SupportContactLogin
Live Demo

Container Security Monitoring for AWS Fargate Datasheet

AWS Fargate shifts the AWS shared responsibility model, but there’s still interplay between layers that you need to account for from a security standpoint. This datasheet goes into detail on how Threat Stack monitors AWS Fargate environments, typical use-cases and the available deployment options.

Download the datsheet to learn how you can secure multiple layers of AWS Fargate at runtime by monitoring four key aspects:

  • Process activity inside Fargate containers
  • Network flow data within, and external to, Fargate tasks
  • Application code running on top of Fargate
  • AWS CloudTrail logs alongside Fargate