There once was a time in software development where developers could design, build and then think about their software's security. However in today's highly connected, API-driven application environment, this approach is simply too risky as it exposes the software to vulnerabilities ...
Aqua Security announced early availability of its runtime security controls for workloads using the CRI-O runtime engine, including those managed using Red Hat OpenShift Container Platform.
CRI-O is an implementation of the Kubernetes CRI (Container Runtime Interface) that enables using OCI (Open Container Initiative) compatible runtimes. It is a lightweight alternative to using Docker as the runtime for Kubernetes. It allows Kubernetes to use any OCI-compliant runtime as the container runtime for running pods. Red Hat OpenShift Container Platform 3.9 introduced GA support for CRI-O as a runtime engine on its platform in April 2018.
"As standards in the cloud-native ecosystem continue to evolve towards simpler common frameworks, organizations must continue to maintain visibility and control over their workloads," said Amir Jerbi, CTO and co-founder of Aqua Security. "We are committed to helping customers secure their applications no matter where and how they are deployed. By extending our support to CRI-O and other emerging standards we are realizing our vision of 'secure once, run anywhere'."
Chris Morgan, Global Technical director, OpenShift Ecosystem at Red Hat said: "Security and compliance are top of mind for our enterprise customers, and the runtime protection capabilities delivered by certified OpenShift partners such as Aqua can help deliver this."
Aqua's container security platform increases the security of cloud-native applications by applying security controls across their entire lifecycle, from development to production. Runtime controls, which now support CRI-O, include:
- Preventing unauthorized images from instantiating
- Zero-configuration protection using machine-learning to understand a container's behavior and applying least-privilege policies that permit the container to perform only legitimate application activities
- Auditing of container activities such as user access, file access, executables used, network access, and more
- Firewalling of container level network connections
Aqua's runtime support for CRI-O will be generally available in July 2018.