Insights, updates and latest news on container security.
With containers being the next major disruption in application technology, this channel features live and on-demand videos with insights, updates and latest news on container security. Watch any video at your convenience or sign up to our channel.
As the adoption of containers and serverless continues to expand to a greater number of enterprises, and to greater numbers of applications within enterprises, it’s not just about managing nodes anymore. Many organizations now run multiple applications, across disparate teams, running on-prem or on different clouds and orchestrators, resulting in a growing need for scalable security that’s easy-to-manage.
With this complex, scaling environment, who owns Kubernetes security?
Attend this webinar to learn how to better manage complex, multi-application, multi-cloud and multi-team enterprise Kubernetes environments with easy to manage policies, intuitive runtime visibility and RBAC at scale.
Liz Rice, Aqua Security & Michael Hausenblas, Red HatRecorded: Mar 12 201926 mins
Presented by the authors of the bestselling O’Reilly Book “Kubernetes Security: Operating Kubernetes Clusters and Applications Safely”
Kubernetes is fundamentally a complex system with lots of different potential attack vectors aimed at data theft, currency mining and other threats. This talk provides an overview of the current state of security-related features in Kubernetes, and gives directional starting points on how to secure Kubernetes components and the applications that run on top of these Kubernetes components. For the topics explored, pointers on where to further investigate will be offered.
•Container image scanning and container security
•Security boundaries (pod, namespace, node, cluster)
•Securing the control plane and Kubernetes APIs
•Authentication and authorization, including new tools available
•Say no to root (and why)!
•Runtime considerations, secrets management and more!
All kidding aside, while recent research indicates significant risks in serverless apps, these risks can largely be mitigated using simple, automated steps in CI/CD pipelines, in both staging and production environments. Taking the right preventative measures can significantly reduce risk and thwart potential attacks.
In this webinar, we analyze the risks and attack vectors highlighted by OWASP and other research, categorizing them into 4 categories based on their severity/potential impact. We will show how Aqua’s serverless security solution addresses each category, demonstrating the following:
•Securing the serverless CI/CD pipeline
•Automated checks in staging environments that create least privilege roles/permissions model
•Profiling Functions’ behavior based data collected during runtime.
•Usage of AWS Lambda layers to identify/block malicious activity in serverless functions
Aqua Security and CircleCiRecorded: Feb 28 201933 mins
Presented in partnership with CircleCi
Enterprises are doing what they can to foster a “security first” mentality within their IT organizations, but don’t always have the necessary skills in-house and may not take the steps needed to build security into an application by design.
As DevOps accelerate application development and deployment, implementing security as an afterthought is no longer an option, since that approach cannot handle the velocity and scale of agile application deployments. Automation is key to embedding security into the DevOps pipeline and ensuring that code is secure before it’s deployed, not after.
In this webinar, Aqua Security and CircleCI will show you how you can bake security into the development process, seamlessly, to ensure that your applications are fully secured throughout the development lifecycle. We’ll show you how you can:
•Build software quickly, using custom job orchestration
•See all of your builds at a glance, including failed builds and slow tests
•Identify image vulnerabilities as you build your application
•Configure your “risk-appetite" to pass or fail images in build based on vulnerability severity
Dustin Aubrey with Aqua SecurityRecorded: Feb 20 201962 mins
Container and Cloud-Native Application Security. It’s our passion. We’ve been there alongside our customers every step of the way: enabling them to secure applications before they're deployed, handling challenges in automating DevSecOps, helping them to scale without increasing risk, and more. We’ve learned a lot.
During this webinar, learn from our three years of hands-on experiences in this rapidly evolving market working on some of the world’s most advanced and large-scale container deployments.
We’ll share our views on:
•What to invest your time in - what’s most impactful for the effort
•What has been successful
•What to do as you scale up
Rani Osnat, Aqua Security and Jason Yee, DatadogRecorded: Jan 31 201941 mins
If your infrastructure is running a high load, how can you know whether that's a normal operation or a hacker who's just using your servers to mine bitcoins? In this webinar, we'll show you a better approach to securing containers and how the right combination of monitoring and security tools keeps your systems performant, reliable and secure – against crypto currency mining, and a lot more.
In this webinar, we'll cover how you can:
-Aggregate data streams and customize how your data is displayed
-Track known vulnerabilities and security issues in existing images
-Monitor containers running from unauthorized images
-Monitor runtime policy violations and audit events
Benjy Portnoy, CISSP, CISA, Aqua SecurityRecorded: Jan 23 201950 mins
Benjy Portnoy, Director of DevSecOps at Aqua Security, has spent the past 3 years working with dozens of organizations on securing their deployments of Kubernetes, Docker, Red Hat OpenShift and other cloud native technologies.
In this webinar, Benjy will share his experiences to help you figure out:
• What to expect from platform providers, security-wise, and what gaps remain
• The maturity curve of securing cloud native applications (containers, serverless and what’s in between) – from the most basic controls to advanced runtime controls
• What to expect from a cloud native security platform: Key criteria to consider
• How to ensure that your organization is ready to go into production across various stake holders and teams
Rani Osnat, VP of Product Marketing, Aqua SecurityRecorded: Jan 15 201934 mins
The growing adoption of containers and the availability of scalable orchestration tools (e.g. Kubernetes) are creating opportunities to develop more agile, easy-to-update applications that combine stateful and stateless modes. The emerging architecture combines both modalities, that have very different security considerations and risk profiles.
While Cloud Foundry Application Runtime is well-suited to 12-factor application development, Cloud Foundry Container Runtime is better for flexible, rapidly-updated apps that can scale-out specific parts of the application in a very elastic way. However, from a security standpoint, CFCR presents challenges in the form of 3rd party open-source inflow, developer-driven code changes, and frequent updates. It also presents benefits in the form of immutability, better network segmentation, and lack of persistence on the host (the notion we sometimes refer to as “reverse uptime”).
This webinar describes how to approach these divergent needs and demonstrates some of the methods and tools that can be used to mitigate risk without slowing down development.
Liz Rice Technology Evangelist, Aqua SecurityRecorded: Jan 10 201950 mins
Kubernetes enables you to run containerized workloads at scale on a cluster of virtual machines, while AWS Fargate offers a flexible way to run containers without having to manage servers. What are the best ways to protect these workloads against attacks? In this demo-rich chalk talk, including a live exploit, we explore how techniques like image scanning and runtime protection tools can provide innovative ways to control and secure your containerized applications, even when there is no way to directly access the hosts that they are running on.
Please join us for this encore Chalk Talk delivered by Liz Rice at AWS Re:Invent
Rani Osnat - V.P. Product Marketing, Aqua SecurityRecorded: Nov 28 201844 mins
Containers and serverless adoption continues to expand, with the numbers of applications growing within enterprises. Many organizations now run multiple applications, across disparate teams, running on-prem or on different clouds, and requiring varying levels of security and compliance.
Attend this webinar to learn how to better manage complex, multi-application, multi-cloud and multi-team enterprise environments with easy to manage policies, intuitive runtime visibility and role-based access control (RBAC) at scale.
Tsvi Korren - Chief Solutions Architect at Aqua SecurityRecorded: Nov 26 201854 mins
The concept of “shift left” engages security earlier in the development cycle of cloud-native applications, accelerating development while reducing risk. However, migrating to cloud-native environments also necessitates the security team to “shift up”, focusing on the application layer to account for the shared-service model and “thin OS” environments that are prevalent in these environments.
Attend this webinar to learn why Shifting Up provides improved security and cost efficiency in cloud-native environments, including:
•Containers as a Service (CaaS)