Fortune 500 at Risk: 250M Artifacts Exposed via Misconfigured Registries
Sign in
Contact
Support
We're hiring!
Aqua Security
Platform
Solutions
Resources
Company
Platform
Aqua Platform
Unified Cloud Security
Gain total lifecycle visibility, reduce risks and stop attacks with the most comprehensive, fully integrated Cloud Native Application Protection Platform (CNAPP)
Platform overview
All platform Integrations
Aqua CNAPP in action
Aqua Open Source
Driving security innovation in the cloud native community
Trivy
Tracee
Dev Security
Software Supply Chain Security
Protect your code, tools, and processes
Risk & Vulnerability Scanning
Automated DevOps scanning for build artifacts
Advanced Malware Protection
Stop stealthy malware from dev to cloud
Cloud Security
Cloud Workload Protection (CWPP)
Runtime protection for every cloud workload
Cloud Security Posture Management
Extend traditional CSPM with workload visibility
Kubernetes Security Posture Management
Holistic Kubernetes Security for the Enterprise
What's New?
Aqua Security Launches Industry First Real-Time CSPM ›
Aqua Security named best cloud native security solution ›
Truth Revealed: Agentless Security is Not Real Security ›
Research and Reports
Gartner® Market Guide for Cloud-Native Application Protection Platforms (CNAPPs)
Solutions
Use Cases
Automate DevSecOps
Security and speed without compromise
Detection and Response
Cloud native detection & Response (CNDR)
Prove Compliance
Controls for PCI, HIPAA, GDPR, and beyond
Container Security
Modern container security for cloud native Apps
Hybrid-Cloud & Multi-Cloud
security for hybrid and multi-cloud deployments
Federal Cloud Native Security
Aqua solutions for the Federal sector
Solutions
Docker Security
Enterprise-Grade security for Docker environments
AWS Cloud Security
Protect cloud native workloads on AWS
Google Cloud Security
Secure K8s apps on Google Cloud Platform
OpenShift Security
Cloud Native Security for Red Hat OpenShift
VMware Tanzu Security
Native security across VMware Tanzu
Azure Cloud Security
Full Lifecycle Security for Azure Container Workloads
Whitepaper
A Compliance Guide: NIST Secure Software Development Framework
Resources
The best of cloud native
Aqua Blog
Expert insight, best practices and advice on cloud native security, trends, threat intelligence and compliance
Read the Blog
Conquer Cloud Security Risk: Introducing Real-Time CSPM
Aqua CNAPP: From Dev to Cloud and Back
White House Shifts Cybersecurity Strategy to Drive Resilience
Resources
Resources Center
eBooks, Data sheets, Whitepapers, Webinars, and much more
The Cloud Native Channel
Cloud native security webinars & videos
Aquademy
The Aqua academy
Cloud Native Wiki
The educational center for everything cloud native
Docker Containers
Software supply chain security
Cloud security
Kubernetes
Application Security
DevSecOps
Aqua research team
Security research focused on the cloud native stack to identify new threats and attack vectors
More security research
Nautilus Containers Attacks Catalog
Analysis of the latest attack trends and a catalog of attack scenarios observed by Nautilus research team
Company
Recognized Leadership
GigaOm Radar Report for container security
Leader and outperformer
Techstrong DevOps dozen 2022
Winner of best cloud native security solution
Frost & Sullivan CNAPP report
Top innovation leader
About Us
Customers
Partners
Newsroom
Upcoming Events
Careers
Support
Connect
Contact
Twitter
Facebook
Linkedin
Instagram
News
Aqua Security Delivers the Industry’s Most Comprehensive Cloud Native Security Data to Amazon Security Lake
Aqua Security Integrates with ServiceNow to Accelerate Cloud Native Risk Remediation
