A company is using Amazon Elastic Container Service (Amazon ECS) to run its container-based application on AWS. The company needs to ensure that the container images contain no severe vulnerabilities. The company also must ensure that only specific IAM roles and specific AWS accounts can access the container images.
Which solution will meet these requirements with the LEAST management overhead?
ion_gee
4 months, 1 week agoGafa255
7 months, 2 weeks agoDaniel76
8 months, 3 weeks agoAgboolaKun
9 months, 1 week agoAamee
9 months, 1 week ago[Removed]
9 months, 1 week ago[Removed]
9 months, 1 week agooioi
9 months, 2 weeks ago