Hi [[ session.user.profile.firstName ]]

The Container Security Channel

  • Date
  • Rating
  • Views
  • Aqua Serverless Security for AWS Lambda
    Aqua Serverless Security for AWS Lambda
    Ariel Shuper, Aqua Security and Mike Deck, AWS Recorded: May 1 2019 58 mins
    Presented in partnership with AWS

    Serverless functions are a paradigm shift in the way that modern-day applications are designed and developed. The agility, the associated cost-saving, and the lack of need for an Ops team has led to swift adoption of serverless technology such as AWS Lambda.

    Serverless also changes the way you protect your application, creating the need for a new solution that can address its unique framework. Aqua Security identified the security challenges of serverless architectures some time ago, and can help keep your applications compliant and secure with two unique offerings:

    -Aqua’s Serverless Security provides visibility into potential security pitfalls, risk-mitigation recommendations, and policy-enforcement options. It gives users a real-time view of function behavior and flags anomalies based on a behavioral model.

    -Aqua’s Advanced Runtime Protection leverages Lambda’s layer to provide comprehensive runtime protection to protect against remote code executions that leverage vulnerabilities in the function’s code, or usage of debug/cli tools like Bash and Shell with negligible impact on your function’s performance.

    This webinar, presented in partnership with AWS, will explain how you can secure your serverless workloads on AWS Lambda.
  • Why Container Security Has Become a Top Challenge for Enterprises
    Why Container Security Has Become a Top Challenge for Enterprises
    Rani Osnat, Aqua Security and Mark Bouchard, CyberEdge Recorded: Apr 24 2019 53 mins
    A joint presentation by Aqua Security and CyberEdge

    Based on findings published in CyberEdge’s 6th annual 2019 Cyberthreat Defense Report*, containers are highlighted as one of this year’s “weakest links” in IT security given the lowest overall security posture score.

    Mostly this can be attributed to the challenges enterprises face as they transition their containerized applications from the Dev/Test environment into production. Containers require a new approach to security as the traditional security infrastructure is not applicable to cloud native and serverless deployments. Rather they must leverage the cloud-native principles of immutability, microservices and portability using machine-learned behavioral whitelisting, integrity controls and nano-segmentation.

    We will discuss :
    •Key findings from the 2019 Cyberthreat Defense Report
    •The unique security challenges (and benefits) of containers
    •What leading enterprises are doing to automate their container security
    •What you should look for in a container security solution
  • Securing Cloud Native Applications Across the Technology Spectrum
    Securing Cloud Native Applications Across the Technology Spectrum
    Rani Osnat, VP of Product Marketing, Aqua Security Recorded: Apr 16 2019 49 mins
    With the accelerated pace at which enterprise development and deployment of cloud native microservices-based applications is growing, supporting cloud native applications requires a holistic approach to security and compliance, across the application lifecycle as well as up and down the stack.

    This webinar helps security teams understand methods for managing and enforcing security policies, spanning both multi-cloud and on-premises environments across a blend of:

    •VM-based containers
    •Containers-as-a-Service (CaaS)
    •Function-as-a-Service (FaaS)
    •Orchestration layer

    You’ll learn how the latest release of the Aqua Cloud Native Security platform protects applications across the technology spectrum as well as against undiscovered vulnerabilities by implementing tight compliance and whitelisting-based zero-trust security.
  • The Emergence of Kubernetes and the Need for Enterprise-Grade Security
    The Emergence of Kubernetes and the Need for Enterprise-Grade Security
    Amir Jerbi, CTO at Aqua Security Recorded: Apr 9 2019 53 mins
    As the adoption of containers and serverless continues to expand to a greater number of enterprises, and to greater numbers of applications within enterprises, it’s not just about managing nodes anymore. Many organizations now run multiple applications, across disparate teams, running on-prem or on different clouds and orchestrators, resulting in a growing need for scalable security that’s easy-to-manage.

    With this complex, scaling environment, who owns Kubernetes security?

    Attend this webinar to learn how to better manage complex, multi-application, multi-cloud and multi-team enterprise Kubernetes environments with easy to manage policies, intuitive runtime visibility and RBAC at scale.
  • The State of Kubernetes Security
    The State of Kubernetes Security
    Liz Rice, Aqua Security & Michael Hausenblas, Red Hat Recorded: Mar 12 2019 26 mins
    Presented by the authors of the bestselling O’Reilly Book “Kubernetes Security: Operating Kubernetes Clusters and Applications Safely”

    Kubernetes is fundamentally a complex system with lots of different potential attack vectors aimed at data theft, currency mining and other threats. This talk provides an overview of the current state of security-related features in Kubernetes, and gives directional starting points on how to secure Kubernetes components and the applications that run on top of these Kubernetes components. For the topics explored, pointers on where to further investigate will be offered.

