Active Workload Protection on Amazon EKS and AWS Fargate
Container adoption has been skyrocketing, but as enterprises mature their container implementations, they face challenges in large-scale orchestration, time-to-market, and security. Amazon’s Managed Kubernetes Service (EKS) and AWS Fargate, which runs containers without having to manage servers or clusters, offer organizations great flexibility, scale and hassle-free options for deploying container-based applications.
The different modes of deployment also make it necessary to gain visibility and uniform security controls across EKS clusters and Fargate deployments. Protecting the application layer requires in-depth understanding of the workloads and their intended functionality.
Attend this webinar to see how the combination of AWS security controls and Aqua’s comprehensive container security platform provide a complete solution for securing containerized applications:
•Full life-cycle security controls that ensure applications are secured before they’re deployed
•Visibility into the security and compliance posture of applications deployed across Fargate and EKS
•Single-pane-of-glass management of security policy, uniformly across clusters and deployment modalities
•Leveraging other native AWS services including Amazon ECR, AWS KMS, IAM roles, and PrivateLink
Join our speakers Scott Ward, Principal Solution Architect, AWS and Liz Rice, Technology Evangelist, Aqua to learn how to secure your AWS container deployments.
RecordedSep 14 201838 mins
Your place is confirmed, we'll send you email reminders
Serverless functions are a paradigm shift in the way that modern-day applications are designed and developed. The agility, the associated cost-saving, and the lack of need for an Ops team has led to swift adoption of serverless technology such as AWS Lambda.
Serverless also changes the way you protect your application, creating the need for a new solution that can address its unique framework. Aqua Security identified the security challenges of serverless architectures some time ago, and can help keep your applications compliant and secure with two unique offerings:
-Aqua’s Serverless Security provides visibility into potential security pitfalls, risk-mitigation recommendations, and policy-enforcement options. It gives users a real-time view of function behavior and flags anomalies based on a behavioral model.
-Aqua’s Advanced Runtime Protection leverages Lambda’s layer to provide comprehensive runtime protection to protect against remote code executions that leverage vulnerabilities in the function’s code, or usage of debug/cli tools like Bash and Shell with negligible impact on your function’s performance.
This webinar, presented in partnership with AWS, will explain how you can secure your serverless workloads on AWS Lambda.
Rani Osnat, Aqua Security and Mark Bouchard, CyberEdge
A joint presentation by Aqua Security and CyberEdge
Based on findings published in CyberEdge’s 6th annual 2019 Cyberthreat Defense Report*, containers are highlighted as one of this year’s “weakest links” in IT security given the lowest overall security posture score.
Mostly this can be attributed to the challenges enterprises face as they transition their containerized applications from the Dev/Test environment into production. Containers require a new approach to security as the traditional security infrastructure is not applicable to cloud native and serverless deployments. Rather they must leverage the cloud-native principles of immutability, microservices and portability using machine-learned behavioral whitelisting, integrity controls and nano-segmentation.
We will discuss :
•Key findings from the 2019 Cyberthreat Defense Report
•The unique security challenges (and benefits) of containers
•What leading enterprises are doing to automate their container security
•What you should look for in a container security solution
Rani Osnat, VP of Product Marketing, Aqua Security
With the accelerated pace at which enterprise development and deployment of cloud native microservices-based applications is growing, supporting cloud native applications requires a holistic approach to security and compliance, across the application lifecycle as well as up and down the stack.
This webinar helps security teams understand methods for managing and enforcing security policies, spanning both multi-cloud and on-premises environments across a blend of:
You’ll learn how the latest release of the Aqua Cloud Native Security platform protects applications across the technology spectrum as well as against undiscovered vulnerabilities by implementing tight compliance and whitelisting-based zero-trust security.
As the adoption of containers and serverless continues to expand to a greater number of enterprises, and to greater numbers of applications within enterprises, it’s not just about managing nodes anymore. Many organizations now run multiple applications, across disparate teams, running on-prem or on different clouds and orchestrators, resulting in a growing need for scalable security that’s easy-to-manage.
With this complex, scaling environment, who owns Kubernetes security?
Attend this webinar to learn how to better manage complex, multi-application, multi-cloud and multi-team enterprise Kubernetes environments with easy to manage policies, intuitive runtime visibility and RBAC at scale.
Liz Rice, Aqua Security & Michael Hausenblas, Red Hat
Presented by the authors of the bestselling O’Reilly Book “Kubernetes Security: Operating Kubernetes Clusters and Applications Safely”
Kubernetes is fundamentally a complex system with lots of different potential attack vectors aimed at data theft, currency mining and other threats. This talk provides an overview of the current state of security-related features in Kubernetes, and gives directional starting points on how to secure Kubernetes components and the applications that run on top of these Kubernetes components. For the topics explored, pointers on where to further investigate will be offered.
