DockerCon18 announcements; CoreOS App Metering tool; Image vulnerability scanning plugin for Jenkins, and the state of DevSecOps
Not rendering correctly? View this email as a web page here.
Container & DevSecOps Digest | June: Post DockerCon18; CoreOS App Metering Tool; Image Vulnerability Scanning Plugin for Jenkins, and the State of DevSecOps
The 5th DockerCon North America just closed its doors, where as usual there were many interesting announcements, with both Docker and its ecosystem partners showing their latest innovations. Here's a summary of those and other industry news, along with Aqua's own updates and some upcoming events. You're welcome to contact us contact@aquasec.com and follow us on Twitter @AquaSecTeam.
DockerCon: Building and managing containersSeveral companies announced new products and functionality at this week’s DockerCon18... Red Hat was talking about the initial public release of its Buildah command-line utility for creating or changing Linux container images. Read on IT Ops Times ›
Can DevOps Really Shift Everything 'To The Left'?Wouldn’t that simply pile all the tasks together willy-nilly, or perhaps force us to resort them into some other left-to-right order?The answer goes at the heart of what ‘continuous’ really means in the context of continuous integration and continuous delivery, the CI/CD mantras at the heart of DevOps. Read on Forbes ›
SANS Secure DevOps SurveyWith this survey, theSANS Institute intends to delve into the specific challenges and risks that organizations find as they start to converge into unified, secure DevOps. This new survey will examine the emergence of the integration of development, IT and security, as well as explore the implications for practitioners. Help the community learn from your own experience, take the Survey ›
Webinar: Kubernetes – How to Prevent Attacks with Admission Controllers
By applying proper admission controls in your Kubernetes cluster, it's possible to generate deployments that adhere to the least privilege model, limiting user and container activity based on their business usage needs. In this session, we will review the Kubernetes 1.10 admission controller capabilities and demo a dynamic admission control webhook that can be customized to limit privileged user access. You’ll learn how to make such standards easier to implement, as well as methods for providing production-grade security.
DevSecOps Gains Enterprise TractionDevSecOps is a great portmanteau word, but is it a concept in wide use? According to a survey of attendees at this year's RSA Conference, it's not yet universal, but many more organizations are now embracing at least some DevSecOps principles than was the case even a yearago... Read on Dark Reading ›
Multi-cloud strategy: 5 challenges you’ll faceAs multi-cloud strategies continue to mature, we asked a range of experts to weigh in on the problems multi-cloud IT shops commonly encounter – and must solve to maximize the potential benefits. These issues all can be solved: They should not be viewed as deal-breakers for your long-term multi-cloud strategy, but rather as opportunities for learning and proactive solutions. Read on The Enterprisers Project ›
Securing Kubernetes Deployments on Amazon EKS with Aqua...The integration of Aqua with EKS provides a seamless way to enforce compliance and security policies on applications running on EKS clusters: Preventing unapproved images from being deployed, enforcing runtime policy controls on containers and pods, ensuring that the cluster nodes are properly configured against the CIS Kubernetes benchmark, and more..Continue Reading ›
Improve Security with Automated Image Scanning Through CI/CD
Liz Rice the container technology evangelist talks to Alex Williams from The New Stackaboutsecuring applications deployed on Kubernetes through automation of the CI/CD pipeline. Using cloud-native security tools that hook right into Jenkins or your favorite CI/CD tool, enterprise security teams can set policies for developers who are building container images. The pipeline enforces those policies through automated vulnerability scanning of each image during the build process. Watch it Now ›
Ready to Secure your Cloud-Native Apps?
Aqua provides a container security platform that enables enterprises to secure their cloud-native and container-based applications from development to production.