    Topics Covered:
    •Container image scanning and container security
    •Security boundaries (pod, namespace, node, cluster)
    •Securing the control plane and Kubernetes APIs
    •Authentication and authorization, including new tools available
    •Say no to root (and why)!
    •Runtime considerations, secrets management and more!
  • 57 Easy Steps to Secure Serverless Functions
    57 Easy Steps to Secure Serverless Functions
    Ariel Shuper Recorded: Mar 11 2019 54 mins
    All kidding aside, while recent research indicates significant risks in serverless apps, these risks can largely be mitigated using simple, automated steps in CI/CD pipelines, in both staging and production environments. Taking the right preventative measures can significantly reduce risk and thwart potential attacks.

    In this webinar, we analyze the risks and attack vectors highlighted by OWASP and other research, categorizing them into 4 categories based on their severity/potential impact. We will show how Aqua’s serverless security solution addresses each category, demonstrating the following:

    •Securing the serverless CI/CD pipeline
    •Automated checks in staging environments that create least privilege roles/permissions model
    •Profiling Functions’ behavior based data collected during runtime.
    •Usage of AWS Lambda layers to identify/block malicious activity in serverless functions
  • Container and Cloud Native Security:  Sharing 3 Years of Valuable Experience
    Container and Cloud Native Security: Sharing 3 Years of Valuable Experience
    Dustin Aubrey with Aqua Security Recorded: Feb 20 2019 62 mins
    Container and Cloud-Native Application Security. It’s our passion. We’ve been there alongside our customers every step of the way: enabling them to secure applications before they're deployed, handling challenges in automating DevSecOps, helping them to scale without increasing risk, and more. We’ve learned a lot.

    During this webinar, learn from our three years of hands-on experiences in this rapidly evolving market working on some of the world’s most advanced and large-scale container deployments.

    We’ll share our views on:
    •What to invest your time in - what’s most impactful for the effort
    •What has been successful
    •What to do as you scale up
  • Best of Both Worlds: Keep your Apps Performant & Secure using Datadog and Aqua
    Best of Both Worlds: Keep your Apps Performant & Secure using Datadog and Aqua
    Rani Osnat, Aqua Security and Jason Yee, Datadog Recorded: Jan 31 2019 41 mins
    If your infrastructure is running a high load, how can you know whether that's a normal operation or a hacker who's just using your servers to mine bitcoins? In this webinar, we'll show you a better approach to securing containers and how the right combination of monitoring and security tools keeps your systems performant, reliable and secure – against crypto currency mining, and a lot more.

    In this webinar, we'll cover how you can:
    -Aggregate data streams and customize how your data is displayed
    -Track known vulnerabilities and security issues in existing images
    -Monitor containers running from unauthorized images
    -Monitor runtime policy violations and audit events
  • Why You Need a Cloud Native Security Solution and How to Evaluate One
    Why You Need a Cloud Native Security Solution and How to Evaluate One
    Benjy Portnoy, CISSP, CISA, Aqua Security Recorded: Jan 23 2019 50 mins
    Benjy Portnoy, Director of DevSecOps at Aqua Security, has spent the past 3 years working with dozens of organizations on securing their deployments of Kubernetes, Docker, Red Hat OpenShift and other cloud native technologies.

    In this webinar, Benjy will share his experiences to help you figure out:

    • What to expect from platform providers, security-wise, and what gaps remain
    • The maturity curve of securing cloud native applications (containers, serverless and what’s in between) – from the most basic controls to advanced runtime controls
    • What to expect from a cloud native security platform: Key criteria to consider
    • How to ensure that your organization is ready to go into production across various stake holders and teams
  • Security Considerations for CF Container Runtime vs. CF Application Runtime
    Security Considerations for CF Container Runtime vs. CF Application Runtime
    Rani Osnat, VP of Product Marketing, Aqua Security Recorded: Jan 15 2019 34 mins
    The growing adoption of containers and the availability of scalable orchestration tools (e.g. Kubernetes) are creating opportunities to develop more agile, easy-to-update applications that combine stateful and stateless modes. The emerging architecture combines both modalities, that have very different security considerations and risk profiles.

    While Cloud Foundry Application Runtime is well-suited to 12-factor application development, Cloud Foundry Container Runtime is better for flexible, rapidly-updated apps that can scale-out specific parts of the application in a very elastic way. However, from a security standpoint, CFCR presents challenges in the form of 3rd party open-source inflow, developer-driven code changes, and frequent updates. It also presents benefits in the form of immutability, better network segmentation, and lack of persistence on the host (the notion we sometimes refer to as “reverse uptime”).

    This webinar describes how to approach these divergent needs and demonstrates some of the methods and tools that can be used to mitigate risk without slowing down development.

Embed in website or blog