Security News > 2020 > August > Threat Stack Cloud Security Platform extends security observability to AWS Fargate tasks

Extending the observability provided by the Threat Stack Cloud Security Platform to AWS Fargate tasks can help Threat Stack customers detect threats and maintain compliance across all areas of their cloud infrastructure.
The Threat Stack Cloud Security Platform collects and correlates security telemetry from the cloud management console, host, containers, orchestration, managed container services and applications, giving Threat Stack customers a view into their entire cloud environment.
Threat Stack customers can monitor several key aspects of AWS Fargate including processes and network activity within AWS Fargate, application code running in AWS Fargate container workloads and AWS CloudTrail logs alongside AWS Fargate.
The Threat Stack Cloud Security Platform now enables customers to understand when containers make unexpected network connections or transfer data to unexpected IP addresses, and investigate potential threats like data exfiltration or risky behavior in AWS Fargate.
"Many of our customers are at the forefront of cloud adoption and Threat Stack Container Security Monitoring for AWS Fargate allows them to combine security telemetry from AWS Fargate with all other areas of the cloud infrastructure to maintain full stack security observability."
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/ewTMVIR695s/
Related news
- Balancing cloud security with performance and availability (source)
- Avoiding vendor lock-in when using managed cloud security services (source)
- Why multi-cloud security needs a fresh approach to stay resilient (source)
- Cloud security gains overshadowed by soaring storage fees (source)
- Google Acquires Wiz for $32 Billion in Its Biggest Deal Ever to Boost Cloud Security (source)
- Google to purchase Wiz for $32 billion in cloud security play (source)
- Cloud security explained: What’s left exposed? (source)
- Oracle Cloud security SNAFU latest: IT giant accused of pedantry as evidence scrubbed (source)
- Inconsistent security strategies fuel third-party threats (source)
- How CISOs can balance security and business agility in the cloud (source)