Aqua Security Launches Industry First Real-Time CSPM
Search
Get Started
Resource Center: Containers & Cloud Native Security
eBooks, Product Sheets, Whitepapers, Webinars and Videos
All Types
Blog (100)
Case Study (14)
eBook (4)
Infographic (2)
Podcasts (18)
Research and Reports (17)
Solution Sheet (24)
Video (20)
Webinar (59)
Whitepaper (27)
All Topics
CISO (1)
CWPP (7)
cloud attacks (2)
Federal cloud native security (5)
Software supply chain security (17)
CNAPP (8)
Container Security (66)
AWS Security (21)
Azure Security (7)
CI/CD (9)
Cloud Native Security (51)
Cloud Security (21)
CSPM (8)
Cloud Workload Protection Platform CWPP (4)
Compliance (11)
Container Vulnerability (8)
DevOps and DevSecOps (25)
Docker Security (4)
Dynamic Container Analysis (7)
Google Cloud Security (8)
Image Vulnerability Scanning (12)
Kubernetes Security (47)
Kubernetes Security Posture Management KSPM (2)
Open Source (15)
Pivotal Cloud Foundry (3)
Red Hat OpenShift (10)
Runtime Security (16)
Secrets Management (4)
Secure VMs (3)
Security Threats (15)
Serverless (10)
Service Mesh (2)
Vulnerability Management (17)
Filter Resources
Topics
All
CISO
1
CWPP
7
cloud attacks
2
Federal cloud native security
5
Software supply chain security
17
CNAPP
8
Container Security
66
AWS Security
21
Azure Security
7
CI/CD
9
Cloud Native Security
51
Cloud Security
21
CSPM
8
Cloud Workload Protection Platform CWPP
4
Compliance
11
Container Vulnerability
8
DevOps and DevSecOps
25
Docker Security
4
Dynamic Container Analysis
7
Google Cloud Security
8
Image Vulnerability Scanning
12
Kubernetes Security
47
Kubernetes Security Posture Management KSPM
2
Open Source
15
Pivotal Cloud Foundry
3
Red Hat OpenShift
10
Runtime Security
16
Secrets Management
4
Secure VMs
3
Security Threats
15
Serverless
10
Service Mesh
2
Vulnerability Management
17
Show more
Types
All
Blog
100
Case Study
14
eBook
4
Infographic
2
Podcasts
18
Research and Reports
17
Solution Sheet
24
Video
20
Webinar
59
Whitepaper
27
Research and Reports
Gartner Market Guide for CNAPP (Cloud-Native Application Protection Platforms)
Webinar
CISO Panel: Tips for Optimizing your cloud native stack
Research and Reports
Cloud Security Report: Cloud Configuration Risks Exposed
Webinar
Implementing Zero-Trust Security: A Comprehensive Guide for Cloud-Native Environments
Whitepaper
13 Recommendations: Mitigate Risk from Exposed Registries & Artifact Repositories
Whitepaper
MAS IT Cloud Security Advisory
Webinar
Steve Wrenn, former CIO of Johnson & Johnson Speaks About Achieving Better OUTCOMES
Case Study
Aqua Cloud Security Platform Unifies Cloud Native Application Protection and Detect, Prioritize, and Reduce Risks in their Software Development Life Cycle.
Solution Sheet
Aqua CWPP Solution
Cloud Workload Protection Platform
Webinar
A Cloud Native Approach to Zero Trust
Whitepaper
451 Business Impact Brief Kubernetes Security Must Unify Strategy
Webinar
A Long Term Strategy for Maintaining Compliance Guidelines
Research and Reports
GigaOm Container Security Radar Report
Webinar
Moving Beyond SBOMS to Secure the Software Supply Chain
Whitepaper
451 Business Impact Security for Software Must Begin with the Supply Chain
eBook
CNAPP 101: Achieving Cloud Native Security
Webinar
PwC Panel: Hands On Readiness for Software Supply Chain Security
Whitepaper
451 Business Impact The Value of a Platform Approach to Cloud-Native Security
Webinar
CISO Panel: Getting Ready for Executive Order 14028
Whitepaper
A Compliance Guide: NIST Secure Software Development Framework
Research and Reports
2022 Cloud Native Threat Report: Tracking Software Supply Chain and Kubernetes Attacks
Webinar
Uber Verdict: The CISO, The Law and The Door!
