A company is using Amazon Elastic Container Service (Amazon ECS) to run its container-based application on AWS. The company needs to ensure that the container images contain no severe vulnerabilities. The company also must ensure that only specific IAM roles and specific AWS accounts can access the container images.
Which solution will meet these requirements with the LEAST management overhead?
tainh
Highly Voted 2 years, 6 months agonischal77777
Most Recent 10 months, 2 weeks agohro
1 year, 3 months agoD2
2 years, 7 months agosambda
2 years, 7 months ago