Aqua Security integration
Triage Aqua image CVEs and vulnerability findings with exploitability analysis.
Integration details
Primary category
Container Image Security
Sync direction
Aqua Security ↔ Konvu
Findings are ingested from Aqua Security into Konvu. Based on your workflow, Konvu can then push context, status changes, and severity updates back to Aqua Security.
Status
Coming soon
What is Aqua Security?
Aqua Security provides enterprise container security with runtime protection, image scanning, Kubernetes admission control, and workload policy enforcement across the container lifecycle.
Why connect Aqua Security to Konvu
- Reduce noise from Aqua's image scans by identifying which CVEs are actually exploitable in your specific environment.
- Correlate threat detections with exploitability analysis to prioritize fixes that address vulnerabilities meeting exploit conditions.
- Maintain audit trails showing why specific Aqua findings were accepted or remediated based on evidence.
How it works
Scan
Aqua Security produces findings from scans or assessments.
Ingest & enrich
Konvu ingests those findings and enriches them with code, configuration, and deployment context.
Assess exploitability
Konvu determines exploitability and recommended action with evidence attached.
Sync decisions
Based on your workflow, Konvu can push context, status updates, and severity adjustments back into Aqua Security.
Quick setup
When Aqua Security is available, you’ll configure it from the integrations list in Konvu.
- 1Go to /configuration/integrations in Konvu and choose Aqua Security.
- 2Authorize access and confirm the data sources you want to sync.
- 3Save the configuration to start syncing.
Sync direction
Aqua Security ↔ Konvu
Findings are ingested from Aqua Security into Konvu. Based on your workflow, Konvu can then push context, status changes, and severity updates back to Aqua Security.
Join the waitlist
We’ll let you know when the Aqua Security integration is ready. Leave your email to get updates.
More integrations
View all
Grype
Focus Grype's container image scan results on vulnerabilities that are actually exploitable.
Snyk
Triage Snyk vulnerabilities across code, dependencies, and containers with exploit context.
Trivy
Filter Trivy's comprehensive scan output to focus on exploitable vulnerabilities.

Anchore
Triage Anchore policy violations and SBOM vulnerabilities with exploitability analysis.
Docker Scout
Focus Docker Scout recommendations on vulnerabilities exploitable in your environment.

Sysdig
Prioritize Sysdig vulnerability findings with environment-specific exploitability analysis.