{"id":63270,"date":"2022-03-30T09:01:33","date_gmt":"2022-03-30T09:01:33","guid":{"rendered":"https:\/\/www.cryptocabaret.com\/?p=63270"},"modified":"2022-03-30T09:01:33","modified_gmt":"2022-03-30T09:01:33","slug":"how-aqua-security-is-approaching-devsecops-in-2022","status":"publish","type":"post","link":"https:\/\/www.cryptocabaret.com\/?p=63270","title":{"rendered":"How Aqua Security is approaching DevSecOps in 2022"},"content":{"rendered":"<p><span class=\"field field--name-title field--type-string field--label-hidden\">How Aqua Security is approaching DevSecOps in 2022<\/span><br \/>\n<span class=\"field field--name-uid field--type-entity-reference field--label-hidden\"><a title=\"View user profile.\" href=\"https:\/\/opensource.com\/users\/gkamathe\" class=\"username\">Gaurav Kamathe<\/a><\/span><br \/>\n<span class=\"field field--name-created field--type-created field--label-hidden\">Wed, 03\/30\/2022 &#8211; 03:00<\/span><\/p>\n<div data-drupal-selector=\"rate-node-69781\" class=\"rate-widget-thumbs-up\">\n<div class=\"rate-thumbs-up-btn-up rate-thumbs-up-btn-up vote-pending\">Up<\/div>\n<div class=\"rate-score\"><a href=\"https:\/\/opensource.com\/user\/register?absolute=1\">Register<\/a> or <a href=\"https:\/\/opensource.com\/user\/login?current=\/rss.xml&amp;absolute=1\">Login<\/a> to like.<\/div>\n<\/div>\n<div class=\"clearfix text-formatted field field--name-body field--type-text-with-summary field--label-hidden field__item\">\n<p>I recently took the opportunity to discuss open source and security challenges with Itay Shakury of <a href=\"https:\/\/marketplace.redhat.com\/en-us\/products\/aqua-security?intcmp=7013a000002qLH8AAM\">Aqua Security<\/a>. What follows is a fascinating discussion about current issues, the future, and specific cloud-native tools that address the concerns of today&#8217;s Chief Information Security Officers (CISOs).<\/p>\n<p><strong>Itay, could you please introduce yourself to our readers?<\/strong><\/p>\n<p>Itay Shakury, Director of Open Source at Aqua Security. I have nearly 20 years of experience in tech, spent across engineering, software architecture, IT, product management, consulting, and more. In recent years, my career path has led me to cloud-native technologies and open source software.<\/p>\n<\/p>\n<div class=\"embedded-resource-list callout-float-right\">\n<div class=\"field field--name-title field--type-string field--label-hidden field__item\">Explore the open source cloud<\/div>\n<div class=\"field field--name-links field--type-link field--label-hidden field__items\">\n<div class=\"field__item\"><a href=\"https:\/\/www.redhat.com\/en\/services\/training\/do092-developing-cloud-native-applications-microservices-architectures?intcmp=7013a000002gp8aAAA\">Free online course: Developing cloud-native applications with microservices<\/a><\/div>\n<div class=\"field__item\"><a href=\"https:\/\/www.redhat.com\/en\/engage\/managed-cloud-services-s-202202210207?intcmp=7013a000002gp8aAAA\">eBook: Modernize your IT with managed cloud services<\/a><\/div>\n<div class=\"field__item\"><a href=\"https:\/\/cloud.redhat.com\/products\/dedicated\/?intcmp=7013a000002gp8aAAA\">Try for 60 days: Red Hat OpenShift Dedicated<\/a><\/div>\n<div class=\"field__item\"><a href=\"https:\/\/www.redhat.com\/en\/topics\/containers\/what-is-kubernetes?intcmp=7013a000002gp8aAAA\">What is Kubernetes?<\/a><\/div>\n<div class=\"field__item\"><a href=\"https:\/\/www.redhat.com\/en\/topics\/edge-computing?intcmp=7013a000002gp8aAAA\">Understanding edge computing<\/a><\/div>\n<div class=\"field__item\"><a href=\"https:\/\/www.redhat.com\/architect\/?intcmp=7013a000002gp8aAAA\">Latest articles for IT architects<\/a><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<p><strong>Tell us about Aqua Security and what problems is it trying to address?<\/strong><\/p>\n<p>Aqua is pioneering cloud security with its integrated cloud-native application protection platform (CNAPP) that provides prevention, detection, and response automation across the entire application lifecycle. Our suite of solutions enables organizations to secure the supply chain, cloud infrastructure, and running workloads. Aqua&#8217;s family of open source projects is an accessible entry-point that allows anyone to get started with cloud-native security immediately and at no cost while at the same time driving innovation for our commercial offerings.<\/p>\n<p><strong>As Director of Open Source at Aqua Security, what are your major responsibilities?<\/strong><\/p>\n<p>My primary responsibility is developing and executing on open source strategy. The strategy includes refining the OSS projects&#8217; roadmap, identifying community initiatives for engagement, and making open source viable for commercial use. As an engineering manager, I am leading Aqua&#8217;s open source teams. Our OSS group is globally distributed and remote-first. This group of talented open source engineers is turning our OSS vision into reality, and I&#8217;m fortunate enough to have been part of it.<\/p>\n<p><strong>What challenges do companies face in securing Kubernetes? How should they approach this problem?