AWS Security

Complete Security for AWS ECS, EKS, Fargate, and Lambda

Enterprises using Amazon ECR, ECS, EKS, Fargate and Lambda, trust Twistlock to provide vulnerability prevention, compliance enforcement, container-aware firewalling, and powerful runtime protection to secure their cloud native applications. Twistlock is proud to be an official member of the AWS Partner Network.

Vulnerability Prevention from Development to Runtime

Detects vulnerabilities in your images throughout their lifecycle, from the beginning of the CI process, to registries, to all your production deployments whether using ECS, EKS, Fargate, or your own self-managed environment in EC2. Create granular policies to prevent vulnerable images from being deployed per task or per region and rely on Twistlock IAM role integration to securely and seamlessly connect to ECR repositories. Integrate Twistlock’s vulnerability and compliance enforcement directly into your CodePipeline jobs.

Implement Full Lifecycle Compliance

With over 30 built-in checks covering every recommendation in the Docker, Kubernetes, and Linux CIS Benchmarks, Twistlock automatically enforces compliance policies across the container lifecycle. Twistlock provides built-in templates for compliance regimes like PCI, HIPAA, GDPR, and NIST SP 800-190 that you can easily implement across hosts, orchestrators, containers, and images in AWS.

Advanced Threat Intelligence

In addition to the more than 30 other upstream vulnerability and threat sources, the Twistlock Intelligence Stream also includes full coverage for Amazon Linux. Twistlock detects and prevents vulnerabilities when Amazon Linux is used as either a host OS or container image base layer. So, regardless of what OS you choose for your hosts and images, Twistlock is ready to protect you.

Cloud Native Firewalling Ready for AWS

Automatically-deployed layer-3 and layer-7 firewalls work with your VPCs and security groups to provide additional layers of defense in depth for your containerized apps.

Runtime Security Spanning VMs to Serverless

From network and application firewalls, to runtime defense, to host protection — Twistlock is the only security tool you need to defend your cloud native applications against vulnerabilities and active threats. Because Twistlock supports Amazon Linux, IAM roles, ECS, EKS, Fargate, and Lambda, you can use AWS services fearlessly, knowing your security platform is ready to protect you across all of them them.

Integrated with AWS Security Hub

Twistlock integrates with AWS Security Hub to provide you with cloud native data and alerts in one centralized dashboard. Aggregate vulnerability and compliance metrics with runtime security intelligence across environments to continuously monitor your cloud native applications on AWS.

Protecting Serverless Functions at Runtime

Read now

“Twistlock allows our team to easily protect containerized applications running in Articulate’s AWS environment. With Twistlock we’re able to identify and address risks before apps reach production – helping our teams ship safer code and gain our customers trust.”

Pim Polderman Platform Engineer, Articulate
Kubernetes Deployment & Security Patterns
Shine a light on answering the question: How well does Kubernetes work in production? Get data research and findings about Kubernetes deployment and security practices.