Security Policy - Aqua https://www.aquasec.com/tag/security-policy/ Cloud Native Security, Container Security & Serverless Security Sun, 31 Mar 2024 16:10:00 +0000 en-US hourly 1 https://wordpress.org/?v=6.5.5 White House Shifts Cybersecurity Strategy to Drive Resilience https://www.aquasec.com/blog/white-house-shifts-cybersecurity-strategy-to-drive-resilience/ Fri, 03 Mar 2023 17:00:41 +0000 https://www.aquasec.com/?p=14459 White House Shifts Cybersecurity Strategy to Drive ResilienceThis week, the White House released its updated National Cybersecurity Strategy detailing the comprehensive approach the U.S. Government’s Administration is taking to cybersecurity. The strategy contains a set of three pillars that outline collaboration between public and private sectors, dealing with systemic challenges within cybersecurity and realignment of incentives for the industry. Pillar Three specifically …]]> Establishing a Resilient DevSecOps Action Plan https://www.aquasec.com/blog/establishing-resilient-devsecops/ Thu, 23 Feb 2023 11:00:00 +0000 https://www.aquasec.com/?p=14461 Establishing a Resilient DevSecOps Action PlanDevSecOps is an easy term to toss around. But what does it mean, exactly? What actually goes into an effective DevSecOps strategy? And how do cloud and DevOps impact DevSecOps processes?  To find out, I participated in a conversation with Merritt Baer, principal in the AWS Office of the CISO, to discuss the best ways …]]> What To Know: A Summary of the Compliance Guide to SSDF https://www.aquasec.com/blog/summary-compliance-guide-to-ssdf/ Tue, 24 Jan 2023 11:00:00 +0000 https://www.aquasec.com/?p=14490 What To Know: A Summary of the Compliance Guide to SSDFNIST has recently researched, defined, and released an entirely new standard for incorporating security into the software development lifecycle called The Secure Software Development Framework.  It was uniquely designed to help address the tremendous gaps in software supply chain security that expose organizations to methodical attacks on an organization’s code, infrastructure, development toolchain, and dependencies. …]]> Out-of the-Box Policies Simplify Container Compliance https://www.aquasec.com/blog/container-compliance-policies/ Thu, 09 Aug 2018 11:53:41 +0000 https://www.aquasec.com/?p=15953 Improve DevOps Processes: Multiple Security Policies Applied to Images https://www.aquasec.com/blog/applying-multiple-security-policies-to-images-in-your-pipeline-to-improve-speed-and-efficiency/ Mon, 22 Jan 2018 12:46:28 +0000 https://www.aquasec.com/?p=16083 Improve DevOps Processes: Multiple Security Policies Applied to ImagesWhen it comes to securing containerized applications, the first item on everyone’s agenda is to ensure that only trusted images are running in your environment, based on security and compliance policies. And for good reason too. This is by far the most effective preventive measure you can take to protect your applications. If you don’t …]]>