Whitepaper
The Essential Guide to CSPM: How CSPM automates security configuration across clouds
Webinar
Software Supply Chain Security with Azure DevOps
Solution Sheet
See, prioritize, and remediate your most critical multi-cloud risks with Aqua Real-Time CSPM
Research and Reports
2022 Container Attacks Catalog: A detailed analysis of container attacks
Whitepaper
7 Top Things You Should Know About Software Supply Chain Security Compliance
Webinar
Security Best Practices for Azure Kubernetes Services
Webinar
The Good, The Bad & The Ugly of Enterprise Wide Kubernetes Adoption
Webinar
Climbing High - The State of DevSecOps Today
Research and Reports
Aqua named the top innovation leader in Frost Radar Global Cloud Native Application Protection Platform Report
Case Study
Electric Company, Elvia, Automates Security and Meets Regulatory Guidelines with Aqua
Webinar
Scaling Kubernetes Security with Kubernetes Goat
Solution Sheet
Software Supply Chain Security with the Aqua Platform
Webinar
Thinking Different: How to Approach Kubernetes Security & Governance
Whitepaper
The CISO's guide to CNAPP
Webinar
Managing your SaaS apps with Terraform, the GitOps way
Solution Sheet
Stop Cloud Native Attacks for VMware Tanzu Application Service and Kubernetes Grid
Webinar
Red Hat, Aqua Security & IBM Power: Demystifying Security for App Modernization
Webinar
Extending the focus of application security to securing the software supply chain
Whitepaper
Aqua Security Federal Government Capability Statement
Webinar
Cloudy With a Chance of DevSecOps
Solution Sheet
Stop attacks in production with Runtime Protection
Webinar
How to remediate zero day attacks 3x faster: Within your software supply chain
Solution Sheet
Software Supply Chain Security with the Aqua Platform
Webinar
Security and Assurance for AWS Fargate Containers
Solution Sheet
Aqua Cloud Native Application Protection Platform (CNAPP): SaaS Edition
Webinar
Cloud Native Attacks: Why Runtime Protection is Not Optional
Solution Sheet
Operationalize cloud native with Zero Trust Architectures
Webinar
Best Practices for Zero Trust & Securing the Federal Software Supply Chain
Video
Security Means Freedom
Run free with Aqua Security
Video
Detecting a Log4j attack with Aqua's CNDR
Webinar
Building Blocks of a Cloud Native Security Program
Webinar
Software Supply Chain: Backdoors Hiding in Plain Sight
Webinar
Jump/Start Webinar Series: Container and Cloud Native Application Security
Research and Reports
Gartner® Report: Innovation Insight for SBOMs Report
Case Study
Bayad Secures Its Digital Transformation with Aqua Security
Solution Sheet
Container Security Checklist – Top 10
Research and Reports
Cloud Native Threat Report: Attacks in the Wild on the Container Supply Chain and Infrastructure
Video
Aqua Security Explained 2020
Redefining Security for cloud native apps & infrastructure
Webinar
CNAPP 101: Tech’s Newest Approach to Securing Cloud Native Assets
Webinar
Securing the Software Supply Chain 101
Webinar
Log4j - What to Know and How to Mitigate It
Webinar
A DZone and Aqua Webinar
What is Kubernetes Security?