<\/strong><\/p>\n<p>One challenge is addressing security across the complete application lifecycle. In the past few years, more and more responsibilities have been put in developers&#8217; hands, especially with Kubernetes and cloud-native technologies. We are seeing this across different fields like quality, operations, support, and security. This &#8220;shift left&#8221; approach is introducing security controls early (or &#8220;left&#8221;) in the development lifecycle, which obviously is a welcome change, but it leaves the organization with the challenge of bridging these newly added controls with preexisting production security (or &#8220;right&#8221; side).<\/p>\n<p><strong>[ Download the free eBook:\u00a0<a href=\"https:\/\/opensource.com\/downloads\/guide-implementing-devsecops\">A guide to implementing DevSecOps<\/a> ]<\/strong><\/p>\n<p><strong>Aqua Security has a variety of popular open source projects. Can you tell us about them?<\/strong><\/p>\n<p>We have a portfolio of tools and solutions across three domains: security scanning, Kubernetes security, and runtime security.<\/p>\n<p>For security scanning, our open source project Trivy is leading the way. Trivy scans container images and code repositories for known vulnerabilities in packages and libraries. In addition to that, Trivy scans Infrastructure as Code files for misconfigurations and common security issues. Trivy is very well received in the industry and has a robust and supportive community of contributors, which makes it so successful. We recently celebrated a milestone of crossing 10,000 GitHub stars!<\/p>\n<p>In Kubernetes security, Aqua&#8217;s Starboard assesses your Kubernetes clusters&#8217; security posture. It is powered by our other project, kube-bench, which is already a staple of Kubernetes security. Since Starboard is a Kubernetes operator, it will continuously and automatically detect changes to the cluster and application state and maintain an up-to-date report of your security posture.<\/p>\n<p>Runtime security is about detecting and preventing suspicious behavior during production. Our project Tracee achieves that by leveraging cutting-edge technology\u2013eBPF\u2014and is leading the way for how that technology can be applied in this use case.<\/p>\n<p><strong>The use of the eBPF technology is growing in security applications and tooling (tracee). Has it reached a point where it can go mainstream?<\/strong><\/p>\n<p>eBPF has been around for a while and has seen real-world usage in some of the biggest technology companies in the world. The technology is solid (especially its recent editions), but it&#8217;s still not so accessible for developers who are programming with it, nor for users who are adopting it. One of the biggest challenges currently is with building and distributing eBPF-powered applications. Unlike &#8220;normal&#8221; applications, which the vendor would build and then ship the resulting artifact to users, eBPF-based applications are much more sensitive to environmental nuances and therefore are commonly shipped as source code that the user needs to compile on-site. We have been working with the community and industry colleagues to solve these challenges upstream so that eBPF can be more widely available and accessible. This actually resulted in another open source project we released called &#8220;btfhub.&#8221;<\/p>\n<p><strong>Supply chain security is currently one of the topmost items for CISOs worldwide. What other security issues do you think need our collective focus and attention?<\/strong><\/p>\n<p>Supply chain is definitely getting a lot of attention. At Aqua, we identified the security gaps that many organizations face, and we acquired a company specializing in supply chain security\u2013Argon Security. Aqua and Argon are working together to address these challenges, and I&#8217;m sure that our open source family will soon benefit from it.<\/p>\n<p>Most supply chain solutions rely on implementing tools and practices early in the software development lifecycle. This is part of the movement to &#8220;shift left,&#8221; moving security from production to the developers. I think this movement is great, but stitching together the different tools that the organization adopts across the &#8220;left&#8221; and &#8220;right&#8221; side of the house is still a challenge, and this is usually next on a CISO&#8217;s desk.<\/p>\n<p><strong>Security is a growing field, with many wanting to make it a career. What are the top skills\/traits that you prioritize while hiring?<\/strong><\/p>\n<p>Curiosity is something that I think helps people in engineering but especially in InfoSec. Being intrinsically curious and having the drive to investigate and understand how things work is very helpful for a security engineer.<\/p>\n<p>In open source specifically, we are looking for engineers with an additional layer of skills on top of the core technological proficiency. In particular, we value softer skills that contribute to our approach that the open source engineers not only write the code but also plan the product roadmap, speak about it, promote it, and build a community around it.<\/p>\n<p><strong>What does Itay enjoy doing in his free time?