O'Reilly logo

Cloud Security Automation by Prashant Priyam

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Securing ECS

AWS ECS always gets created in VPC, where you define subnets and security groups to ensure network-level security to ECS instances. Similar to EC2 instances, here also we specify a key pair to access the SSH of ECS instances.

In the security group, we define CIDR for incoming traffic on a specific port, or a range of contiguous ports, to open on the container instance.

Apart from the security group, we use IAM roles and policies heavily to ensure the security of ECS clusters.

Let's take some example IAM policies that allow a user to perform all the management activity on the ECS cluster:

{  "Version": "2012-10-17",  "Statement": [    {      "Action": [        "ecs:Describe*",        "ecs:List*"      ],      "Effect": "Allow",      "Resource": "*"    },    { "Action": [ ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required