A company is using Amazon Elastic Container Service (Amazon ECS) to run its container-based application on AWS. The company needs to ensure that the container images contain no severe vulnerabilities. The company also must ensure that only specific IAM roles and specific AWS accounts can access the container images.
Which solution will meet these requirements with the LEAST management overhead?
phmeeeee
2 months, 3 weeks agoion_gee
8 months, 1 week agoGafa255
11 months, 1 week agoDaniel76
1 year agoAgboolaKun
1 year, 1 month agoAamee
1 year, 1 month ago[Removed]
1 year, 1 month ago[Removed]
1 year, 1 month agooioi
1 year, 1 month ago