What about container security?

What about container security?

 27.08.2018, last updated 05.03.2021 -  Jeremy T. Bouse

With normal legacy server security you would routinely scan your servers for vulnerabilities, but with the move to using containers this methodology for vulnerability detection doesn’t exactly fit as you would typically build the container and move it along through your environments during the software development life cycle. So how do we check our containers to ensure they are as secure as our old servers? How do you know your image is still secure after it’s been built?

Read more… ( ~5 Min.)
Working with ECS

Working with ECS

 22.08.2018, last updated 05.03.2021 -  Jeremy T. Bouse

By this point we should have a VPC in place and our Private tier subnets can route out either a NAT Gateway or VPN Connection that performs NAT, we can then begin to look at deploying applications into the environment in earnest. In my environment I’ve made the choice to use containers as much as possible so the most logical next step is to setup an Elastic Container Service (ECS)  cluster.

Read more… ( ~6 Min.)
Setting up your Virtual Private Cloud

Setting up your Virtual Private Cloud

 21.08.2018, last updated 05.03.2021 -  Jeremy T. Bouse

If you’ve already followed along from my earlier posts on getting started with AWS and my update to getting started, then by now you should have a multi-tiered VPC across multiple Availability Zones which is setup along the lines that the diagram below displays. Your VPC will have a single Internet Gateway and 2 Gateway Endpoints going to S3 and DynamoDB. Each of the subnets will also have their own Route Table which establishes the routes available from within the subnet.

Read more… ( ~7 Min.)