Broadcast Date: February 19, 2019

Level: 300

AWS Fargate makes it easy to run containers without needing to provision or manage servers. But how do you secure workloads without access to the host? In this tech talk, we explore the security controls and best practices for securing containers running on AWS Fargate. We cover networking setup, IAM, and the AWS and third-party tools you can use to deploy a secure, scalable cluster with AWS Fargate.

Learning Objectives

  • Learn how to secure container workloads without access to the host
  • Learn about security controls and best practices for securing containers running on AWS Fargate
  • Learn about networking setup, IAM, and the AWS and third-party tools needed to deploy a secure, scalable cluster with AWS Fargate

Who Should Attend?

Developers, DevOps Engineers, Architects

Speakers

  • Theo Salvo, Sr. Technical Account Manager, AWS


Learn More

To learn more about the services featured in this talk, please visit:
https://aws.amazon.com/fargate

Intro body copy here about 2018 re:Invent launches.

Download the Slide Deck

Compute

Service How To

December 19th, 2018 | 1:00 PM PT

Developing Deep Learning Models for Computer Vision with
Amazon EC2 P3 Instances.

Register Now>

Containers

What's New / Cloud Innovation

December 11th, 2018 | 1:00 PM PT

EMBARGOED

Register Now>

Data Lakes & Analytics

Webinar 1:

What's New / Cloud Innovation

December 10th, 2018 | 11:00 AM PT

EMBARGOED

Register Now>

Webinar 2:

What's New / Cloud Innovation

December 12th, 2018 | 11:00 AM PT

EMBARGOED

Register Now>