Connect Amazon ECS or Kubernetes clusters and create protection policies to start monitoring your container environment with Container Security.
The following table describes the platform support for different ECS and EKS deployments.
Amazon EKS
|
Amazon ECS
|
Microsoft
|
Google
|
Alibaba Cloud
|
Kubernetes | ||||
EC2
|
Fargate
|
EC2
|
Fargate
|
AKS Standard |
GKE Standard
|
GKE Autopilot
|
ACK
|
Includes OpenShift, Gardener, and any other self-managed on-prem clusters
|
|
Admission controller
|
Y
|
Y
|
Y
|
Y
|
Y
|
Y
|
Y
|
||
Continuous Compliance | Y | Y | Y | Y | Y |
Y
|
Y | ||
Runtime Security
|
Y
|
Y
|
Y
|
Y
|
Y
|
Y
|
Y
|
Y
|
|
Vulnerability Scanning
|
Y
|
Y
|
Y
|
Y
|
Y
|
Y
|
Y
|
Y
|
Y
|
Malware Scanning
|
Y |
Y
|
Y
|
Y
|
Y
|
||||
Compliance Scanning
|
Y
|
Y
|
Y
|
Y
|
Y
|
Get Container Security protection up and running quickly and start monitoring your
container
environment for vulnerabilities and policy violations in 5 easy steps.
-
Connect a cluster:
-
Deploy Container Security to one or more of your Kubernetes or Amazon ECS clusters.
-
Amazon ECS: Amazon ECS clusters or Amazon ECS Fargate clusters
-
Monitor policy violations and vulnerability detections
![]() |
NoteContainer Security supports asset configuration and management with Terraform. For
details,
see the Trend Vision One Terraform Provider.
|