youtube image
From YouTube: 49. #EveryoneCanContribute Cafe: Aqua Security and Open Source with Anaïs Urlichs

Description

Anaïs Urlichs did a deep dive into the OSS tools from Aqua Security: Trivy, tfsec, Starboard, Tracee and more. We have discussed usage scenarios, custom policies, the integration touch points between the tools, and how to contribute.

Join our meetup group: https://www.meetup.com/everyonecancontribute-cafe/ Blog: https://everyonecancontribute.com/post/2022-03-08-cafe-49-aqua-security-open-source/

TOC
0:00 Introduction
2:39 Overview of Aqua Security OSS projects
3:22 Trivy: Container and IaC security scanning https://aquasecurity.github.io/trivy/latest/
16:40 Trivy: Custom policies https://aquasecurity.github.io/trivy/latest/misconfiguration/custom/ & differences to tfsec https://aquasecurity.github.io/trivy/latest/misconfiguration/comparison/tfsec/
19:34 Starboard: Vulnerability scanning in Kubernetes clusters https://aquasecurity.github.io/starboard/latest/
25:34 Starboard: Custom policies for Trivy https://aquasecurity.github.io/starboard/latest/integrations/vulnerability-scanners/trivy/
30:22 Trivy exporter for Prometheus
30:58 Aqua Enterprise insights into runtime protection
35:00 Starboard operator, with Prometheus metrics
38:00 Starboard integrations: Polaris, Conftest
42:58 Tracee: Runtime security and forensics using eBPF https://aquasecurity.github.io/tracee/latest/
51:55 Tracee: Differences to Falco discussion https://github.com/aquasecurity/tracee/issues/48
57:52 How to contribute: Slack https://blog.aquasec.com/open-source-developer-slack-community & projects https://github.com/aquasecurity
1:00:43 Q&A: Starboard reports dashboard, alerting, OOTB support in Aqua Enterprise, open-sourcing the tools to keep the pace of development, and reduce server load.