Kubernetes Exposed: One Yaml away from Disaster
Sign in
Contact
Support
We're hiring!
Aqua Security
Platform
Solutions
Resources
Company
Platform
Aqua Platform
Unified Cloud Security
Gain total lifecycle visibility, reduce risks and stop attacks with the most comprehensive, fully integrated Cloud Native Application Protection Platform (CNAPP)
Platform overview
All platform Integrations
Aqua CNAPP in action
Aqua Open Source
Driving security innovation in the cloud native community
Trivy
Tracee
Dev Security
Software Supply Chain Security
Protect your code, tools, and processes
Risk & Vulnerability Scanning
Automated DevOps scanning for build artifacts
Advanced Malware Protection
Stop stealthy malware from dev to cloud
Cloud Security
Cloud Workload Protection (CWPP)
Runtime protection for every cloud workload
Cloud Security Posture Management
Extend traditional CSPM with workload visibility
Kubernetes Security Posture Management
Holistic Kubernetes Security for the Enterprise
What's New?
The Agent vs Agentless Debate is Over
Aqua CNAPP Integrates with Amazon Security Lake
Remediate Vulnerabilities with Integrated Aqua and ServiceNow Workflows
Research and Reports
Gartner Market Guide for CNAPP (Cloud-Native Application Protection Platforms)
Solutions
Use Cases
Automate DevSecOps
Security and speed without compromise
Detection and Response
Cloud native detection & Response (CNDR)
Prove Compliance
Controls for PCI, HIPAA, GDPR, and beyond
Container Security
Modern container security for cloud native Apps
Hybrid-Cloud & Multi-Cloud
security for hybrid and multi-cloud deployments
Solutions
Docker Security
Enterprise-Grade security for Docker environments
AWS Cloud Security
Protect cloud native workloads on AWS
Google Cloud Security
Secure K8s apps on Google Cloud Platform
OpenShift Security
Cloud Native Security for Red Hat OpenShift
VMware Tanzu Security
Native security across VMware Tanzu
Azure Cloud Security
Full Lifecycle Security for Azure Container Workloads
Industry
Federal
CNAPP solution for Federal Government
Financial Services
One platform for financial services
Whitepaper
A Compliance Guide: NIST Secure Software Development Framework
Resources
The best of cloud native
Aqua Blog
Expert insight, best practices and advice on cloud native security, trends, threat intelligence and compliance
Read the Blog
Conquer Cloud Security Risk: Introducing Real-Time CSPM
Aqua CNAPP: From Dev to Cloud and Back
White House Shifts Cybersecurity Strategy to Drive Resilience
Resources
Resources Center
eBooks, Data sheets, Whitepapers, Webinars, and much more
The Cloud Native Channel
Cloud native security webinars & videos
Aquademy
The Aqua academy
Cloud Native Wiki
The educational center for everything cloud native
Docker Containers
Software supply chain security
Cloud security
Kubernetes
Application Security
DevSecOps
Aqua research team
Security research focused on the cloud native stack to identify new threats and attack vectors
More security research
2023 Annual Aqua Nautilus Research
A Comprehensive Cloud Native Threat Report
Company
Recognized Leadership
GigaOm Radar Report for container security
Leader and outperformer
Techstrong DevOps dozen 2022
Winner of best cloud native security solution
Frost & Sullivan CNAPP report
Top innovation leader
About Us
Customers
Partners
Newsroom
Upcoming Events
Careers
Support
Services
Connect
Contact
Twitter
Facebook
Linkedin
Instagram
News
Aqua Security New Business Increases by 65% in H1 2023
Fileless attacks surge as cybercriminals evade cloud security defenses
Aqua Security Achieves FedRAMP® “In Process” Milestone
Search
Get Started
Resource Center: Containers & Cloud Native Security
eBooks, Product Sheets, Whitepapers, Webinars and Videos
All Types
Case Study (17)
eBook (6)
Infographic (2)
Research and Reports (20)
Solution Sheet (25)
Video (20)
Webinar (60)
Whitepaper (26)
All Topics
Financial (1)
FInTech (2)
CISO (2)
CWPP (8)
cloud attacks (2)
Federal cloud native security (7)
Software supply chain security (19)
CNAPP (11)
Container Security (64)
AWS Security (23)
Azure Security (8)
CI/CD (10)