•Container image scanning and container security
•Security boundaries (pod, namespace, node, cluster)
•Securing the control plane and Kubernetes APIs
•Authentication and authorization, including new tools available
•Say no to root (and why)!
•Runtime considerations, secrets management and more!
All kidding aside, while recent research indicates significant risks in serverless apps, these risks can largely be mitigated using simple, automated steps in CI/CD pipelines, in both staging and production environments. Taking the right preventative measures can significantly reduce risk and thwart potential attacks.
In this webinar, we analyze the risks and attack vectors highlighted by OWASP and other research, categorizing them into 4 categories based on their severity/potential impact. We will show how Aqua’s serverless security solution addresses each category, demonstrating the following:
•Securing the serverless CI/CD pipeline
•Automated checks in staging environments that create least privilege roles/permissions model
•Profiling Functions’ behavior based data collected during runtime.
•Usage of AWS Lambda layers to identify/block malicious activity in serverless functions
Enterprises are doing what they can to foster a “security first” mentality within their IT organizations, but don’t always have the necessary skills in-house and may not take the steps needed to build security into an application by design.
As DevOps accelerate application development and deployment, implementing security as an afterthought is no longer an option, since that approach cannot handle the velocity and scale of agile application deployments. Automation is key to embedding security into the DevOps pipeline and ensuring that code is secure before it’s deployed, not after.
In this webinar, Aqua Security and CircleCI will show you how you can bake security into the development process, seamlessly, to ensure that your applications are fully secured throughout the development lifecycle. We’ll show you how you can:
•Build software quickly, using custom job orchestration
•See all of your builds at a glance, including failed builds and slow tests
•Identify image vulnerabilities as you build your application
•Configure your “risk-appetite" to pass or fail images in build based on vulnerability severity
Container and Cloud-Native Application Security. It’s our passion. We’ve been there alongside our customers every step of the way: enabling them to secure applications before they're deployed, handling challenges in automating DevSecOps, helping them to scale without increasing risk, and more. We’ve learned a lot.
During this webinar, learn from our three years of hands-on experiences in this rapidly evolving market working on some of the world’s most advanced and large-scale container deployments.
We’ll share our views on:
•What to invest your time in - what’s most impactful for the effort
•What has been successful
•What to do as you scale up
If your infrastructure is running a high load, how can you know whether that's a normal operation or a hacker who's just using your servers to mine bitcoins? In this webinar, we'll show you a better approach to securing containers and how the right combination of monitoring and security tools keeps your systems performant, reliable and secure – against crypto currency mining, and a lot more.
In this webinar, we'll cover how you can:
-Aggregate data streams and customize how your data is displayed
-Track known vulnerabilities and security issues in existing images
-Monitor containers running from unauthorized images
-Monitor runtime policy violations and audit events
Benjy Portnoy, Director of DevSecOps at Aqua Security, has spent the past 3 years working with dozens of organizations on securing their deployments of Kubernetes, Docker, Red Hat OpenShift and other cloud native technologies.
In this webinar, Benjy will share his experiences to help you figure out:
• What to expect from platform providers, security-wise, and what gaps remain
• The maturity curve of securing cloud native applications (containers, serverless and what’s in between) – from the most basic controls to advanced runtime controls
• What to expect from a cloud native security platform: Key criteria to consider
• How to ensure that your organization is ready to go into production across various stake holders and teams
Rani Osnat, VP of Product Marketing, Aqua Security
The growing adoption of containers and the availability of scalable orchestration tools (e.g. Kubernetes) are creating opportunities to develop more agile, easy-to-update applications that combine stateful and stateless modes. The emerging architecture combines both modalities, that have very different security considerations and risk profiles.
While Cloud Foundry Application Runtime is well-suited to 12-factor application development, Cloud Foundry Container Runtime is better for flexible, rapidly-updated apps that can scale-out specific parts of the application in a very elastic way. However, from a security standpoint, CFCR presents challenges in the form of 3rd party open-source inflow, developer-driven code changes, and frequent updates. It also presents benefits in the form of immutability, better network segmentation, and lack of persistence on the host (the notion we sometimes refer to as “reverse uptime”).
This webinar describes how to approach these divergent needs and demonstrates some of the methods and tools that can be used to mitigate risk without slowing down development.
Kubernetes enables you to run containerized workloads at scale on a cluster of virtual machines, while AWS Fargate offers a flexible way to run containers without having to manage servers. What are the best ways to protect these workloads against attacks? In this demo-rich chalk talk, including a live exploit, we explore how techniques like image scanning and runtime protection tools can provide innovative ways to control and secure your containerized applications, even when there is no way to directly access the hosts that they are running on.
Please join us for this encore Chalk Talk delivered by Liz Rice at AWS Re:Invent
Rani Osnat - V.P. Product Marketing, Aqua Security
Containers and serverless adoption continues to expand, with the numbers of applications growing within enterprises. Many organizations now run multiple applications, across disparate teams, running on-prem or on different clouds, and requiring varying levels of security and compliance.
