Seamless integration with your stack, across the cloud native ecosystem

Aqua provides a wide range of connectors for all stages of the cloud native application lifecycle

Aqua Security Platform Integrations

All
Registries
CI/CD
DevOps Tools
Container Platforms
Service Mesh
Serverless
Cloud Providers
Vaults
Security & SIEM
Amazon Security Lake Amazon Security Lake The Amazon Security Lake collects security data from AWS environments. It uses the Open Cybersecurity Schema Framework to standardize and combine the data, making it easier to investigate security concerns and quickly respond to incidents.
AWS Secrets Manager AWS Secrets Manager Manage, retrieve, and rotate database credentials, API keys, and other secrets on AWS Secrets Manager; Then securely deliver them to running containers with no container restart needed and no persistence on the host OS.
Google Artifact Registry Google Artifact Registry Detect and identify vulnerabilities, malware, and secrets for Google Artifact Registry through continuous scanning of images, programming languages and packages.
VMware Tanzu Kubernetes Grid VMware Tanzu Kubernetes Grid Aqua secures the software supply chain, detects, prioritizes and reduce risks, and stops run-time attacks for applications built and deployed on VMware TKG with a comprehensive cloud native security platform.
OpsGenie OpsGenie Open tickets in OpsGenie for scanning, assurance and runtime security events discovered by Aqua, for rapid incident response and remediation.
Azure Service Fabric Azure Service Fabric Automate the deployment of Aqua Enforcers and Aqua Scanner instances with Azure Service Fabric, ensuring that your Azure and Windows-based container applications are protected.
Amazon EKS-Distro (EKS-D) Amazon EKS-Distro (EKS-D) Amazon EKS-Distro enables using the same tools on-prem as your cloud destination. Aqua's holistic Kubernetes security includes KSPM to deliver EKS security
Istio Istio Gain visibility into Istio routings and configure network security policies, protect the Envoy proxy containers, and prevent malicious activity.
Prometheus Prometheus Allow DevOps teams to monitor and alert on events sent from Aqua CSP, in real-time, directly from the Prometheus dashboards.
Harbor Harbor Continuously scan container images in Harbor for known vulnerabilities, embedded secrets, OSS licenses, malware, and configuration issues.
Google Cloud Functions Google Cloud Functions Ensure Google Cloud Functions meet assurance policies before being launched into production, with automated scans for vulnerabilities and sensitive data.
Azure Functions Azure Functions Assess the risk of Azure Functions by discovering vulnerabilities and sensitive data in function’s code and its environment variables. Prevent execution of functions that violate your organization’s security policy.
Slack Slack Send notifications on vulnerabilities and security events discovered by Aqua via dedicated Slack channels for rapid remediation and incident response.
Tanzu Application Service Tanzu Application Service Protect applications running on Tanzu Application Service across their entire lifecycle, from scanning droplet for vulnerabilities and embedded secrets, to securing app instance and Diego cells in runtime.
Kubernetes Kubernetes Enhance Kubernetes native security with deep image scanning, image assurance, and runtime security controls for container workloads, at enterprise scale.
Azure Container Instances (ACI) Azure Container Instances (ACI) Protect applications running on Azure Container Instances, using Aqua MicroEnforcer embedded in the containers to ensure that workloads perform their intended function and detect vulnerable or compromised containers.
Oracle Container Engine (OKE) Oracle Container Engine (OKE) Prevent untrusted images from running and assure compliant configurations for Oracle Container Engine for Kubernetes. Aqua delivers real-time visualization and actionable insights into the security posture of a Container Engine cluster.
Rancher Rancher Protect cloud native workloads on Rancher with full lifecycle security controls that include image scanning, secrets management, and runtime security at scale.
VMware Tanzu Kubernetes Grid VMware Tanzu Kubernetes Grid Protect cloud native workloads on Tanzu Kubernetes Grid with full lifecycle security controls, including image scanning, secrets management, and runtime security at scale.
sumo logic sumo logic Provide DevOps teams with visibility into real-time container security metrics and events in Sumo Logic, to enable quick remediation of security issues. 
IBM QRadar IBM QRadar Provide security teams with centralized visibility into container and serverless function vulnerabilities and runtime security events, within IBM QRadar.
Loggly Loggly Send container and serverless security events to Loggly for centralized events management and incident response.
Amazon CloudWatch Amazon CloudWatch Provide DevOps teams with visibility into real-time container security metrics and events in AWS CloudWatch, to enable quick remediation of security issues.
Azure Operations Management Suite (OMS) Azure Operations Management Suite (OMS) Provide security and DevOps teams with centralized visibility into container and serverless function vulnerabilities and runtime security events, within Azure OMS.
Micro Focus ArcSight Micro Focus ArcSight Provide security teams with centralized visibility into container and serverless function vulnerabilities and runtime security events, within ArcSight.
Red Hat Quay Red Hat Quay Continuously scan container images in Red Hat Quay for known vulnerabilities, embedded secrets, OSS licenses, malware, and configuration issues.
Sonatype Nexus Repository Sonatype Nexus Repository Continuously scan container images in Sonatype Nexus for known vulnerabilities, embedded secrets, OSS licenses, malware, and configuration issues.
JFrog Artifactory JFrog Artifactory Continuously scan container images in Artifactory for known vulnerabilities, embedded secrets, OSS licenses, malware, and configuration issues.
Google Container Registry (GCR) Google Container Registry (GCR) Continuously scan container images in Google Container Registry for known vulnerabilities, embedded secrets, OSS licenses, malware, and configuration issues.
Mirantis Secure Registry Mirantis Secure Registry Continuously scan container images in Mirantis Secure Registry for known vulnerabilities, embedded secrets, OSS licenses, malware, and configuration issues.
Amazon ECR Amazon ECR Continuously scan container images in Amazon ECR for known vulnerabilities, embedded secrets, OSS licenses, malware, and configuration issues.
CyberArk Enterprise Password Vault CyberArk Enterprise Password Vault Securely deliver secrets managed in CyberArk EPV into running containers, on any orchestrator, with no container restart and no persistence on host.
Atlassian Jira Atlassian Jira Automatically open tickets for vulnerabilities and security issues discovered by Aqua, to enable rapid remediation by DevOps teams.
D2IQ Kubernetes Platform (DKP) D2IQ Kubernetes Platform (DKP) Protect cloud native workloads on D2IQ Kubernetes Platform (DKP) with full lifecycle security controls that include image scanning, secrets management, and runtime security at scale.
Azure Key Vault Azure Key Vault Securely deliver secrets managed in Azure Vault into running containers, on any orchestrator, with no container restart and no persistence on host.
AWS Key Management Service (KMS) AWS Key Management Service (KMS) Securely deliver secrets managed in Amazon KMS into running containers, on any orchestrator, with no container restart and no persistence on host.
Oracle Cloud Infrastructure Oracle Cloud Infrastructure Use Aqua Cloud Security Posture Management (CSPM) to reduce risks in your Oracle public cloud, including, best practices, comprehensive policies coverage, remediation assistance and compliance.
Alibaba Cloud Alibaba Cloud Identify and remediate misconfigurations and high-risk settings for Alibaba Cloud with Aqua’s Cloud Security Posture Management, and secure Alibaba Cloud Container Service for Kubernetes infrastructure and workloads with host scanning, assurance policies and run time protection.