Deploy the Threat Stack host-based Agent – not the containerized Agent – to secure an AWS Elastic Container Service (ECS) environment.
The AWS ECS has an orchestration layer that sits between the host and containers. The orchestration layer allows AWS to manage container instances. However, the orchestration layer does not allow access to the host kernel audit information, which prevents the Threat Stack containerized Agent from deploying correctly. As a result, the Threat Stack host-based Agent must be used to monitor activity in AWS ECS.