{"id":53336,"date":"2025-01-16T20:50:25","date_gmt":"2025-01-17T04:50:25","guid":{"rendered":"https:\/\/www.sumologic.com\/integration\/aqua-security-app-fuer-sumo-logic"},"modified":"2026-01-20T17:06:31","modified_gmt":"2026-01-21T01:06:31","slug":"aqua-security","status":"publish","type":"integration","link":"https:\/\/www.sumologic.com\/de\/app-catalog\/aqua-security","title":{"rendered":"Aqua Security-App f\u00fcr Sumo Logic"},"content":{"rendered":"\n<section class=\"e-stn e-stn-04971e5cbc928e92181d738037937e13331b4ca7 e-stn--dynamic-grid-section e-mt-0 e-mb-0\"><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row justify-content-center\">\n<div class=\"wp-block-b3rg-column e-col e-col-23c491b9590ceaa0fec0c4d0a346887f5f358584  col-sm-7\">\n<h2 class=\"wp-block-heading has-text-align-center has-gunmetal-color has-text-color has-link-color wp-elements-920989da562d80a76408c9a185b40b8a\" id=\"get-end-to-end-visibility-for-your-cloud-native-workloads-with-aqua-and-sumo-logic\">Erhalten Sie End-to-End-Transparenz f\u00fcr Ihre Cloud-nativen Workloads mit Aqua und Sumo Logic<\/h2>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-row e-row row e-row--dlt\">\n<div class=\"wp-block-b3rg-column e-col e-col-fb16d19c19a5d501f2ddbce9412fd9f46af6fdf6  col-sm-4\">\n<div class=\"e-div e-div-431e405250f2ce8249058d3c4dd9ba0fc1b25722\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/icon-secure-intellectual-property-1.svg\" alt=\"\" class=\"wp-image-23678\" style=\"aspect-ratio:1;width:63px\" title=\"\"><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\" id=\"image-security-in-your-ci-cd-pipeline\">Image-Sicherheit in Ihrer CI\/CD-Pipeline<\/h3>\n\n\n\n<p>\u00dcberwachen Sie die Sicherheitslage der Images in Ihrer CI\/CD-Pipeline, um bekannte Schwachstellen, Malware und eingebettete sensible Daten in Ihren Workloads zu identifizieren und schnell zu beheben.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-fb16d19c19a5d501f2ddbce9412fd9f46af6fdf6  col-sm-4\">\n<div class=\"e-div e-div-431e405250f2ce8249058d3c4dd9ba0fc1b25722\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/icon-compliance-1.svg\" alt=\"\" class=\"wp-image-23665\" style=\"aspect-ratio:1;width:63px\" title=\"\"><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\" id=\"host-security-and-compliance\">Host-Sicherheit und Compliance<\/h3>\n\n\n\n<p>\u00dcberwachen Sie den Compliance-Status jedes Ihrer Cloud-nativen Hosts auf der Grundlage von CIS-Benchmarks f\u00fcr Kubernetes, Docker und Linux sowie Ihrer eigenen angepassten Compliance-Richtlinien.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-fb16d19c19a5d501f2ddbce9412fd9f46af6fdf6  col-sm-4\">\n<div class=\"e-div e-div-431e405250f2ce8249058d3c4dd9ba0fc1b25722\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-thumbnail is-resized\"><img decoding=\"async\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/icon-in-depth-security-3.svg\" alt=\"\" class=\"wp-image-23672\" style=\"aspect-ratio:1;width:63px\" title=\"\"><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\" id=\"security-in-your-runtime-environment\">Sicherheit in Ihrer Laufzeitumgebung<\/h3>\n\n\n\n<p>\u00dcberwachen Sie unbefugte und verd\u00e4chtige Aktivit\u00e4ten in Ihren Produktions-Workloads. Identifizieren Sie anomale ausf\u00fchrbare Dateien wie Privilegieneskalationen, unregistrierte oder nicht-konforme Images, die in die Produktion \u00fcbertragen werden, sowie unbefugte Netzwerkaktivit\u00e4ten.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n<section class=\"e-stn e-stn-7c38f1bb1226b513cc2c340296a83248f1c6f7a8 e-stn--repeatable-content-cards e-mt-0 e-pt-30 e-mb-0 e-pb-30\"><style>@media only screen and (max-width: 9999px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-7c38f1bb1226b513cc2c340296a83248f1c6f7a8 { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #f8f8f8; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}<\/style><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"3348\" height=\"1560\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Aqua-Security-Image-Security-and-Compliance.png\" alt=\"\" class=\"wp-image-3463\" title=\"\"><\/figure>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\">\n<h2 class=\"wp-block-heading\" id=\"image-security\">Image Security<\/h2>\n\n\n\n<p>Identifizieren und \u00fcberwachen Sie Images in Ihrer CI-Pipeline, die aufgrund von Malware, offengelegten sensiblen Daten oder hochriskanten Schwachstellen gegen Ihre Image Assurance-Richtlinien versto\u00dfen haben. Aqua f\u00fcgt sich in Ihre bevorzugte CI\/CD-Pipeline ein, um Ihre Images kontinuierlich auf bekannte Schwachstellen, Malware und schlechte Konfigurationen zu scannen. So k\u00f6nnen Sie Probleme fr\u00fchzeitig erkennen und beheben, noch bevor Ihre Anwendungen in Produktion gehen.