Attend this webinar to learn how to better manage complex, multi-application, multi-cloud and multi-team enterprise environments with easy to manage policies, intuitive runtime visibility and role-based access control (RBAC) at scale.
Tsvi Korren - Chief Solutions Architect at Aqua Security
The concept of “shift left” engages security earlier in the development cycle of cloud-native applications, accelerating development while reducing risk. However, migrating to cloud-native environments also necessitates the security team to “shift up”, focusing on the application layer to account for the shared-service model and “thin OS” environments that are prevalent in these environments.
Attend this webinar to learn why Shifting Up provides improved security and cost efficiency in cloud-native environments, including:
•Containers as a Service (CaaS)
SANS Jim Bird and Barb Filkins and Rani Osnat, Aqua Security
A new survey of SANS practitioners has examined how security and risk management leaders will manage the collaborative, agile nature of DevOps to be seamless and transparent in the development process.
In this webcast, Part 1 on the topic, SANS Analyst Authors Jim Bird and Barb Filkins will reveal how practitioners are handling evolving DevOps requirements and challenges, and how they're integrating security into the process.
Maya Kaczorowski (Google), Rani Osnat and John Michaelson (Aqua)
Google said it themselves, “We are on a mission to make containers accessible to everyone, especially the enterprise.” But enterprises also need enterprise-grade security.
Enter the Aqua Container Security Platform (CSP), the first consumption-based container runtime security solution available on the Google Cloud Platform (GCP) Marketplace.
Aqua CSP is deployed onto your GKE cluster with one click. Once deployed, you get full lifecycle security for your container and Kubernetes-based applications, from image scanning to runtime and network controls.
Attend this webinar and learn how to:
• Protect GKE workloads while paying only for running nodes, per hour, via your monthly GCP bill.
• Scan images in your pipeline and in the Google Container Registry, and ensure that only trusted images are deployed into production
• Apply least-privilege security policies to your runtime environment to automatically detect and prevent malicious activity and container-related attacks
• Segment services on your cluster with container-level firewalling
• Integrate with Google’s Cloud Security Command Center for streamlined visibility
Nolan Karpinski with VMware and John Michaelson with Aqua Security
As more businesses embrace modern, agile application development processes, implementing security at the speed of the business requires an approach that easily extends across both containers and VMs.
Attend this webinar and learn how this integrated, highly scalable approach to securing VMs and containers through a combined solution allows security teams to visualize their security policy for VMs and containers within AppDefense, as well as view and respond to policy violations from Aqua within AppDefense.
During this webinar, we’ll review:
• Runtime assurance for containers that sends container context — called “runtime profiles” — to AppDefense
• How this policy is visualized within AppDefense once it’s inherited from Aqua in order to rationalize policy across various services and modes of deployment.
• Event identification and tracing in AppDefense
Aqua’s open source tools arm Kubernetes administrators and developers with an easy way to identify weaknesses in their deployments so that they can address those issues before they are exploited by attackers.
During this webinar we’ll review how Aqua's open source tools offer preventive security for Kubernetes:
•Kube-Bench: checks a Kubernetes cluster against 100+ checks documented in the CIS Kubernetes Benchmark.
•Kube-Hunter: conducts penetration tests against Kubernetes clusters that hunt for exploitable vulnerabilities and misconfiguration - both from outside the cluster as well as inside it (running as a pod).
As your environment expands from managing your own containers to include Containers as a Service (CaaS) and Serverless, what are the new risks of abstracting the underlying infrastructure? What are the best practices for ensuring consistent policies and compliance across hybrid environments combining serverless and containers?
During this webinar, we will explore the impact of CaaS and Serverless deployments on the enterprise security landscape and how to best protect applications regardless of where they run:
•The attack vectors of serverless environments
•The common practices which can be used across the different platforms
•The unique steps to protect each workload type and environment
•Why legacy security tools are not sufficient for microservices landscape
You’ll walk away with a solid understanding of how to combat the inherent security challenges of Serverless architectures and micro-services landscape.
This 12 minute video explains how to:
•Protect GKE workloads while paying only for running nodes, per hour, via your monthly GCP bill.
•Scan images in your pipeline and in the Google Container Registry, and ensure that only trusted images are deployed into production
•Apply least-privilege security policies to your runtime environment to automatically detect and prevent malicious activity and container-related attacks
•Segment services on your cluster with container-level firewalling
•Integrate with Google’s Cloud Security Command Center for streamlined visibility
Insights, updates and latest news on container security.
With containers being the next major disruption in application technology, this channel features live and on-demand videos with insights, updates and latest news on container security. Watch any video at your convenience or sign up to our channel.
Active Workload Protection on Amazon EKS and AWS FargateScott Ward, Principal Solution Architect, AWS and Liz Rice Technology Evangelist, Aqua Security[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]38 mins