Cloud Native Security (49)
Cloud Security (20)
CSPM (13)
Cloud Workload Protection Platform CWPP (5)
Compliance (12)
Container Vulnerability (9)
DevOps and DevSecOps (18)
Docker Security (4)
Dynamic Container Analysis (7)
Google Cloud Security (9)
Image Vulnerability Scanning (12)
Kubernetes Security (46)
Kubernetes Security Posture Management KSPM (2)
Open Source (15)
Pivotal Cloud Foundry (3)
Red Hat OpenShift (10)
Runtime Security (16)
Secrets Management (4)
Secure VMs (3)
Security Threats (16)
Serverless (10)
Service Mesh (2)
Vulnerability Management (16)
Filter Resources
Topics
All
Financial
1
FInTech
2
CISO
2
CWPP
8
cloud attacks
2
Federal cloud native security
7
Software supply chain security
19
CNAPP
11
Container Security
64
AWS Security
23
Azure Security
8
CI/CD
10
Cloud Native Security
49
Cloud Security
20
CSPM
13
Cloud Workload Protection Platform CWPP
5
Compliance
12
Container Vulnerability
9
DevOps and DevSecOps
18
Docker Security
4
Dynamic Container Analysis
7
Google Cloud Security
9
Image Vulnerability Scanning
12
Kubernetes Security
46
Kubernetes Security Posture Management KSPM
2
Open Source
15
Pivotal Cloud Foundry
3
Red Hat OpenShift
10
Runtime Security
16
Secrets Management
4
Secure VMs
3
Security Threats
16
Serverless
10
Service Mesh
2
Vulnerability Management
16
Show more
Types
All
Case Study
17
eBook
6
Infographic
2
Research and Reports
20
Solution Sheet
25
Video
20
Webinar
60
Whitepaper
26
Research and Reports
GigaOm Radar for Cloud Security Posture Management (CSPM)
Research and Reports
KuppingerCole Leadership Compass: Software Supply Chain Security
Webinar
The Evolution of Cloud Security Posture Management (CSPM)
Research and Reports
Gartner Market Guide for CNAPP (Cloud-Native Application Protection Platforms)
Case Study
Expanding Cybersecurity Through the Department of Defense
Whitepaper
How to Protect FinServs from Cyber and Compliance Risk Banking on Cloud Native Security
Webinar
Empowering Financial Services Organizations with CSPM
Case Study
Hyper-Growth Travel Startup Uses Aqua to Secure AWS Fargate Environment
eBook
The Evolution of Cloud Security:
To Real-Time CSPM and Beyond
eBook
The State of Cloud Native Security:
An Aqua 2023 Survey
Whitepaper
Securing Serverless Cloud Workloads on AWS
Case Study
Modern FinTech Uses Aqua as Cornerstone for Cloud Native Security
Webinar
Real-Time CSPM: Cloud Security Starts with Complete Visibility
Solution Sheet
Stop Cloud Native Attacks with the Aqua Platform
Webinar
Strengthening Federal Software Infrastructure: Importance of SBOM Compliance Standards
Whitepaper
13 Recommendations: Mitigate Risk from Exposed Registries & Artifact Repositories
Webinar
CISO Panel: Tips for Optimizing your cloud native stack
Case Study
NCR Securely Transitions to Multi-Cloud Microservices Applications with Aqua
Webinar
Implementing Zero-Trust Security: A Comprehensive Guide for Cloud-Native Environments
Whitepaper
MAS IT Cloud Security Advisory
Webinar
Steve Wrenn, former CIO of Johnson & Johnson Speaks About Achieving Better OUTCOMES
Research and Reports
Cloud Security Report: Cloud Configuration Risks Exposed
Case Study
ABAX Unifies Cloud Native Application Protection with Aqua
Solution Sheet
Aqua CWPP Solution
Cloud Workload Protection Platform
Webinar
A Cloud Native Approach to Zero Trust
Whitepaper
451 Business Impact Brief Kubernetes Security Must Unify Strategy
Webinar
A Long Term Strategy for Maintaining Compliance Guidelines
Webinar
Moving Beyond SBOMS to Secure the Software Supply Chain
Whitepaper
451 Business Impact Security for Software Must Begin with the Supply Chain
eBook
CNAPP 101: Achieving Cloud Native Security
Webinar
PwC Panel: Hands On Readiness for Software Supply Chain Security
Whitepaper
451 Business Impact The Value of a Platform Approach to Cloud-Native Security
Webinar
CISO Panel: Getting Ready for Executive Order 14028
Whitepaper
A Compliance Guide: NIST Secure Software Development Framework
Research and Reports
2022 Cloud Native Threat Report: Tracking Software Supply Chain and Kubernetes Attacks
Webinar
Uber Verdict: The CISO, The Law and The Door!
