Container & Kubernetes Security

Container Security Scanning
for Docker & Kubernetes
images.

AquilaX Container Scanner inspects Docker images layer by layer for CVEs, misconfigurations, privilege escalation paths, and exposed secrets. Full Kubernetes RBAC and runtime security analysis — aligned to CIS and NSA benchmarks.

Standards covered
CIS Kubernetes NSA CNSA CIS Docker
Container — nginx:1.21 · api:latest
# Dockerfile analysis FROM ubuntu:20.04 USER root ← CRITICAL: runs as root EXPOSE 22 ← SSH exposed RUN apt-get install -y curl wget # 47 OS packages with known CVEs
Root container — privilege escalation Critical
CVE-2023-4911 — glibc LOONEY TUNABLES Critical
SSH port exposed (22) — attack surface High
K8s RBAC — cluster-admin binding Critical
🧠 Securitron AI — Container Triage
312 OS packages · 47 CVEs → 7 exploitable · Dockerfile fixes ready
312
packages
7
critical
Layer
analysis
57BLines Scanned
·
31M+Vulnerabilities Found
·
93.54%False Positives Eliminated
·
<120sScan Completion
·
32Parallel Scanners
·
153KApps Protected
·
300+Active Developers
·
57BLines Scanned
·
31M+Vulnerabilities Found
·
93.54%False Positives Eliminated
·
<120sScan Completion
·
32Parallel Scanners
·
153KApps Protected
·
300+Active Developers
·
Container Security Coverage

Docker Security: Images. Configs.
Runtime. All covered.

From the base image to the Kubernetes RBAC policy — AquilaX Container Scanner covers the full container security stack.

🐳

Docker Image CVEs

Layer-by-layer scanning of OS packages (apt, apk, yum) and application packages inside container images. Real-time CVE lookup against NVD, GHSA, and Red Hat Security Advisory.

Layer
Analysis
NVD
Real-time
📄

Dockerfile Security

Root user, privileged mode, unnecessary capabilities, missing health checks, secrets in ENV/ARG, exposed dangerous ports, and ADD vs COPY best practice violations.

Root
User
Secrets
in ENV
☸️

Kubernetes RBAC

ClusterAdmin bindings, wildcard resource permissions, service account token auto-mounting, missing namespaces, and insecure inter-pod communication policies.

RBAC
Analysis
PoLP
Enforced
🏃

Runtime Configuration

Privileged containers, host network/PID/IPC sharing, missing seccomp and AppArmor profiles, writable root filesystems, and missing resource limits and requests.

seccomp
AppArmor
No
Privileged
🔑

Secrets in Images

API keys, database passwords, and certificate private keys baked into image layers — including secrets added in intermediate build stages that persist in the final image.

All
Layers
Build
Cache
🌐

Network Policies

Missing Kubernetes NetworkPolicy resources, overly permissive pod-to-pod communication, exposed service ports, and LoadBalancer services without IP allowlisting.

NetPol
Audit
Service
Exposure
Use Cases

Container Security built for
cloud-native teams.

Container security is a non-negotiable for any team running workloads on Docker or Kubernetes.

🚀

CI/CD Image Gate

Block container image builds that introduce new critical CVEs. Integrate with your registry pipeline — Docker Hub, ECR, GCR, or Harbor — and enforce security before push.

☸️

Kubernetes Hardening

Continuously audit running cluster configurations against CIS Kubernetes benchmarks. Get actionable findings mapped to pod specs and RBAC policies with one-click remediation.

📋

Compliance Evidence

Generate CIS Kubernetes and NSA CNSA compliance reports automatically. Meet DoD STIG, FedRAMP, and SOC 2 container security requirements with continuous audit evidence.

Container Scanner · Available on Premium & Ultimate

Ship containers you
can trust.

Connect your container registry and AquilaX scans every image automatically. No agents inside the container.

14-day Ultimate trial No credit card required Cancel anytime On-premises available