Aqua 3.0 Released
March 12, 2018

Aqua Security announced the availability of version 3.0 of its platform featuring new security automation and controls for Kubernetes-based runtime environments.

The new release also introduces more than 120 additional features, extending the capabilities of the company's end-to-end container security platform to address the requirements of today's multi-platform enterprise customers, from securing the build pipeline and enabling DevSecOps, to runtime protection of workloads.

As part of its 3.0 launch, Aqua also unveiled patent-pending MicroEnforcer architecture to deliver runtime security for Container-as-a-Service environments.

"Kubernetes adoption has been increasing along with the maturity and enterprise-readiness of its features," noted Liz Rice, Technology Evangelist at Aqua Security. "With the enterprise security skill shortage, enterprises are looking for ways to leverage Kubernetes to automate deployments and accelerate application delivery, at scale, without compromising on security. That's what Aqua 3.0 is all about."

Aqua 3.0 builds on Kubernetes security capabilities to provide automated Kubernetes-native controls in several key areas:

- Kubernetes-Native Role Based Access Controls: Aqua 3.0 enables customers to leverage Kubernetes webhook admission controller to create fine-grained user access control roles and policies, controlling access to kubectl commands, governed by Aqua's scalable labeling scheme. This enables security teams to govern access across teams, with full segregation of duties.

- Kubernetes-Native Image Assurance Controls: In addition to its ability to block unapproved images from running at the individual host level, Aqua can now prevent Kubernetes from running unapproved images across entire clusters, providing a more efficient mechanism that scales across large deployments.

- Kubernetes-Native Network Controls: Aqua's container-level firewall now enables admins to control network traffic based on Kubernetes namespaces, clusters or deployments. This allows admins to enforce network segmentation for compliance purposes, as well as limit an attack's "blast radius" across clusters and applications.

- CIS Kubernetes Benchmark: Building upon Aqua's open-source Kube-Bench, the tool widely used by the community to validate the security posture of Kubernetes deployments, Aqua now incorporates CIS Kubernetes benchmark checks alongside updated Docker CIS benchmark checks. Automated checks can run daily, providing a detailed report that can also be exported for compliance.

- Kubernetes Context in Audit Events: Aqua's event logging now includes Kubernetes-specific information, such as pod name, type, deployment and namespace data, providing additional visibility for compliance and forensics.

The Aqua platform drives DevSecOps automation, and provides visibility and runtime protection for cloud-native workloads, including both host-level and network-level controls.

Aqua 3.0 is compatible with implementations of Kubernetes 1.8 or newer, and is available to existing Aqua customers. It is certified on popular Kubernetes-based deployments, including Azure AKS and ACS, Google GKE, Amazon EKS, and RedHat Openshift, and is a Kubernetes Technology Partner.

Aqua 3.0 also introduces many other new features, including malware scanning for images and hosts, vulnerability scanning for hosts, and enhanced support for network plug-ins Flannel, Calico, Weave and Contiv.

Additionally with version 3.0, Aqua unveils its patent-pending MicroEnforcer technology for securing "zero infrastructure" container-as-a-service offerings. The new, patent-pending technology that provides runtime security controls for applications running in a public cloud container-as-a-service (CaaS) environment where the user does not manage VM instances or hosts.

MicroEnforcer technology inserts security controls into the container early in its development lifecycle. As the container image is built, the MicroEnforcer is embedded into it in a way that later allows it to monitor and control instantiated containers, including the ability to prevent specific unauthorized container activities.

Aqua MicroEnforcer secures containers wherever they run:

- It identifies malicious activity, such as access to unauthorized networks or attempts to inject code into the container, and prevents these attempts at runtime;

- It securely injects secrets into containers that are authorized to use them at runtime, leveraging existing enterprise secrets stores;

- All alerts generated by MicroEnforcer are sent to the Aqua Command Center, which in turn can send them to integrated SIEM and analytics tools.

The Latest

September 18, 2018

To celebrate IT Professionals Day 2018 (this year on September 18), the SolarWinds IT Pro Day 2018: A World Powered by Tech Pros survey explores a "Tech PROactive" world where technology professionals have the time, resources, and ability to use their technology prowess to do absolutely anything ...

September 17, 2018

The role of DevOps in capitalizing on the benefits of hybrid cloud has become increasingly important, with developers and IT operations now working together closer than ever to continuously plan, develop, deliver, integrate, test, and deploy new applications and services in the hybrid cloud ...

September 13, 2018

"Our research provides compelling evidence that smart investments in technology, process, and culture drive profit, quality, and customer outcomes that are important for organizations to stay competitive and relevant -- both today and as we look to the future," said Dr. Nicole Forsgren, co-founder and CEO of DevOps Research and Assessment (DORA), referring to the organization's latest report Accelerate: State of DevOps 2018: Strategies for a New Economy ...

September 12, 2018

This next blog examines the security component of step four of the Twelve-Factor methodology — backing services. Here follows some actionable advice from the WhiteHat Security Addendum Checklist, which developers and ops engineers can follow during the SaaS build and operations stages ...

September 10, 2018

When thinking about security automation, a common concern from security teams is that they don't have the coding capabilities needed to create, implement, and maintain it. So, what are teams to do when internal resources are tight and there isn't budget to hire an outside consultant or "unicorn?" ...

September 06, 2018

In evaluating 316 million incidents, it is clear that attacks against the application are growing in volume and sophistication, and as such, continue to be a major threat to business, according to Security Report for Web Applications (Q2 2018) from tCell ...

September 04, 2018

There's a welcome insight in the 2018 Accelerate State of DevOps Report from DORA, because for the first time it calls out database development as a key technical practice which can drive high performance in DevOps ...

August 29, 2018

While everyone is convinced about the benefits of containers, to really know if you're making progress, you need to measure container performance using KPIs.These KPIs should shed light on how a DevOps team is faring in terms of important parameters like speed, quality, availability, and efficiency. Let's look at the specific KPIs to track for each of these broad categories ...

August 27, 2018

Protego Labs recently discovered that 98 percent of functions in serverless applications are at risk, with 16 percent considered "serious" ...

August 23, 2018

After another record year of breaches, The 2018 DevSecOps Community Survey found that 3 in 10 respondents suspected or verified breaches stemming from vulnerabilities in open source components — a 55% increase over 2017, and 121% increase since 2014 ...

Share this