Containers

Category: Security, Identity, & Compliance

Multi-account infrastructure provisioning with AWS Control Tower and AWS Proton

Introduction The majority of the enterprise customers tend to establish centralize control and well-architected organization-wide policies when it comes to distribution of cloud resources in multiple teams. These teams are primarily divided into three categories: IT operations, Enterprise Security, and Application (App)-development. While delivery of business value from application standpoint falls under the purview of […]

Announcing additional Linux controls for Amazon ECS tasks on AWS Fargate

Introduction An Amazon Elastic Container Service (Amazon ECS) task is a number of co-located containers that are scheduled on to AWS Fargate or an Amazon EC2 container instance. Containers use Linux namespaces to provide workload isolation—and with namespaces—even though containers are scheduled together in an Amazon ECS task, they’re still isolated from each other and […]

Shift left to secure your container supply chain

Introduction When we talk about securing container solutions, most of the focus is on securing the orchestrator or the infrastructure that the orchestrator runs on. However, at the heart of your container solutions are the containers themselves. In this post, we show you how we ensured that before we even push a container into our […]

Securing Kubecost access with Amazon Cognito

Introduction Kubecost provides real-time cost visibility and insights for teams using Kubernetes. It has an intuitive dashboard to help you understand and analyze the costs of running your workloads in a Kubernetes cluster. Kubecost is built on OpenCost, which was recently accepted as a Cloud Native Computing Foundation (CNCF) Sandbox project, and is actively supported […]

AWS App Runner now integrates with AWS Secrets Manager and AWS Systems Manager Parameter Store

AWS App Runner makes it easy to run web applications and APIs at production scale. It enables you to build, deploy, run, and observe web applications without the burden associated with infrastructure management. Many such applications externalize the storage of URLs, API keys, usernames, database secrets, and configuration parameters. Starting today, App Runner allows you to […]

Blue/Green or Canary Amazon EKS clusters migration for stateless ArgoCD workloads

This blog was authored by Sébastien Allamand (Sr. Solution Architect Specialist, Containers), This blog has also been translated into Korean here. Edit: 02 Jun 2023: The sample has been updated according to the EKS Blueprint V5 Migration Edit 06 October 2023: Upgrade the blog and sample to use gitops-bridge-argocd-bootstrap integration Introduction Organizations use modern application […]

Managing access to Amazon Elastic Kubernetes Service clusters with X.509 certificates

Managing access to Amazon Elastic Kubernetes Service clusters with X.509 certificates

Introduction Currently, customers are given two main options for end users to access Amazon Elastic Kubernetes Service (Amazon EKS) clusters when using utilities like kubectl – AWS Identity and Access Management (AWS IAM), or OpenID Connect (OIDC). However, some customers leverage X.509 certificates to authenticate their end-users for access to Amazon EKS clusters, especially those […]

Amazon ECR in Multi-Account and Multi-Region Architectures

Amazon ECR in Multi-Account and Multi-Region Architectures

Introduction Amazon Elastic Container Registry (Amazon ECR) is a fully managed container registry offering high-performance hosting, so you can reliably deploy application images and artifacts anywhere. It stores container images and artifacts that deploy application workloads across AWS services as well as non-AWS environments. Amazon ECR is a regional service, where each Region in each […]

Read our blog post on securing Amazon Elastic Container Service applications using Application Load Balancer and Amazon Cognito.

Securing Amazon Elastic Container Service applications using Application Load Balancer and Amazon Cognito

Introduction Designing and maintaining secure user management, authentication and other related features for applications is not an easy task. Amazon Cognito takes care of this work, which allows developers to focus on building the core business logic of the application. Amazon Cognito provides user management, authentication, and authorization for applications where users can log in […]

Building STIG-compliant AMIs for Amazon EKS

Building STIG-compliant AMIs for Amazon EKS

As more organizations required to run hardened virtual machines to increase security to meet the internal compliance adopt Kubernetes, there is a need for hardened Amazon Machine Images (AMIs) that work with Amazon Elastic Kubernetes Service (Amazon EKS). There are multiple options to choose from. One solution is to use Bottlerocket, a special-purpose OS from […]