Webinar
A Case Study and a Checklist: Open Source vs Commercial Vulnerability Scanning
Webinar
What’s Next for DevSecOps: 'Shift Right' for Runtime Protection
Research and Reports
Blasting past your security: A Blast Radius Analysis of Container Attacks
Video
Tracee Presentation at BlackHat USA 2021
Case Study
Aqua’s SaaS Solution to Manage Container Vulnerabilities and Secure Cloud Accounts with Thoughtworks
Whitepaper
Buyer's Guide Checklist: A holistic approach to securing the cloud native stack
Webinar
KubeSec Enterprise Online NA 2021
Research and Reports
Understanding the cloud native runtime protection security gap
Whitepaper
The Security Risks of Using Open Source Software
eBook
Securing Modern Applications and Infrastructure
Webinar
Runtime Security using Tracee: A Walk-through Explainer Demo
Research and Reports
GovLoop Cloud Native Security Report for US Federal Government & Agencies
Webinar
Native and Holistic Kubernetes Security
Whitepaper
Rethinking the Sec in DevSecOps: Security as Code
Case Study
GitLab Uses Aqua Trivy to Provide Customers with Default DevSecOps Container Security
Webinar
Anatomy of Cloud Native Attacks and How To Stop Them
Webinar
Securely optimizing containerization with AWS Graviton2, Arm & Aqua Security
Webinar
Rethinking the Sec in DevSecOps: Security as Code
Case Study
Aqua Delivers Security for “Human-level” HCM SaaS at Forum Engineering
Webinar
Securing the Software Supply Chain for Cloud Native
Solution Sheet
Aqua Security: The Complete Cloud Native Security Platform
Webinar
Infrastructure & Ops Superstream: Creating Your Kubernetes Platform
Video
Tracee 0.5 Quick Intro
Whitepaper
The 10 Most Common Azure Configuration Challenges
Webinar
Risk-based Vulnerability Management for Cloud Native Apps: A Comprehensive View
Case Study
Aqua Secures the “Entrepreneur Economy” at Neat Commerce
Research and Reports
Gartner Market Guide for Cloud Workload Protection Platforms (CWPP)
Webinar
Beyond Scanning: Cloud Native Vulnerability Management 101
Webinar
Identity-Based Microsegmentation
Webinar
Securing workloads on innovative cloud native architectures
Research and Reports
Cloud Security Report: Cloud Configuration Risks Exposed
Whitepaper
Debunking the Top Seven Cloud Native Security Myths
Webinar
CSPM (Cloud Security Posture Management) 101 Webinar
Whitepaper
The Ten Riskiest AWS Misconfigurations
Webinar
A Blueprint to Cloud Native Security on Red Hat OpenShift
Webinar
A Complete Approach to Cloud Native Security
Solution Sheet
Securing your K8s Infrastructure with Aqua KSPM
Whitepaper
Using open source software to evolve enterprise-class security solutions
Research and Reports
Analyse des menaces visant la « supply chain » dans dans les environnements cloud-native
Infographic
What is CSPM and Why You Need It
Solution Sheet
Protecting Cloud VMs in Modern Cloud Native Stacks
Case Study
Online Retailer Leverages Aqua to Build Secure Cloud Native Applications from the Start
Webinar
Secure your cloud native applications – an AWS customer case study
Case Study
Internet Services Provider Kakaku.com Improves Security and Operational Efficiency with Aqua
Solution Sheet
Securing Cloud Functions
Podcasts
Go Time - Episode #97 Live from Gophercon UK with Liz Rice
Podcasts
DtSR Episode 368
Contain(er) Your Security
Podcasts
Red Hat OpenShift: Container Vulnerability Scanning
Podcasts
DevOps Chat: Container Security and Aqua 3.5
Podcasts
Improve Security with Automated Image Scanning Through CI/CD
With Liz Rice, Technology Evangelist
Podcasts
BeerSecOps #15 with Cheryl Hung: The CNCF End User Community & Virtual KubeCon
Podcasts
BeerSecOps #13: Security for Serverless Functions with Dean Bryen
Solution Sheet
Segregation of Duties in Multi-Tenant Cloud Native Environments
Video
Running Compliance Checks with Aqua
Case Study
AIB Centralizes their Container Security with Aqua
