Views:

Connect Amazon ECS or Kubernetes clusters and create protection policies to start monitoring your container environment with Container Security.

The following table describes the platform support for different ECS and EKS deployments.
 
AWS ECS
AWS EKS
Azure
GCP
Self-managed
 
Fargate
EC2
Fargate
EC2
 
GKE (STD)
GKE (Autopilot)
OpenShift/Gardener
Admission controller
   
Y
Y
Y
Y
Y
Y
Runtime Security
Y
Y
Y
Y
Y
Y
 
Y
Runtime Vulnerability Scanning
Y
Y
Y
Y
Y
Y
Y
Y
Runtime Malware Scanning
Y
Y
Y
Y
Y
Drift detection
Y
Y
Y
Y
Y
Y
 
Y
Continuous Container Configuration Protection
   
Y
Y
Y
Y
Y
Y
Get Container Security protection up and running quickly and start monitoring your container environment for vulnerabilities and policy violations in 5 easy steps.
  1. Connect a cluster:
  2. Deploy Container Security to one or more of your Kubernetes or Amazon ECS clusters.
Note
Note
Container Security supports asset configuration and management with Terraform. For details, see the Trend Vision One Terraform Provider.