<\/p>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n<section class=\"e-stn e-stn-9ba64c108fcbde5b30e83141be4660222d378972 e-stn--repeatable-content-cards e-mt-0 e-pt-30 e-mb-0 e-pb-30\"><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-15df7f642de35e557df618afb20d16d065041e70 e-col--media-wrapper  col-sm-12 col-lg-6\">\n<h2 class=\"wp-block-heading\" id=\"host-security-and-compliance\">Host-Sicherheit und Compliance<\/h2>\n\n\n\n<p>Identifizieren und \u00fcberwachen Sie den Compliance-Status Ihrer Cloud-Hosts und stellen Sie mit Aqua sicher, dass sie die CIS-Standards f\u00fcr Kubernetes, Docker und Linux erf\u00fcllen.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"3360\" height=\"2100\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Aqua-Security-Host-Security-and-Compliance.png\" alt=\"\" class=\"wp-image-3465\" title=\"\"><\/figure>\n<\/div><\/div>\n<\/div>\n<\/div><\/section>\n\n<section class=\"e-stn e-stn-7c38f1bb1226b513cc2c340296a83248f1c6f7a8 e-stn--repeatable-content-cards e-mt-0 e-pt-30 e-mb-0 e-pb-30\"><style>@media only screen and (max-width: 9999px) {\n\t\t\t\t\t\t\t\t\t.e-stn.e-stn-7c38f1bb1226b513cc2c340296a83248f1c6f7a8 { \n\t\t\t\t\t\t\t\t\t\tbackground-color: #f8f8f8; \n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}<\/style><div class=\"container\">\n<div class=\"wp-block-b3rg-row e-row row\">\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\"><div class=\"e-img \">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1189\" src=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Aqua-Security-Runtime-Events-1-scaled.png\" alt=\"\" class=\"wp-image-66164\" title=\"\" srcset=\"https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Aqua-Security-Runtime-Events-1-scaled.png 2560w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Aqua-Security-Runtime-Events-1-300x139.png 300w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Aqua-Security-Runtime-Events-1-1024x476.png 1024w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Aqua-Security-Runtime-Events-1-768x357.png 768w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Aqua-Security-Runtime-Events-1-1536x713.png 1536w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Aqua-Security-Runtime-Events-1-2048x951.png 2048w, https:\/\/www.sumologic.com\/wp-content\/uploads\/dashboard-Aqua-Security-Runtime-Events-1-575x267.png 575w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\" \/><\/figure>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-b3rg-column e-col e-col-30cf6e0d31fd8780616c8617a3382c2b2c7f4e3b e-col--content-wrapper  col-sm-12 col-lg-6\">\n<h2 class=\"wp-block-heading\" id=\"runtime-security\">Laufzeitsicherheit<\/h2>\n\n\n\n<p>Identifizieren und \u00fcberwachen Sie unbefugtes oder verd\u00e4chtiges Laufzeitverhalten in Ihren Cloud-Native-Workloads. Aqua erkennt und blockiert alle risikoreichen oder unregistrierten Images, die in die Laufzeitumgebung \u00fcbertragen werden, und stoppt anomale ausf\u00fchrbare Dateien und Dokumente sowie verd\u00e4chtige Netzwerkaktivit\u00e4ten in der Produktion.<\/p>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":4,"featured_media":29056,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","show_popup":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","place_holder_image_url":"","post_reading_time":"< 1","notification_enabled":false,"notification_text":"","notification_logo":"","notification_expiration_time":0,"is_enable_transparent_header":false,"selected_taxonomy_terms":{"integration-cloud-provider":[],"integration-use-case":[267,270],"translation_priority":[221]},"selected_primary_terms":[],"learn_more_link":[],"featured_page_list":[],"notification_enabled_post_list":[],"_gspb_post_css":"","_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"54001,54012,54020","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"integration-cloud-provider":[],"integration-use-case":[267,270],"class_list":["post-53336","integration","type-integration","status-publish","has-post-thumbnail","hentry","integration-use-case-security","integration-use-case-development"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/integration\/53336","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/integration"}],"about":[{"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/types\/integration"}],"author":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/users\/4"}],"version-history":[{"count":6,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/integration\/53336\/revisions"}],"predecessor-version":[{"id":66925,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/integration\/53336\/revisions\/66925"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/media\/29056"}],"wp:attachment":[{"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/media?parent=53336"}],"wp:term":[{"taxonomy":"integration-cloud-provider","embeddable":true,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/integration-cloud-provider?post=53336"},{"taxonomy":"integration-use-case","embeddable":true,"href":"https:\/\/www.sumologic.com\/de\/wp-json\/wp\/v2\/integration-use-case?post=53336"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}