Webinar
Software Supply Chain Security with Azure DevOps
Research and Reports
2023 Aqua Nautilus Research: A Comprehensive Cloud Native Threat Report
Research and Reports
2022 Container Attacks Catalog: A detailed analysis of container attacks
Whitepaper
7 Top Things You Should Know About Software Supply Chain Security Compliance
Webinar
Security Best Practices for Azure Kubernetes Services
Webinar
The Good, The Bad & The Ugly of Enterprise Wide Kubernetes Adoption
Webinar
Climbing High - The State of DevSecOps Today
Research and Reports
Aqua named the top innovation leader in Frost Radar Global Cloud Native Application Protection Platform Report
Case Study
Electric Company, Elvia, Automates Security and Meets Regulatory Guidelines with Aqua
Webinar
Scaling Kubernetes Security with Kubernetes Goat
Solution Sheet
Software Supply Chain Security with the Aqua Platform
Webinar
Thinking Different: How to Approach Kubernetes Security & Governance
Whitepaper
The CISO's guide to CNAPP
Webinar
Managing your SaaS apps with Terraform, the GitOps way
Solution Sheet
Stop Cloud Native Attacks for VMware Tanzu Application Service and Kubernetes Grid
Webinar
Red Hat, Aqua Security & IBM Power: Demystifying Security for App Modernization
Webinar
Extending the focus of application security to securing the software supply chain
Whitepaper
Aqua Security Federal Government Capability Statement
Solution Sheet
Stop attacks in production with Runtime Protection
Webinar
How to remediate zero day attacks 3x faster: Within your software supply chain
Solution Sheet
Software Supply Chain Security with the Aqua Platform
Webinar
Security and Assurance for AWS Fargate Containers
Solution Sheet
Aqua Cloud Native Application Protection Platform (CNAPP): SaaS Edition
Webinar
Cloud Native Attacks: Why Runtime Protection is Not Optional
Solution Sheet
Operationalize cloud native with Zero Trust Architectures
Webinar
Best Practices for Zero Trust & Securing the Federal Software Supply Chain
Video
Security Means Freedom
Run free with Aqua Security
Video
Detecting a Log4j attack with Aqua's CNDR
Webinar
Building Blocks of a Cloud Native Security Program
Webinar
Software Supply Chain: Backdoors Hiding in Plain Sight
Webinar
Jump/Start Webinar Series: Container and Cloud Native Application Security
Research and Reports
Gartner® Report: Innovation Insight for SBOMs Report
Case Study
Bayad Secures Its Digital Transformation with Aqua Security
Solution Sheet
Container Security Checklist – Top 10
Research and Reports
Cloud Native Threat Report: Attacks in the Wild on the Container Supply Chain and Infrastructure
Video
Aqua Security Explained 2020
Redefining Security for cloud native apps & infrastructure
Webinar
CNAPP 101: Tech’s Newest Approach to Securing Cloud Native Assets
Webinar
Securing the Software Supply Chain 101
Webinar
Log4j - What to Know and How to Mitigate It
Webinar
A DZone and Aqua Webinar
What is Kubernetes Security?