Video
Secure Windows Containers on GKE clusters
Video
Deploying Aqua CSP on AWS Fargate
Video
How to Integrate Aqua with a Registry
Webinar
Achieving Least Privilege Access in Kubernetes
Webinar
Hack-Proofing Your Kubernetes Clusters
Webinar
KubeSec Enterprise Online:
A Webinar Series
Video
How to Deploy Aqua Enforcers on Windows VMs
Video
Deploy Aqua on GKE on the GCP Marketplace
Webinar
Dynamic Analysis of Container Images for Detecting Stealthy Malware
Video
Visualize Risks in Your K8s Clusters with Aqua Risk Explorer
Blog
Visualize and Prioritize Risks in Kubernetes with Aqua Risk Explorer
Video
How to Integrate Aqua with Jenkins
Podcasts
BeerSecOps #12: Michael Hausenblas on Software Supply Chain Management (via GitOps)
Blog
Aqua Partners with GCP to Secure Windows Containers on GKE
Solution Sheet
Aqua Dynamic Threat Analysis (DTA) for Aqua CSP
Blog
Dynamic Threat Analysis for Container Images: Uncovering Hidden Risks
Blog
Threat Alert: Kinsing Malware Attacks Targeting Container Environments
Blog
Blocking Attacks in Runtime with Drift Prevention
Blog
Trivy Image Vulnerability Scanner Now Under Apache 2.0 License
Blog
Scanning Image Layers, Prometheus, and Harbor Integrations
Podcasts
BeerSecOps #11: Liz Rice - The Container Security Book
Blog
Aqua CSP Globally Whitelisted for ARO: Red Hat OpenShift on Azure
Blog
Kube-Query: A Simpler Way to Query Your Kubernetes Clusters
Podcasts
BeerSecOps #10: Tanya Janca – AppSec Education
Podcasts
BeerSecOps #09: Gene Kim – The Unicorn Project
Blog
CloudSploit Delivers Best Practices for Oracle Cloud Security
Webinar
A Calculated, Visual, Risk-Based Approach for Exploring Your Security Risks
Blog
Announcing General Availability of CloudSploit by Aqua for GCP
Podcasts
BeerSecOps #08: Kelsey Hightower
Case Study
Clarizen secures Kubernetes-based cloud native apps on AWS with Aqua Security
Blog
Threat Alert: Exploiting Open Docker Daemons for DDoS Attacks
Blog
A Deep Dive into eBPF:
The Technology that Powers Tracee
Blog
What You Need to Know About AWS Lambda Functions Risk Mitigation
Blog
Cloud Native Security Best Practices: Using Kubernetes Admission Controller for Image Assurance
Case Study
NCR Securely Transitions to Multi-Cloud Microservices Applications with Aqua
Blog
A Brief History of Containers: From the 1970s Till Now
Blog
Cloud Native Best Practices: Security Policies in CI/CD Pipelines
Webinar
The Container Security Checklist
Webinar
The Sharp Edges of Kubernetes Security
Blog
DevSecOps with Trivy and GitHub Actions
Blog
Pluggable Image Vulnerability Scanners for Harbor
Podcasts
Meet Elissa Shevinsky, Founder & CEO of Faster Than Light, Author of "Lean Out"
Blog
Aqua Integrates with AWS Security Hub: Closing the Gap on Cloud Native Security
Podcasts
BeerSecOps #05:
With Michael Man The Man Behind the DevSecOps London Gathering
Case Study
A CloudSploit Case Study:
Trek10's Three AWS Cloud Security Concerns
& One Solution
Podcasts
All About OWASP
with Sam Stepanyan
Podcasts
DevSecOps - Humans Vs Non-Humans
with Josh Kirkwood
Podcasts
Cloud Native and Open Source
with Liz Rice
Blog
Tracee: Tracing Containers with eBPF
Blog
Performance-Optimized Runtime Protection for Serverless Functions
with Aqua
Blog
Optimized Logging for Container Workloads Using AWS FireLens
Solution Sheet
Aqua Security for Pivotal Application Service (PAS)
Blog
Cloud VM Security with Aqua CSP
Blog
Cloud Native Security Best Practices: Vulnerability Management
Blog
CVE-2019-14287 sudo Vulnerability Allows Bypass of User Restrictions
eBook
Operating Kubernetes Clusters and Applications Safely
Webinar
Kubernetes RBAC: Audit Your Cluster’s RBAC Configuration for Vulnerabilities
Blog
Native Runtime Protection for
Pivotal Cloud Foundry
Whitepaper
DevSecOps, Making it Happen: The Essential DevSecOps Guide
Blog
Securing Hybrid Cloud Workloads on Google Anthos
