Amazon VGT2 Las Vegas

Amazon VGT2 Las VegasMore Info

Customers seek an all-encompassing perspective on the security status of their workloads. Continuously monitoring security events during runtime is crucial for developing secure, operationally sound, and dependable workloads, particularly in environments that utilize containers and orchestration platforms. In this entry, we will illustrate how to leverage services like AWS Security Hub and other tools to enhance your security posture. If you’re interested in a related topic, check out another blog post here.

Logical Separation: Advancing Beyond Physical Isolation in the Cloud Era

By Alex Rivera and Jamie Thompson
Published on 29 JUL 2020

We have updated the whitepaper on Logical Separation with AWS to assist customers in maximizing the security and innovative advantages that come from logical separation in cloud environments. This document explores a multi-faceted approach—utilizing identity management, network security, serverless solutions, and container services, among others.

Building a CI/CD Pipeline for Container Vulnerability Scanning with Trivy and AWS Security Hub

By Brian Foster
Published on 29 JUN 2020

In this post, I will guide you through creating a CI/CD pipeline using AWS Developer Tools alongside Trivy, an open-source container vulnerability scanner developed by Aqua Security. You will create two Docker images, one with vulnerabilities and one without, to demonstrate Trivy’s capabilities, including how to forward vulnerability information to AWS Security Hub. For further insights, refer to this comprehensive guide here.

How to Manage Your Application Deployments with Amazon EC2 Container Service and Docker

By Sara Mitchell
Published on 10 DEC 2015

Governance amidst IT teams has become progressively more complex, particularly when it comes to application deployments that involve varied technologies. For instance, consider the challenge of collocating multiple applications on a shared operating system, where unintentional conflicts may arise from the applications themselves or the libraries and network ports they depend on. This situation underscores the necessity for effective governance strategies.

For an excellent resource on interview questions related to this field, check out this link here.

SEO Metadata:


Comments

Leave a Reply

Your email address will not be published. Required fields are marked *