A company is using Amazon Elastic Container Service (Amazon ECS) to run its container-based application on AWS. The company needs to ensure that the container images contain no severe vulnerabilities. The company also must ensure that only specific IAM roles and specific AWS accounts can access the container images.
Which solution will meet these requirements with the LEAST management overhead?
ion_gee
7 months, 1 week agoGafa255
10 months, 2 weeks agoDaniel76
11 months, 3 weeks agoAgboolaKun
1 year agoAamee
1 year ago[Removed]
1 year ago[Removed]
1 year agooioi
1 year ago