Container Security Monitoring for AWS Fargate Datasheet

AWS Fargate shifts the AWS shared responsibility model, but there’s still interplay between layers that you need to account for from a security standpoint. This datasheet goes into detail on how Threat Stack monitors AWS Fargate environments, typical use-cases and the available deployment options.

Download the datsheet to learn how you can secure multiple layers of AWS Fargate at runtime by monitoring four key aspects:

  • Process activity inside Fargate containers
  • Network flow data within, and external to, Fargate tasks
  • Application code running on top of Fargate
  • AWS CloudTrail logs alongside Fargate