<\/strong><\/p>\n<p>Technology is a big part of my life, and I&#8217;m also drawn to it in my free time. But besides that, spending time with my wife and son, hikes, and good food. I also never miss my morning yoga routine.<\/p>\n<hr>\n<p>I&#8217;d like to thank Itay for taking the time to discuss the security concerns we all face in today&#8217;s cloud-native, containerized world. He has provided some great insights and shows just how many solutions open source software provides.<\/p>\n<\/div>\n<div class=\"clearfix text-formatted field field--name-field-article-subhead field--type-text-long field--label-hidden field__item\">\n<p>I sit down with Aqua Security&#8217;s Director of Open Source to discuss cloud trends, Kubernetes security, hiring for InfoSec jobs, and everything in between.<\/p>\n<\/div>\n<div class=\"field field--name-field-lead-image field--type-entity-reference field--label-hidden field__item\">\n<article class=\"media media--type-image media--view-mode-caption\">\n<div class=\"field field--name-field-media-image field--type-image field--label-hidden field__item\">  <img decoding=\"async\" src=\"https:\/\/www.cryptocabaret.com\/wp-content\/uploads\/2022\/03\/security-lock-password.jpg\" width=\"510\" height=\"292\" alt=\"Lock\" title=\"Lock\" loading=\"lazy\"><\/div>\n<div class=\"field field--name-field-caption field--type-text-long field--label-hidden caption field__item\"><span class=\"caption__byline\">Image by: <\/span><\/p>\n<p>JanBaby, via Pixabay CC0.<\/p>\n<\/div>\n<\/article>\n<\/div>\n<div class=\"field field--name-field-tags field--type-entity-reference field--label-hidden field__items\">\n<div class=\"field__item\"><a href=\"https:\/\/opensource.com\/tags\/security-and-privacy\" hreflang=\"en\">Security and privacy<\/a><\/div>\n<div class=\"field__item\"><a href=\"https:\/\/opensource.com\/tags\/containers\" hreflang=\"en\">Containers<\/a><\/div>\n<div class=\"field__item\"><a href=\"https:\/\/opensource.com\/tags\/cloud\" hreflang=\"en\">Cloud<\/a><\/div>\n<div class=\"field__item\"><a href=\"https:\/\/opensource.com\/tags\/kubernetes\" hreflang=\"en\">Kubernetes<\/a><\/div>\n<div class=\"field__item\"><a href=\"https:\/\/opensource.com\/tags\/devops\" hreflang=\"en\">DevOps<\/a><\/div>\n<\/p><\/div>\n<div class=\"hidden field field--name-field-listicle-title field--type-string field--label-hidden field__item\">What to read next<\/div>\n<div class=\"field field--name-field-default-license field--type-list-string field--label-hidden field__item\"><a rel=\"license\" href=\"http:\/\/creativecommons.org\/licenses\/by-sa\/4.0\/\"><br \/>\n        <img decoding=\"async\" alt=\"Creative Commons License\" src=\"https:\/\/www.cryptocabaret.com\/wp-content\/uploads\/2022\/03\/cc-by-sa--17.png\" title=\"This work is licensed under a Creative Commons Attribution-Share Alike 4.0 International License.\"><\/a>This work is licensed under a Creative Commons Attribution-Share Alike 4.0 International License.<\/div>\n<section class=\"field field--name-field-comments field--type-comment field--label-hidden comment-wrapper\">\n<div class=\"comments__count\">\n<div class=\"login\"><a href=\"https:\/\/opensource.com\/user\/register?absolute=1\">Register<\/a> or <a href=\"https:\/\/opensource.com\/user\/login?current=\/rss.xml&amp;absolute=1\">Login<\/a> to post a comment.<\/div>\n<\/p><\/div>\n<\/section>\n<p class=\"wpematico_credit\"><small>Powered by <a href=\"http:\/\/www.wpematico.com\" target=\"_blank\" rel=\"noopener\">WPeMatico<\/a><\/small><\/p>\n","protected":false},"excerpt":{"rendered":"<p>How Aqua Security is approaching DevSecOps in 2022 Gaurav Kamathe Wed, 03\/30\/2022 &#8211; 03:00 Up Register or Login to like. I recently took the opportunity to discuss open source and security challenges with Itay Shakury of Aqua Security. What follows is a fascinating discussion about current issues, the future, and specific cloud-native tools that address [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":63271,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[307],"tags":[],"class_list":["post-63270","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-open-source"],"_links":{"self":[{"href":"https:\/\/www.cryptocabaret.com\/index.php?rest_route=\/wp\/v2\/posts\/63270","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cryptocabaret.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cryptocabaret.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cryptocabaret.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cryptocabaret.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=63270"}],"version-history":[{"count":0,"href":"https:\/\/www.cryptocabaret.com\/index.php?rest_route=\/wp\/v2\/posts\/63270\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cryptocabaret.com\/index.php?rest_route=\/wp\/v2\/media\/63271"}],"wp:attachment":[{"href":"https:\/\/www.cryptocabaret.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=63270"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cryptocabaret.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=63270"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cryptocabaret.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=63270"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}