Aqua Security Unveils Industry-First Detection & Response for Zero-Day Attacks in Cloud Native EnvironmentsOctober 14, 2021
Aqua Security unveiled the most powerful cloud native detection and response (CNDR) capabilities in the industry. CNDR uses a growing body of more than 80 behavioral indicators to identify zero-day attacks from low level eBPF events, which are surfaced by the open source project Tracee. The new detection capabilities, combined with Aqua’s unique runtime security controls, make Aqua the only vendor that can both detect and granularly prevent malicious activity from spreading without disrupting the production environment.
Newly Identified Behavioral Indicators
CNDR leverages continually updated, runtime behavioral indicators that are based on thousands of real-world attacks observed in the wild on cloud native environments, including Linux, Containers, Serverless and Kubernetes workloads. For example, a rootkit tactic that involves loading a malicious kernel, execution of fileless malware, reverse shell, etc.
In addition to behavioral indicators, Aqua’s threat intelligence includes IP and DNS reputation intel and a malware database, giving CNDR and Aqua’s customers access to the most complete threat intelligence feed for Cloud Native Application security.
“The cloud native threat landscape is constantly evolving. Adversaries are advancing their techniques to craft more sophisticated and targeted attacks at a rate faster than enterprises can track, which makes the cloud native cyber research performed by Team Nautilus so important,” said Amir Jerbi, co-founder and CTO, Aqua Security. “By incorporating the output of this research and intelligence with industry-leading detection capabilities and surgical runtime policies, Aqua delivers the industry’s most comprehensive protection for cloud native environments.”
Built on eBPF-based Open Source Technology
Aqua CNDR is built on the open source project Tracee, which uses Linux eBPF technology to surface suspicious application behavior at runtime. Tracee uniquely takes advantage of eBPF features that prevent circumvention by evaders and exploits, ensuring accurate detection of suspicious behavior. Since its creation in 2019, Tracee has evolved from an open source system tracing tool into a robust runtime security solution for DevOps that includes a powerful eBPF engine, easy deployment, and a list of behavioral indicators to also identify malicious patterns and attacks from eBPF events.
A Pioneer in Cloud Native Detection and Response
The addition of CNDR is a significant milestone in the industry and for Aqua Security, which already offers the most unified and integrated Cloud Native Application Protection Platform (CNAPP) on the market. While a small number of solutions leverage eBPF for observability and monitoring, they lack a broad set of continuously updated behavioral intelligence specific to novel attacks in cloud native environments. Aqua goes beyond mere detection to stop the detected attacks using its granular, highly focused runtime controls.
“It is absolutely critical for application development and security teams to keep the business and production environment running while at the same time maintaining an effective security posture. This is impossible if runtime controls are binary – let the container run with security issues or kill the container. That is why we focus on the most granular, least intrusive enforcement capabilities available, so the business can continue running securely,” said Ehud Amiri, VP Product Management at Aqua Security.
Aqua is also adding new capabilities to its CNAPP, featuring:
- New Kubernetes assurance policies that provide coverage for a variety of vulnerabilities, including known CVEs involving services, secrets in ConfigMaps, and overly permissive access to sensitive resources.
- Maximum platform flexibility with an option for increased cost/performance benefits with Kubernetes Security and scanning support for the new Power10 architecture on Red Hat OpenShift.
- Lightweight, holistic, and streamlined visibility and management of cloud VMs.
- Manage, segment, filter, and group VM workloads from the new VM workload screen using cloud provider attributes, tags, and labels.
- Increase protection, visibility, and compliance for both containers and cloud VMs in one place with lightweight runtime malware scanning (based on pattern matching).
- More locality and compliance options as Aqua Dynamic Threat Analysis (DTA) sandboxes can now be run from multiple hosted locations around the globe.
The Aqua API can now be leveraged to gain awareness of new security risks affecting previously scanned images (e.g., new vulnerabilities, change in severity) and to identify images that have been modified since their last scan.