Threat Stack announced
the availability of Threat Stack Container Security
Monitoring for AWS Fargate. Extending the observability provided by the Threat Stack Cloud
Security Platform to AWS Fargate tasks can help Threat Stack customers detect
threats and maintain compliance across all areas of their cloud infrastructure. The Threat Stack Cloud Security
Platform collects and correlates security telemetry from the cloud
management console, host, containers, orchestration, managed container services
and applications, giving Threat Stack customers a comprehensive view into their
entire cloud environment.
AWS Fargate is a serverless
compute engine for containers from Amazon Web Services (AWS) that works with
both Amazon Elastic Container Service (Amazon ECS) and Amazon Elastic
Kubernetes Service (EKS). AWS Fargate makes it easy for users to focus on
building their applications and removes the need to provision and manage
servers, lets users specify and pay for resources per application, and improves
security through application isolation by design. By supporting workloads
within AWS Fargate managed containers, Threat Stack is ensuring customers
maintain visibility and control while they achieve the business-benefits of the
cloud and AWS Fargate.
Threat
Stack customers can monitor several key aspects of AWS Fargate including
processes and network activity within AWS Fargate, application code running in
AWS Fargate container workloads and AWS CloudTrail logs alongside AWS Fargate.
The Threat Stack Cloud Security Platform now enables customers to understand
when containers make unexpected network connections or transfer data to
unexpected IP addresses, and investigate potential threats like data
exfiltration or risky behavior in AWS Fargate.
"Our ‘Leveraging DevSecOps to Secure
Cloud-native Applications' report shows the top container security challenge is aligning
the architectural implementation of a container security control with the
organization's intended container deployment model," said Doug Cahill, Senior
Analyst and Group Practice Director, Cybersecurity, The Enterprise Strategy
Group. "The ability of the Threat Stack Cloud Security Platform to secure
multiple container consumption and deployment models is well suited for
organizations that want flexibility for where their container-based
applications are and will be deployed."
"We're
very excited our customers now have the ability to extend their cloud security
observability into AWS Fargate," said Brian Ahern, CEO, Threat Stack. "Many of
our customers are at the forefront of cloud adoption and Threat Stack Container
Security Monitoring for AWS Fargate allows them to combine security telemetry
from AWS Fargate with all other areas of the cloud infrastructure to maintain
full stack security observability."