Case Study
Aqua’s SaaS Solution to Manage Container Vulnerabilities and Secure Cloud Accounts with Thoughtworks
Webinar
What’s Next for DevSecOps: 'Shift Right' for Runtime Protection
Research and Reports
Blasting past your security: A Blast Radius Analysis of Container Attacks
Video
Tracee Presentation at BlackHat USA 2021
Case Study
GitLab Uses Aqua Trivy to Provide Customers with Default DevSecOps Container Security
Whitepaper
Buyer's Guide Checklist: A holistic approach to securing the cloud native stack
Webinar
KubeSec Enterprise Online NA 2021
Research and Reports
Understanding the cloud native runtime protection security gap
Whitepaper
The Security Risks of Using Open Source Software
eBook
Securing Modern Applications and Infrastructure
Webinar
Runtime Security using Tracee: A Walk-through Explainer Demo
Research and Reports
GovLoop Cloud Native Security Report for US Federal Government & Agencies
Webinar
Native and Holistic Kubernetes Security
Case Study
Aqua Delivers Security for “Human-level” HCM SaaS at Forum Engineering
Webinar
Anatomy of Cloud Native Attacks and How To Stop Them
Webinar
Rethinking the Sec in DevSecOps: Security as Code
Case Study
U.S. Federal Government Agency Realizing The Full Potential of Cloud Native Transformation
Webinar
Securing the Software Supply Chain for Cloud Native
Solution Sheet
See, prioritize, and remediate your most critical multi-cloud risks with Aqua Real-Time CSPM
Webinar
Infrastructure & Ops Superstream: Creating Your Kubernetes Platform
Video
Tracee 0.5 Quick Intro
Whitepaper
The 10 Most Common Azure Configuration Challenges
Webinar
Risk-based Vulnerability Management for Cloud Native Apps: A Comprehensive View
Case Study
Internet Services Provider Kakaku.com Improves Security and Operational Efficiency with Aqua
Research and Reports
Gartner Market Guide for Cloud Workload Protection Platforms (CWPP)
Webinar
Identity-Based Microsegmentation
Webinar
Securing workloads on innovative cloud native architectures
Solution Sheet
Aqua CNAPP Secures cloud native applications across the full life cycle
Whitepaper
Debunking the Top Seven Cloud Native Security Myths
Research and Reports
Cloud Security Report: Cloud Configuration Risks Exposed
Whitepaper
The Ten Riskiest AWS Misconfigurations
Webinar
A Blueprint to Cloud Native Security on Red Hat OpenShift
Webinar
A Complete Approach to Cloud Native Security
Solution Sheet
Securing your K8s Infrastructure with Aqua KSPM
Whitepaper
Using open source software to evolve enterprise-class security solutions
Research and Reports
Analyse des menaces visant la « supply chain » dans dans les environnements cloud-native
Webinar
CSPM (Cloud Security Posture Management) 101 Webinar
Infographic
What is CSPM and Why You Need It
Solution Sheet
Protecting Cloud VMs in Modern Cloud Native Stacks
Case Study
Online Retailer Leverages Aqua to Build Secure Cloud Native Applications from the Start
Webinar
A Case Study and a Checklist: Open Source vs Commercial Vulnerability Scanning
Case Study
Aqua Secures the “Entrepreneur Economy” at Neat Commerce
Solution Sheet
Securing Cloud Functions
Go Time - Episode #97 Live from Gophercon UK with Liz Rice
DtSR Episode 368
Contain(er) Your Security
Red Hat OpenShift: Container Vulnerability Scanning
DevOps Chat: Container Security and Aqua 3.5
Improve Security with Automated Image Scanning Through CI/CD
With Liz Rice, Technology Evangelist
Solution Sheet
Segregation of Duties in Multi-Tenant Cloud Native Environments
Video
Running Compliance Checks with Aqua
