-time visibility into namespaces, deployments, nodes (hosts), containers and the images they came from, as well as network connections between and within namespaces.

Visualize and Prioritize Risks in your Cluster

Control Workload Admission Using K8s Attributes

Shift-left workload security and gain a clear perspective of your workload’s security posture. Powered by Open Policy Agent (OPA), new Kubernetes Assurance Policies allow you to apply dozens of out-of-the-box rules or add custom rules using Rego expressions.

Control Workload Admission Using K8s Attributes

Determine the Compliance of Kubernetes Workloads

Gain control over the security posture of your Kubernetes workloads based on both image contents and configuration, as well as Pod attributes. Works in conjunction with Aqua’s Image Assurance Policies to prevent the deployment of unsafe and non-compliant workloads.

Determine the Compliance of Kubernetes Workloads

Achieve Least Privilege Access in Kubernetes

Assess the permissions and privileges of users and subjects in K8s against research-based best practices and get remediation advice to minimize exposure. Continuously reduce the risk of over-provisioned roles and service account privileges, diminishing the need for Kubernetes security expertise.

Achieve Least Privilege Access in Kubernetes

CIS Kubernetes Benchmark Checks

Automate compliance checks of your Kubernetes environment according to the CIS Kubernetes Benchmark with more than 100 individual checks, daily scans, and a detailed report of the findings. Leverages Aqua’s widely-used open source Kube-Bench tool.

CIS Kubernetes Benchmark Checks

Kubernetes Cluster Penetration Testing

Run automated pen-testing of Kubernetes clusters, identifying weaknesses against real-world attack vectors. Complement configuration checks and best practices by defending against attacks in the wild. Leverages Aqua’s industry leading open source Kube-Hunter tool.

Kubernetes Cluster Penetration Testing

Kubernetes Context for Audit Events

Achieve visibility into Kubernetes security events to facilitate compliance, forensics, and incident response. Event logging includes diverse Kubernetes-specific information, such as pod name, type, deployment, and namespace data, user access, and container start/stop.

Kubernetes Context for Audit Events

Identity-based Segmentation

Enforce container-level network rules with Aqua’s identity-based firewall, within and across clusters. Use it seamlessly with K8s network plug-ins, including Weave, Calico, Flannel, and Contiv. Visualize network connections, automatically map connections, and create rules based on Kubernetes namespaces, clusters, and deployments.

Identity-based Segmentation
Operating Kubernetes Clusters and Applications Safely
This practical eBook walks you through Kubernetes security features—including when to use what—and shows you how to augment those features with container image best practices and secure network communication.
Get the eBook now