Chat with us, powered by LiveChat

Securing Cloud-Native Workloads on AWS

Aqua provides the most complete security solutions to protect workloads running on Amazon ECS, EKS, Fargate and Lambda.

As an Advanced APN member and Container Competency technology partner, Aqua provides highly-integrated security controls for cloud native applications on AWS, supporting managed container services, such as Amazon ECS for container orchestration, Amazon EKS for Kubernetes-based deployments, AWS Fargate for on-demand container scaling, AWS Lambda for serverless functions, and Amazon ECR for storing and managing container images.

Protect workloads running on
Amazon EKS

Prevent unauthorized images from running in your EKS cluster, enforce container immutability, network segmentation and segregation of duties.

Secure Applications running on AWS Fargate containers

Embed Aqua MicroEnforcer into your containers to ensure that workloads running on AWS Fargate are only performing their intended function, detect vulnerable or compromised containers.

Extend security from Amazon ECR to Amazon ECS

Manage image vulnerabilities, ensure only trusted images can be deployed, automatically whitelist legitimate container behavior, and detect and block suspicious activities.
How Aqua is deployed to protect AWS containers and serverless functions
Securing workloads on AWS - ECS, EKS and Fargate
Image Vulnerability
Scanning & Assurance
Prevent unauthorized images from running in your AWS environment. Continuously scan images stored in Amazon ECR and Lambda functions to ensure that DevOps teams do not introduce vulnerabilities, bad configurations, or secrets into container images. Get actionable recommendations for remediation of security issues.
Protect Applications in Runtime
Prevent unvetted containers from running in your Amazon ECS, EKS and Fargate environments. Automatically create security policies based on container behavior and ensure that containers only do what they are supposed to do in the application context. Detect and prevent activities that violate policy, and defend against container-specific attack vectors.
Container-Level RBAC
Apply highly granular access control policies into containers at runtime via integration with AWS IAM roles. Define user access privileges according to role, allowing or preventing specific Docker actions, such as view, run, stop, view logs, and more.
Secrets Management
Leverage AWS KMS (key management store) to securely deploy secrets – such as passwords, keys and tokens – into containers at runtime. Aqua makes it easy to manage, rotate, and revoke secrets in containers with no downtime, running only in memory without persistence on disk.