A company is using Amazon Elastic Container Service (Amazon ECS) to run its container-based application on AWS. The company needs to ensure that the container images contain no severe vulnerabilities. The company also must ensure that only specific IAM roles and specific AWS accounts can access the container images.
Which solution will meet these requirements with the LEAST management overhead?
tainh
Highly Voted 2 years, 5 months agonischal77777
Most Recent 8 months, 3 weeks agohro
1 year, 1 month agoD2
2 years, 5 months agosambda
2 years, 5 months ago