Whitepaper
The Definitive Guide to Securing Kubernetes
Blog
Kubernetes RBAC: Asking for Forgiveness or Getting Permission
Solution Sheet
Aqua Security for VMware Enterprise PKS
Blog
DNS Spoofing on Kubernetes Clusters
Webinar
Virtual Container Patching: Control Known Vulnerabilities Detected in Container Images
Blog
Kubernetes Pod Escape
Using Log Mounts
Blog
Aqua Operator: Automating Security for Kubernetes
Webinar
Aqua Serverless Security for AWS Lambda
Blog
Knative: The Serverless Environment for Kubernetes Fans
Blog
Security Configuration Benchmarks for Kubernetes
Webinar
Vulnerability Management Strategies for Cloud Native Security
Case Study
Video compliance tech innovator Theta Lake ensures compliance on Amazon ECS
Solution Sheet
Aqua Security for AWS Lambda Functions
Whitepaper
Securing Containers and Serverless
on AWS
Research and Reports
Frost & Sullivan Report
Serverless Security Maturing: Serverless Adoption & Competitive Security Options are Expanding
Blog
Istio Security: Zero-Trust Networking
Blog
Security for Pivotal PAS and PKS
Blog
Serverless Security: The Importance of FaaS Risk Assessment
Blog
Istio: The Enterprise Upgrade Path to Microservices
Blog
Severe Privilege Escalation Vulnerability in Kubernetes (CVE-2018-1002105)
Research and Reports
2020 Threat Report: Attacks in the Wild on Container Infrastructure
Whitepaper
Security in the New World of Containers and Serverless
eBook
Container Security:
10 Things DevOps Need to Do
Solution Sheet
Aqua Security for Azure Container Service and Windows Containers
Solution Sheet
Aqua for Commercial Kubernetes Apps in GCP Marketplace
Solution Sheet
Aqua Security for AWS
Cloud Native Workloads
Whitepaper
NIST SP 800-190
Container Security Guide
Blog
Kube-Bench: An OSS Tool for Running Kubernetes CIS Benchmark Tests
Blog
Streamline Image
Vulnerability Management for
OpenShift Image Streams
Blog
Kube-hunter: An Open Source Tool for Kubernetes Penetration Testing
Research and Reports
Securosis Analyst Report:The Guide to Enterprise Container Security
Solution Sheet
Aqua Container Security for Red Hat OpenShift
Blog
Aqua Integrates with Google’s Cloud Security Command Center
Blog
Aqua MicroScanner:
Free Image Vulnerability Scanning Plugin for Jenkins
Video
Kubernetes, Metadata, and You (KubeCon NA 2017)
Blog
Kubernetes Security Deep-Dive
Video
Equifax Breach Contained by Containers
Whitepaper
Compliance Guide: Achieving HIPAA Compliance for Containers
Blog
Aqua on OpenShift
Level-Up Your Container Security Game - Part I
Whitepaper
Supporting PCI-DSS Compliance for Cloud Native Environments
Blog
Securing Serverless: Persistent Security for Ephemeral Environments
Whitepaper
The Ultimate Guide to Secrets Management in Containers
Blog
How to Secure Amazon ECS Workloads On Demand
Whitepaper
Compliance Guide: Achieving GDPR Compliance for Containers
Video
Containers from Scratch - The Sequel (ContainerCamp AU 2017)
Video
Your Secret's Safe with Me - Securing Container Secrets with Vault
Blog
MicroScanner: Free Image Vulnerability Scanner for Developers
Blog
Grafeas and Image Vulnerability Scanning
Blog
Kubernetes 1.10: What’s New in Security
Solution Sheet
Aqua - OpenShift Product Brief
Blog
Governance and Control for The Container Supply Chain Using Aqua Security and Google Grafeas
Solution Sheet
Aqua - ArcSight Product Brieft
Podcasts
Discussing GitOps with
Andy Martin (Control Plane)
Blog
Managing Secrets in Docker Containers
Blog
Securing Containers on OpenShift
Video
Containers: The Dr. Jekyll and Mr. Hyde of Security - RSAC 2017 Presentation
Video
Docker Image Vulnerability Scanning in Microsoft Visual Studio Team Services
Video
Scanning Docker Images on a Massive Scale
Infographic
Infographic: DevOps, Security or DevSecOps?
Blog
Docker Networking and Kubernetes Networking Tools
No matching resources for "
"
Aqua Security