Aqua scans your container images for vulnerabilities, malware, and secrets - like every other security tool nowadays. But they were doing it back in 2015 when Docker was version 1.7 and most enterprises wouldn't touch containers with a ten-foot pole.
The Core Stuff That Works
Container Image Scanning: They hook into your CI/CD pipeline and scan images during builds. Unlike Twistlock (before Palo Alto bought them and made everything slower), Aqua usually finishes scans in under 3 minutes for normal images. Catches CVEs, hardcoded passwords, and malicious packages that some jackass developer inevitably includes - like that time someone npm installed a bitcoin miner thinking it was a legit crypto library.
Runtime Protection: Once your containers are running, Aqua watches for suspicious behavior. If something starts making network calls to sketchy domains or writing files where it shouldn't, it'll flag or block it. This caught crypto miners in our staging cluster back in March 2024 - they were mining some shitcoin called Monero and maxing out our t3.medium nodes.
Kubernetes Security: Probably their strongest feature. They actually understand Kubernetes YAML and catch misconfigurations before they hit production. Running as root, missing network policies, overly permissive RBAC - all the dumb shit that keeps you up at night wondering if you're about to get pwned.
The Enterprise Marketing Bullshit (That's Actually Useful)
They call themselves "CNAPP" now - Cloud Native Application Protection Platform. Sounds like marketing garbage, but it means they handle:
- Cloud posture checking: Scans your AWS/Azure/GCP configs for the obvious mistakes everyone makes
- Runtime workload protection: Behavioral analysis for running containers that actually works
- Supply chain security: Making sure your base images and dependencies aren't compromised by some supply chain attack
Real Integration Experience
Their Kubernetes integration is actually solid. I've deployed it on three different clusters (EKS 1.24, GKE 1.23, and one cursed on-prem cluster running K8s 1.21) and it usually works without breaking everything. The admission control webhook occasionally fucks up deployments during busy periods - we hit this during a particularly brutal Monday morning deployment rush when everyone decided to push at once.
AWS integration is smooth if you're using EKS. Other clouds work but feel like afterthoughts - GKE works fine, AKS is hit-or-miss. The Jenkins plugin is decent but times out on images over 2GB, which is basically every Java app we've ever built.
New AI Security Features (Mostly Bullshit)
They shoved AI security features into the product in early 2025 because apparently every enterprise tool needs "AI" in the marketing slides now. 90% of it is pure vendor theatre - prompt injection detection, model scanning, whatever. Sure, the prompt injection stuff might catch something if you're crazy enough to run LLMs in production containers, but show me one company actually doing that without losing sleep.
What Actually Breaks
- Setup takes longer than their sales demo suggests (plan a weekend, not a Tuesday afternoon) - learned this when we tried to deploy during a "quick maintenance window"
- Resource usage is heavier than their docs claim - we hit around 50% CPU overhead during security scan bursts on our EKS 1.24 cluster
- PostgreSQL backend will choke if you don't tune it properly (their default max_connections=100 is laughable for anything beyond dev)
- GitLab integration is half-baked compared to their GitHub and Jenkins plugins - the documentation writers clearly never actually used this feature