Case Study
AIB Centralizes their Container Security with Aqua
Video
Secure Windows Containers on GKE clusters
Video
Deploying Aqua CSP on AWS Fargate
Video
How to Integrate Aqua with a Registry
Webinar
Achieving Least Privilege Access in Kubernetes
Webinar
Hack-Proofing Your Kubernetes Clusters
Webinar
KubeSec Enterprise Online:
A Webinar Series
Video
How to Deploy Aqua Enforcers on Windows VMs
Video
Deploy Aqua on GKE on the GCP Marketplace
Webinar
Dynamic Analysis of Container Images for Detecting Stealthy Malware
Video
Visualize Risks in Your K8s Clusters with Aqua Risk Explorer
Video
How to Integrate Aqua with Jenkins
Solution Sheet
Aqua Dynamic Threat Analysis (DTA) for Aqua CSP
Webinar
A Calculated, Visual, Risk-Based Approach for Exploring Your Security Risks
Case Study
Clarizen secures Kubernetes-based cloud native apps on AWS with Aqua Security
Webinar
Secure your cloud native applications – an AWS customer case study
Webinar
The Container Security Checklist
Webinar
The Sharp Edges of Kubernetes Security
Solution Sheet
Aqua Security for Pivotal Application Service (PAS)
eBook
Operating Kubernetes Clusters and Applications Safely
Webinar
Kubernetes RBAC: Audit Your Cluster’s RBAC Configuration for Vulnerabilities
Whitepaper
DevSecOps, Making it Happen: The Essential DevSecOps Guide
Whitepaper
The Definitive Guide to Securing Kubernetes
Solution Sheet
Aqua Security for VMware Enterprise PKS
Webinar
Virtual Container Patching: Control Known Vulnerabilities Detected in Container Images
Webinar
Aqua Serverless Security for AWS Lambda
Webinar
Vulnerability Management Strategies for Cloud Native Security
Case Study
Video compliance tech innovator Theta Lake ensures compliance on Amazon ECS
Solution Sheet
Aqua Security for AWS Lambda Functions
Whitepaper
Securing Containers and Serverless
on AWS
Research and Reports
Frost & Sullivan Report
Serverless Security Maturing: Serverless Adoption & Competitive Security Options are Expanding
Research and Reports
2020 Threat Report: Attacks in the Wild on Container Infrastructure
Whitepaper
Security in the New World of Containers and Serverless
eBook
Container Security:
10 Things DevOps Need to Do
Solution Sheet
Aqua Security for Azure Container Service and Windows Containers
Solution Sheet
Aqua for Commercial Kubernetes Apps in GCP Marketplace
Solution Sheet
Aqua Security for AWS
Cloud Native Workloads
Whitepaper
NIST SP 800-190
Container Security Guide
Research and Reports
Securosis Analyst Report:The Guide to Enterprise Container Security
Solution Sheet
Aqua Container Security for Red Hat OpenShift
Video
Kubernetes, Metadata, and You (KubeCon NA 2017)
Video
Equifax Breach Contained by Containers
Whitepaper
Compliance Guide: Achieving HIPAA Compliance for Containers
Whitepaper
Supporting PCI-DSS Compliance for Cloud Native Environments
Whitepaper
The Ultimate Guide to Secrets Management in Containers
Whitepaper
Compliance Guide: Achieving GDPR Compliance for Containers
Video
Containers from Scratch - The Sequel (ContainerCamp AU 2017)
Video
Your Secret's Safe with Me - Securing Container Secrets with Vault
Solution Sheet
Aqua - OpenShift Product Brief
Solution Sheet
Aqua - ArcSight Product Brieft
Video
Containers: The Dr. Jekyll and Mr. Hyde of Security - RSAC 2017 Presentation
Video
Docker Image Vulnerability Scanning in Microsoft Visual Studio Team Services
Video
Scanning Docker Images on a Massive Scale
Infographic
Infographic: DevOps, Security or DevSecOps?
No matching resources for "
"
Aqua Security