Cloud Native Security for Red Hat OpenShift

Aqua provides a full-stack security solution for enterprises using Red Hat OpenShift to deploy their cloud native applications, extending OpenShift's native capabilities to provide runtime protection and secure secrets delivery.

Aqua-OpenShift layered container security

Manage Risk in the Container Development Pipeline

Continuously scan the Red Hat OpenShift Registry to verify that DevOps teams do not introduce vulnerabilities, bad configurations, and secrets into container images, and prevent unauthorized images from running in Red Hat OpenShift Container Platform environments.
Manage Risk in the Container Development Pipeline

Protect Applications in Runtime

Ensure that containers only do what they are supposed to do in the application context, by leveraging machine learning to whitelist normal container behavior. Get alerts on and automatically prevent policy violations around usage of host resources, role-based user access, and network activity. Defend against specific attack vectors targeting containerized applications.
Protect Applications in Runtime

Achieve Visibility and Compliance

Monitor container activity in real-time, gain full visibility and audit trail into containers deployed in Red Hat OpenShift Container Platform. Log events, such as access attempts, network access, running executables, privilege escalations and more, and produce reports for regulatory compliance requirements, such as PCI DSS, HIPAA, and GDPR.
Achieve Visibility and Compliance

Securely Inject Secrets into Containers

Securely inject secrets, such as passwords, keys and tokens, into containers in runtime, with no container downtime. Leverage your existing enterprise secrets stores, such as HashiCorp Vault and CyberArk Enterprise Password Vault, and easily manage, rotate, and revoke secrets in containers, running only in memory with no persistent storage on disk.
Securely Inject Secrets into Containers

Multi-Tenancy Management

Support multiple tenancies through delegation of management capabilities, such as image security assurance policies, container runtime policies, etc. Data and reports from the tenant levels roll up to the top level, allowing admins to monitor and enforce policies on a global level.
Multi-Tenancy Management