Aqua 3.0 Released
March 12, 2018

Aqua Security announced the availability of version 3.0 of its platform featuring new security automation and controls for Kubernetes-based runtime environments.

The new release also introduces more than 120 additional features, extending the capabilities of the company's end-to-end container security platform to address the requirements of today's multi-platform enterprise customers, from securing the build pipeline and enabling DevSecOps, to runtime protection of workloads.

As part of its 3.0 launch, Aqua also unveiled patent-pending MicroEnforcer architecture to deliver runtime security for Container-as-a-Service environments.

"Kubernetes adoption has been increasing along with the maturity and enterprise-readiness of its features," noted Liz Rice, Technology Evangelist at Aqua Security. "With the enterprise security skill shortage, enterprises are looking for ways to leverage Kubernetes to automate deployments and accelerate application delivery, at scale, without compromising on security. That's what Aqua 3.0 is all about."

Aqua 3.0 builds on Kubernetes security capabilities to provide automated Kubernetes-native controls in several key areas:

- Kubernetes-Native Role Based Access Controls: Aqua 3.0 enables customers to leverage Kubernetes webhook admission controller to create fine-grained user access control roles and policies, controlling access to kubectl commands, governed by Aqua's scalable labeling scheme. This enables security teams to govern access across teams, with full segregation of duties.

- Kubernetes-Native Image Assurance Controls: In addition to its ability to block unapproved images from running at the individual host level, Aqua can now prevent Kubernetes from running unapproved images across entire clusters, providing a more efficient mechanism that scales across large deployments.

- Kubernetes-Native Network Controls: Aqua's container-level firewall now enables admins to control network traffic based on Kubernetes namespaces, clusters or deployments. This allows admins to enforce network segmentation for compliance purposes, as well as limit an attack's "blast radius" across clusters and applications.

- CIS Kubernetes Benchmark: Building upon Aqua's open-source Kube-Bench, the tool widely used by the community to validate the security posture of Kubernetes deployments, Aqua now incorporates CIS Kubernetes benchmark checks alongside updated Docker CIS benchmark checks. Automated checks can run daily, providing a detailed report that can also be exported for compliance.

- Kubernetes Context in Audit Events: Aqua's event logging now includes Kubernetes-specific information, such as pod name, type, deployment and namespace data, providing additional visibility for compliance and forensics.

The Aqua platform drives DevSecOps automation, and provides visibility and runtime protection for cloud-native workloads, including both host-level and network-level controls.

Aqua 3.0 is compatible with implementations of Kubernetes 1.8 or newer, and is available to existing Aqua customers. It is certified on popular Kubernetes-based deployments, including Azure AKS and ACS, Google GKE, Amazon EKS, and RedHat Openshift, and is a Kubernetes Technology Partner.

Aqua 3.0 also introduces many other new features, including malware scanning for images and hosts, vulnerability scanning for hosts, and enhanced support for network plug-ins Flannel, Calico, Weave and Contiv.

Additionally with version 3.0, Aqua unveils its patent-pending MicroEnforcer technology for securing "zero infrastructure" container-as-a-service offerings. The new, patent-pending technology that provides runtime security controls for applications running in a public cloud container-as-a-service (CaaS) environment where the user does not manage VM instances or hosts.

MicroEnforcer technology inserts security controls into the container early in its development lifecycle. As the container image is built, the MicroEnforcer is embedded into it in a way that later allows it to monitor and control instantiated containers, including the ability to prevent specific unauthorized container activities.

Aqua MicroEnforcer secures containers wherever they run:

- It identifies malicious activity, such as access to unauthorized networks or attempts to inject code into the container, and prevents these attempts at runtime;

- It securely injects secrets into containers that are authorized to use them at runtime, leveraging existing enterprise secrets stores;

- All alerts generated by MicroEnforcer are sent to the Aqua Command Center, which in turn can send them to integrated SIEM and analytics tools.

The Latest

March 19, 2018

The global DevOps market size is expected to reach USD 12.85 billion by 2025, according to a new study by Grand View Research, registering an 18.60% CAGR during the forecast period ...

March 15, 2018

More than half of companies (52%) admit to cutting back on security measures to meet a business deadline or objective, according to a SecOps research report released by Threat Stack ...

March 13, 2018

While microservices can certainly be used for greenfield projects, the survey suggests that this is not the sole source of value. In fact, more than half of respondents indicate that they are also using microservices to re-architect existing projects. The reality we see is that microservices can offer value to users along their IT transformation journey — whether they are just looking to update their current application portfolio or are gearing up for new initiatives ...

March 12, 2018

As DevOps teams and developers are looking to make 2018 the year in which technical crises are avoided, continuous testing should be at the top of their resolutions list. Here are four steps developers and DevOps teams can take to ensure the benefits of continuous testing are effectively implemented throughout the development process ...

March 08, 2018

Digital leaders will outpace their rivals by adopting methodologies and mindsets that shorten software delivery cycles. They'll also get really, really good at rapid, iterative change following design thinking principles ...

March 06, 2018

There are six major pain points that companies experience when they try to deploy and run Kubernetes in their complex environments, and there are also some best practices companies can use to address those pain points ...

March 05, 2018

With more than 30 Kubernetes solutions in the marketplace, it's tempting to think Kubernetes and the vendor ecosystem has solved the problem of operationalizing containers at scale. Far from it. There are six major pain points that companies experience when they try to deploy and run Kubernetes in their complex environments, and there are also some best practices companies can use to address those pain points ...

March 01, 2018

With the growing adoption of tablets and smartphones, companies are constantly seeking new web technologies that support multiple device types in addition to traditional desktops. At the same time, they are continually adding capabilities to their web applications that help users visualize and analyze data regardless of the platform or device used. To keep up in this changing technology environment, organizations must deliver these complex applications quickly, with high quality, and yet find ways to maximize their investment in these apps over the long haul ...

February 27, 2018

While most organizations are committed to the full adoption of both agile and DevOps, many are struggling with key challenges and missing out on the extensive benefits these practices can have on their bottom line, according to a global study by CA Technologies ...

February 26, 2018

To help understand the current state of development trends, Dimensional Research and Micro Focus worked together to create the, Managing the migration to DevOps: A global survey of software developers report. The research shows that nearly all organizations are already adopting or are taking a strong interest in the processes necessary to implement DevOps. But, there are challenges to overcome as companies because they are often running both traditional waterfall and DevOps development and release processes in tandem — and plan to support both into the future ...

Share this