Resource Center Content Type Case Studies & Customer Testimonials Compliance Guides Datasheets eBooks and Whitepapers Infographics Reports SOC Threat Intel Videos Webinars Topics Application Security AWS Security Compliance for the Cloud Container Security DevSecOps Machine Learning Security Research Container Security Monitoring for AWS Fargate Datasheet AWS Fargate shifts the AWS shared responsibility model, but there’s still interplay between layers that you need to account for from a security standpoint. This datasheet goes into detail on how Threat Stack monitors AWS Fargate environments, typical use-cases and the available deployment options. Download the datsheet to learn how you can secure multiple layers of AWS Fargate at runtime by monitoring four key aspects: Process activity inside Fargate containers Network flow data within, and external to, Fargate tasks Application code running on top of Fargate AWS CloudTrail logs alongside Fargate You Might Also Like... Container and Kubernetes Data Sheet Cloud Security Threat Briefing: Docker Cryptojacking Exploit SANS Webinar: Securing Microservices in Containerized Environments SANS Webinar: Real World Challenges for PCI Compliant Containers Get Access to Threat Stack's Cloud Security Platform Request Demo Share this Datasheet