FAQ: How do I secure my AWS ECS workload with Threat Stack?

Follow

Deploy the Threat Stack host-based Agent – not the containerized Agent – to secure an AWS Elastic Container Service (ECS) environment.

The AWS ECS has an orchestration layer that sits between the host and containers. The orchestration layer allows AWS to manage container instances. However, the orchestration layer does not allow access to the host kernel audit information, which prevents the Threat Stack containerized Agent from deploying correctly. As a result, the Threat Stack host-based Agent must be used to monitor activity in AWS ECS.

Was this article helpful?
0 out of 0 found this helpful
Have more questions? Submit a request

Comments

0 comments

Please sign in to leave a comment.