The wide range of options for running containers on AWS creates different security considerations for each strategy.

How does your container strategy impacts security requirements?
What are the key capabilities needed for threat prevention, detection and response?

Do you have the overview of security best practices for your preferred combination of orchestration and compute engine: EKS or ECS on EC2 or Fargate, DIY Kubernetes on EC2, Docker, and more.

Are you struggling with some of the questions above?
Reach out to your IT2Trust Business Manager for a discussion to answers your specific questions on how to secure containers.

Recommended short video
Download Whitepaper


You can also get news about IT-security sent directly to your inbox – via our e-newsletter News2You.
News2You is targeted to both resellers and end users – and contains the latest within IT-security and Networking solutions – as well as invitations to seminars and other events we host.

Do you wish to receive News2You in the future, please send os an e-mail to