BOSTON—-Threat Stack, a leader in cloud security and compliance for infrastructure and applications, today announced the availability of Threat Stack Container Security Monitoring for AWS Fargate. Extending the observability provided by the Threat Stack Cloud Security Platform to AWS Fargate tasks can help Threat Stack customers detect threats and maintain compliance across all areas of their cloud infrastructure. The Threat Stack Cloud Security Platform® collects and correlates security telemetry from the cloud management console, host, containers, orchestration, managed container services and applications, giving Threat Stack customers a comprehensive view into their entire cloud environment.
AWS Fargate is a serverless compute engine for containers from Amazon Web Services (AWS) that works with both Amazon Elastic Container Service (Amazon ECS) and Amazon Elastic Kubernetes Service (EKS). AWS Fargate makes it easy for users to focus on building their applications and removes the need to provision and manage servers, lets users specify and pay for resources per application, and improves security through application isolation by design. By supporting workloads within AWS Fargate managed containers, Threat Stack is ensuring customers maintain visibility and control while they achieve the business-benefits of the cloud and AWS Fargate.
Threat Stack customers can monitor several key aspects of AWS Fargate including processes and network activity within AWS Fargate, application code running in AWS Fargate container workloads and AWS CloudTrail logs alongside AWS Fargate. The Threat Stack Cloud Security Platform now enables customers to understand when containers make unexpected network connections or transfer data to unexpected IP addresses, and investigate potential threats like data exfiltration or risky behavior in AWS Fargate.
“Our ‘Leveraging DevSecOps to Secure Cloud-native Applications’ report shows the top container security challenge is aligning the architectural implementation of a container security control with the organization’s intended container deployment model,” said Doug Cahill, Senior Analyst and Group Practice Director, Cybersecurity, The Enterprise Strategy Group. “The ability of the Threat Stack Cloud Security Platform to secure multiple container consumption and deployment models is well suited for organizations that want flexibility for where their container-based applications are and will be deployed.”
continue reading at businesswire.com