Broadcast Date: February 19, 2019
Level: 300
AWS Fargate makes it easy to run containers without needing to provision or manage servers. But how do you secure workloads without access to the host? In this tech talk, we explore the security controls and best practices for securing containers running on AWS Fargate. We cover networking setup, IAM, and the AWS and third-party tools you can use to deploy a secure, scalable cluster with AWS Fargate.
Learning Objectives
- Learn how to secure container workloads without access to the host
- Learn about security controls and best practices for securing containers running on AWS Fargate
- Learn about networking setup, IAM, and the AWS and third-party tools needed to deploy a secure, scalable cluster with AWS Fargate
Who Should Attend?
Developers, DevOps Engineers, Architects
Speakers
- Theo Salvo, Sr. Technical Account Manager, AWS
Learn More
To learn more about the services featured in this talk, please visit:
https://aws.amazon.com/fargate
Intro body copy here about 2018 re:Invent launches.
Download the Slide Deck
Compute
Service How To
December 19th, 2018 | 1:00 PM PT
Developing Deep Learning Models for Computer Vision with
Amazon EC2 P3 Instances.
Data Lakes & Analytics
Webinar 1:
What's New / Cloud Innovation
December 10th, 2018 | 11:00 AM PT
EMBARGOED
Register Now>