Aqua Security offers two primary deployment models for its cloud-native security platform: Aqua SaaS and Aqua Self-Hosted. Choosing the right one hinges on your organization’s specific needs regarding control, operational overhead, and security posture.

Here’s Aqua Security in action, demonstrating its vulnerability scanning capabilities against a sample container image.

# Simulate pulling an image and scanning it with Aqua CLI
docker pull ubuntu:latest
aqua scan ubuntu:latest --format json > scan_results.json
cat scan_results.json

The output will detail vulnerabilities found, their severity, and remediation advice, showcasing Aqua’s ability to identify risks before they impact production.

The core problem Aqua Security addresses is the fragmented and complex security landscape of cloud-native environments. Traditional security tools often fail to keep pace with the dynamic nature of containers, Kubernetes, and serverless architectures. Aqua provides a unified platform to manage security across the entire application lifecycle, from code to cloud.

Internally, Aqua works by deploying an agent (often a DaemonSet in Kubernetes) that collects runtime information and policy compliance data. This data is then analyzed against Aqua’s extensive vulnerability and compliance databases. For SaaS, this data is sent to Aqua’s managed cloud infrastructure. For self-hosted, it’s processed within your own environment. The platform offers granular control over policies, allowing you to define what’s acceptable in your environment, such as restricting the use of specific base images, disallowing privileged containers, or enforcing software bill of materials (SBOM) requirements.

The key levers you control include:

  • Policy Definition: Crafting granular security policies based on vulnerability thresholds, compliance standards (like CIS Benchmarks, PCI DSS, HIPAA), and custom rules.
  • Image Scanning: Integrating scans into CI/CD pipelines to catch vulnerabilities early.
  • Runtime Protection: Implementing real-time threat detection and prevention for running containers and Kubernetes clusters.
  • Network Segmentation: Defining and enforcing network policies to limit the blast radius of a compromised container.
  • Configuration Management: Ensuring Kubernetes and container configurations adhere to security best practices.

Aqua’s unified dashboard provides a single pane of glass to view security posture across all your cloud-native assets, enabling proactive threat hunting and incident response.

The most surprising true thing about Aqua’s approach is how deeply it integrates with the underlying cloud-native orchestration systems, particularly Kubernetes. It doesn’t just scan images; it understands the context of how those images are deployed. This means it can enforce policies not just on the image itself, but on its runtime behavior within a pod, its network access, and its privileges, all while respecting Kubernetes’ own resource management and security constructs.

The next concept to explore is integrating Aqua’s security policies directly into your CI/CD pipelines for automated security gates.

Want structured learning?

Take the full Aqua course →