Aqua Container Security
Products
Aqua Platform
The most complete cloud native application protection platform (CNAPP) for the entire stack, from development to production
Container Security
Full lifecycle security for all containers
Kubernetes Security
Holistic Kubernetes Security for the Enterprise
Serverless Security
Full lifecycle security for functions
VM Security
Virtual machine workload protection
CSPM
Cloud Security Posture Management
Vulnerability Scanning
CI-integrated scanning for all artifacts
Dynamic Threat Analysis
Hidden malware detection in container images
Platform Integrations
CI/CD, Orchestrators, SIEM, and more
Aqua Open Source
Open source developer-oriented security tools, paving the way for cloud native innovation
kube-bench
kube-hunter
trivy
CloudSploit
Tracee
Starboard
Blog
Introducing KSPM by Aqua: Kubernetes Security Posture Management
Solutions
USE CASES
Automate DevSecOps
Modernize Security
Prove Compliance
Go Hybrid & Multi-Cloud
ENVIRONMENTS
Kubernetes Security
AWS Cloud Security
OpenShift Security
VMware Tanzu Security
Azure Cloud Security
Google Cloud Security
Docker Security
Resources
Aqua Blog
Resource Center
Cloud Native Channel
Team Nautilus Research
Kubernetes 101
Docker 101
Cloud Native Security 101
Cloud Security (CSPM)
Research and Reports
Threat Report: Attacks in the Wild on Container Infrastructure
Company
About Us
Customers
Partners
Newsroom
Upcoming Events
Careers
Support
CONNECT
Contact
Twitter
Facebook
Linkedin
NEWS
Container, Serverless & Cloud Native Security Flash – January 2021
What are Supply Chain Attacks, and How to Guard Against Them
Creating a culture of cybersecurity and tech innovation
Visit the Newsroom
Search
Try Aqua
Get Demo
Resource Center
›
Whitepaper
All Topics
AWS Security
Azure Security
CI/CD
Cloud Native Security
Cloud Security
Cloud Security CSPM
Cloud Workload Protection Platform CWPP
Compliance
Container Deployment
Container Network Security
Container Security
Container Vulnerability
DevOps and DevSecOps
Docker Security
Drift Prevention
Dynamic Container Analysis
EKS Security
Events and Conferences
Google Cloud Security
IBM Cloud
Image Vulnerability Scanning
Kubernetes Security
Kubernetes Security Posture Management KSPM
KubeSec
Liz Rice
Malware Attacks
Open Source
Pivotal Cloud Foundry
RBAC
Red Hat OpenShift
Runtime Security
Secrets Management
Secure VMs
Security Threats
Serverless
Service Mesh
Threat Alert
Vulnerability Management
Whitepaper
Using open source software to evolve enterprise-class security solutions
Whitepaper
The Essential Guide to CSPM (Cloud Security Posture Management)
Whitepaper
Kubernetes and the Enterprise: A DZone Kubernetes Trend Report
Whitepaper
Container Adoption Report:
Understanding Container Adoption With a Special Focus on Container Security
Whitepaper
DevSecOps, Making it Happen: The Essential DevSecOps Guide
Whitepaper
The Definitive Guide to Securing Kubernetes
Whitepaper
Securing Containers and Serverless
on AWS
Research and Reports
A DZone RefCard:
Kubernetes Security
Whitepaper
Security in the New World of Containers and Serverless
Whitepaper
NIST SP 800-190
Container Security Guide
Whitepaper
Compliance Guide: Achieving HIPAA Compliance for Containers
Whitepaper
Achieving PCI-DSS Compliance for Containers
Whitepaper
The Ultimate Guide to Secrets Management in Containers
Whitepaper
Compliance Guide: Achieving GDPR Compliance for Containers