© Shimon Ifrah 2019
S. IfrahDeploy Containers on AWShttps://doi.org/10.1007/978-1-4842-5101-0_6

6. Securing Your Containerized Environment

Shimon Ifrah1 
(1)
Melbourne, VIC, Australia
 

In Chapter 5, you learned how to configure an EC2 instance as a Docker container host and learned how to deploy Windows and Linux containers directly on the host. In this chapter, I will cover AWS security and how to protect your user accounts, container hosts (EC2 instances), applications, and containers.

Security is an essential part of AWS simply because AWS is a public cloud where all servers and services can be accessed from anywhere anytime. Therefore, it is essential to protect your applications, data, and public cloud resources from unauthorized access. A security ...

Get Deploy Containers on AWS: With EC2, ECS, and EKS now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.