AWS Fargate has been growing in popularity because it expedites time to market by abstracting away more of an organization's infrastructure, simplifying operations and maintenance. With less infrastructure to secure and the pace of development and deployment accelerating, it becomes even more important to to prove the effectiveness of security controls at runtime. Can you quickly spot SSH activity within one of your misconfigured Fargate containers? Can you recognize that a container has been compromised and is now sending large amounts of data to an unknown IP?
Join us as we introduce Threat Stack Container Security Monitoring for AWS Fargate — now generally available. We will outline the security use cases raised by the questions above, demo the functionality of our new Fargate monitoring agent, and show how it fits into existing Threat Stack workflows.
“Threat Stack Cloud Security Platform was designed to automatically scale with us, providing continuous visibility into user, workload and infrastructure behaviors through every stage of our cloud journey.”
– Bibek Galera, Head of Infrastructure Security at Zuora