Security News > 2020 > August > Threat Stack Cloud Security Platform extends security observability to AWS Fargate tasks
Extending the observability provided by the Threat Stack Cloud Security Platform to AWS Fargate tasks can help Threat Stack customers detect threats and maintain compliance across all areas of their cloud infrastructure.
The Threat Stack Cloud Security Platform collects and correlates security telemetry from the cloud management console, host, containers, orchestration, managed container services and applications, giving Threat Stack customers a view into their entire cloud environment.
Threat Stack customers can monitor several key aspects of AWS Fargate including processes and network activity within AWS Fargate, application code running in AWS Fargate container workloads and AWS CloudTrail logs alongside AWS Fargate.
The Threat Stack Cloud Security Platform now enables customers to understand when containers make unexpected network connections or transfer data to unexpected IP addresses, and investigate potential threats like data exfiltration or risky behavior in AWS Fargate.
"Many of our customers are at the forefront of cloud adoption and Threat Stack Container Security Monitoring for AWS Fargate allows them to combine security telemetry from AWS Fargate with all other areas of the cloud infrastructure to maintain full stack security observability."
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/ewTMVIR695s/
Related news
- AWS unveils cloud security IR service for a mere $7K a month (source)
- AWS security essentials for managing compliance, data protection, and threat detection (source)
- Strategies for CISOs navigating hybrid and multi-cloud security (source)
- Are Long-Lived Credentials the New Achilles’ Heel for Cloud Security? (source)
- Best CSPM Tools 2025: Top Cloud Security Solutions Compared (source)
- CrowdStrike vs Wiz: Which Offers Better Cloud Security and Value? (source)
- CISA Mandates Cloud Security for Federal Agencies by 2025 Under Binding Directive 25-01 (source)
- Privileged Accounts, Hidden Threats: Why Privileged Access Security Must Be a Top Priority (source)
- Enhancing visibility for better security in multi-cloud and hybrid environments (source)
- Microsoft Fixes AI, Cloud, and ERP Security Flaws; One Exploited in Active Attacks (source)