Containers
Category: Security, Identity, & Compliance
Multi-account infrastructure provisioning with AWS Control Tower and AWS Proton
Introduction The majority of the enterprise customers tend to establish centralize control and well-architected organization-wide policies when it comes to distribution of cloud resources in multiple teams. These teams are primarily divided into three categories: IT operations, Enterprise Security, and Application (App)-development. While delivery of business value from application standpoint falls under the purview of […]
Announcing additional Linux controls for Amazon ECS tasks on AWS Fargate
Introduction An Amazon Elastic Container Service (Amazon ECS) task is a number of co-located containers that are scheduled on to AWS Fargate or an Amazon EC2 container instance. Containers use Linux namespaces to provide workload isolation—and with namespaces—even though containers are scheduled together in an Amazon ECS task, they’re still isolated from each other and […]
Shift left to secure your container supply chain
Introduction When we talk about securing container solutions, most of the focus is on securing the orchestrator or the infrastructure that the orchestrator runs on. However, at the heart of your container solutions are the containers themselves. In this post, we show you how we ensured that before we even push a container into our […]
Securing Kubecost access with Amazon Cognito
Introduction Kubecost provides real-time cost visibility and insights for teams using Kubernetes. It has an intuitive dashboard to help you understand and analyze the costs of running your workloads in a Kubernetes cluster. Kubecost is built on OpenCost, which was recently accepted as a Cloud Native Computing Foundation (CNCF) Sandbox project, and is actively supported […]
AWS App Runner now integrates with AWS Secrets Manager and AWS Systems Manager Parameter Store
AWS App Runner makes it easy to run web applications and APIs at production scale. It enables you to build, deploy, run, and observe web applications without the burden associated with infrastructure management. Many such applications externalize the storage of URLs, API keys, usernames, database secrets, and configuration parameters. Starting today, App Runner allows you to […]
Blue/Green or Canary Amazon EKS clusters migration for stateless ArgoCD workloads
This blog was authored by Sébastien Allamand (Sr. Solution Architect Specialist, Containers), This blog has also been translated into Korean here. Edit: 02 Jun 2023: The sample has been updated according to the EKS Blueprint V5 Migration Edit 06 October 2023: Upgrade the blog and sample to use gitops-bridge-argocd-bootstrap integration Introduction Organizations use modern application […]
Managing access to Amazon Elastic Kubernetes Service clusters with X.509 certificates
Introduction Currently, customers are given two main options for end users to access Amazon Elastic Kubernetes Service (Amazon EKS) clusters when using utilities like kubectl – AWS Identity and Access Management (AWS IAM), or OpenID Connect (OIDC). However, some customers leverage X.509 certificates to authenticate their end-users for access to Amazon EKS clusters, especially those […]
Amazon ECR in Multi-Account and Multi-Region Architectures
Introduction Amazon Elastic Container Registry (Amazon ECR) is a fully managed container registry offering high-performance hosting, so you can reliably deploy application images and artifacts anywhere. It stores container images and artifacts that deploy application workloads across AWS services as well as non-AWS environments. Amazon ECR is a regional service, where each Region in each […]
Securing Amazon Elastic Container Service applications using Application Load Balancer and Amazon Cognito
Introduction Designing and maintaining secure user management, authentication and other related features for applications is not an easy task. Amazon Cognito takes care of this work, which allows developers to focus on building the core business logic of the application. Amazon Cognito provides user management, authentication, and authorization for applications where users can log in […]
Building STIG-compliant AMIs for Amazon EKS
As more organizations required to run hardened virtual machines to increase security to meet the internal compliance adopt Kubernetes, there is a need for hardened Amazon Machine Images (AMIs) that work with Amazon Elastic Kubernetes Service (Amazon EKS). There are multiple options to choose from. One solution is to use Bottlerocket, a special-purpose OS from […]









